Cyber Insurance Risk Survey Email(Required) Name(Required)Title/Role(Required)Third-Party IT provider for firm/BusinessIT Employee of Firm/BusinessNon-IT employee of Firm/BusinessA 'Third-Party IT provider for firm/Business' is a third party contractor providing IT services to the firm/business.Business Name(Required)Estimated Annual Firm Revenue(Required)Please estimate the firm's gross revenue for the next 12 months.Total number of employees(Required)Please provide the total number employees.Does the applicant have MFA in place for remote network access?(Required) Yes No Uncertain For access to your network. Multi-factor authentication is a security system that requires two or more methods of authentication from different categories that verify a user's identity to log in.Does the applicant have MFA in place for email access?(Required) Yes No Uncertain For Email access specifically. Multi-factor authentication is a security system that requires two or more methods of authentication from different categories that verify a user's identity to log in.Does the applicant have MFA in place for network administrators and other privileged users?(Required) Yes No Uncertain For network administrators and other privileged users specifically. Multi-factor authentication is a security system that requires two or more methods of authentication from different categories that verify a user's identity to log in.Does the applicant use an EDR tool that includes centralized monitoring?(Required) Yes No Uncertain Endpoint Detection and Response (EDR), also referred to as endpoint detection and threat response (EDTR), is a cybersecurity solution that continuously detects and mitigates cyber threats on endpoint devices.Does the applicant use an email security filtering tool?(Required) Yes No Uncertain EmailDoes the applicant regularly back up and segregate sensitive data?(Required) Yes No Uncertain Backups