DATA BACKUP
Test your latest data backup. Does it restore? Is it protecting all your digital assets or only some? Is there a backup NOT connected physically to a computer? Is there a backup OFFSITE?
VULNERABILITY SCAN
Do a vulnerability scan of your network to ensure best-practice site PROTECTION. Check the firmware level on all edge devices to reduce vulnerabilities the scan may have missed. Is there a DETECTION strategy in place to alert you of a breach?
STAFF MEMBERS
Test your staff members with phishing messages designed with specific words and phrases they would naturally trust. Have they been trained to perceive threats?
DISASTER RECOVERY PLAN
Examine your disaster recovery plan. If your main data storage is destroyed, do you have the means to recover? Determine if your Recovery Time Objective is realistic and what circumstances will cause an increase to your Recovery Point Objective.
TWO-FACTOR AUTHENTICATION
Implement a two-factor authentication strategy for any and all access to your network.