Cybersecurity Risk Assessment
0% Complete
1 of 8


Your information technology (IT) infrastructure and end-user systems are the starting point for cyber security.

Who manages your IT environment? ( choose all that apply)
Who has access to your computer hardware? ( choose all that apply)
Do you have a listing of all user accounts?
Do any of your users have admin access to the operating system on their computers?
Do you have an inventory of devices such as printers, computers, and scanners for your business?
Do you have an inventory of all software used including access keys and serial numbers?
Is your physical office locked when vacant?
How long before your computer screen is set to lock when not in use anytime you're away from your computer?