GET STARTED

0$

Thank you, We've emailed you the summary!

Do you have a dedicated hardware firewall?

Yes

Workplaces should be secured with a firewall. The firewall built into a modem/ router supplied by your Internet Service Provider (ISP) has very basic functionality and provides minimal protection.

No

Workplaces should be secured with a firewall. The firewall built into a modem/ router supplied by your Internet Service Provider (ISP) has very basic functionality and provides minimal protection.

I Don't know

Workplaces should be secured with a firewall. The firewall built into a modem/ router supplied by your Internet Service Provider (ISP) has very basic functionality and provides minimal protection.

Question 1/20
You need to select an item to continue

Do you have a dedicated hardware firewall?

Workplaces should be secured with a firewall.  The firewall built into a modem/ router supplied by your Internet Service Provider (ISP) has very basic functionality and provides minimal protection.

You need to select an item to continue

Does your firewall have an active security subscription?

Yes

A modern firewall will have security software built in that is updated by the manufacturer daily if the device has an active subscription. This software is often responsible for the real “secret sauce” of threat detection.

No

A modern firewall will have security software built in that is updated by the manufacturer daily if the device has an active subscription. This software is often responsible for the real “secret sauce” of threat detection.

I Don't know

A modern firewall will have security software built in that is updated by the manufacturer daily if the device has an active subscription. This software is often responsible for the real “secret sauce” of threat detection.

Question 2/20
You need to select an item to continue

Does your firewall have an active security subscription?

A modern firewall will have security software built in that is updated by the manufacturer daily if the device has an active subscription. This software is often responsible for the real “secret sauce” of threat detection.
You need to select an item to continue

Is all your network hardware regularly updated with the latest firmware updates?

Yes

Firmware is a type of software that tells a piece of hardware how to work! Firmware is regularly updated by manufacturers to improve performance and sometimes fix critical security flaws.

No

Firmware is a type of software that tells a piece of hardware how to work! Firmware is regularly updated by manufacturers to improve performance and sometimes fix critical security flaws.

I Don't know

Firmware is a type of software that tells a piece of hardware how to work! Firmware is regularly updated by manufacturers to improve performance and sometimes fix critical security flaws.

Question 3/20
You need to select an item to continue

Is all your network hardware regularly updated with the latest firmware updates?

Firmware is a type of software that tells a piece of hardware how to work! Firmware is regularly updated by manufacturers to improve performance and sometimes fix critical security flaws.
You need to select an item to continue

Do all your computers (desktops and laptops) have anti-malware software licenced for business use?

Yes

Good quality anti-malware software is an essential part of a multi-layered IT security defence setup. “Free” software is almost always not licensed for business use, it will have reduced functionality and little or no support.

No

Good quality anti-malware software is an essential part of a multi-layered IT security defence setup. “Free” software is almost always not licensed for business use, it will have reduced functionality and little or no support.

I Don't know

Good quality anti-malware software is an essential part of a multi-layered IT security defence setup. “Free” software is almost always not licensed for business use, it will have reduced functionality and little or no support.

Question 4/20
You need to select an item to continue

Do all your computers (desktops and laptops) have anti-malware software licenced for business use?

Good quality anti-malware software is an essential part of a multi-layered IT security defence setup.  “Free” software is almost always not licensed for business use, it will have reduced functionality and little or no support.

You need to select an item to continue

Do all your mobile devices (phones and tablets) have anti-malware software licenced for business use?

Yes

Often overlooked, mobile devices can provide a “back door” into your business IT if not secured in the same way as other business machines.

No

Often overlooked, mobile devices can provide a “back door” into your business IT if not secured in the same way as other business machines.

I Don't know

Often overlooked, mobile devices can provide a “back door” into your business IT if not secured in the same way as other business machines.

Question 5/20
You need to select an item to continue

Do all your mobile devices (phones and tablets) have anti-malware software licenced for business use?

Often overlooked, mobile devices can provide a “back door” into your business IT if not secured in the same way as other business machines.
You need to select an item to continue

Is all your online / cloud data (including email) backed up to a third party provider?

Yes

Although most cloud services (e.g. Microsoft 365) are incredibly robust, they usually make it clear that it is your responsibility to ensure your data is safe.

