You can always press Enter⏎ to continue
I.T. Security Self-Assessment Tool

I.T. Security Self-Assessment Tool

We've put together an I.T. security self-assessment for small businesses. At the end you will receive an assessment of your organisation's cyber security status based on your score.
  • 1
    Press
    Enter
  • 2
    • 1
    • 2
    • 3
    • 4
    • 5
    Not important
    Important
    Press
    Enter
  • 3
    Important information could include emails, invoices, accounts, customer data, appointments and software. Backup could include information saved to the cloud or an external hard drive or USB stick.
    Press
    Enter
  • 4
    Press
    Enter
  • 5
    Press
    Enter
  • 6
    Press
    Enter
  • 7
    A strong password is usually one that would be difficult to guess and DOES NOT include any combination of personal information, popular words or number sequences (e.g. don't use 'qwerty' or 'liverpool123')
    Press
    Enter
  • 8
    Press
    Enter
  • 9
    This could include email, social media, HMRC/tax accounts or any other online accounts critical to the running of your business.
    Press
    Enter
  • 10
    Press
    Enter
  • 11
    - Screen to auto-lock after a period of inactivity - PIN code, passcode, fingerprint, face ID (or other biometric) to access your device - Find my device (for Apple devices) - Play protect (for Android devices)
    Press
    Enter
  • 12
    Firewall and anti-virus are security features that are built into Windows and macOS, and can be found in your computer's settings. However, you may have also chosen to purchase a product that provides these, or additional features, from a third party.
    Press
    Enter
  • 13
    Software includes the device's operating system and the apps on the device.
    Press
    Enter
  • 14
    Software includes the device's operating system and the apps on the device.
    Press
    Enter
  • 15
    Software includes the device's operating system and the apps on the device.
    Press
    Enter
  • 16
    This may include checking it's from a well known brand, performing a web search or only downloading from a manufacturer approved store such as Apple App store or Google Play.
    Press
    Enter
  • 17
    Press
    Enter
  • 18
    Press
    Enter
  • 19
    Email Verified

    The verification code has been sent to some@email.com
    Please check your mailbox and paste the code below to complete verification

    Didn't receive verification code?or
    Receiving the email may take a few minutes, thank you for your patience!
    Press
    Enter
  • 20
    This score determines your organisation's cyber security position.
    Press
    Enter
  • Should be Empty:
Question Label
1 of 20See AllGo Back
close