08 Feb Cyber Best Practice Assessment Posted at 21:55h in by reseco 0 Comments 0 Likes In recent years, cyber attacks have emerged as one of the most significant threats facing organizations of all sizes. The Internet and other network operations have created risks that were unheard of less than a decade ago. When cyber attacks (such as data breaches and hacks) occur, they can result in devastating damage, such as business disruptions, revenue loss, legal fees, and forensic analysis, and customer or employee notifications. It is important to remember that no organization is immune to the impact of cyber crime. As a result, cyber liability insurance has become an essential component of any risk management program. Begin by answering the questions, to the best of your ability. Each response will be given a numerical value depending on the answer. After completing all of the questions, your score will determine your organization's level of cyber risk. Name Title Email Phone Company Name Employee Count By completing this form you are enrolling in Reseco Group, Reseco Insurance Advisors LLC, and Risk Management Advisors LLC marketing campaigns and can unsubscribe at any time. 1. Does your organization have a wireless network, or do you employees or customers access your internal systems from remote locations?YesNoUnsure2. Does anyone in your organization take company-owned mobile devices (e.g., laptops, smartphones, and USB drives) with them, either home or when travelling?YesNoUnsure3. Does your organization use Cloud-based software or storage?YesNoUnsure4. Does your organization have a "bring your own device" (BYOD) policy that allows employees to use personal devices for business use or an a company network?YesNoUnsure5. Are any employees allowed access to administrative privileges on your network or computers?YesNoUnsure6. Does your organization have critical operational systems connected to a public network?YesNoUnsure7. Does anyone in your organization use computers to access bank accounts or initiate money transfers?YesNoUnsure8. Does your organization store sensitive information (e.g., financial reports, trade secrets, intellectual property and product designs) that could potentially compromise your organization if stolen?YesNoUnsure9. Does your organization digitally store the personally identifiable information (PII) of employees or customers? This can include goverment-issued ID numbers and financial information.YesNoUnsure10. Is your organization part of a supply chain, or do you have supply chain partners?YesNoUnsure11. Does your organization conduct business in foreign countries, either physically or online?YesNoUnsure12. Has your organization ever failed to enforce policies around the acceptable use of computers, email, the Internet, etc.?YesNoUnsure13. Can the general public access your organization's building without the use of an ID card?YesNoUnsure14. Is network security training for employees optional at your organization?YesNoUnsure15. Can employees use their computers or company-issued devices indefinitely without updating passwords?YesNoUnsure16. Has your IT department ever failed to install antivirus software or perform regular vulnerability checks?YesNoUnsure17. Can employees dispose of sensitive information in unsecured bins?YesNoUnsure18. Would your organization lose critical information in the event of a system failure or other network disaster?YesNoUnsure19. Can employees easily see what co-workers are doing on their computers?YesNoUnsure20. Has your organization neglected to review its data security or cyber security policies and procedures within the last year?YesNoUnsureTime is Up!