Firewall & Perimeter
Question 1 of 18
Which best describes your organization's network perimeter protection?
Firewall & Perimeter
Question 2 of 18
How are your firewall rules and network access policies managed?
Endpoint Protection
Question 3 of 18
Which best describes how your organization protects employee devices (laptops, desktops, phones)?
Endpoint Protection
Question 4 of 18
How are software updates and security patches handled across your organization?
Email Security
Question 5 of 18
Which best describes your organization's email security?
Identity & Access Management
Question 6 of 18
Which best describes how your organization handles user authentication?
Identity & Access Management
Question 7 of 18
What happens to employee accounts and system access when someone leaves your organization?
Remote Access
Question 8 of 18
How do employees access company systems and data when working remotely?
Patch & Vulnerability Management
Question 9 of 18
Does your organization actively scan for security vulnerabilities in your systems?
Patch & Vulnerability Management
Question 10 of 18
When a critical security patch is released, how quickly is it applied across your systems?
Cloud Security
Question 11 of 18
Which best describes your organization's use of and security around cloud services?
Cloud Security
Question 12 of 18
Are your cloud accounts and configurations reviewed for security risks?
Data Protection & Backups
Question 13 of 18
Which best describes how your organization backs up critical business data?
Data Protection & Backups
Question 14 of 18
How does your organization handle sensitive data (customer info, financial records, employee data)?
Compliance & Policy
Question 15 of 18
Which best describes your organization's security policies and documentation?
Incident Response
Question 16 of 18
Does your organization have a plan if you experience a cyberattack or data breach?
Security Awareness & Training
Question 17 of 18
How does your organization approach cybersecurity awareness for employees?
Security Awareness & Training
Question 18 of 18
Has your organization ever tested employees' ability to recognize a phishing attack?