DIY - Self Assessment

If you own a business, you need to take cybersecurity seriously to protect your company from online threats like hacking, data theft, and malware.

DIY - Self Assessment
Photo by JESHOOTS.COM / Unsplash

One way to check your business's cybersecurity is by doing a Self Assessment. This process measures your security measures against a set of basic standards designed to protect against common cyber threats.

Look at the following main areas:

  1. Boundary Firewalls and Internet Gateways: This is like a virtual fence that blocks unauthorized access to your network and systems from external threats.
  2. Secure Configuration: This means making sure that your IT systems and devices are set up securely and have the latest security updates and patches.
  3. Access Control: This ensures that only authorized people have access to sensitive information.
  4. Malware Protection: This is like having a security guard for your systems. It means having the right anti-malware software in place to prevent malware attacks.
  5. Patch Management: This makes sure that all your systems and software have the latest security updates and patches.
  6. Backup: Having a backup to restore to a previous state, in the event that there is a system failure or a virus attack.

Doing this kind of review helps you stay on top of your cybersecurity game, and protect your business from potential online threats.

Here's a Self Assessment Checklist

  1. Use strong, unique passwords and enable multi-factor authentication.
  2. Regularly update software and applications to fix known security vulnerabilities.
  3. Secure all endpoints, including laptops, mobile devices, and IoT devices.
  4. Secure your network and configure firewalls and routers properly.
  5. Backup Backup & Backup.
  6. Train employees to recognize and avoid common cyber threats such as phishing and social engineering attacks.
  7. Regularly back up important data and test restoration procedures.
  8. Implement anti-malware and anti-virus software and keep them up to date.
  9. Control access to sensitive data and systems through proper access management.
  10. Have an incident response plan in place and regularly test it.
  11. Regularly review and update cybersecurity policies and procedures to keep up with changing threats and business needs.

This list is not exhaustive, and every business may have specific cybersecurity needs based on their industry, size, and risk profile.


Don't wait for a cyber attack to happen! Take action now to protect your sensitive information and secure your online presence. Stay vigilant, stay informed, and stay safe!

Read more