Basic Online Security Assessment Welcome to your Basic Online Security Assessment Password SecurityI have the same password for every online account.I have two passwords I rotate for every online account.I have a different password for each online account. Password SecurityI use the suggested "strong password" whenever possible.I use my first or last name and pet name when creating passwords.I use letters from names I know, plus capital and lowercase letters, numbers and special characters. Password SecurityI give my login information to others.I keep my login information to myself and would never share it.I email my passwords to friends to login to my account. Public WIFII check my banking statements and process bill pay on public WIFI accounts.I use a protected browser and never login to personal accounts on public WIFI.I use a protected web browser, have malware installed but will occasionally check my online balance and login to personal accounts. Public WIFII open sensitive documents from work while using public WIFI.I use a protected browser, have employed an IT company to protect and encrypt all mobile working devices, and instruct employees to never open sensitive information while working from public WIFI sources.I use a protected web browser, have some sort of malware installed and I use my work computer to conduct sensitive business over public WIFI. Office WIFII give my WIFI password out to guests who visit.I have a strong password or used the password provided to me by my internet company and do not share this information. We have a separate WIFI for guests when they visit.I do not password protect my private WIFI. Office WIFIAll staff members have the password to our office WIFI but are given strict instructions to not connect personal devices.My office has a protected WIFI and the password is not given out. There is a guest WIFI for personal devices and guests.All staff members have the login information to our company WIFI and are encouraged to use for work and personal devices. Malware ProtectionI have a low-cost, basic malware protection, but I’m not sure if it’s even doing anything.I have hired a company to protect my business from malware and hacking.I have no form of protection for any of my computer systems. EmailOur company offers employee training for how to protect the company when utilizing email, but they are allowed to send sensitive information over email as long as they follow protocol.All sensitive information is kept away from email. We have an encrypted system that is monitored by our hired IT company.We allow all information to be sent via email. No encryption has been put into place. Employee TrainingMy company offers staff training covering safety online provided by our hired IT company quarterly to keep up with the ever-changing hacking and phishing techniques.Our employees should know what is appropriate when we hire them.I use letters from names I know, plus capital and lowercase letters, numbers and special characters. Time is Up! Search for: Recent Posts Managed IT | A Necessity for Small Business Latest Cyber Security Tactics Remote Working | Safety Tips Social Media | Risks for your business Cybersecurity: Over-the-Counter vs Rx JFG TeamThe JFG Team recognizes the value and importance of relationships and works to maintain excellence in responsive service and technical business support.