Skip to content
SOLUTIONS
APPROACH
WHY TERRACLOUD
ABOUT US
INSIGHTS
CONTACT
Menu
SOLUTIONS
APPROACH
WHY TERRACLOUD
ABOUT US
INSIGHTS
CONTACT
Mini Cyber Security Assessment
Cyber Security
Compliance
Assessment
Start the assessment
For each question, please select the relevant options provided.
Mini Assessment
Step
1
of
2
50%
First Name
Last Name
Contact Number
Company Name
Email Address
CAPTCHA
Data Protection and Backup (select all relevant)
Backup and recovery system in place
Encryption for sensitive data
Regular data integrity checks
Cloud storage solutions with security features
How frequently are backups performed?
Daily
Weekly
Monthly
Where are backups stored?
Offsite
Cloud
On-premises
How quickly can data be restored from a backup?
Within hours
Within a day
A few days
What type of encryption is used?
Symmetric
Asymmetric
Both
At which stages is data encrypted?
At rest
In transit
Both
How often are integrity checks performed?
Daily
Weekly
Monthly
What methods or tools are used for these checks?
Which cloud storage provider is used?
AWS
Google Cloud
Microsoft Azure
Other
Please specify other cloud storage provider
What security features are enabled?
Multi-factor authentication
Data encryption
Regular access reviews
Other
Please specify antivirus software
Software and Network Security (select all relevant)
Antivirus software installed and regularly updated
Firewall protection active
Regular software updates and patches applied
VPN (Virtual Private Network) for remote access
Which antivirus software is being used?
McAfee
Norton
Kaspersky
Avast
Other
Please specify other security features
How frequently is the antivirus software updated?
Daily
Weekly
Monthly
What type of firewall is in place?
Hardware
Software
Both
How frequently are firewall rules reviewed and updated?
Daily
Weekly
Monthly
How are updates managed?
Manually
Automatic updates
Scheduled updates
Which of the following categories receive regular updates?
Operating Systems
Business applications
Security software
All of the above
Which VPN solution is in use?
OpenVPN
NordVPN
ExpressVPN
Cisco AnyConnect
Other
Please specify other VPN solution
Is multi-factor authentication required for VPN access?
Yes
No
Authentication and Access (Select all relevant)
Two-factor authentication (2FA) for critical accounts
Secure password policy enforced
Regularly updated access permissions for employees
Biometric authentication systems (e.g., fingerprint, facial recognition)
Which accounts have 2FA enabled?
Email accounts
Financial accounts
Cloud storage accounts
VPN access
All critical accounts
What type of 2FA method is primarily used?
SMS text verification
Authentication apps (e.g., Authy, Google Authenticator)
Hardware tokens
Other
Please specify other 2FA method
What are the minimum password requirements?
At least 8 characters
Must include uppercase and lowercase letters
Must include numbers
Must include special symbols (e.g., !, @, #)
How frequently are users required to change passwords?
Every 30 days
Every 60 days
Every 90 days
Not regularly
How often are access permissions reviewed?
Monthly
Quarterly
Bi-annually
Annually
Is there a protocol for removing access for terminated employees?
Immediately upon termination
Within 24 hours
Within a week
No set protocol
What type(s) of biometric authentication is in use?
Fingerprint
Facial recognition
Iris/retinal scan
Voice recognition
Other
Please specify other combinations
Are biometrics used as the sole method of authentication or combined with other methods?
Sole method
Combined with passwords
Combined with 2FA
Other combinations
Please specify other biometric authentication
Employee Training and Policy (Select all relevant)
Regular security training sessions for employees
A clear and communicated cybersecurity policy
Incident reporting system for potential security threats
Regular security drills or simulations
How often are these training sessions conducted?
Monthly
Quarterly
Bi-annually
Annually
What topics are covered in the training sessions? (Select all that apply)
Phishing and email scams
Password security
Safe internet browsing habits
Reporting suspicious activity
Other
Please specify other covered topics
How is the cybersecurity policy communicated to employees?
In the employee handbook
During onboarding
Regular email reminders
Dedicated training sessions
Other
Please specify other communicated policies
How often is the cybersecurity policy updated?
Annually
When significant changes occur
Not regularly
How do employees report incidents?
Through a dedicated online portal
By emailing a specific team or person
In person to their supervisor
Via an anonymous hotline
Other
Please specify other ways employees report incidents
How is feedback provided after an incident report?
Immediate acknowledgment email
Investigation results within a week
Only if further action is required
No feedback provided
What types of simulations or drills are conducted? (Select all that apply)
Phishing email tests
Physical security breach drills
Ransomware simulations
Data breach response
Other
Please specify other simulations or drills
How often are these drills or simulations conducted?
Monthly
Quarterly
Bi-annually
Annually
Physical Security (Select all relevant)
Secure server rooms or data centers
Access logs for critical infrastructure areas
Surveillance systems in key areas
Secure disposal methods for old hardware or data storage
What security measures are in place for server rooms/data centers? (Select all that apply)
Biometric access (e.g., fingerprint, retina scan)
Keycard access
Security personnel stationed
Alarm systems
Other
Please specify other types of surveillance systems installed
How are these logs maintained?
Digital tracking system
Manual log entries
CCTV footage reviews
How frequently are these logs reviewed?
Daily
Weekly
Monthly
When necessary
What type of surveillance systems are installed? (Select all that apply)
CCTV cameras
Motion detectors
Sound-based surveillance
Thermal cameras
Other
Please specify other security measures are in place for server rooms/data centers
How frequently is the footage reviewed?
Continuously monitored in real-time
Daily reviews
Only when an incident is reported
Other
Please specify other frequency for footage being reviewed