No

Although most cloud services (e.g. Microsoft 365) are incredibly robust, they usually make it clear that it is your responsibility to ensure your data is safe.

I Don't know

Although most cloud services (e.g. Microsoft 365) are incredibly robust, they usually make it clear that it is your responsibility to ensure your data is safe.

Question 6/20
You need to select an item to continue

Is all your online/ cloud data (including email) backed up to a third party provider?

Although most cloud services (e.g. Microsoft 365) are incredibly robust, they usually make it clear that it is your responsibility to ensure your data is safe.
You need to select an item to continue

Is Multi-Factor Authentication (MFA/2FA) activated on all your cloud / online services including email accounts?

Yes

If an online service is only secured with a username and password it can be very easy to access by a malicious actor. Multi factor authentication is easy to implement on all reputable cloud services and should be considered mandatory.

No

If an online service is only secured with a username and password it can be very easy to access by a malicious actor. Multi factor authentication is easy to implement on all reputable cloud services and should be considered mandatory.

I Don't know

If an online service is only secured with a username and password it can be very easy to access by a malicious actor. Multi factor authentication is easy to implement on all reputable cloud services and should be considered mandatory.

Question 7/20
You need to select an item to continue

Is Multi-Factor Authentication (MFA/2FA) activated on all your cloud / online services including email accounts?

If an online service is only secured with a username and password it can be very easy to access by a malicious actor. Multi factor authentication is easy to implement on all reputable cloud services and should be considered mandatory.
You need to select an item to continue

Are operating systems and core software on all your devices (laptops, desktops and mobile devices) updated regularly?

Yes

Vulnerabilities in software are a very common route for cyber attacks. Software developers are good at releasing updates to correct these vulnerabilities but they are not always applied automatically?

No

Vulnerabilities in software are a very common route for cyber attacks. Software developers are good at releasing updates to correct these vulnerabilities but they are not always applied automatically?

I Don't know

Vulnerabilities in software are a very common route for cyber attacks. Software developers are good at releasing updates to correct these vulnerabilities but they are not always applied automatically?

Question 8/20
You need to select an item to continue

Are operating systems and core software on all your devices (laptops, desktops and mobile devices) updated regularly?

Vulnerabilities in software are a very common route for cyber attacks. Software developers are good at releasing updates to correct these vulnerabilities but they are not always applied automatically?
You need to select an item to continue

Do you ensure that all end-of-life hardware and software in your organisation is removed or upgraded?

Yes

There comes a point where manufacturers and developers stop updating and patching their products and you must ensure that you are not using such products.

No

There comes a point where manufacturers and developers stop updating and patching their products and you must ensure that you are not using such products.

I Don't know

There comes a point where manufacturers and developers stop updating and patching their products and you must ensure that you are not using such products.

Question 9/20
You need to select an item to continue

Do you ensure that all end-of-life hardware and software in your organisation is removed or upgraded?

There comes a point where manufacturers and developers stop updating and patching their products and you must ensure that you are not using such products.
You need to select an item to continue

Do you encrypt the hard drives on all your devices?

Yes

If a computer is stolen, data on unencrypted drives can be very easily accessed. Consider the risk to your organisation if this data included personal, financial or commercially sensitive data.

No

If a computer is stolen, data on unencrypted drives can be very easily accessed. Consider the risk to your organisation if this data included personal, financial or commercially sensitive data.

I Don't know

If a computer is stolen, data on unencrypted drives can be very easily accessed. Consider the risk to your organisation if this data included personal, financial or commercially sensitive data.

Question 10/20
You need to select an item to continue

Do you encrypt the hard drives on all your devices?

If a computer is stolen, data on unencrypted drives can be very easily accessed. Consider the risk to your organisation if this data included personal, financial or commercially sensitive data.
You need to select an item to continue

Are you able to remotely wipe company devices that are lost or stolen?

Yes

An additional measure, or an alternative for devices that do not support drive encryption (for example, mobile phones and tablets), which will enable you to remotely wipe a lost or stolen device of sensitive data.

