CYBERSECURITY
ASSESSMENT

3

Take the thinktum Cybersecurity Assessment!

 

1 / 20

Does your organization have a wireless network, or do employees or customers access your internal systems from remote locations?

2 / 20

Does anyone in your organization take company-owned mobile devices (e.g., laptops, smartphones and USB drives) with them, either home or when travelling?

3 / 20

Does your organization use Cloud-based software or storage?

4 / 20

Does your organization have a “bring your own device” (BYOD) policy that allows employees to use personal devices for business use or on a company network?

5 / 20

Are any employees allowed access to administrative privileges on your network or computers?

6 / 20

Does your organization have critical operational systems connected to a public network?

7 / 20

Does anyone in your organization use computers to access bank accounts or initiate money transfers?

8 / 20

Does your organization store sensitive information (e.g., financial reports, trade secrets, intellectual property and product designs) that could potentially compromise your organization if stolen?

9 / 20

Does your organization digitally store the personally identifiable information (PII) of employees or customers? This can include government-issued ID numbers and financial information.

10 / 20

Is your organization part of a supply chain, or do you have supply chain partners?

11 / 20

Does your organization conduct business in foreign countries, either physically or online?

12 / 20

Has your organization ever failed to enforce policies around the acceptable use of computers, email, the Internet, etc.?

13 / 20

Can the general public access your organization’s building without the use of an ID card?

14 / 20

Is network security training for employees optional at your organization?

15 / 20

Can employees use their computers or company-issued devices indefinitely without updating passwords?

16 / 20

Has your IT department ever failed to install antivirus software or perform regular vulnerability checks?

17 / 20

Can employees dispose of sensitive information in unsecured bins?

18 / 20

Would your organization lose critical information in the event of a system failure or other network disaster?

19 / 20

Can employees easily see what co-workers are doing on their computers?

20 / 20

Has your organization neglected to review its data security policies and procedures in the last year?

Your score is