Cybersecurity Risk Assessment
The Cybersecurity Risk Assessment will help you determine where your organization stands regarding cybersecurity best practices. After submitting your assessment, individual results will be presented to you, and recommendations on making your organization more secure. Within each category below, select the option that best represents the current state of your organization. There are no wrong answers. This assessment is meant to help guide your organization to a safer and stronger security posture.
Password Security
Password Security refers to the control placed on your network-connected devices, such as your work station.
File & Data Backups
File Backups refer to the procedure in-place to safely copy critical business files and databases.
Antivirus Protection
Antivirus Protection refers to an end-point installed solution to protect against computer viruses, such as McAfee, Norton, or Avast.
Acceptable Use Policy
An Acceptable Use Policy governs how employees use company resources and restricts certain activities.
Email Security
Email Security refers to the control placed with your email provider to safeguard your incoming and outgoing emails from threats.
Security Awareness Training
Security Awareness Training refers to the on-site or virtual training conducted to train employees of the ongoing threats including social engineering and phishing.
Firewall Defense
Firewall Defense refers to the control used within your organization to keep external threats out while securing your internal network.
Intrusion Detection
Intrusion Detection refers to the ability to detect intrusion to your network and the ways that you can discover it.
Personal Devices
Personal Devices refers to the ability to bring personal devices from home and connect to the corporate network through WiFi, such as a phone or tablet.
Workstation OS Patches
Workstation OS Patches refers to the procedures to keep current with OS patching, updates, and Hotfixes.
Submit Your Assessment
Your content has been submitted
*We do not sell or distribute your information to any third-parties. We will never contact you without your permission.