"*" indicates required fields
Step 1 of 12
Cybersecurity threats are constantly evolving, and complacency is not an option.Take our self-assessment quiz to evaluate your organization’s cybersecurity readiness. This assessment leverages valuable insights from advanced technologies like Cisco Secure Endpoint to provide a comprehensive view of your cybersecurity posture. Upon completion, you’ll gain insights into your company’s strengths and weaknesses and practical recommendations to bolster your online safety.Remember, when it comes to cybersecurity, complacency is not an option. Don’t assume your organization’s security measures are enough; make sure you have a clear understanding of where your business stands.
Here are some examples of email security measures:
Here are some examples of strong authentication measures:
Here are some examples of protective measures:
Here are some examples of preventive measures:
Here are some examples of appropriate network security controls:
Here are some examples of endpoint protection software:
Here are some examples of cloud security:
Here are some examples of preventive measures you can put in place to protect your data:
We appreciate your commitment to enhancing your organization’s online security. We are excited to share your results and provide your business with the next steps to strengthen your organization’s cybersecurity measures.
Based on your self-assessment, we have evaluated each question and assigned star rankings to indicate how your security measures stack up. Our assessment also includes valuable guidance on how you can improve your online security going forward. We understand that cybersecurity can be complex, so we have tailored the advice for each topic to be easy to follow, accompanied by practical tips to help you enhance your security practices.
To ensure you have easy access to your results and the accompanying advice, we can also email these results to you.
Question 1 of 10
What security measures are in place for your company’s email security?
Your organization uses one email security measure.
Your organization uses two email security measures.
Your organization uses three email security measures.
Your organization uses zero email security measures.
Insights and steps moving forward:
If you do not have a robust email security system in place, you can take small steps to ensure the security of your computers and end users.
Here are some actionable steps to enhance your email security:
Question 2 of 10
What strong authentication measures are used for your employees' digital resources?
Your company uses one strong authentication measure.
Your company uses two strong authentication measures.
Your company uses three strong authentication measures.
Your company uses no strong authentication measures.
Implementing strong authentication measures for employees’ digital resources is crucial for maintaining a secure work environment for your organization.
Here are some steps you can take:
Question 3 of 10
How do you cyber-protect and secure your remote workforce?
You secure your remote workforce with one protective measure.
You secure your remote workforce with two protective measures.
You secure your remote workforce with three protective measures.
You have zero protective measures to secure your remote workforce
Ensure the safety and resilience of your remote workforce by implementing these essential cybersecurity measures:
Question 4 of 10
Do you have preventive measures to respond to security incidents, including data compromise or other security breaches?
You have one preventive measure in place to respond to security incidents.
You have two preventive measures in place to respond to security incidents.
You have three preventive measures in place to respond to security incidents.
You have four preventive measures in place to respond to security incidents.
You have zero preventive measures to respond to security incidents.
To ensure preventive measures are in place to respond to security incidents, including data breaches or other security breaches, you can follow these steps:
Question 5 of 10
Have you implemented appropriate network security controls, including firewalls, intrusion prevention systems, and encrypted traffic?
You’ve implemented one network security control.
You’ve implemented two network security controls.
You’ve implemented three network security controls.
You’ve implemented four network security controls.
You’ve implemented zero network security controls.
To determine if proper network security controls, including firewalls, intrusion prevention systems, and encryption, have been implemented, you can follow these steps:
Question 6 of 10
Do you have a formal process in place for managing vulnerabilities, including vulnerability scanning, patching, and remediation?
You have a formal process in place for managing vulnerabilities. This is crucial for maintaining the security of your systems and data.
You don’t have a formal process in place to manage unforeseen vulnerabilities.
If your organization doesn’t have a formal process in place for managing vulnerabilities, here are some tips to consider moving forward:
Question 7 of 10
Do all your computers have endpoint protection software to protect them from unforeseen viruses or malware?
You use one endpoint protection software solution for your computers.
You use two endpoint protection software solutions for your computers.
You use three endpoint protection software solutions for your computers.
You use zero endpoint protection software solution for your computers.
To ensure comprehensive protection against unforeseen viruses or malware, follow these steps regarding endpoint protection software:
Question 8 of 10
What cloud security measures does your organization employ to protect your distributed network?
You use one cloud security protective measure.
You use two cloud security protective measures.
You use three cloud security protective measures.
You use zero cloud security protective measures.
If you're unsure about the steps to take regarding cloud security and whether it's the right fit for your organization, here are some tips to guide you:
Question 9 of 10
Have you conducted security awareness training for employees to help them understand and mitigate information security risks?
You’ve conducted security awareness training for your employees.
You’ve not conducted any security awareness training for your employees.
You’re unaware of security awareness training or how it will help your company.
Insights and steps moving forward
It can be overwhelming to conduct security awareness training for your team if you haven't done it before. Here are a few tips to help you get started and ensure your employees understand and mitigate information security risks:
Question 10 of 10
What measures are in place to prevent unauthorized access to your systems and data?
You have one preventive measure in place.
You have two preventive measures in place.
You have three preventive measures in place.
You have zero preventive measures in place.
To prevent unauthorized access to your systems and data, here are a few steps to help get you started:
Δ