Cyber Risk Exposure Scorecard
In recent years, cyber attacks have emerged as one of the most significant threats facing organizations of all sizes. The Internet and other network operations have created risks that were unheard of less than a decade ago. When cyber attacks (such as data breaches and hacks) occur, they can result in devastating damage, such as business disruptions, revenue loss, legal fees, and forensic analysis and customer or employee notifications.
Instructions: For each question, check the box if the answer is yes or "unsure".
Question | Check |
Does your organization have a wireless network, or do employees or customers access your internal systems from remote locations? | |
Does anyone in your organization take company-owned mobile devices (e.g., laptops, smartphones and USB drives) with them, either home or when travelling? | |
Does your organization use Cloud-based software or storage? | |
Does your organization have a “bring your own device” (BYOD) policy that allows employees to use personal devices for business use or on a company network? | |
Are any employees allowed access to administrative privileges on your network or computers? | |
Does your organization have critical operational systems connected to a public network? | |
Does anyone in your organization use computers to access bank accounts or initiate money transfers? | |
Does your organization store sensitive information (e.g., financial reports, trade secrets, intellectual property and product designs) that could potentially compromise your organization if stolen? | |
Does your organization digitally store the personally identifiable information (PII) of employees or customers? This can include government-issued ID numbers and financial information. | |
Is your organization part of a supply chain, or do you have supply chain partners? | |
Does your organization conduct business in foreign countries, either physically or online? | |
Has your organization ever failed to enforce policies around the acceptable use of computers, email, the Internet, etc.? | |
Can the general public access your organization’s building without the use of an ID card? | |
Is network security training for employees optional at your organization? | |
Can employees use their computers or company-issued devices indefinitely without updating passwords? | |
Has your IT department ever failed to install antivirus software or perform regular vulnerability checks? | |
Can employees dispose of sensitive information in unsecured bins? | |
Would your organization lose critical information in the event of a system failure or other network disaster? | |
Can employees easily see what co-workers are doing on their computers? | |
Has your organization neglected to review its data security or cyber security policies and procedures within the last year? |
Now tally your scores:
0-5: You probably don't need cyber liability, unless you have specific concerns.
6-10: Elevated risk, you should consider a cyber liability policy.
11-20: You should have had a Cyber Liability policy, like, yesterday.