Leadership
Due Diligence Checklist For IT

As an effective leader, it is important to ask the right questions in order to gain critical business insight. While leaders cannot know everything, they can certainly ask the right questions to gain a better understanding of their organization's IT risks, including those related to ransomware and other threats.

To help you stay informed, we have compiled a list of key questions you should periodically ask your Information Technology staff:

Meeting the cyber security requirements of your insurance carrier is crucial in ensuring that you are fully protected. To ensure that you are in compliance, we recommend taking the following steps:

1) Obtain a copy of the requirements from your insurance carrier.
2) Review and understand the requirements thoroughly.
3) Share the requirements with your IT leader and seek their feedback.
4) Consider seeking a third-party evaluation of your organization's compliance with the requirements.
5) Ensight Advisers offers free evaluation of these requirements, if you need help. Contact us at info@ensightadvisers.com for more information.

By taking these steps and staying informed about your insurance carrier's requirements, you can be sure that your organization is fully protected and in compliance. Contact us at info@ensightadvisers.com for more information.

Best Answer: We have several security protocols and procedures in place to protect against ransomware and other cyber threats. These include:

Regular software and system updates: All software and systems are kept up-to-date with the latest security patches and updates to minimize vulnerabilities.

Employee training: All employees receive regular security training and awareness to help them identify and prevent potential threats.

Data backup: We have a robust data backup strategy in place to ensure that all data is regularly backed up and can be recovered in case of an attack.

Firewall and intrusion detection/prevention systems: We have a firewall and intrusion detection/prevention systems in place to monitor and block suspicious network activity.

Endpoint protection: We use endpoint protection software to monitor and protect all devices connected to our network.

Vulnerability management: We regularly scan our network for vulnerabilities and take action to remediate them promptly.

Incident response plan: We have a well-defined incident response plan in place to ensure a prompt and effective response in case of a security incident.

Third-party vendor risk management: We conduct regular risk assessments of our third-party vendors and service providers to ensure they meet our security standards and have appropriate protections in place.

Our security protocols and procedures are regularly reviewed and updated to stay current with the latest threats and best practices

Best Answer: Yes, all of our software and systems are updated with the latest security patches and updates on a regular basis. We have a robust patch management program in place that ensures all software and systems are up-to-date with the latest security patches and updates. We also use different automated tools to ensure that all the systems are updated on time.

In addition to this, our team regularly monitors for any new vulnerabilities that may arise and takes prompt action to address them. We also have a process in place to test and validate updates before deploying them to production systems to minimize any potential impact on our operations.

Best Answer: Yes, we have third-party vendors and service providers that have access to sensitive data. We have strict security standards in place and all third-party vendors and service providers are required to meet these standards before they are granted access to our sensitive data.

We conduct regular risk assessments of our third-party vendors and service providers to ensure they meet our security standards and have appropriate protections in place. We also require that all third-party vendors and service providers sign agreements outlining our security standards and their responsibilities for protecting sensitive data.

We also have a dedicated team that monitors and audits the security practices of our third-party vendors and service providers on a regular basis to ensure compliance with our security standards.

In addition to this, we have a incident response plan in place to address any security incidents that may occur with these vendors and service providers.

Best Answer: Our organization has a comprehensive incident response plan in place to address any security incidents that may occur. The plan includes a clear chain of command, roles and responsibilities for incident response team members, and procedures for identifying, containing, and mitigating the incident. We regularly test and update our incident response plan to ensure that it remains current and effective. In case of a security incident, our incident response team is activated immediately to investigate and determine the cause of the incident, assess the potential impact, and take the necessary steps to contain and mitigate the incident. We also communicate with relevant stakeholders and partners, including our customers, to keep them informed of the situation and any actions being taken

Best Answer: Our organization regularly measures and monitors the effectiveness of our security measures through a combination of internal and external assessments. We have implemented a robust security program that includes continuous monitoring, vulnerability management, and incident response protocols.
Poor Answer: We don't really measure or monitor the effectiveness of our security measures. We just have some basic security protocols in place and that's good enough. We haven't had any security breaches so far, so I guess our security is working fine.

Ensuring the integrity and availability of your backups is crucial to protecting your data against potential threats such as malware attacks, hardware failures, and accidental deletion. Here are some important questions to ask your IT staff to gain a good understanding of your backup strategy:

1 - Are our backups immutable? (they cannot be changed).
Best Answer: Yes, our backups are immutable, meaning they cannot be modified or tampered with once they are created.
Bad Answer: No, our backups can be modified which could compromise the integrity of the data in case of recovery.

2 - Have you done a full restore from this backup to test it? if so when?
Best Answer: Yes, we have conducted a full restore from our backups within the last 3 months to ensure they are working correctly and that all the data is being backed up.
Bad Answer: No, we have not performed a full restore test to ensure the backups are working correctly and all the data is being backed up.

3 - Can you send me a copy of the last restore results from the system log?
Best Answer: Yes, and I have sent you a copy of the last restore results from the system log, which show the date and time of the restore, the files that were restored, and the status of the restore.
Bad Answer: No, the system logs are not available or the restore report is not up to date, which could indicate an issue with the backup process.

Having a robust backup strategy that includes regular testing and monitoring to ensure that your backups are working correctly is an essential aspect of protecting your data and maintaining the integrity of your backups. At Ensight Advisers we provide backup solutions that are immutable, tested and monitored to ensure that in case of an incident, you can recover your data with minimal disruption.

Best Answer: Yes - Ask for some type of summary report of the training.
Bad Answer: No - Ask what the gaps are.

By asking these questions, you can gain a better understanding of your organization's IT risks and take action to minimize them. For more information on how to improve your organization's security, please contact us at Info@EnsightAdvisers.com or call 1-559-794-2200.