Please enable JavaScript in your browser to complete this form.
Does the Organization employ and support remote employees? * Remote employees Remote contractors Remote employees and contractors No remote workers
Does the Organization perform background checks to examine and assess an employee/contractor's work and criminal history? * Yes No
Are the Organization's employees required to sign a non-disclosure agreement (NDA)? * Yes No
Are the Organization's employees required to sign the non-disclosure agreement (NDA) annually? * Yes No
Does the Organization have a formal process to manage the termination and/or transfer of employees? * Yes No
Does the Organization have a formal process to equip new employees and ensure the return of equipment from terminated/reassigned employees? * Yes No
Does the Organization staff wear ID badges? * Yes, with authorized access levels and types present on badge Yes, with only employee name and/or company No
Does the Organization have a Bring Your Own Device (BYOD) policy for personal devices (laptops, cellphones, ect.) utilizing organizational assets? * Yes No
Does the Organization have effective physical access controls (e.g., door locks) in place to access the facilities? * Yes No
Are key areas within the Organization (e.g., server rooms, personnel files, etc.) protected from unauthorized access? * Yes No
By choosing 'Other' in the previous question, can you describe the other access control process(es)? *
Does the Organization have a plan in place to manage access events or circumstances (e.g., a person with the server room key is sick)? * Yes No
Does the Organization have policies and procedures in place to document repairs or modifications to physical access components? * Yes No
How are the Organization's physical access controls authorized? *
Does the Organization use video surveillance technology? * Yes No
By choosing 'Yes' in the previous question, can you describe your Organization's current video surveillance system? *
Are the recording from the Organization's surveillance system stored on premises or in the cloud? * On premises Cloud storage Hybrid model
Please describe the Organization's current network setup? *
How many servers does the Organization have? * 0 1-3 4-9 10+
By choosing 'Other' in the previous question, can you name the other server operating system(s)? *
Does the Organization collect and/or store sensitive data on any server? * Yes No
How many workstations (desktops) does the Organization have? * 1-10 11-50 51-100 100+
How many laptops does the Organization have? * 1-10 11-50 51-100 100+
By choosing 'Other' in the previous question, can you name the other workstation/laptop operating system(s)? *
Does the Organization collect and/or store sensitive data on any workstations/laptops? * Yes No
The Organization's corporate email provider is: * Self-hosted (Internal Exchange Server) Hybrid cloud-hosted (Cloud Exchange, Office 365) Company Gmail/ Microsoft Office/ Other Hosted Email Provider Users utilize personal email for company business
Does the Organization use a third party to administer your email system? * Yes No
Does the Organization use multi-factor authentication to protect email access? * Yes No
Does the Organization have a written access plan for email? * Yes No
Does the Organization have an acceptable use policy for email? * Yes No
Does the Organization have a plan for creating new and removing terminated employees from email access? * Yes No
Has the Organization recently performed an audit to optimize and validate email security features? * Yes No
Does the Organization use a system to monitor email for threats and unauthorized access? * Yes No
Does the Organization backup and archive the email system? * Yes No
By choosing 'Yes' in the previous question, briefly describe any email backup policies and plans that the Organization currently has in place. *
The Organization's telephone service is: * VoIP solution (Ring Central, Google Voice, etc.) Hardline solution Company-managed mobile phones Personal mobile phones
Are the Organization's telecommunication devices located in an access-restricted area? * Yes No
Is the Organization's telecommunication system self-service? * Yes No
Is there a member of the Organization responsible for the telecommunication system administration who can provision new users/devices and resolve basic support issues? * Yes No
Does the Organization utilize a wireless network? * Yes No
What type of encryption is used on the Organization's wireless network? * WEP WPA WPA2 RADIUS Other
By choosing 'Other' in the previous question, please name the type of encryption that is used on the Organization's wireless network.
