Gallery
Cybersecurity survey
Share
Explore
Cybersecurity survey

Results summary

Results of Cybersecurity survey
1
Question
Do not agree
Somewhat agree
Completely agree
Skip
i
1
Our staff understands cybersecurity risks to our organization.
X
2
3
0
2
All of our staff receives cybersecurity training.
X
2
3
0
3
Our computers, network, and data have not been hacked or compromised in recent memory.
1
X
3
0
4
Our website and social media accounts have not been hacked or compromised in recent memory.
1
X
3
0
5
We do not share proprietary or sensitive information on our website or on social media.
1
X
3
0
6
We do not struggle when asked for internal documents by 3rd parties (such as legal and information requests).
X
2
3
0
7
We utilize, maintain, and share security policies with our staff.
X
2
3
0
8
We utilize, maintain, and share travel security policies with our staff.
X
2
3
0
9
We utilize, maintain, and share data security policies with our staff.
X
2
3
0
10
We do not share sensitive information (such as social security or credit card numbers) via email.
1
X
3
0
11
Our organization's key data is backed up regularly.
X
2
3
0
12
We have a business continuity plan in place if there is a critical, unplanned system outage.
X
2
3
0
13
We have an incident response and recovery plan in place.
X
2
3
0
14
Our systems are running current software versions and are patched regularly.
1
2
X
0
15
Our systems are able to mitigate emerging threats and attacks.
X
2
3
0
16
Our email security system quarantines phishing and malware attacks.
1
X
3
0
17
Our staff only acquires and uses software through our organization's approved channels.
1
X
3
0
18
Our staff does not share their passwords or keep them written down for others to discover.
X
2
3
0
19
Our organization uses multi-factor authentication (2FA) to access critical systems including email.
X
2
3
0
20
We have a process to control access and data when a staff member leaves the organization.
X
2
3
0
21
We know all of the online services and applications used by our team.
X
2
3
0
22
We considered cybersecurity when building our website.
1
X
3
0
23
We control who has access to our physical office space and systems.
X
2
3
0
24
We use a shredder to dispose of printed information and media.
X
2
3
0
There are no rows in this table

Share
 
Want to print your doc?
This is not the way.
Try clicking the ⋯ next to your doc name or using a keyboard shortcut (
CtrlP
) instead.