Does your organisation enforce multi-factor authentication (MFA) for all remote access and critical systems?
MFA significantly reduces the risk of account takeover attacks, which are responsible for over 80% of data breaches.
How does your organisation manage privileged administrator accounts?
Privileged Account Management (PAM) limits the blast radius if an administrator account is compromised.
How frequently does your organisation review and remove unnecessary user access rights?
Regular access reviews enforce least-privilege and reduce the exposure from dormant or ex-employee accounts.
Does your organisation have a documented password policy that is actively enforced?
Strong password policies reduce the risk of brute-force and credential-stuffing attacks.
Does your organisation maintain and regularly update firewall rules to block unnecessary traffic?
Firewall hygiene is fundamental. Outdated rules can allow traffic to systems that should not be exposed.
How does your organisation segment its network to isolate sensitive systems?
Network segmentation limits lateral movement — an attacker who breaches one zone cannot easily reach others.
Does your organisation use endpoint detection and response (EDR) or managed security tools?
Basic antivirus is no longer sufficient. EDR provides behavioural detection and response capabilities.
Does your organisation classify and label sensitive data (e.g. personal, financial, confidential)?
You cannot protect what you have not identified. Data classification is the foundation of an effective data protection programme.
Is sensitive data encrypted both at rest and in transit?
Encryption is your last line of defence if storage or communications are compromised.
Does your organisation test data backups to verify they can be successfully restored?
Untested backups often fail during ransomware recovery. Regular restore testing is essential.
Does your organisation have a documented and tested incident response plan?
An untested plan is worse than no plan — you need to know it works before an incident occurs.
How quickly can your organisation detect a significant security incident?
The average attacker dwell time is 16 days. Fast detection dramatically reduces damage.
How frequently does your organisation run phishing simulation tests?
Phishing is the primary initial attack vector. Regular simulations build genuine resilience.
Does your organisation provide role-specific cybersecurity training for executives and board members?
Executives are the highest-value target for spear-phishing and BEC attacks. Generic training is insufficient.
Does your organisation assess the cybersecurity posture of suppliers before onboarding them?
Supply chain attacks have increased 742% since 2020. Vendor risk is now a primary attack surface.
Are your third-party contracts reviewed to include cybersecurity obligations and breach notification requirements?
Contractual security requirements set enforceable expectations and protect your organisation legally.
Does your organisation maintain an inventory of all cloud services (IaaS, PaaS, SaaS) in use?
Shadow IT is a major blind spot. You cannot secure cloud services you do not know about.
Does your organisation have controls to prevent cloud misconfiguration (e.g. public S3 buckets, exposed APIs)?
Misconfiguration is the number one cause of cloud data breaches. Automated checking is essential.
Does your organisation have physical access controls to secure areas containing sensitive IT infrastructure?
Physical access to servers or network equipment bypasses most digital security controls.
Is there a clean desk and screen lock policy in place and actively enforced?
Visible documents and unlocked screens are common sources of data leakage in shared offices.
Your Cyber Score
Create a free account to see your full domain breakdown, personalised roadmap, and learning recommendations.