Cybersecurity Assessment

Assess Your Security Posture

Assess your organization's cybersecurity posture across key domains.

How It Works

1

Complete the No-Obligation Risk Assessment

Answer 30 plain-language questions about your organization's cybersecurity practices at your own pace.

2

Schedule a No-Obligation Consultation

We review your responses, provide brief feedback, and answer any follow-up questions.

3

Choose Optional Ongoing Support

Based on your needs, you may choose subscription-based services for additional cybersecurity support.

This awareness-level cybersecurity assessment helps your organization understand its current posture, identify gaps, and consider practical next steps. Informed by recognized best practices, including the NIST Cybersecurity Framework 2.0, it uses plain language and can be completed at your own pace—it does not need to be finished all at once. Your responses are kept confidential and used only to provide a brief summary and optional follow-up guidance; it is not a technical audit, compliance review, or request for system access.

Step 1 of 7

Asset Identification & Risk Assessment

Show examples ID – Identify
  • Customer names, emails, phone numbers
  • Payment or billing information
  • Employee payroll records
  • Business financial records
  • Contracts, designs, or proprietary documents
Show examples ID – Identify
  • Confidential: Credit card info, Social Security numbers
  • Internal Use Only: Employee schedules, internal emails
  • Public: Website content, marketing flyers, social media posts
Show examples ID – Identify
  • Point-of-sale (POS) system
  • Accounting software (e.g., QuickBooks)
  • Company email system
  • Website or online booking system
  • Cloud storage (Google Drive, OneDrive)
Show examples ID – Identify
  • If email goes down, we can't communicate with customers.
  • A data breach would hurt customer trust.
  • We think phishing emails are the most likely risk.