Does your organization have a wireless network or do employees or customers access your internal systems from remote locations?
Does anyone in your organization take company-owned mobile devices (e.g. laptops, smartphones and USB drives) with them, either home or when traveling?
Does your organization use Cloud-based software or storage?
Does your organization have a “bring your own device” (BYOD) policy that allows employees to use personal devices for business use or on a company network?
Are any employees allowed access to administrative privileges on your network or computers?
Does your organization have critical operational systems connected to a public network?
Does anyone in your organization use computers to access bank accounts or initiate money transfers?
Does your organization store sensitive information ( e.g., financial reports, trade secrets, intellectual and product designs) that could potentially compromise your organization if stolen?
Does your organization digitally store the personally identifiable information (PII) of employees or customers? This can include government-issued ID numbers and financial information?
Is your organization part of a supply chain, or do you have supply chain partners?
Does your organization conduct business in foreign countries, either physically or online?
Has your organization ever failed to enforce policies around the acceptable use of computers, email, the internet, etc?
Can the general public access your organization’s building without the use of an ID card?
Is network security training for employees optional at your organization?
Can employees use their computers or company-issued devices indefinitely without updating passwords?
Has your IT department ever failed to install antivirus software or perform regular vulnerability checks?
Can employees dispose of sensitive information in unsecured bins?
Would your organization lose critical information in the event of a system failure or other network disaster?
Can employees easily see what co-workers are doing on their computers?
Has your organization neglected to review its data security or cyber security policies and procedures within the last year?