Skip to content
Call Us Today: 1(888)-575-7973
|
info@lighthouseintegrations.com
Search for:
Services
Managed Services
Cybersecurity Services
Business Solutions
Cloud Solutions
About
About Lighthouse
Meet the Advisory Board
Contact
Blog
Best Practices
Business Leadership
Business Solutions
Case Study
Cybersecurity
IT Support/Managed Services
Tips/How-To’s
The Cloud
FAQ
Search for:
Services
Managed Services
Cybersecurity Services
Business Solutions
Cloud Solutions
About
About Lighthouse
Meet the Advisory Board
Contact
Blog
Best Practices
Business Leadership
Business Solutions
Case Study
Cybersecurity
IT Support/Managed Services
Tips/How-To’s
The Cloud
FAQ
Services
Managed Services
Cybersecurity Services
Business Solutions
Cloud Solutions
About
About Lighthouse
Meet the Advisory Board
Contact
Blog
Best Practices
Business Leadership
Business Solutions
Case Study
Cybersecurity
IT Support/Managed Services
Tips/How-To’s
The Cloud
FAQ
Cyber Risk Assessment Page
Rachel Bobroske
2024-01-19T18:34:08+00:00
Cybersecurity Risk Assessment
Your Name
(Required)
First
Last
IDENTIFY
1.1 Do you know what sensitive data your business holds?
Yes, we have a detailed inventory
Some idea, but not detailed
Not sure
No idea
1.2 How often do you review the technology and digital tools used in your business?
Regularly (every 3 - 6 months)
Occasionally (every year)
Rarely
Never
1.3 Are you aware of the legal requirements for data protection in your industry?
Fully aware and compliant
Somewhat aware
Aware, but not compliant
Not aware
1.4 Have you identified which external parties have access to your sensitive data (like vendors or partners?
Yes, fully documented
Aware of some parties
Unsure
Never considered
1.5 Do you understand the potential cybersecurity risks related to your industry?
Fully understand and prepared
Somewhat understand
Limited understanding
Not aware of risks
1.6 Does your business have a cybersecurity insurance policy?
Comprehensive policy
Basic policy
No policy, but considering
No policy
Hidden
Identify Score
PROTECT
2.1 Do you use antivirus or anti-malware software?
Yes, updated regularly
Yes, but not regularly updated
No, but planning to
No
2.2 How do you manage access to your systems and data?
Strict access controls and user privileges
Basic user accounts and passwords
Informal/no formal system
No management
2.3 Do you have a firewall or network security tools in place?
Yes, professionally managed
Yes, but self-managed
Planning to implement
No
2.4 Are your employees required to use strong, unique passwords for all business accounts?
Yes, with regular updates
Yes, but not regularly updated
No strict policy
No guidance on passwords
2.5 Do you regularly audit your IT security measures?
Yes, with professional audits
Self-audited regularly
Rarely audited
Never audited
2.6 Is your Wi-Fi network secure and encrypted?
Secure, encrypted, and regularly monitered
Secure and encrypted
Unencrypted but private
Public or no Wi-Fi security
Hidden
Protect Score
DETECT
3.1 How do you detect unauthorized access or anomalies in your systems?
Secure, encrypted, and regularly monitered
Secure and encrypted
Unencrypted but private
Public or no Wi-Fi security
3.2 Are your employees trained to identify common cyber threats (like phishing emails)?
Secure, encrypted, and regularly monitered
Secure and encrypted
Unencrypted but private
Public or no Wi-Fi security
3.3 Do you have a process for regularly updating software and systems?
Secure, encrypted, and regularly monitered
Secure and encrypted
Unencrypted but private
Public or no Wi-Fi security
3.4 Are there procedures to ensure mobile devices (phones, tablets) used for business are secure?
Secure, encrypted, and regularly monitered
Secure and encrypted
Unencrypted but private
Public or no Wi-Fi security
3.5 Do you keep logs of systems and network activity?
Secure, encrypted, and regularly monitered
Secure and encrypted
Unencrypted but private
Public or no Wi-Fi security
3.6 How often do you conduct vulnerability assessments of your IT systems?
Secure, encrypted, and regularly monitered
Secure and encrypted
Unencrypted but private
Public or no Wi-Fi security
Hidden
Detect score
RESPOND
4.1 Do you have a plan for what to do in case of a data breach?
Secure, encrypted, and regularly monitered
Secure and encrypted
Unencrypted but private
Public or no Wi-Fi security
4.2 In case of a breach, who would be responsible for managing the response?
Secure, encrypted, and regularly monitered
Secure and encrypted
Unencrypted but private
Public or no Wi-Fi security
4.3 How quickly can you identify and contain a breach?
Secure, encrypted, and regularly monitered
Secure and encrypted
Unencrypted but private
Public or no Wi-Fi security
4.4 Are your employeess trained on how to respond to cybersecurity incidents?
Secure, encrypted, and regularly monitered
Secure and encrypted
Unencrypted but private
Public or no Wi-Fi security
4.5 Do you have external support (e.g., cybersecurity firm) for incident response?
Secure, encrypted, and regularly monitered
Secure and encrypted
Unencrypted but private
Public or no Wi-Fi security
4.6 Is there a protocol for preserving evidence after a cyber incident?
Secure, encrypted, and regularly monitered
Secure and encrypted
Unencrypted but private
Public or no Wi-Fi security
Hidden
Respond score
RECOVER
5.1 Do you have backups of critical data?
Secure, encrypted, and regularly monitered
Secure and encrypted
Unencrypted but private
Public or no Wi-Fi security
5.2 In the event of data loss, how quickly can you restore your systems?
Secure, encrypted, and regularly monitered
Secure and encrypted
Unencrypted but private
Public or no Wi-Fi security
5.3 Do you have a plan to communicate with stakeholders (customers, employees) after a security incident?
Secure, encrypted, and regularly monitered
Secure and encrypted
Unencrypted but private
Public or no Wi-Fi security
5.4 Do you conduct regular drills or simulations for recovery procedures?
Secure, encrypted, and regularly monitered
Secure and encrypted
Unencrypted but private
Public or no Wi-Fi security
5.5 Is there a plan for maintaining business operations during a cyber incident?
Secure, encrypted, and regularly monitered
Secure and encrypted
Unencrypted but private
Public or no Wi-Fi security
5.6 How do you ensure that recovered data after an incident is safe and uncorrupted?
Secure, encrypted, and regularly monitered
Secure and encrypted
Unencrypted but private
Public or no Wi-Fi security
Hidden
Recover score
Hidden
Overall Risk Assessment Score
Page load link
Go to Top