BOOK A CALL BACK
Have a question? Fill in the form below to book a call
About:
Menu
REMOTE SUPPORT
 NETWORK STATUS

Free Online - Cyber Security Assessment

Takes 15 minutes, and you’ll receive instant results.
Securing your organisation is a top priority. This online review helps assess your current cybersecurity measures. As you answer the questions, consider where your data is stored, the desktop applications you use, and any third-party cloud apps. Your responses will clarify your security posture and identify areas for improvement.
Start Here
1. Data Protection and Privacy
Are measures in place to protect sensitive data (e.g., encryption, access controls)?
Do you ensure compliance with data protection regulations (e.g., GDPR)?
Is customer data stored, processed, and protected securely?
Is there a clear policy on data retention and deletion?
2. Access Controls
Do you manage user access to systems and data effectively?
Is data segregated based on roles?
Is multi-factor authentication (MFA) implemented?
Are there defined processes for onboarding and offboarding employees or contractors?
Are privileged accounts managed and monitored?
Is there a policy on password management?
Do you use a secure method for password storage?
3. Incident Response
Do you have an incident response plan in place?
Can you quickly detect and respond to a cybersecurity incident?
Is there a designated incident response team?
Is there a defined process for reporting incidents both internally and externally?
4. Network Security
Are measures in place to secure your network perimeter (e.g., firewalls)?
Do you monitor network traffic for suspicious activity?
Is remote access secured (e.g., VPN)?
Is your network segmented to protect sensitive assets?
5. Endpoint and Device Security
Is there a clear desk and locked screen policy?
Do you use antivirus software?
Is there a system in place for patch management and software updates?
Do staff access company resources exclusively through company-provided devices (laptops and phones) and NOT personal devices at all?
Do you maintain an inventory list of devices?
Are all devices encrypted?
6. Policies and Governance
Do you have cybersecurity policies and procedures in place?
Are these policies reviewed and updated regularly?
Do you have a signed copy from your staff acknowledging the policies?
Are the policies and procedures stored in a secure location?
Is there a designated person responsible for managing the documentation?
7. Security Awareness and Training
Do you provide cybersecurity training for your staff?
Is training conducted regularly and is it mandatory?
Do you conduct phishing simulations or other awareness programs?
Do you have a system in place to ensure that employees understand and comply with security policies?
8. Disaster Recovery and Business Continuity
Do you have a disaster recovery and business continuity plan?
Is the plan tested and updated regularly?
Do you ensure the availability and integrity of critical systems and data during a disaster?
Do you have a data backup process in place?
9. Emerging Threats and Future Planning
Do you have a strategy for adopting new cybersecurity technologies and practices?
Do you assess the impact of new technologies (e.g., AI, IoT) on your cybersecurity posture?
Do you have a long-term strategy for maintaining and improving cybersecurity?
10. Certification
Do you have Cyber Essentials Certification?
Do you rely on consultants to complete your certification?
Contact Details
Please enter your contact details below and submit your review. We will email you a copy of your security review
Moving over to us is simple!READ MORE - 3 STEPS