What's Your SCORE?
Security Compliance and Operational Risk Exposure
Help us understand your organization and its cybersecurity posture by answering a few questions.
None of your data will be stored without your explicit consent, and there is no obligation.
Please select your primary industry:
(Some industries have different standards they have to comply with and we want to make sure you are covered)
Help us understand the scope of your technology footprint and the data you process
Do you have an inventory?
(Everything connected to your network or the internet is a possible attack surface. An accurate inventory should include hardware, software, and any devices connected to your network, .e.g, TVs, copies, scanners.)
ARCHITECTURE - do you have network diagrams with dataflows and connections?
Accurate network diagrams are important because they:
1) show who/what your network is connected to
2) show how/where you process and store data
3) what data you are collecting, processing, storing, and sharing, and
4) where your network and endpoints might be vulnerable to attack
STRATEGY - do you have an IT and/or Cybersecurity Strategy?
(An effective IT and Cybersecurity Strategy outlines your company’s priorities for enabling operations and protecting data.)
AUDITS - have you had an IT and/or Cybersecurity Audit?
(Depending on your industry and the size of your company, you may be required to audit your systems’ security annually. Do you know if you are required to? If so, we can help.)
TESTING - have you conducted penetration or vulnerability testing?
(Cyber threats and vulnerabilities are constantly evolving. Regular security testing is a great way to understand your risk exposure. Testing can take on many forms. We can help you identify what kinds of testing you should be doing and how often.)
CONTINUITY OF OPERATIONS - Have you conducted Incident Response (IR)/Disaster Recovery (DR) testing?
(If your business relies on your access to systems and data, you need to have plans in place to address systems failures, cyber attacks, and data breaches. Then you need to test those plans to make sure you and your staff know what to do in case of an emergency.)
CYBERSECURITY INSURANCE - Do you have an insurance policy in case of cyber attack or data breach?
(Just like protecting your house, your car, and your loved ones if something should happen to you, Cybersecurity Insurance can help protect your business in the event of a cyber attack or data breach.)