PERSONAL RISK ASSESSMENT
How many unique passwords do you have?
Do you use public wifi?
Only with a VPN
Do you take work files (physical or digital) out of the office?
Do you use online file sharing programs
such as Google Docs or Dropbox to store work files?
Do you use your personal email account
to store work information for easy access?
Do you know how to identify an encrypted
credit card submission form?
If your computer was wiped right now,
how much data would you lose?
Less than an hour's worth
Less than a week's worth
More than a week's worth
By looking at your social media profile,
what could outsiders learn?
Personal information that could be leveraged in a targeted attack
Sensitive information about your company
Nothing of substance
Have you ever plugged someone else's flash drive
into your computer?
Do you let any family members or friends use
your work computer?
You scored /100 in our risk assessment.
Your risk profile is
How to improve your risk profile
- Conduct an audit of all your passwords to check their strength.
- If your passwords are weak, be sure to change them.
- If you use only one password, at a minimum, choose unique passwords for sensitive sites and accounts.
- Assess your social media presence - how much about you is easily accessible to the public, and is this information a cyber security liability?
- If you need to use file sharing software or are unsure how to share files securely, check with the IT department for the best way to access information remotely.
- Consult with IT about if, how, when and where your data is backed up in the event of cyber attack and loss of information.
Cyber security course by VinciWorks
This assessment is just a short snippet of the VinciWorks cyber security course.
The course, appropriate for all staff, teaches people about the dangers of using online communications to conduct business. After completing the course users will:
- Understand how easy it is for users with any technical background to cause irreparable damage to the brand
- Know how to identify and report cyber attacks including phishing attacks, fake website or suspicious file attachments
- Know how to identify and avoid social engineering
- Understand the dangers of using the same password on multiple sites and using insecure passwords
To request a course preview email us at email@example.com or call us at 0208 815 9308.