No

An additional measure, or an alternative for devices that do not support drive encryption (for example, mobile phones and tablets), which will enable you to remotely wipe a lost or stolen device of sensitive data.

I Don't know

An additional measure, or an alternative for devices that do not support drive encryption (for example, mobile phones and tablets), which will enable you to remotely wipe a lost or stolen device of sensitive data.

Question 11/20
You need to select an item to continue

Are you able to remotely wipe company devices that are lost or stolen?

An additional measure, or an alternative for devices that do not support drive encryption (for example, mobile phones and tablets), which will enable you to remotely wipe a lost or stolen device of sensitive data.
You need to select an item to continue

Do you block employee access to web sites more likely to contain harmful files?

Yes

Certain types of web site are known to be more likely to host dangerous files and it is sensible to pro-actively block them from employee devices.

No

Certain types of web site are known to be more likely to host dangerous files and it is sensible to pro-actively block them from employee devices.

I Don't know

Certain types of web site are known to be more likely to host dangerous files and it is sensible to pro-actively block them from employee devices.

Question 12/20
You need to select an item to continue

Do you block employee access to web sites more likely to contain harmful files?

Certain types of web site are known to be more likely to host dangerous files and it is sensible to pro-actively block them from employee devices.
You need to select an item to continue

Do you have any security solutions in place to help protect remote workers?

Yes

Remote workers have significantly less protection when working outside of the office. You should implement tools such as software-based DNS security which help block employees from accessing malicious websites wherever they work.

No

Remote workers have significantly less protection when working outside of the office. You should implement tools such as software-based DNS security which help block employees from accessing malicious websites wherever they work.

I Don't know

Remote workers have significantly less protection when working outside of the office. You should implement tools such as software-based DNS security which help block employees from accessing malicious websites wherever they work.

Question 13/20
You need to select an item to continue

Do you have any security solutions in place to help protect remote workers?

Remote workers have significantly less protection when working outside of the office. You should implement tools such as software-based DNS security which help block employees from accessing malicious websites wherever they work.
You need to select an item to continue

Do you have a dedicated email security solution filtering all inbound emails?

Yes

Email is one of the most common methods used to carry out cyber-attacks. You must invest in an email security solution which protects against phishing, malware, spam, and malicious links.

No

Email is one of the most common methods used to carry out cyber-attacks. You must invest in an email security solution which protects against phishing, malware, spam, and malicious links.

I Don't know

Email is one of the most common methods used to carry out cyber-attacks. You must invest in an email security solution which protects against phishing, malware, spam, and malicious links.

Question 14/20

You need to select an item to continue

Do you have a dedicated email security solution filtering all inbound emails?

Email is one of the most common methods used to carry out cyber-attacks. You must invest in an email security solution which protects against phishing, malware, spam, and malicious links.
You need to select an item to continue

Do you have a formal risk management program, with an IT risk assessment conducted at least once a year?

Yes

It is important to have an experienced cyber security professional assess your organisation at least once per year to identify risks and recommend solutions to mitigate them. Risks should be reviewed at board level.

No

It is important to have an experienced cyber security professional assess your organisation at least once per year to identify risks and recommend solutions to mitigate them. Risks should be reviewed at board level.

I Don't know

It is important to have an experienced cyber security professional assess your organisation at least once per year to identify risks and recommend solutions to mitigate them. Risks should be reviewed at board level.

Question 15/20
You need to select an item to continue

Do you have a formal risk management program, with an IT risk assessment conducted at least once a year?

It is important to have an experienced cyber security professional assess your organisation at least once per year to identify risks and recommend solutions to mitigate them. Risks should be reviewed at board level.
You need to select an item to continue

Do you train your staff to ensure they know how to use your systems safely and spot signs of a cyber-attack?

Yes

Human error is the single biggest cyber security risk in your organisation. It is fundamental that your staff know how to safely use IT systems both inside and outside of the office. A policy alone is not sufficient.

No

Human error is the single biggest cyber security risk in your organisation. It is fundamental that your staff know how to safely use IT systems both inside and outside of the office. A policy alone is not sufficient.

I Don't know

Human error is the single biggest cyber security risk in your organisation. It is fundamental that your staff know how to safely use IT systems both inside and outside of the office. A policy alone is not sufficient.

