IS YOUR COMPANY EXPERIENCING A CYBER ATTACK?

IS YOUR COMPANY PREPARED FOR A CYBER ATTACK?

UNDERSTAND YOUR CYBER RISKS

While you are working at building a winning business, cyber criminals from around the world are scheming to steal your data. Be proactive about the protection you need and determine your level of risk by taking our easy 16-point Cyber Risk Self AssessmentTake the assessment below or receive it by email security@cyber.sc.

 

TAKE THE SELF ASSESSMENT

CYBER RISK SELF-ASSESSMENT

Answer each of the following questions with one of three answers:
Fully Implemented, Partially Implemented, or Not Implemented.

1. Do you have an up-to-date inventory of software installed in your network environment?

?

Fully Implemented:
All aspects of this category of cyber risk are being properly and consistently looked after

Partially Implemented:
Some aspects of this category of cyber risk are taking place and other important risk measures are being neglected

Not Implemented:
Important risk measures in this category of cyber risk are not taking place at all in the organization

Fully ImplementedPartially ImplementedNot Implemented

2. Do you understand and are you familiar with your software inventory?

?

Fully Implemented:
All aspects of this category of cyber risk are being properly and consistently looked after

Partially Implemented:
Some aspects of this category of cyber risk are taking place and other important risk measures are being neglected

Not Implemented:
Important risk measures in this category of cyber risk are not taking place at all in the organization

Fully ImplementedPartially ImplementedNot Implemented

3. Are you able to update all software in your environment?

?

Fully Implemented:
All aspects of this category of cyber risk are being properly and consistently looked after

Partially Implemented:
Some aspects of this category of cyber risk are taking place and other important risk measures are being neglected

Not Implemented:
Important risk measures in this category of cyber risk are not taking place at all in the organization

Fully ImplementedPartially ImplementedNot Implemented

4. Can you manage all the software in your environment?

?

Fully Implemented:
All aspects of this category of cyber risk are being properly and consistently looked after

Partially Implemented:
Some aspects of this category of cyber risk are taking place and other important risk measures are being neglected

Not Implemented:
Important risk measures in this category of cyber risk are not taking place at all in the organization

Fully ImplementedPartially ImplementedNot Implemented

5. Do you have an up-to-date inventory of network hardware installed in your environment?

?

Fully Implemented:
All aspects of this category of cyber risk are being properly and consistently looked after

Partially Implemented:
Some aspects of this category of cyber risk are taking place and other important risk measures are being neglected

Not Implemented:
Important risk measures in this category of cyber risk are not taking place at all in the organization

Fully ImplementedPartially ImplementedNot Implemented

6. Do you understand and are you familiar with your inventory of network hardware?

?

Fully Implemented:
All aspects of this category of cyber risk are being properly and consistently looked after

Partially Implemented:
Some aspects of this category of cyber risk are taking place and other important risk measures are being neglected

Not Implemented:
Important risk measures in this category of cyber risk are not taking place at all in the organization

Fully ImplementedPartially ImplementedNot Implemented

7. Are you able to manage and update all hardware in your environment?

?

Fully Implemented:
All aspects of this category of cyber risk are being properly and consistently looked after

Partially Implemented:
Some aspects of this category of cyber risk are taking place and other important risk measures are being neglected

Not Implemented:
Important risk measures in this category of cyber risk are not taking place at all in the organization

Fully ImplementedPartially ImplementedNot Implemented

8. Have you identified WHAT your most valuable data assets are (the data crown jewels of the organization)?

?

Fully Implemented:
All aspects of this category of cyber risk are being properly and consistently looked after

Partially Implemented:
Some aspects of this category of cyber risk are taking place and other important risk measures are being neglected

Not Implemented:
Important risk measures in this category of cyber risk are not taking place at all in the organization

Fully ImplementedPartially ImplementedNot Implemented

9. Do you know WHERE in your organization’s network your valuable data is stored?

?

Fully Implemented:
All aspects of this category of cyber risk are being properly and consistently looked after

Partially Implemented:
Some aspects of this category of cyber risk are taking place and other important risk measures are being neglected

Not Implemented:
Important risk measures in this category of cyber risk are not taking place at all in the organization

Fully ImplementedPartially ImplementedNot Implemented

10. Do you know WHO has access to your valuable data within your organization and among your external partners and suppliers?

