• Skip to primary navigation
  • Skip to main content
  • Enterprise Business
 Login

Direct RFP Logo Icon DirectRFP Login


LinkCare Logo Icon LinkCare Login
916.757.1100
linksource logo

LinkSource Technologies

Strategy and Managed Services for Connectivity and Cloud

  • Network & Cloud Sourcing
    • Networks
    • UCaaS
    • CCaaS
    • Cloud
    • Cyber Security
    • Mobile & IOT
  • Hardware Sourcing
    • Network Hardware
    • Optical Transceivers
    • Server Hardware
    • Storage Hardware
    • Third-Party Maintenance
    • UPS and PDU Hardware
    • ITAD and Data Destruction
  • What We Do
    • Planning and Consulting
    • Strategic Sourcing
    • Expense Management
    • Inventory and Audit
    • SMB Solutions
    • RFP Automation
  • About
    • Who We Serve
    • Leadership
  • Resources
    • Technology Sourcing Blog
    • RFP Automation Blog
    • News and Events
  • Contact

Cybersecurity Checklist

What is the likelihood of each of the following threats impacting your company’s cyber security?

General Threats

Lack of separation between test and production data or environments

Use of unauthorized software or hardware

Sending and receiving of login credentials through unencrypted methods

Operating system not designed for high security

Human Threats

Inadequate or inconsistently enforced security policy

Attackers who impersonate employees over the phone persuading administrators to give out usernames, passwords, modem numbers, etc.

Too many or too few system administrators, or administrators who are highly pressured

Ignorance of security issues, such as lack of security awareness, guidelines, or proper documentation

Information or incorrectly classified or accidentally destroyed, modified, or disclosed

Privacy Threats

Unauthorized monitoring of sensitive data crossing the internal network

Subversion of DNS to redirect email or other traffic

Subversion of routing protocols to redirect email or other traffic

Analysis of ewaste to access sensitive documents or data

Equipment Threats

Equipment failure due to defective hardware, cabling, or communications system

Damage from natural disasters, such as fire, smoke, water, earthquakes, storms, and power outages

Equipment failure due to airborne dust, electromagnetic interference, or static electricity

Incorrect destruction of network interface devices, hard drives, computers, or media

Previous
Next

Last step

Fill out your info and calculate your cybersecurity risk.

Risk of Threat:

Your Score: 0%

Calculating Score Low threat of cybersecurity risk Moderate threat of cybersecurity risk High threat of cybersecurity risk Severe threat of cybersecurity risk

Contact us for SECaaS Sourcing Solutions

Footer

linksource logo
  • Network & Cloud Sourcing
    • Networks
    • UCaaS
    • CCaaS
    • Cloud
    • Cyber Security
    • Mobile & IOT
  • Hardware Sourcing
    • Network Hardware
    • Optical Transceivers
    • Server Hardware
    • Storage Hardware
    • Third-Party Maintenance
    • UPS and PDU Hardware
    • ITAD and Data Destruction
  • What We Do
    • Planning and Consulting
    • Strategic Sourcing
    • Expense Management
    • Inventory and Audit
    • SMB Solutions
    • RFP Automation
  • About
    • Who We Serve
    • Leadership
  • Resources
    • Technology Sourcing Blog
    • RFP Automation Blog
    • News and Events
  • Contact
  • Facebook
  • LinkedIn
  • Twitter
  • YouTube

Copyright © 2022 LinkSource Technologies • All Rights Reserved • Hardware Terms & Conditions • Privacy Policy

  • Network & Cloud Sourcing
  • Hardware Sourcing
  • What We Do
  • About
  • Resources
  • Contact