Question 16/20
You need to select an item to continue

Do you train your staff to ensure they know how to use your systems safely and spot signs of a cyber-attack?

Human error is the single biggest cyber security risk in your organisation. It is fundamental that your staff know how to safely use IT systems both inside and outside of the office. A policy alone is not sufficient.
You need to select an item to continue

Do you use third party tools or providers to carry out vulnerability scanning on your systems?

Yes

Vulnerability scanners help identify weaknesses in your IT systems which could be exploited by a cyber criminal to attack your systems and steal your data.

No

Vulnerability scanners help identify weaknesses in your IT systems which could be exploited by a cyber criminal to attack your systems and steal your data.

I Don't know

Vulnerability scanners help identify weaknesses in your IT systems which could be exploited by a cyber criminal to attack your systems and steal your data.

Question 17/20

You need to select an item to continue

Do you use third party tools or providers to carry out vulnerability scanning on your systems?

Vulnerability scanners help identify weaknesses in your IT systems which could be exploited by a cyber criminal to attack your systems and steal your data.
You need to select an item to continue

Do you have systems in place to centrally manage the settings on your computers?

Yes

Systems like Microsoft Endpoint Manager and Azure Active Directory are low cost, cloud based, serverless solutions which allow you to centrally control configuration and security settings for users and devices and help keep them secure.

No

Systems like Microsoft Endpoint Manager and Azure Active Directory are low cost, cloud based, serverless solutions which allow you to centrally control configuration and security settings for users and devices and help keep them secure.

I Don't know

Systems like Microsoft Endpoint Manager and Azure Active Directory are low cost, cloud based, serverless solutions which allow you to centrally control configuration and security settings for users and devices and help keep them secure.

Question 18/20
You need to select an item to continue

Do you have systems in place to centrally manage the settings on your computers?

Systems like Microsoft Endpoint Manager and Azure Active Directory are low cost, cloud based, serverless solutions which allow you to centrally control configuration and security settings for users and devices and help keep them secure.
You need to select an item to continue

Do you have formal access control procedures in place for managing the provision of new user accounts & leavers?

Yes

It is important that you have clearly defined processes detailing how different types of access request should be raised, managed, and approved. For example, you could maintain checklists for processing starters and leavers.

No

It is important that you have clearly defined processes detailing how different types of access request should be raised, managed, and approved. For example, you could maintain checklists for processing starters and leavers.

I Don't know

It is important that you have clearly defined processes detailing how different types of access request should be raised, managed, and approved. For example, you could maintain checklists for processing starters and leavers.

Question 19/20
You need to select an item to continue

Do you have formal access control procedures in place for managing the provision of new user accounts & leavers?

It is important that you have clearly defined processes detailing how different types of access request should be raised, managed, and approved. For example, you could maintain checklists for processing starters and leavers.
You need to select an item to continue

Do you have granular access in place across your systems, with all access denied by default?

Yes

Employees should only have the minimum required level of access to your systems to do their job. You can typically use security groups and RBAC (role-based access control) to help manage this.

No

Employees should only have the minimum required level of access to your systems to do their job. You can typically use security groups and RBAC (role-based access control) to help manage this.

I Don't know

Employees should only have the minimum required level of access to your systems to do their job. You can typically use security groups and RBAC (role-based access control) to help manage this.

Question 20/20
You need to select an item to continue

Do you have granular access in place across your systems, with all access denied by default?

Employees should only have the minimum required level of access to your systems to do their job. You can typically use security groups and RBAC (role-based access control) to help manage this.

You need to select an item to continue

Your Results

The final estimated price is :

Well Done! 

You've only had [variable-2] "Don't Know" Answers.



Well Done! 

Didn't have any "Don't Know" Answers.



You Did Ok! 

You've had [variable-2] "Don't Know" Answers.



You Need To Know More About Your IT Security.

You've had [variable-2] "Don't Know" Answers.



Summary

Answer Information Quantity Score
Discount :
Total :
Provide your email address below to get a copy of your summary. We promise to never spam you, we hate spam as much as everyone else.

Summary

Answer Information Quantity Score
Discount :
Total :