Take our 3 minute quiz for a chance to win an iPhone 17 Pro Max!
Employees should provide a second form of authentication, like a code sent to their phone, when accessing Cloud services such as Microsoft 365. Without MFA, accounts are at higher risk of being compromised.
⚠️ Please select an answer to continue
Employees should only have the access they need, and accounts for those who have left the company must be removed. Keeping outdated or excessive permissions increases security risks.
Employees with administrative privileges should have a dedicated admin account instead of using their everyday login. Using a separate account for admin tasks reduces the risk of privilege misuse and credential theft.
The organisation should have security measures in place to identify logins from unusual locations or anonymous VPN's and take action, such as alerting admins or disabling the account. Without this attackers could access systems unnoticed and escalate an attack.
Emails should be automatically scanned for malicious content like phishing links, malware, or spam without purely relying on the email vendor security (such as 365 only). Without email security measures, employees are more vulnerable to cyber threats.
The business should ensure firewall security patches are applied promptly. Firewalls help block unauthorised access, and outdated ones can be exploited by attackers.
Guests and visitors should be restricted to a different Wi-Fi network from company systems. If guests can connect to internal networks, they could accidentally or intentionally compromise security.
Regularly applying updates to both operating systems and third-party software is essential because unpatched systems are common targets for hackers.
Organisations should keep track of all IT assets, including devices and software. Without an inventory, it's harder to manage updates, security patches, and risks.
If ransomware is detected on one device, it should be quickly cut off from the network to prevent it from spreading. Without isolation measures, ransomware can rapidly infect multiple systems.
The same antivirus software should be deployed consistently across the business. Using different antivirus solutions can create security gaps and make management more complex.
All critical data, including Cloud services like SharePoint, should be backed up and stored securely to protect it from loss or ransomware attacks. Without backups, data loss could be irreversible.
Backups should be tested regularly to confirm they can be restored when needed. A backup is useless if it fails when recovery is required.
Organisations should have a disaster recovery plan that enables it to resume operations quickly after an incident. Without one, recovery could take weeks or months.
Employees should be regularly trained to recognise cyber threats like phishing, ransomware, and social engineering. Without training, employees are more likely to fall for scams.
Employees should be periodically tested with fake phishing emails or similar exercises to measure and improve their awareness. Regular testing helps reinforce security training.
Organisations should regularly evaluate its security risks and implement measures to reduce them. Without assessments, vulnerabilities may go unnoticed.
Organisations should have cyber insurance and comply with its security conditions. Failing to meet these conditions could result in a rejected claim.
Employees should formally acknowledge and agree to follow security policies, including password management and personal device usage. Without clear policies, employees may unknowingly create security risks.
Personal or unmanaged devices should not be used to access company data. Allowing unapproved devices increases security risks, as these devices may lack necessary security controls.
Enter your details to view your complete cyber risk assessment.
Our cybersecurity experts can help you address any vulnerabilities identified in your assessment and strengthen your security posture.
You can restart the assessment to test different scenarios or update your answers.
Your details will be sent to SCG and a member of the team will be in touch shortly.
Your Information: