The Trusted Choice for All Technology and Security Needs

EYES ON IT: Is Your Current Provider Doing Enough?

Find out with this quick quiz!

"*" indicates required fields

1. Regularly Scheduled Reviews: Have they met with you in the last 3 months to discuss your IT Security Plan and new tools such as 2FA or advanced endpoint security?
2. Ongoing Monitoring: Do they monitor, patch, and update your network’s security daily or weekly? Are they reviewing firewall logs? Do they provide proof?
3. Insurance Check: Have they urged you to review your cyber insurance? Have they ensured your policy requirements are being met?
4. Their Insurance: Do they have insurance to cover you if they make a mistake? Do you have a copy of their current policy?
5. Incident Response: Have they provided you with a clear plan in case of a breach? If not, why not?
6. Outsourcing Disclosure: Are they outsourcing your support?
7. Staff Training: Are their technicians trained on new threats? Do they have certified cybersecurity experts on staff?
8. Ransomware Protection: Do they have a ransomware-proof backup system in place?
9. Mobile Device Security: Have they implemented a mobile device security policy? Is your data encrypted and remotely wipeable?
10. Password Management: Do they enforce strong passwords and regular updates? Is there a process for changing passwords if an employee leaves?
11. Advanced Security: Have they discussed replacing your old antivirus with advanced endpoint security?
12. Admin Privileges: Do you know who has admin privileges? Do they notify you of new access requests?
13. Annual Risk Assessment: Do they conduct a comprehensive risk assessment every year?
14. Web Filtering: Have they implemented web filtering to block harmful or inappropriate websites?
15. Cybersecurity Training: Have they provided cybersecurity training for you and your employees? Have they helped create an acceptable use policy (AUP)?
16. Email Security: Have they configured your email to prevent the transmission of confidential data?
17. Remote Access: Is your remote access granted by a securely installed software agent? Who has access to the software dashboard providing your IT remote access?
18. Dark Web Monitoring: Have they talked to you about monitoring for dark web threats?
19. Network Access: Do you know who has access to your network and what security controls are in place? Is there a protocol for granting (and rescinding) permissions?
20. Backup & Disaster Recovery Planning: Has your provider explained where your backups reside and how long a restoration would take?

LEARN YOUR SCORE AND DISCOVER HOW SECURE YOUR BUSINESS IS

By submitting this form you agree to receive email, text, and promotional communications from Advanced Computer Technologies related to products and services in accordance with Advanced Computer Technologies' privacy policy.

SECURE YOUR Business Today!

Every business is a potential target to cybercriminals, but accounting firms are particularly attractive due to the large amount of personal data stored on clients.

ACT’s Vulnerability Scan​ identifies security gaps in your network and protocols. You’ll receive an actionable plan with best practices for securing your network and fixing issues before they become a problem.

Give us 10 minutes to show you how a Vulnerability Scan can secure your business. It’s free!

Complete the form or call Rachel Rose at
(973) 758-0500 to speak with someone right away.

7

Benefits of a Vulnerability Scan

  • Identifies where your practice has security gaps, making you vulnerable to phishing attacks, hacking attempts, and ransomware
  • Defines the level of risk for every security gap
  • Provides actionable best practices to correct issues before they become problems

Common Misconceptions About Security

  • I have a firewall; why should I worry?
  • Employees working from home have secured laptops, so there shouldn’t be a problem.
  • All our computers have anti-virus software installed, so they’re protected.
  • We use a highly-rated video conferencing platform, so it must be secure.
  • Our IT guy updates our computers and fixes issues when we call, so our network is secure.

All of these assumptions are false.

A Vulnerability Scan locates the weak spots, and offers solutions to strengthen the security of your business.

Why BUSINESSES Choose ACT as their Technology & security Partner

ACT has been protecting businesses for nearly 25 years. We have a deep understanding of how networks need to be configured, how to protect data, ensure uptime, support software packages, and meet compliance requirements. Businesses appreciate our turn-key solutions, our fast response times, and our professional engineers and technicians.  

WOULD YOU TRADE 10 MINUTES TO SAVE $4 MILLION?

I know you’re busy and I respect your time. 10 minutes is all I need to explain how our Vulnerability Scan will help you identify your network’s strengths and weaknesses. There’s no risk and no fee. When we’re done, we’ll hand you a report outlining our findings.

Fill out the form above or feel free to call me now at (973) 758-0500.

Managed IT Services | Advanced Security Solutions | Backup & Disaster Recovery | Network Services & Support | Cloud Computing | Co-Managed IT Services | VOIP Phone Solutions

The Trusted Choice for All Technology and Security Needs