Free Cyber Security Risk Assessment
Answer 15 questions in these five technology categories to determine your final Risk Score.

SECURITY AWARENESS
Employee errors are the #1 source of data breaches. Indicate how well informed, educated, and aware your employees are in the following areas.

Employees know how to identify potential phishing scams, harmful attachments and spam.
No
Not Sure
Yes



Passwords
We routinely update passwords to contain complex configurations and have a procedure for securing them.
No
Not Sure
Yes

Shadow IT
Policies are in place to manage employees who use unauthorised file-share programs, personal devices, external hard drives, social media, etc.
No
Not Sure
Yes

HARDWARE & SOFTWARE
Desktop computers, devices, accessories, servers and multiple software programs used to conduct business all have their own security requirements. Where do you rank?

Computers
Our computers have been purchased in the last
three years and all required system upgrades
have been installed in that time.
No
Not Sure
Yes



Software
All software programs have received necessary updates, and antivirus measures are in place.
No
Not Sure
Yes

Compatibility
Any specialised equipment (machine sensors, voice assist, legacy systems, etc.) and software can easily “talk with each other” securely.
No
Not Sure
Yes

ENDPOINT SECURITY
Remote access to your networks from wireless devices, such as smartphones, tablets, and personal laptops, can create pathways for security threats. How are you doing with the following endpoint security measures?

Personal Devices
Policies are in place for employees who use personal devices for work to prevent data loss, and those devices have updated security software.
No
Not Sure
Yes



Firewalls
Our network security and firewall systems are regularly updated and monitored to ensure the latest and greatest defences are in place to protect against internet-based cyber threats.
No
Not Sure
Yes

Monitoring
Our systems are monitored 24/7 to ensure critical updates are applied, maintenance is performed, and dedicated IT personnel are addressing emerging threats related to cloud-based security protection.
No
Not Sure
Yes

PRINTER SECURITY
Modern printers and copiers are connected to networks and have the ability to email, scan, fax, store data, and yes – even print! They need to be protected just as much as computers. How does your organisation rate?

Printed Documents
We have a policy in place to ensure that confidential printed documents don’t end up in the wrong hands.
No
Not Sure
Yes



Rules-Based Printing
We have PIN-access or swipe-to-print protection measures in place to release print jobs only when an authorised user is present to retrieve printed documents.
No
Not Sure
Yes

Security Settings
ob tracking, hard drive encryption, password protection, remote monitoring, and proper network configurations are in place and are routinely updated.
No
Not Sure
Yes

BACK-UP SYSTEMS
We’ve outlined a detailed plan in the event a disruption occurs. The plan includes clearly defined processes, and it identifies who will take certain actions.

Cloud Services
No
Not Sure
Yes



Business Continuity Plan
We’ve outlined a detailed plan in the event a disruption occurs with clearly defined processes, and identified who will take certain actions.
No
Not Sure
Yes

Testing
Our backup system is regularly tested to ensure operation if called to duty, and we’ve conducted a practice drill.
No
Not Sure
Yes
