Small Sized Businesses

Free Small Business Cyber Security Assessment Tool

Are you looking to see if your business has the basics of cybersecurity covered? Or if there are gaps in your security system? Our free NIST standard Cybersecurity Self-Assessment is designed to give non technical staff an easy way to increase online security. It’s not complicated, takes less than 15 minutes, and helps you see where you’re strong and where you can level up without paying for expensive audits or cyber security consultants.

Our small business cybersecurity checklist helps you:

  • Identify basic cybersecurity assessment gaps before attackers do
  • Reduce the risk of phishing, ransomware, and data breaches
  • Build a stronger defense with a clear cybersecurity risk checklist
  • Show your customers and partners that you take cyber security seriously

What You’ll Find Inside the free cyber security Assessment

Email & Access Security

Backup & Recovery

Device & Network Protection

Response Planning

Threat Protection

  1. Device/Computer Monitoring: Agent software to send data back to dashboard. (Remote Management and Monitoring Software)
  2. Mobile Device Management: Able to control application installation and remote wipe.
  3. Anti Virus: Software that is designed to prevent, search for, detect, and remove software viruses.
  4. Anti Malware: Software that is designed to prevent, search for, detect, and remove malware.
  5. Ransomware Detection: Software that is designed to prevent, search for, detect, and stop ransomware processes.
  6. Strong Passwords: 20 character alphanumeric random passwords that are different for each account
  7. Password Security: Passwords should not be stored in browsers.
  8. Onsite Backups: Backups to USB or other onsite device.
  9. Offsite Automated Backups: Backup to cloud solution.
  10. G Suite/O365 Backed Up, Qbo Cloud: Back up email, calendar, tasks, files.
  11. Security Awareness Training: Monthly video training for staff with Q&A.
  12. Phishing Simulations: Phishing simulation is a program that organizations can use to send realistic phishing email to employees in order to gauge their awareness of attacks and what to do with phishing emails when they receive them.
  13. Account Sharing: Every User/Employee should have their own account for logins, and software.
  14. Disaster/Compromise Response Plan: A well thought out plan in the event of a disaster or a compromise. Who will you call? Does everyone know who to call?
  15. Cyber Security Insurance: Rider on to General Liability Insurance
  16. Work from Home or Remote access: Using a software application that encrypts data to access corporate Network. Do not use RDS or RDS through VPN.
  17. Business Continuity: For client server applications
  18. Software, Operating System and Browsers Up to Date: Updates can be pushed through RMM
  19. Website: Using Cloudflare to prevent DDOS attacks?
  20. Routers and Servers: Default Passwords changed.
  21. MDR: Managed Detection and Response software

Our free cyber security audit covers:

topics

Device/Computer Monitoring

Mobile Device Management

Anti Virus

Anti Malware

Ransomware Detection

Strong Passwords

Routers and Servers

topics

Password Security

Multi Factor Authentication

Onsite Backups

Offsite Automated Backups

G Suite/O365 Backed Up, Qbo Cloud

Security Awareness Training

Phishing Simulations

topics

Account Sharing

Disaster/Compromise Response Plan

Cyber Security Insurance

Work from Home or Remote access

Business Continuity

Software & Operating Systems

Website

Need Assistance With The Audit?

Contact our team of cyber security professionals to get a free 30 minute cyber security audit walk through.