How exposed is your business?
Six quick questions, two short ones to tailor the result, and you'll see where your business stands.
About two minutes. Plain English, no jargon.
We'll use your email to send a copy of your result. No spam, no pushy sales calls.
Question 1 of 9 When your team logs in to email and business apps, do they need a code from their phone as well as a password? Yes, on every app, for every staff member, every time On email, but not other apps Some staff have it, some don't, it's never been made mandatory No, password only
Back
Question 2 of 9 If a ransomware attack locked all your files tomorrow, could you restore them from a backup? Yes, backups run daily and we've tested a restore in the last six months Yes, we have backups, but I couldn't tell you when one was last tested We assume Microsoft 365 or our cloud provider handles it No reliable backup, or I'm not sure where they live
Back
Question 3 of 9 When Microsoft or Apple release a critical security update, how fast does it land on your computers? Within a few days, on every device, automatically We rely on Windows or Apple to handle it through automatic updates. Only when something breaks or someone asks Half our laptops are still on an old version of Windows or macOS
Back
Question 4 of 9 How many people in your business can install software or change system settings on any work computer? One or two, and they only use admin powers when they need to Two or three people use admin access for everyday work too Most staff are admins on their own laptop Pretty much everyone, there's no real difference between staff and admin
Back
Question 5 of 9 If a staff member got a fake invoice or "urgent" email pretending to be from you right now, what would happen? They'd report it through a clear process and someone would investigate They'd forward it to a manager or IT and we'd figure it out They'd probably delete it and move on They might click it, or reply to ask if it's real
Back
Question 6 of 9 When a staff member leaves, when does their access to email, files, and apps actually get cut off? Same day, there's a checklist we follow Within a few days, usually Whenever someone remembers Old accounts probably still exist somewhere
Back
Question 7 of 9 How many people work in your business? Just me 2 to 5 6 to 15 16 to 50 50 or more
Back
Question 8 of 9 Who looks after your IT today? No one specific Someone internal who handles it on the side An external IT provider A mix of both
Back
Question 9 of 9 What sort of business are you? Childcare Construction Medical or dental practice Property or real estate Retail or hospitality Trades or contractors Community services or NFP Law firm Accounting or bookkeeping Something else
Back
Hi there, here's where your business stands.
Want to talk through this?
Your two biggest gaps 1 2 Why the full assessment matters
This snapshot covers the headline basics: MFA, backups, patching, admin access, phishing, and offboarding.
A full diagnostic also looks at:
Application control Microsoft 365 security configuration Macros and email security layers Device management Network security Staff awareness and training
Many businesses look strong on the basics and still have material gaps in these areas.
Where this leaves you on Essential Eight
MFA Multi-factor authentication
Backups Regular backups
Patching Covers 2 of 8: Patch applications + Patch operating systems
Admin access Restrict administrative privileges
This snapshot covers 5 of the 8 Essential Eight controls. The full IT Maturity Assessment covers all 8, plus Microsoft 365 hardening, device management, and staff training.
Retake the Snapshot