You can always press Enter⏎ to continue
Welcome

Welcome

No technical jargon. Just simple questions to help you stay safe. Let’s get started!.
19Questions
  • 1
    This involves a formal review of your systems, data, and processes to identify potential vulnerabilities. A "recent" assessment typically refers to one completed within the last 12 months to ensure your defenses keep pace with new threats.
    Press
    Enter
  • 2
    Keeping systems current ensures that "patches" are applied to fix known security flaws. This includes everything from operating systems (Windows/macOS) and mobile apps to hardware "firmware" for routers and printers.
    Press
    Enter
  • 3
    Firewalls act as a digital barrier between your internal network and the outside internet.They monitor incoming and outgoing traffic to block unauthorized access and malicious data packets based on a set of security rules.
    Press
    Enter
  • 4
    Antivirus software detects, neutralizes, and removes malicious software like viruses, ransomware, and spyware. Regular updates (often daily) are essential so the software can recognize the latest "signatures" of new threats as they emerge.
    Press
    Enter
  • 5
    Human error is a leading cause of security breaches. This training ensures that staff can recognize phishing attempts, practice safe password management, and understand their role in protecting sensitive company data.
    Press
    Enter
  • 6
    This refers to a standard set of rules requiring complex passwords, regular updates, and the use of Multi-Factor Authentication (MFA). A strong policy ensures that stolen or guessed credentials cannot be easily used to gain unauthorized access to your systems.
    Press
    Enter
  • 7
    Encryption converts your data into unreadable code to prevent unauthorized access. "In transit" refers to data moving over the internet or email, while "at rest" refers to data stored on hard drives, servers, or cloud storage.
    Press
    Enter
  • 8
    An incident response plan is a documented "playbook" that outlines exactly what steps your team should take if a breach occurs. It ensures a fast, organized reaction to contain the threat, minimize data loss, and restore normal operations as quickly as possible.
    Press
    Enter
  • 9
    This follows the "principle of least privilege," ensuring employees only have access to the specific files and systems necessary for their job. Restricting permissions prevents sensitive data from being accidentally or intentionally accessed, altered, or deleted by unauthorized users.
    Press
    Enter
  • 10
    Your security is only as strong as your weakest partner. This involves vetting outside contractors, software providers, or cloud services to ensure they follow strict security standards, preventing a breach in their system from impacting yours.
    Press
    Enter
  • 11
    This ensures that copies of your critical information are stored securely and can be restored quickly following a system failure, ransomware attack, or accidental deletion. A robust plan includes regular testing to confirm that your backups actually work when you need them.
    Press
    Enter
  • 12
    Unlike a self-assessment, an audit is a systematic evaluation of your security controls—often by an independent party. This ensures that your policies are actually being followed in practice and that your technical defenses are functioning as intended.
    Press
    Enter
  • 13
    Cybersecurity isn't just digital. This refers to protecting the physical environment where your data lives, such as using locked server rooms, security cameras, badge-entry systems, and cable locks to prevent the theft of servers, laptops, or backup drives.
    Press
    Enter
  • 14
    If a breach occurs, you must know who to notify and when. This plan outlines how you will inform employees, customers, legal authorities, and the public, ensuring your messaging is transparent and meets legal notification requirements.
    Press
    Enter
  • 15
    This involves checking if your security practices meet the legal requirements of your industry or region (such as GDPR for privacy, HIPAA for healthcare, or PCI-DSS for credit card payments). Failing to comply can result in heavy fines and legal action.
    Press
    Enter
  • 16
    Press
    Enter
  • 17
    Press
    Enter
  • 18
    Press
    Enter
  • 19
    Press
    Enter
  • Should be Empty:
Question Label
1 of 19See AllGo Back
close