Tell us about your business
We'll personalise your report. Takes 30 seconds.
Passwords and Multi-Factor Authentication1/8
When staff log in to email, accounting software, or other business systems, what do they need beyond their password?
MFA = multi-factor authentication: a second step after the password, like a code from a phone or an authentication app.
How do staff manage their passwords day-to-day?
Who in your business has administrator (admin) access, meaning the ability to install software, change system settings, or access everyone else's data?
Application Control and Software Management2/8
Can staff install software on their work computers whenever they want?
Is there a list somewhere of the software your business actually uses and approves?
Are staff able to run downloaded files or unfamiliar programs on their computers without anything stopping them?
Patching and Updates3/8
When a software vendor releases a critical security update, how quickly does it get installed on your computers?
Are the operating systems on your computers (Windows, macOS) still officially supported by Microsoft or Apple, meaning they still get security updates?
How do updates actually get pushed out across your business?
Microsoft 365 and Email Security4/8
What protection is in place against phishing emails (fake emails impersonating banks, suppliers, or your own colleagues)?
Are emails from your business reaching customers reliably, or do you regularly hear they ended up in junk?
Does anyone actively monitor the security of your email and document platform (Microsoft 365, Google Workspace, or similar) and work to tighten it over time?
Specifically for Microsoft Word, Excel, and PowerPoint files: are macros (the automated code inside those files) restricted?
Backup and Recovery5/8
How often is your business data (files, emails, accounting data, customer records) backed up?
Where are your backups stored, and could ransomware reach them?
When did someone last actually test restoring data from a backup to make sure it works?
Device and Endpoint Protection6/8
Are all your work computers (laptops, desktops, tablets) managed through a central system that lets IT push policies, install software, and lock down settings?
What kind of security software is running on your computers to detect and stop threats like ransomware or viruses?
EDR = endpoint detection and response: like advanced antivirus. Watches for suspicious behaviour (not just known viruses) and can isolate a compromised device from the network automatically.
Are all your computers set up the same way, or has each one grown into its own configuration over time?
Network Security7/8
How old is your network equipment (firewall, router, WiFi access points), and is anyone keeping its software up to date?
Is the WiFi that visitors and clients use kept separate from the WiFi your staff use for work?
When staff work from home or on the road, how do they connect back to business systems?
VPN = virtual private network: a private, encrypted tunnel between the staff member's device and your business network, so data can't be intercepted on public WiFi.
Staff Practices and Security Awareness8/8
Do staff get any cybersecurity training: recognising phishing, what to do with suspicious emails, password hygiene?
When a staff member leaves the business, what happens to their access to email, files, accounting software, and other business systems?
If a staff member received a suspicious email right now (a fake invoice, a "your account is locked" message, an odd request from the boss), what would happen?