ITCW
Focused Mode

Security Risk Audit

Complete this 10-point assessment to identify critical vulnerabilities in your infrastructure.

Security Check Step 1 of 10
Access

Do you enforce unique individual logins for all staff and immediately deactivate accounts for former employees?

Identity

Is Multi-Factor Authentication (MFA) active on all company email and cloud-based databases?

Human Risk

Does staff receive regular training to spot phishing/social engineering, and have you verified employee details aren't scrapable for spear-phishing?

Communications

Is all sensitive internal and client communication handled through end-to-end encrypted messaging platforms?

Network

Is your Guest Wi-Fi completely isolated from the business network to prevent unauthorized access to internal systems?

Endpoints

Do you deploy next-generation antivirus or Endpoint Detection and Response (EDR) on all workstations and laptops?

Mobile

Are all company-owned and BYOD mobile devices centrally managed (MDM) and fully encrypted?

Infrastructure

Are critical files backed up off-site daily to an immutable location disconnected from your main network?

Physical

Is core network hardware kept in a locked area, and do you enforce visitor logging at all office locations?

Physical Data

Are sensitive paper files kept in locked cabinets when not in use to prevent unauthorized physical access?