?

Fully Implemented:
All aspects of this category of cyber risk are being properly and consistently looked after

Partially Implemented:
Some aspects of this category of cyber risk are taking place and other important risk measures are being neglected

Not Implemented:
Important risk measures in this category of cyber risk are not taking place at all in the organization

Fully ImplementedPartially ImplementedNot Implemented

11. Do you know who all the ‘privileged users’ that have complete access to all your important data are (Either internal or external partners and suppliers)?

?

Fully Implemented:
All aspects of this category of cyber risk are being properly and consistently looked after

Partially Implemented:
Some aspects of this category of cyber risk are taking place and other important risk measures are being neglected

Not Implemented:
Important risk measures in this category of cyber risk are not taking place at all in the organization

Fully ImplementedPartially ImplementedNot Implemented

12. Is the access of the privileged users ‘logged?’

?

Fully Implemented:
All aspects of this category of cyber risk are being properly and consistently looked after

Partially Implemented:
Some aspects of this category of cyber risk are taking place and other important risk measures are being neglected

Not Implemented:
Important risk measures in this category of cyber risk are not taking place at all in the organization

Fully ImplementedPartially ImplementedNot Implemented

13. Are your privileged user access logs monitored?

?

Fully Implemented:
All aspects of this category of cyber risk are being properly and consistently looked after

Partially Implemented:
Some aspects of this category of cyber risk are taking place and other important risk measures are being neglected

Not Implemented:
Important risk measures in this category of cyber risk are not taking place at all in the organization

Fully ImplementedPartially ImplementedNot Implemented

14. Are your software and hardware assets secured according to the best practices for your industry?

?

Fully Implemented:
All aspects of this category of cyber risk are being properly and consistently looked after

Partially Implemented:
Some aspects of this category of cyber risk are taking place and other important risk measures are being neglected

Not Implemented:
Important risk measures in this category of cyber risk are not taking place at all in the organization

Fully ImplementedPartially ImplementedNot Implemented

15. Are you continually checking for ‘holes’ and ‘weakness’ in the configuration of your hardware and software?

?

Fully Implemented:
All aspects of this category of cyber risk are being properly and consistently looked after

Partially Implemented:
Some aspects of this category of cyber risk are taking place and other important risk measures are being neglected

Not Implemented:
Important risk measures in this category of cyber risk are not taking place at all in the organization

Fully ImplementedPartially ImplementedNot Implemented

16. Are you quickly addressing the weaknesses that you identify in the configuration of your hardware and software?

?

Fully Implemented:
All aspects of this category of cyber risk are being properly and consistently looked after

Partially Implemented:
Some aspects of this category of cyber risk are taking place and other important risk measures are being neglected

Not Implemented:
Important risk measures in this category of cyber risk are not taking place at all in the organization

Fully ImplementedPartially ImplementedNot Implemented

 

Most fast-growing companies are unaware of the high risk they face from cyber attacks. Even the smallest security breach can compromise the trust and integrity between you and your customers, your partners, and your vendors. It might also result in the loss of assets, future revenue, and potentially cause crippling litigation for your business.

Cyber SC is committed securing the future of your company through consultation, education, and implementation of the best defences available in cyber security.

WE GIVE YOU PEACE OF MIND KNOWING:

  • Your data is properly protected.
  • Your company is becoming more valuable with cyber security.
  • You’ve got access to your cyber security leader when you need it.

ABOUT CYBER SC

We Serve fast-growing businesses that urgently need proper data protection.

Cyber SC understands how complicated it is to run a business in the crazy world of the 21st century. Keeping a fast growing business safe from cyber attack keeps most informed business leaders up at night.

Dominic and Christian have created a business model that gives companies the best cyber security capabilities and strategies for protecting against cyber threats without having to pay another full-time salary. This is the most cost effective way to make sure your business is protected.

MORE VIDEOS

SERVICES

Here’s how to make your company resilient against cyber threats:

CONTACT US.

We will schedule a meeting to assess your needs and hear your concerns.

CREATE A PLAN.

We will recommend an action plan to properly secure your company.

SECURE YOUR BUSINESS.

We will implement the plan so you can work on your business.