Is the wireless SSID (wireless network name) broadcasted? * Yes No
Does the Organization have a segmented guest wireless network? * Yes No
Does the Organization have an Acceptable Use Policy banner present on the guest network? * Yes No
If known, please list the brands of wireless access devices (routers, access points, etc.) used. *
Does the Organization use portable media devices? (e.g., CD/DVD drives, tablets, iPads, USB storage devices, etc.) * Yes No
Does the Organization have a written security and acceptable use policy for Internet of Things (IoT) devices? * Yes No
Does the Organization have a person responsible for security policies and procedures? * Yes – Dedicated Yes – A member of our staff handles it along with other responsibilities Yes – We use an outside resource No
How does the Organization communicate security updates to needed resources? *
Does the Organization use multi-factor authentication for access to high-sensitive data? * Yes No
Does the Organization have a formal sexual harassment training policy for all employees? * Yes No
Does the Organization have a formal security awareness training policy for all employees? * Yes No
Does the Organization have a formal cyber security training policy for all employees? * Yes No
Does the Organization have a media destruction policy for used media (CD/DVD archives, floppy disks, audio or video tape, etc.) in place? * Yes No
Does the Organization track and audit the employees security training for completeness? * Yes No
Does the Organization have baseline configurations of IT systems established and maintained? * Yes No
Does the Organization have an updated list of in-use company software such as office software suites, accounting packages, inventory management software, and software development tools? * Yes No
Does the Organization have a list of all cloud-based SaaS (Software as a Service) and collaborative file sharing tools (DropBox, Google Drive, etc.) in use? * Yes No
Does the Organization have a data flow map for internal and external communication? * Yes No
By choosing 'Yes' for the previous question, is there an updated diagram available of the path that data travels into or out of your network, through which devices, and how the data is stored? * Yes No
Does the Organization have a Cybersecurity Roles and Responsibilities Policy for employees and third-party vendors? * Yes No
Does the Organization have a list of business products and services, prioritized from critical to low impact risks or vulnerabilities? * Yes No
Have the Organization's management team, employees, and vendors agreed to policies for managing risk tolerance? * Yes No
Has the Organization completed a vulnerability assessment that identifies and documents weaknesses in your IT systems and network? * Yes No
Does the Organization have a breach response and disaster recovery plan in place? * Yes No
Ares the Organization's breach response and disaster recovery plans tested periodically? * Yes No
Does the Organization have a backup plan for workstations and servers? * Yes, Backup Services (SaaS solution) Yes, Local Backups (NAS, USB drives, DVD/Tape) Yes, Hybrid (mix of SaaS and local devices No
Are the Organization's backup plans maintained and tested periodically? * Yes No
For data systems, has the Organization determined uptime requirements to ensure business continuity? * Yes No
Has the Organization ever experienced a cyber breach/attack? * Yes No
By choosing 'Yes' in the previous question, please describe the cyber breach/attack.
Has the Organization undergone breach remediation processes? * Yes No
By choosing 'Yes' in the previous question, please describe the details of the remediation.
Does the Organization have a System Development Life Cycle (SDLC) in place to manage software software/hardware development or configuration? * Yes No
Does the Organization have an audit trail system in place to monitor network or system configuration changes? * Yes No
Does the Organization have a mandatory written data destruction policy? * Yes No
Are the Organization's data protection processes being continuously improved? * Yes No
Does the Organization audit the protection technologies that are employed on a regular basis? * Yes No
Does the Organization implement protections against data leaks, such as exfiltration? * Yes No
Does the Organization have systems in place to verify software, firmware, and information integrity? * Yes No
Are the Organization's development and testing environment(s) separate from the production environment? * Yes No Not Applicable
Has the Organization implemented a system or process to detect malicious code operating on the internal network? * Yes No
Does the Organization have IT mechanisms (e.g., fail-safe, load balancing, hot swap) in place to achieve network resilience requirements in normal and adverse situations? * Yes No
Are the Organization's audit log records being determined, documented, implemented and reviewed in accordance with regulatory policy? * Yes No
Are the Organization's employees required to complete cybersecurity awareness training and acknowledge their responsibilities? * Yes No
Are the Organization's senior executives made aware of their roles and responsibilities regarding company data? * Yes No
Are the Organization's administrators or privileged users, who have access sensitive data, required to acknowledge their increased roles and responsibilities? * Yes No
Does the Organization provide periodic security reminders or updates to its employees, contractors, or stakeholders? * Yes No
Are the Organization's employees activities being monitored to detect potential cybersecurity events? * Yes No
Has the Organization established and managed a baseline of network operations and expected data flows for users and systems? * Yes No
Does the Organization use a SIEM or other monitoring tools to aggregate and correlate event data from multiple sources and sensors to discern potential attack targets and methods? * Yes No