Take our Cyber Risk Assessment

Complete this form to see how secure your business is.

1Access and User Security
2Device and Network Security
3Data Protection
4Governance and Awareness
5Get your results

Access and User Security

Is MFA required for all users?
Employees should provide a second form of authentication, like a code sent to their phone, when accessing Cloud services such as Microsoft 365. Without MFA, accounts are at higher risk of being compromised.
Are employee accounts regularly reviewed to remove unnecessary privileges and leavers?
Employees should only have the access they need, and accounts for those who have left the company must be removed. Keeping outdated or excessive permissions increases security risks.
Are there separate Administrator and Standard User accounts?
Employees with administrative privileges should have a dedicated admin account instead of using their everyday login. Using a separate account for admin tasks reduces the risk of privilege misuse and credential theft.
Is there monitoring and alerting in place to detect potential threats?
The organisation should have security measures in place to identify logins from unusual locations or anonymous VPN's and take action, such as alerting admins or disabling the account. Without this attackers could access systems unnoticed and escalate an attack.
Are emails scanned for malicious links and attachments?
Emails should be automatically scanned for malicious content like phishing links, malware, or spam without purely relying on the email vendor security (such as 365 only). Without email security measures, employees are more vulnerable to cyber threats.