top of page
What's Your SCORE?
Security Compliance and Operational Risk Exposure
 
Help us understand your organization and its cybersecurity posture by answering a few questions.
None of your data will be stored without your explicit consent, and there is no obligation.

Please select your primary industry:

​

(Some industries have different standards they have to comply with and we want to make sure you are covered)

dataAnchor

Help us understand the scope of your technology footprint and the data you process

Please check all the types of systems and data that apply
inventoryAnchor

Do you have an inventory?

​

(Everything connected to your network or the internet is a possible attack surface. An accurate inventory should include hardware, software, and any devices connected to your network, .e.g, TVs, copies, scanners.)

When was your inventory last reviewed, updated or verified ?
Does your inventory include (checkal tht apply)....
Anchor 1

ARCHITECTURE - do you have network diagrams with dataflows and connections?

​

Accurate network diagrams are important because they:
1) show who/what your network is connected to
2) show how/where you process and store data
3) what data you are collecting, processing, storing, and sharing, and
4) where your network and endpoints might be vulnerable to attack

ARCHITECTURE - when were your network diagrams last reviewed, updated or verified ?
Anchor 2

STRATEGY - do you have an IT and/or Cybersecurity Strategy?

​

(An effective IT and Cybersecurity Strategy outlines your company’s priorities for enabling operations and protecting data.)

STRATEGY - When was was your IT and/or Cybersecurity strategy last updated?
Anchor 4

AUDITS - have you had an IT and/or Cybersecurity Audit?

​

(Depending on your industry and the size of your company, you may be required to audit your systems’ security annually. Do you know if you are required to? If so, we can help.)

AUDITS - When was the most recent one conducted?
AUDITS - what was the type of the MOST RECENT audit?
Anchor 7
AUDITS - where all findings addressed?
Anchor 5

TESTING - have you conducted penetration or vulnerability testing?

​

(Cyber threats and vulnerabilities are constantly evolving. Regular security testing is a great way to understand your risk exposure. Testing can take on many forms. We can help you identify what kinds of testing you should be doing and how often.)

TESTING - When was the most recent one conducted?
TESTING - where all findings addressed?
Anchor 3

CONTINUITY OF OPERATIONS - Have you conducted Incident Response (IR)/Disaster Recovery (DR) testing?

​

(If your business relies on your access to systems and data, you need to have plans in place to address systems failures, cyber attacks, and data breaches. Then you need to test those plans to make sure you and your staff know what to do in case of an emergency.)

CONTINUITY OF OPERATIONS - When was the most recent one conducted?
CONTINUITY OF OPERATIONS - where all findings addressed?
Anchor 6

CYBERSECURITY INSURANCE - Do you have an insurance policy in case of cyber attack or data breach?

​

(Just like protecting your house, your car, and your loved ones if something should happen to you, Cybersecurity Insurance can help protect your business in the event of a cyber attack or data breach.)

CYBERSECURITY INSURANCE - When was it most recently updated?
bottom of page