Survey logo
TIC Survey 2017
 
Page 1 of 1
 
  Findlay TIC Business Technology Survey 2017  
Thank you for coming to the Findlay TIC Business Technology Survey site. The objectives of this survey are to: 1) ascertain which technologies are being used by our local businesses and how they are being used; 2) provide information to you on how to benefit from technology improvements; 3) benchmark our community as a whole and to compare these results with previous years’ Findlay survey results and technology surveys in other communities; and 4) analyze the survey results, and use this information as a guidepost in establishing development initiatives that will improve our competitiveness.

If you need any technical support for this survey please email schneider@findlay.edu. This survey will be online through Friday, July 21, 2017. All information will be kept in the strictest of confidence and will only be used in the compilation of aggregated data.


 
1.
*
 
 
 
 
2.

 
 
 
 
3.

 
 
 
 
4.

 
 
 
 
5.
What industry does your business best fit in?
 
 
 
 
 
 
 
 
 
 
 
 
 
       
 
 
 
6.
Who is most responsible for information security decisions in your business?
 
 
 
 
 
       
 
 
 
7.
What is your organization using for online business presence? (choose all that apply)
 
 
 
 
 
 
       
 
 
 
8.
How are you using social media to enhance your business? (choose all that apply)
 
 
 
 
 
 
 
       
 
 
 
9.
Does your organization offer a mobile app for download from an app store or marketplace (e.g., Google Play, App Store), or your website?
 
 
 
 
 
 
10.

 
 
 
 
11.
What technology is used to communicate within the company? (choose all that apply)
 
 
 
 
 
       
 
 
 
12.
Does your business use instant messaging or video conferencing for business? (choose all that apply)
 
 
 
 
 
       
 
 
 
13.
Which office productivity package is readily available for every PC user? (choose all that apply)
 
 
 
 
 
 
 
       
 
 
 
14.
Do you have an Enterprise Resource Planning (ERP) system (integrated accounting, human resources, manufacturing, supply chain, etc. package)?
 
 
 
 
 
       
 
 
 
15.
Does your business use a computer-based accounting/finance package?
 
 
 
 
 
 
 
       
 
 
 
16.

 
 
 
 
17.
What tool(s) does your organization use for data visualization? (choose all that apply)
 
 
 
 
 
 
 
 
 
 
 
       
 
 
 
18.
Do you have personnel focused on data management/ data quality / business intelligence / analytics for your organization? (choose all that apply)
 
 
 
 
 
 
       
 
 
 
19.

 
 
 
 
20.
Backups are made regularly, using: (choose all that apply)
 
 
 
 
 
 
 
       
 
 
 
21.

 
 
 
 
22.

 
 
 
 
23.

 
 
 
 
24.
Do your organization use systems to protect end user devices (endpoints) from viruses, malware, spam, spyware, adware, ransomware, and other objectionable material? (choose all that apply)
 
 
 
 
 
 
 
 
 
25.
If you answered No, not protected to the previous question, please indicate why: (choose all that apply)
 
 
 
 
 
       
 
 
 
26.
Your network is protected from intrusion by: (choose all that apply)
 
 
 
 
 
 
 
 
27.
If you answered No, not protected to the previous question, please indicate why: (choose all that apply)
 
 
 
 
 
 
       
 
 
 
28.
Which of the following voice communications solutions does your company currently use or employ? (choose all that apply)
 
 
 
 
 
 
       
 
 
 
29.
What response best describes your support environment? (choose all that apply)
 
 
 
 
 
 
       
 
 
 
30.

 
 
 
 
31.

 
 
 
 
32.
If you answered yes to the previous question, was it (choose all that apply)
 
 
 
 
       
 
 
 
33.
If you answered yes to the previous question, Ransomware attack, how did you recover?
 
 
 
 
 
 
 
34.
If you answered yes to question 31, had an information security attack, how would you rate its severity?
 
 
 
 
35.
Do you have a disaster recovery/business continuity plan for your business?
 
 
 
 
36.
If the data on your computer systems were to become corrupted or destroyed, your business could restore critical data in:
 
 
 
 
 
 
 
 
37.
Has your business been affected by wind, flood, fire, or other kinds of disasters within the past three years?
 
 
 
 
38.
Have your company policies changed in response to any recent disaster? (choose all that apply)
 
 
 
 
 
 
39.
If you answered yesto the previous question, please indicate how your policies have changed. (choose all that apply)
 
 
 
 
 
       
 
 
 
40.
Does your company have any security or privacy policies? (choose all that apply)
 
 
 
 
 
 
 
 
 
 
 
       
 
 
 
41.
If you answered No to the previous question, please indicate why: (choose all that apply)
 
 
 
 
 
       
 
 
 
42.
Does your organization provide any end user security training? (choose all that apply)
 
 
 
 
       
 
 
 
43.

 
 
 
 
44.
How many employees have remote access to company information resources?
 
 
 
 
 
 
 
 
 
45.
What technologies does your organization use for secure remote access? (choose all that apply)
 
 
 
 
 
 
 
       
 
 
 
46.
What type of devices does your organization allow for remote access? (choose all that apply)
 
 
 
 
 
       
 
 
 
47.
Does your organization permit personal devices on your internal business network?
 
 
 
 
48.
If you answered yes, permit personal devices on the internal business network, does your organization (choose all that apply)
 
 
 
       
 
 
 
49.
What kind of third party access to your network and systems infrastructure does your organization allow? (choose all that apply)
 
 
 
 
 
 
 
       
 
 
 
50.
What type of Internet connection does your organization use? (choose all that apply)
 
 
 
 
 
 
 
 
 
       
 
 
 
51.
Which of the following operating systems does your company currently use? (choose all that apply)
 
 
 
 
 
       
 
 
 
52.
What communications device(s) are used within your organization? (choose all that apply)
 
 
 
       
 
 
 
53.
Has your business adopted mobile Internet devices? (choose all that apply)
 
 
 
 
 
 
 
 
54.
Does mobile technology use affect your concerns about information security?
 
 
 
 
55.
Are you considering or using Software Defined Networking (SDN)? (choose all that apply)
 
 
 
 
 
 
 
 
56.
Are you familiar with the Internet of Things (IOT)/Smart Technologies? (choose all that apply)
 
 
 
 
 
 
 
 
 
 
 
 
57.
Why does your company use the Internet of Things/Smart Technologies? (choose all that apply)
 
 
 
 
 
 
 
       
 
 
 
58.
Are you familiar with virtualization? (choose all that apply)
 
 
 
 
 
 
 
 
 
59.
Why does your company use virtualization? (choose all that apply)
 
 
 
 
 
 
 
 
 
 
 
60.
Are you familiar with cloud computing (Internet-based computing)?
 
 
 
 
 
 
 
 
61.
If you are not planning to use cloud computing, why not? (choose all that apply)
 
 
 
 
 
 
 
 
 
       
 
 
 
62.
In the next 12 months, in which ways will your business use cloud computing? (choose all that apply)
 
 
 
 
       
 
 
 
63.
What is your perception of security in cloud computing? Which of the following concern you? (choose all that apply)
 
 
 
 
 
 
 
 
 
64.

 
 
 
 
  To receive the results of the survey, please plan to attend the Sixteenth Annual Information Assurance Forum at UF/Winebrenner Theological Seminary on Wednesday, November 1, 2017.

Results of this survey are presented along with student research in the morning. Invited speaker sessions are scheduled from 11am-5pm. This year's topic is smart technologies.
 
 
  Done   Cancel