Take our free assessment (just 15 questions and around 4 minutes of your time) to receive your Cyber assessment score and report.
  • Are your users able to perform administrative tasks, such as installing software on their devices?

    No - only those with dedicated administrative accounts

    No - only administrators

    Only certain users

    Yes - all users are trusted

    Yes

    Are there restrictions placed on your users so that they only have access to the data and systems they need?

    Yes - users are grouped to ensure they only have access to the data and systems they require

    Yes - individual users can only access their own data and systems

    Yes - access to sensitive data is restricted to select users

    No - We allow our users access to all data and systems

    No

    Are your users aware of the risk of cyber threats?

    Yes - we insist on regular awareness training

    Yes

    IT staff are aware, but not our individual users

    To some extent

    No

    How robust is your IT security support?

    We have a separate team of IT staff which includes a dedicated IT security function

    We have in-house IT administrator(s)

    We have an ongoing IT contract with an external provider

    To some extent

    Self-help

    How many users have access to your systems/network?

    1-20

    21-50

    50+

  • Do you have and maintain a list of IT assets?

    Yes - a fully automated asset discovery and inventory system

    Yes - a regular manual asset discovery and inventory system

    Yes - a detailed, up to date asset register

    Yes - we carry out an asset register on an ad hoc basis

    No - we keep no records of our IT assests

    Do you have and maintain a list of software used by the company?

    Yes - a fully automated software inventory system

    Yes - a regular manual software inventory system

    Yes - a detailed up to date software catalogue

    Yes - we update our software catalogue on an ad-hoc basis

    No - we keep no records of the software used in the company

    How are potential risks managed within your organisation?

    We have a detailed risk register which is reguarly reviewed and any issues are addressed wherever possible

    We have a risk register which is regularly reviewed

    We manage all identified risks when required (i.e. on an ad hoc basis)

    We have no formal method of managing risk

    We are not aware of any risks to the business

    Are your devices regularly patched (updated)?

    Yes - we have a fully integrated patch management system for OS and software applications

    Yes - automatic updates are set for both OS & software applications

    Yes - automatic updates are set for OS applications only

    Yes - user are responsible for their own updates

    No

    Are your users permitted to use their own personal devices?

    No

    Yes - but only via guest or dedicated network access

    Yes - using the business network

    Yes - in the most part, users work on personal devices

    Unknown

  • How does your company connect to the internet?

    Using an ISP issued router / firewall (without WIFI)

    Using an ISP issued router / firewall (with WIFI)

    Using a Small Office / Home Office (SOHO) firewall

    Using a next generation firewall

    Using a shared building connection

    Do you host any internet services (such as website, email, remote access)?

    Yes - we host website(s) and/or email, remote access and others

    Yes - we host website(s) and/or email

    Yes - we host remote access

    Yes - other

    No

    Are your devices protected from viruses and other malicious software?

    Yes - using a centrally managed endpoint security protection (e.g: McAfee, ePO)

    Yes - we have unmanaged endpoint security protection

    Yes - we use commercial anti-virus software

    Yes - we use free anti-virus software

    Unknown

    Are your systems regularly checked for vulnerabilities?

    Yes - we carry out regular external and internal penetration tests and vulnerability assessments

    Yes - we occasionally carry out external and internal penetration tests and vulnerability assessments

    Yes - we carry out regular vulnerability assessments

    Yes - we occasionally carry out vulnerability assessments

    Never

    Is your data backed up?

    Yes - we have a tested offsite backup process in place

    Yes - we have an offsite backup process in place

    Yes - we regularly back up our data (manually)

    Yes - we store our data in the cloud

    No

Free Assessment Terms and Conditions

  1. Any results provided as a result of your search are to be used for indicative purposes only and we reserve the right to review the results prior to entering into a formal retainer with you, as such we will have no liability to you (to the extent permitted by law) until such time as we enter into a formal retainer.
  2. Subject to the paragraph immediately above, and to this disclaimer generally, we do not accept any responsibility or liability for any loss or damage you may incur:
    1. if any information, content, material or data you provide on the website is not correct, complete and accurate, or if it is misleading, or if you fail to disclose all relevant facts;
    2. in the event that any software product you purchase directly from a third party does not meet your requirements or is not suitable for you;
    3. for any acts, omissions, errors or defaults of any third party in connection with any software product purchased from them:
    4. which are indirect or not foreseeable by us when you accessed or used our website;
    5. arising from an inability to access our website, from any use of the website or from reliance on the data transmitted using the website where such losses or damages are caused by any event beyond our reasonable control including as a result of the nature of electronic transmission of data over the internet.
  3. Our website provides information on a wide range of software products but there may be other products or services available on the market which may be more appropriate or suitable for you than those shown on our website.
  4. The software products we recommend via our software comparison technology are based solely on the information provided and inputted by you. You should always double-check the information that you input onto our website. You are responsible for the accuracy and detail of any information inputted by you onto our website.
  5. Not all of the software products displayed on our website are provided by us and some are provided by third parties over whom we have no control.
  6. If you are purchasing a software product from a third party directly you should also read their terms and conditions. The software product provider’s terms and conditions will cover any transaction or agreement between you and the software product provider.

By undertaking this free assessment you agree to opt-in (be included) into the Cyber X communication database to receive updates, offers, bulletins and promotions via your email account. Should you wish not to receive these communications; each email will contain an option to allow your details to be removed from our databases.