take a closer look at your IT today!

Every business is a potential target to cybercriminals, but the healthcare industry is particularly attractive due to the large amount of personal data stored on patients. With ransomware at an all-time high, it’s time to take a closer look at what your current IT company is doing to secure you from a cyber-attack, data breach, or compliance violation.

Take this 2-minute quiz to determine if you are properly secured.

"*" indicates required fields

EYES ON IT: Is Your Current Provider Doing Enough?

Find out with this quick quiz!

1. Have they met with you in the last 3 months to discuss your IT Security Plan and new tools such as 2FA or advanced endpoint security?
2. Do they monitor, patch, and update your network’s security daily or weekly? Are they reviewing firewall logs? Do they provide proof?
3. Have they urged you to review your cyber insurance? Have they ensured your policy requirements are being met?
4. Do they have insurance to cover you if they make a mistake? Do you have a copy of their current policy?
5. Have they provided you with a clear plan in case of a breach? If not, why not?
6. Are they outsourcing your support?
7. Are their technicians trained on new threats? Do they have certified cybersecurity experts on staff?
8. Do they have a ransomware-proof backup system in place?
9. Have they implemented a mobile device security policy? Is your data encrypted and remotely wipeable?
10. Do they enforce strong passwords and regular updates? Is there a process for changing passwords if an employee leaves?
11. Have they discussed replacing your old antivirus with advanced endpoint security?
12. Do you know who has admin privileges? Do they notify you of new access requests?
13. Do they conduct a comprehensive risk assessment every year?
14. Have they implemented web filtering to block harmful or inappropriate websites?
15. Have they provided cybersecurity training for you and your employees? Have they helped create an acceptable use policy (AUP)?
16. Have they configured your email to prevent the transmission of confidential data?
17. Is your remote access granted by a securely installed software agent? Who has access to the software dashboard providing your IT remote access?
18. Have they talked to you about monitoring for dark web threats?
19. Do you know who has access to your network and what security controls are in place? Is there a protocol for granting (and rescinding) permissions?
20. Has your provider explained where your backups reside and how long a restoration would take?

LEARN YOUR SCORE AND DISCOVER HOW SECURE YOUR PRACTICE IS

If there’s room for improvement, ask us for a free Vulnerability Scan. ACT is offering a limited number of healthcare practices a free Vulnerability Scan to identify security gaps in networks and protocols. You’ll receive an actionable plan with best practices for securing your network and fixing issues before they become problems. And the best part is, it’s free (really)!
By submitting this form you agree to receive email, text, and promotional communications from Advanced Computer Technologies related to products and services in accordance with Advanced Computer Technologies' privacy policy.

7

Benefits of a Vulnerability Scan

  • Identifies where your practice has security gaps, making you vulnerable to phishing attacks, hacking attempts, and ransomware
  • Defines the level of risk for every security gap
  • Provides actionable best practices to correct issues before they become problems

Common Misconceptions About Security

  • I have a firewall; why should I worry?
  • Employees working from home have secured laptops, so there shouldn’t be a problem.
  • All our computers have anti-virus software installed, so they’re protected.
  • We use a highly-rated video conferencing platform, so it must be secure.
  • Our IT guy updates our computers and fixes issues when we call, so our network is secure.

All of these assumptions are false.

A Vulnerability Scan locates the weak spots, and offers solutions to strengthen the security of your practice.

Why BUSINESSES Choose ACT as their Technology & security Partner

ACT has been protecting businesses for nearly 25 years. We have a deep understanding of how networks need to be configured, how to protect data, ensure uptime, support software packages, and meet compliance requirements. Businesses appreciate our turn-key solutions, our fast response times, and our professional engineers and technicians.  

WOULD YOU TRADE 10 MINUTES TO SAVE $4 MILLION?

I know you’re busy and I respect your time. 10 minutes is all I need to explain how our Vulnerability Scan will help you identify your network’s strengths and weaknesses. There’s no risk and no fee. When we’re done, we’ll hand you a report outlining our findings.

Fill out the form above or feel free to call me now at (973) 758-0500.

Managed IT Services | Advanced Security Solutions | Backup & Disaster Recovery | Network Services & Support | Cloud Computing | Co-Managed IT Services | VOIP Phone Solutions

The Trusted Choice for All Technology and Security Needs