Skip to content
Contact Us
Services
MANAGED SERVICES
Protectit
Pricing Models
Endpoint Compliance Audit
Security and Compliance Visibility
Managed Endpoint Protection
Computer, Server, Smartphone, and Tablet
Managed Network Protection
Firewall, WiFi, and Remote Communication
Safeguard Scanning & Evidencing
Domain, Cloud, Network, and Endpoint
Other Services
Professional Services
Co-Managed Cybersecurity Services
CISO & Security Personnel Compliance Support
Hardening Services
Cyber Strategy Consulting
Digital Cyber Forensics Services
Cybersecurity Integration as a Service
Secure Synchronization Platform
NIST-Based Solutions
IDENTIFY
Zero Trust Complete
Evidence of Compliance
Protect
Managed Endpoint & Network Protection
Data Exfiltration Protection
Detect & Respond
Managed Detection & Incident Response
Recover
Event Recovery & Breach Support
Industries
CYBER-REGULATED INDUSTRIES
FINANCIAL SERVICES
Life, P&C, and Health Insurance
Carriers, Brokers, Agencies
Commercial Cyber Insurance
Wealth
Broker Dealers, IBDs, RIAs, Hedge Funds
Banking
Retail, Mortgage Bankers, Brokers, Credit Unions
GOVERNMENT
Government Contractors
GOVERNMENT
HEALTHCARE
Hospitals, Clinics, Practitioners
MANUFACTURING
OTHERS
Other Cyber-Regulated Industries
Others
NON CYBER-REGULATED INDUSTRIES
With a commitment to cybersecurity
SERVICE PROVIDERS
Serving Cyber-Regulated Industries
Software Vendors
Law, Compliance, and Consulting Firms
Accounting Firms
Support
Resources
Compliance Corner
Cyber Bites
News
Company
COMPANY
About
Team
Media & Press Kit
Working at FCI
privacy
Security & Privacy Policy
Privacy Notice
FCI SOAR PLATFORM
The platform we built to deliver our services
Security Orchestration
Security Automation
Security Response
OTHER
Financial Planning Association
Free Cybersecurity Audit Preparedness Assessment
Are you ready for a cyber audit?
More >
MANAGED SERVICES
Pricing Models
Endpoint Visibility
Managed Endpoint Protection
Managed Network Protection
Safeguard Scanning & Evidencing
Zero Trust Complete
Evidence of Compliance
Data Exfiltration Protection
Managed Extended Detection & Response
Security Incident Response
Event Recovery & Breach Support
Cybersecurity Integration as a Service
Professional Services
NIST-BASED SOLUTIONS
Zero Trust Ecosystem
Evidence of Compliance
Security Assessment
Managed Endpoint Protection
Data Exfiltration Protection
Managed Network Protection
Managed Extended Detection & Response
Security Incident Response
Event Recovery & Breach Support
Cybersecurity Integration as a Service
Professional Services
INDUSTRIES
Life, P&C & Health Insurance
Commercial Cyber Insurance
Wealth
Banking
Healthcare
Manufacturing
Other Cyber-Regulated Industries
Non Cyber-Regulated Industries
Service Providers
SUPPORT
RESOURCES
Compliance Corner
Cyber Bites
Insights
NEWS
COMPANY
About
Team
Media & Press
Working at FCI
Security & Privacy Policy
Privacy Notice
Security Orchestration
Security Automation
Security Response
Financial Planning Association
Unique Model to work with internal IT teams and MSPs
Co-Managed Cybersecurity
Read >
Menu
MANAGED SERVICES
Pricing Models
Endpoint Visibility
Managed Endpoint Protection
Managed Network Protection
Safeguard Scanning & Evidencing
Zero Trust Complete
Evidence of Compliance
Data Exfiltration Protection
Managed Extended Detection & Response
Security Incident Response
Event Recovery & Breach Support
Cybersecurity Integration as a Service
Professional Services
NIST-BASED SOLUTIONS
Zero Trust Ecosystem
Evidence of Compliance
Security Assessment
Managed Endpoint Protection
Data Exfiltration Protection
Managed Network Protection
Managed Extended Detection & Response
Security Incident Response
Event Recovery & Breach Support
Cybersecurity Integration as a Service
Professional Services
INDUSTRIES
Life, P&C & Health Insurance
Commercial Cyber Insurance
Wealth
Banking
Healthcare
Manufacturing
Other Cyber-Regulated Industries
Non Cyber-Regulated Industries
Service Providers
SUPPORT
RESOURCES
Compliance Corner
Cyber Bites
Insights
NEWS
COMPANY
About
Team
Media & Press
Working at FCI
Security & Privacy Policy
Privacy Notice
Security Orchestration
Security Automation
Security Response
Financial Planning Association
Unique Model to work with internal IT teams and MSPs
Co-Managed Cybersecurity
Read >
1. Name
2. Email
3. Company
4. Company Type (check all that apply)
Insurance Carrier
Broker Dealer
Corporate RIA
Registered Rep
Career Insurance Agent
RIA
5. If you are a Career Insurance Agent, who is your Carrier?
6. If you are a Registered Rep, who is your Broker Dealer?
7. Your IT Support team is
Internal
Outsourced
I do not have an IT Support team
I do not know
8. The majority of your cyber tools are local or managed? Local Cybersecurity tools are installed and configured by users or IT staff and have no link with a Security Operation Center (SOC). Managed Cybersecurity tools are installed, configured and monitored from distance by a Security Operation Center (SOC) and without any user involvement.
Local
Managed
I do not know
9. Do you have an Antivirus installed?
Yes, local
Yes, managed
No
I do not know
10. If you have an antivirus, what brand?
11. Do you have full-disk encryption?
Yes, local
Yes, managed
No
I do not know
12. If you have full-disk encryption, what brand?
13. Do you have encrypted backup?
Yes, local
Yes, managed
No
I do not know
14. If you have encrypted backup, what brand?
15. Do you have multi-factor authentication?
Yes, local
Yes, managed
No
I do not know
16. If you have multi-factor authentication, what brand?
17. Do you have secure encrypted email?
Yes, local
Yes, managed
No
I do not know
18. If you have secure encrypted email, what brand?
19. Do you use a password manager?
Yes, local
Yes, managed
No
I do not know
20. If you have a password manager, what brand?
21. Do you have any of these cybersecurity tools configured to protect you (check all that apply)?
Operating System Firewall
Screen Saver
Password to access devices
22. If you use an online file synchronization service (OneDrive, Google Drive, ShareFile, Dropbox, etc.), please indicate which one:
23. Do you have an Incident Response Plan (IRP)? This is a set of written instructions for detecting, responding to, and limiting the effects of an information security event. These plans provide instructions for responding to a number of potential scenarios, including data breaches, denial of service/distributed denial of service attacks, firewall breaches, virus or malware outbreaks and insider threats.
Yes
No
I do not know
24. Do you have a WISP (Written Information Security Policy)? Every business that contains personal information about a client is required to develop, implement and maintain a comprehensive information security program that is written in one or more readily accessible parts and contains administrative, technical, and physical safeguards.
Yes
No
I do not know
25. Number of Users
26. Number of Servers
27. Number of Android Smartphones and Tablets
28. Number of iOS Smartphones and Tablets
29. Number of Windows Computers
30. Number of MacOS Computers
31. If you use a Client Portal to share file with your clients, which one?
32. If you have one or many custodians, which one?
33. Notes
Send