Cyber Risk Exposure Scorecard

In recent years, cyber attacks have emerged as one of the most significant threats facing organizations of all sizes. The Internet and other network operations have created risks that were unheard of less than a decade ago. When cyber attacks (such as data breaches and hacks) occur, they can result in devastating damage, such as business disruptions, revenue loss, legal fees, and forensic analysis and customer or employee notifications.

Instructions: For each question, check the box if the answer is yes or "unsure".

Does your organization have a wireless network, or do employees or customers access your internal systems from remote locations?
Does anyone in your organization take company-owned mobile devices (e.g., laptops, smartphones and USB drives) with them, either home or when travelling?
Does your organization use Cloud-based software or storage?
Does your organization have a “bring your own device” (BYOD) policy that allows employees to use personal devices for business use or on a company network?
Are any employees allowed access to administrative privileges on your network or computers?
Does your organization have critical operational systems connected to a public network?
Does anyone in your organization use computers to access bank accounts or initiate money transfers?
Does your organization store sensitive information (e.g., financial reports, trade secrets, intellectual property and product designs) that could potentially compromise your organization if stolen?
Does your organization digitally store the personally identifiable information (PII) of employees or customers? This can include government-issued ID numbers and financial information.
Is your organization part of a supply chain, or do you have supply chain partners?
Does your organization conduct business in foreign countries, either physically or online?
Has your organization ever failed to enforce policies around the acceptable use of computers, email, the Internet, etc.?
Can the general public access your organization’s building without the use of an ID card?
Is network security training for employees optional at your organization?
Can employees use their computers or company-issued devices indefinitely without updating passwords?
Has your IT department ever failed to install antivirus software or perform regular vulnerability checks?
Can employees dispose of sensitive information in unsecured bins?
Would your organization lose critical information in the event of a system failure or other network disaster?
Can employees easily see what co-workers are doing on their computers?
Has your organization neglected to review its data security or cyber security policies and procedures within the last year?

Now tally your scores:
0-5: You probably don't need cyber liability, unless you have specific concerns.
6-10: Elevated risk, you should consider a cyber liability policy.
11-20: You should have had a Cyber Liability policy, like, yesterday.


The information included in this website was collected from sources that are considered reliable including, without limitation, rate information provided by carriers, coverage descriptions from carriers and marketing materials from various sources. This information is provided for educational purposes only. We have not verified nor can we guarantee the accuracy, timeliness or completeness of such information. This website is provided on an "AS-IS" basis. Thus, it is solely your responsibility to verify any information you obtain from this Website before making decisions or incurring costs based on such information. This information is not intended to be exhaustive nor should any discussion or opinions be construed as legal advice or policy coverage. Readers should contact legal counsel or an insurance professional for appropriate advice. Please refer to your policy or talk with your broker for specific coverages and exclusions that are applicable to your situation.