START QUIZ
Cybersecurity Maturity Quiz
Under the custom HTML tab in the settings panel, add the following HTML code:
On pages 2-5, the hotspots over answer options A-D have assigned SDK tags. You can add a tag by opening the SDK panel.
Take our 5 QUESTION quiz to find out what your cybersecurity risk is and what you should be doing to protect your organization.
u
How Mature is your Cybersecurity Program?
Has your organization developed and/or rolled out security policies for the following:
1 / 5
Data privacy, information security and information governance
A
Information security and information governance
B
Only information security
C
None of these
D
1
How mature is your organization's zero trust strategy, including identity verification, network segmentation, and continuous monitoring?
2 / 5
Fully implemented and continuously optimized
Partially implemented with some ongoing development
In planning stages
2
Not yet considered
Do you have the people and processes in place to handle security operations including incident management, remediation and threat hunting? This team might be outsourced or insourced but should be dedicated to the security function in your business.
3 / 5
We have 24/7 security monitoring (SIEM) in place
We have 24x7 security monitoring (SIEM) in place and can react to a security incident in under an hour
We have 24/7 security monitoring, with under 1-hour response, and has been tested in the last 6 months
Yes to all above and we also have proactive threat hunting and dark web monitoring in place
3
Are you backing up all business data on a regular basis including storing one recent backup offsite? As part of your data protection plan, is there a documented disaster recovery plan?
4 / 5
Unsure on backup status
Some backup with no testing
Full backup with onsite and regular testing
Full backup, secondary site backup, and tested disaster recovery plan
4
Does your organization have technology to enforce a data leakage policy (DLP) including email attachments and data sharing via cloud services?
5 / 5
DLP for email, cloud sharing and endpoint leaks
DLP for email and cloud sharing
DLP for email
5
No DLP
Your organization's cybersecurity program has a great foundation but can still benefit from further development. To ensure that your organization is adequately protected, you’ll need to make sure your cybersecurity strategy considers all the possible threats. For a tailored approach on how you can improve your overall compliance and cybersecurity maturity, please contact us for a full Security Maturity Assessment.
YOUR SCORE / IMMATURE
CONTACT US
RETAKE QUIZ
Your organization's cybersecurity program has a great foundation but is still in development. To ensure that your organization is adequately protected, you’ll need to make sure your cybersecurity strategy considers all the possible threats. Invest in ransomware and malware now to prevent higher costs associated with a breach later. For a tailored approach on how you can improve your overall compliance and cybersecurity maturity, please contact us for a full Security Maturity Assessment.
YOUR SCORE / In Development
Congratulations! You have a high-performing and comprehensive cybersecurity strategy that combines threat intelligence tools and security programs. Your strategy is strategically aligned to your business objectives and considers relevant vulnerabilities. But you will need to maintain and keep-up with your cyber defense program to ensure that the business is well protected. Periodic staff training and regular review of your cybersecurity strategy should ensure that your business will be cyber ready. To learn more on you can protect your business against cyberattacks, visit our Cybersecurity Resource Center.
YOUR SCORE / High Performing