State of Dx and Business Technology Questionnaire

Thank you for participating in our questionnaire. We appreciate your input! The questionnaire consists of four parts and should take about 10 minutes to complete.

Introduction and Demographics


Digital Transformation


Digital Performance

Not satisfied Extremely satisfied
Strongly DisagreeDisagreeNeutralAgreeStrongly Agree
Our digital transformation strategy is well defined.
We are currently executing our digital transformation strategy.

Business Applications

Technology Strategy

Poorly aligned Very well aligned
Strongly DisagreeDisagreeNeutralAgreeStrongly Agree
Business technology is critical to running our business operations.
Business technology is key to achieving our performance objectives and goals.
Business technology is key to gaining or maintaining customers and/or market share.
Business technology is key to innovation.
Our IT team/function supports the business technology needs of our organization
Our IT team processes are standardized and well documented.

Business Readiness


Business Readiness

Marketing and Online Presence

Client Experience

Business Technology Readiness


Cloud

Strongly DisagreeDisagreeNeutralAgreeStrongly Agree
We are taking steps to transition our legacy on-premises technology to the cloud.
Our cloud technology infrastructure allows for easy remote access and file sharing.
We can easily scale our cloud resources to meet sudden changes in workload or headcount.

Communication & Collaboration

Strongly DisagreeDisagreeNeutralAgreeStrongly Agree
We can conduct virtual meetings free of technical issues.
Our organization has implemented a method of communication besides email (e.g., Teams or Slack for text messages, Stream or Loom for video messages).
Our organization uses project management software, and pertinent employees are trained on it.

Office Infrastructure

Strongly DisagreeDisagreeNeutralAgreeStrongly Agree
Our technology infrastructure security is proactively maintained and managed.
Our bandwidth/internet speed is sufficient for everyone in our organization to easily complete their day-to-day business functions.
Our phone/communications systems meet business needs.

Remote Work

Strongly DisagreeDisagreeNeutralAgreeStrongly Agree
We have dedicated computers for remote workers.
Our organization has created and disseminated a work from home (WFH) policy defining which cybersecurity tools remote workers are required to use.
We only use company-controlled devices that are properly secured.
Our WFH team members are efficient and productive

Business Continuity

Strongly DisagreeDisagreeNeutralAgreeStrongly Agree
Our data is protected and can be restored no matter what disaster occurs.
We regularly review our backup strategy and adhere to a documented backup retention process.
We perform backup recovery testing of all critical systems and data at least once per quarter.

Regulatory Policy and Compliance

Cybersecurity

Strongly DisagreeDisagreeNeutralAgreeStrongly Agree
All employees receive regular cybersecurity awareness training.
We carry at least $1 million per occurrence and $2 million of aggregate cyber liability insurance coverage for our business.
We use multifactor authentication (MFA) across all critical business applications.
We conduct a regular (at least once per quarter) technology assessment of our network, computer systems, processes, and people to identify where we are not meeting security best practices.
Scroll to Top