Continue your free IT Assessment Step 1 of 4 25% Name* First Last Email* Phone NumberCAPTCHA NetworkingIs the networking equipment business grade?*Yes - configured by an IT ProfessionalConsumer - ie. bought at BestBuySupplied by our internet service providerI don't knowWifi*There is a private password secured Wifi channelGuest use the same Wifi as employeesThere is no WifiI don't knowPolicies and Procedures Complex passwords (8+ characters with !, @, #, $, etc.) are enforced. Employees use dual authentication. Employee computer onboarding and offboarding procedures are in place. Support procedures are defined. ComputersComputers:* are less than 3 years old have warranttes are business computers are home computers are all Macs Computer Protection*Endpoint protection not only scans for malware and viruses but also blocks malicious websites, stops phishing attempts, and checks for vulnerabilities. All computers have complete Endpoint ProtectionAll computers have Antivirus & Malware scannersAll computers have Microsoft Security EsentialsSome computers don't have any protectionI don't knowAre all PCs joined to the domain?* A domain is a form of a computer network in which all user accounts, computers, printers and other security principals, are registered with a central database located on one or more clusters of central computers known as domain controllers. Authentication takes place on domain controllers. Open the Control Panel, click the System and Security category, and click System. Look under “Computer name, domain and workgroup settings” here. If you see “Domain”: followed by the name of a domain, your computer is joined to a domain.YesNoSome PCs are joined to the domainWe don't have PCs, we have MacsI don't know Administrative Privileges*On home computers systems, the owner is usually the default administrator. In business and networked systems, this level of permission normally allows the user to install software, and change configuration settings. The term administrative privileges is most commonly used in reference to Microsoft operating systems.Employees have local admin rights.Employees can't install programs without an administrator.I don't know.Monitoring*Computers are monitored for hardware failures and malicious software.Computers have no monitoring.I don't knowBackups* Email connects with IMAP or POP. All files are automatically backed up offsite. Employees store files locally on their computers. There is a BDR (Backup and Disaster Recovery) appliance. Do you want to speak with someone right away? Call 1-888-316-1883 This review of your company’s technology systems and environment will result in a written evaluation with recommendations.