Tomorrow’s Technology Today Vulnerability Test Name* Email* Do you have a Disaster Recovery Plan?* Yes, not only do we know how we would recover data but we have a business continuity plan in place. We have tools and processes in place to recover all data if it is lost. We have a plan in place but have never tested it We have talked about it but have some ideas. No, I never really thought about it. Have you tested your restore and recovery procedures?* We test them monthly and have worked out the problems. We tested them when we first began using the back-up process. I know we should test them but do not know how. We have never tested them. I did not know we needed to test the restore procedures. How often do you back-up?* A full system back-up runs automatically each day. We do a full system back-up weekly. We do incremental back-ups daily. I back up my own documents and data. I do not recall the last time we did a back-up. Do you have usernames and passwords for email, the company firewall, and routers?* Yes, they are fully documented and at our disposal. Yes, but our IT person has them. We have them for some things but not for others. No, I don't feel that we need them. I have no idea. Do you know where all your PC and Server software and licenses are?* Yes, they are all catalogued and accounted for. Most, but not all. I think our IT person might have them. I think we have them somewhere, but we don't necessarily keep track of where we put them. We've never had them. How often do you run an Anti-Virus program, if ever?* As often as I can, especially when I download files from the Internet. Weekly, or I have them scheduled weekly. Every month or so. Only when my screen gets bombarded with pop-ups or acts odd. I don't run/own an anti-virus program. How often do you update your Anti-Virus definitions?* Our anti-virus software is centralized on a server and updated automatically. Every time I run the anti-virus program. Every once in a while. Never. I don't own/run anti-virus, it makes everything too slow. How protected are you from outside intrusion or unauthorized access?* Very well. We have a firewall that is monitored 24 hours a day and no remote access. We have a firewall and users can access the server remotely with a password through our virtual private network. We have a firewall. I assume it is keeping out intruders. Someone mentioned they could get on our server through our wireless network but I have not had a chance to check. We use PC Anywhere (or some other remote control software.) That is protection, right? Your Score: Tomorrow Technology Today Vulnerability Test Name This field is for validation purposes and should be left unchanged.