Prevent Identity Compromise

Are you protected against unauthorized user access and potential security breaches?


1.

Does your organization have a formal business or governance plan which includes managing cybersecurity?

Yes
No
Don't Know

2

Does your organization have any department for managing network security?

Yes
No
Don't Know

3.

Does your organization have technical capability to accomplish network wide inspections?

Yes
No
Don't Know

4.

Do your organization enforce policies and procedures, including IT usage policies, complex password policies, and data security policies?

Yes
No
Don't Know

5.

Do you provide your employees with routine cybersecurity awareness training?

Yes
No
Don't Know

6.

Does your organization have a secure and remote backup solution to protect against threats such as Ransomware?

Yes
No
Don't Know

7.

Does your organization have breach incident response plan?

Yes
No
Don't Know

8.

How frequently are systems and data generally backed up in your organization?

Weekly
Monthly
Quarterly
Yearly
For Accreditation
Never
Don't Know

9.

Does your organization complete regular and systematic reviews of log files and backup logs?

Yes
No
Don't Know

10.

How frequently are Cybersecurity Risk Assessments undertaken at your organization?

Weekly
Monthly
Quarterly
Yearly
For Accreditation
Never
Don't Know

11.

Does your organization maintain an up to date computer and software asset list?

Yes
No
Don't Know

12.

Does your organization regularly test the strength of your security protocols?

Yes
No
Don't Know

13.

Do all PC’s and Laptops owned by the business have anti-virus software installed with automatic updates, or with Software patch management?

Yes
No
Don't Know

14.

Does your organisation use hardware firewall for network security?

Yes
No
Don't Know

15.

Does your organization use intrusion detection software on computers?

Yes
No
Don't Know

16.

Multi-Factor Authentication enabled for your organizations systems?

Yes
No
Don’t know

17.

Do your staff know how to safely identify and report phishing emails?

Yes
No
Don’t know

18.

Who has permission to install software within your organizations?

Only an IT Individual
Administrator
Any Employee can install whichever applications they need
Don’t know

19.

How often do you use your work computer, laptop, tablet or mobile phone for nonwork related tasks such as online banking, watching YouTube, checking your personal email and/or social media such as Facebook?

Never
Occasionally (i.e. once or twice a week)
Frequently (i.e. almost daily)
Everyday

20.

Is your organization currently using any 3rd party IT service?

Yes
No
Don't Know


Please fill the details below to check your score