08 Feb Cyber Best Practice Assessment Posted at 21:55h in by reseco 0 Comments 0 Likes In recent years, cyber attacks have emerged as one of the most significant threats facing organizations of all sizes. The Internet and other network operations have created risks that were unheard of less than a decade ago. When cyber attacks (such as data breaches and hacks) occur, they can result in devastating damage, such as business disruptions, revenue loss, legal fees, and forensic analysis, and customer or employee notifications. It is important to remember that no organization is immune to the impact of cyber crime. As a result, cyber liability insurance has become an essential component of any risk management program. Begin by answering the questions, to the best of your ability. Each response will be given a numerical value depending on the answer. After completing all of the questions, your score will determine your organization's level of cyber risk. Name Job Title Email Company Name Employee Count Phone By completing this form you are enrolling in Reseco Group, Reseco Insurance Advisors LLC, and Risk Management Advisors LLC marketing campaigns and can unsubscribe at any time. 1. Does your organization have a wireless network, or do you employees or customers access your internal systems from remote locations? Yes No Unsure 2. Does anyone in your organization take company-owned mobile devices (e.g., laptops, smartphones, and USB drives) with them, either home or when travelling? Yes No Unsure 3. Does your organization use Cloud-based software or storage? Yes No Unsure 4. Does your organization have a "bring your own device" (BYOD) policy that allows employees to use personal devices for business use or an a company network? Yes No Unsure 5. Are any employees allowed access to administrative privileges on your network or computers? Yes No Unsure 6. Does your organization have critical operational systems connected to a public network? Yes No Unsure 7. Does anyone in your organization use computers to access bank accounts or initiate money transfers? Yes No Unsure 8. Does your organization store sensitive information (e.g., financial reports, trade secrets, intellectual property and product designs) that could potentially compromise your organization if stolen? Yes No Unsure 9. Does your organization digitally store the personally identifiable information (PII) of employees or customers? This can include goverment-issued ID numbers and financial information. Yes No Unsure 10. Is your organization part of a supply chain, or do you have supply chain partners? Yes No Unsure 11. Does your organization conduct business in foreign countries, either physically or online? Yes No Unsure 12. Has your organization ever failed to enforce policies around the acceptable use of computers, email, the Internet, etc.? Yes No Unsure 13. Can the general public access your organization's building without the use of an ID card? Yes No Unsure 14. Is network security training for employees optional at your organization? Yes No Unsure 15. Can employees use their computers or company-issued devices indefinitely without updating passwords? Yes No Unsure 16. Has your IT department ever failed to install antivirus software or perform regular vulnerability checks? Yes No Unsure 17. Can employees dispose of sensitive information in unsecured bins? Yes No Unsure 18. Would your organization lose critical information in the event of a system failure or other network disaster? Yes No Unsure 19. Can employees easily see what co-workers are doing on their computers? Yes No Unsure 20. Has your organization neglected to review its data security or cyber security policies and procedures within the last year? Yes No Unsure Time is Up! Time's up
Sorry, the comment form is closed at this time.