Sterling Computers
IT Services
This document was created as a handout to Sterling webinars for IT experts, that may have become comfortable with their company security policies. The checklist allows IT specialist to see if they are prepared for all possible cyberattack threats.