Cyber scorecard de vulnerabilidade

Entenda a vulnerabilidade cibernética da sua organização e identifique as etapas necessárias para fortalecê-la.
Desenvolvido em colaboração com Prof. Mark Button e Dr. Victoria Wang no Institute of Criminal Justice Studies at University of Portsmouth.

O scorecard inclui 23 perguntas de autoavaliação sobre a organização de sua organização:

  • atratividade para criminosos cibernéticos
  • danos potenciais em caso de uma violação cibernética
  • força / fraqueza da segurança e resiliência cibernética.

Os resultados do seu Scorecard são fornecidos em um relatório em PDF para download.

Actual Total Possible Total Score
Attractiveness to cyber criminals
The damage which would be caused
RISK SUB-TOTAL
Cyber security and resilience
Overall cybercrime and data protection vulnerability rating
-
Step 1 of 4
25% Complete
Please fill in the fields from above.
Step 2 of 4
50% Complete

Attractiveness to cyber criminals

1. How much personal information (personal identity, address related or financial data) does your organisation store or process?

Such data might include that concerning employees, pensioners, donors, members of an organisation, bank account holders, home owners or the holders of a variety of vital personal documentation. Wherever personal data is held, the organisation concerned is attractive to cybercriminals.

2. How much sensitive information is controlled/handled by your organisation?

Such data might include information which is confidential because it relates to health, origins, or privacy. There are several other reasons: it might be confidential for reasons of security; it might portray an individual in a light which would damage their public image; it might be the subject of legal proceedings; it might, if revealed have a negative financial impact. Information which an individual or organisation does not want made public can be used as the basis for blackmail.

3. How much high value Intellectual Property or other sensitive commercial information is controlled/handled by your organisation?

Such data might include information which is valuable because it concerns innovation or unique record sets or complex formulae or the latest developments.

4. How contentious are issues your organisation, or your clients, are involved in?

An organisation might, by virtue of its operations, its stated views or its political associations, become attractive to "hackivists". In this way it might also become attractive because it symbolises a particular part of society.

5. To what extent could your organisation provide access to information about other organisations?

Organisations that provide services to other organisations often have access to systems, databases, sensitive and confidential information. This could include, for example, law firms, accountancy firms, IT outsourcing companies. It is easier to attack one organisation which is a route to several others than to attack them one by one.

6. To what extent is your organisation known externally for having weak or strong cybercrime defences?

An organisation which is publicly perceived to have weak cybercrime defences might be attractive because it is seen as a soft or easy target - one where the risks are low but the potential gains are high. Perversely, an organisation which is publicly perceived to have secure cybercrime defences might also be attractive because it could be seen as a challenge where cybercriminals could test their expertise.

Please answer all the questions.
Step 3 of 4
75% Complete

The damage which would be caused

7. How well-known is your organisation’s brand or public profile?

An organisation’s public profile/brand may be well-known with the general public, within specific sectors, and/or within specific sub-sectors or local geographic areas.

8. How positive is your organisation’s brand profile?

Brands may be well-known for good reasons, such as a reputation for quality work, or for bad reasons, such as a reputation for facilitating tax evasion. Organisations with a well-known brand and a positive public profile will have more to lose than organisations with a well-known and negative public profile.

9. How vulnerable are your organisation’s income sources to an adverse cyber incident?

How quickly could your organisation's income sources be impacted by an adverse cyber incident? For example, could your customers quickly and easily switch to one of your competitors? Income sources secured for the medium term are likely to be less vulnerable to adverse cyber incidents.

10. To what extent could data stored/processed by your organisation be used to cause wider damage to others?

Personal, financial, legal, commercial data could, if stolen, be used for a variety of criminal purposes. For example, personal and/or financial information can be used to commit fraud, legal information can be used for blackmail/extortion, and commercial information can be used to obtain an unfair competitive advantage.

11. To what extent does the public/your clients expect that your organisation is cyber secure?

Organisations are often expected, by virtue of their function, to be highly cyber secure. For examples, donors may reasonably expect that charities ensure personal information is stored securely. Commercial organisations are typically expected by customers to ensure contractual information remains confidential. Investors expect that valuable intellectual property is stored securely.

12. Does your organisation provide data or technology services?

Does your organisation sell or have a wider responsibility for data or technology services? If so a cyber breach could be particularly damaging reputationally.

13. How significant could immediate financial damage from a cyber breach be?

Some organisations may incur immediate financial damage due to, for example, lost revenue, payments for damages to clients, reduced donations.

Please answer all the questions.
Step 4 of 4
100% Complete

Cyber security and resilience

14. Has your organisation mapped its data and where it is, and completed a strategic review of its online presence in the last 3 years?

This would include considering and planning the extent of your online presence (rather than it just being allowed to grow); the number, type and ownership of specific devices which are connected; and the distribution of its assets (i.e. where data and systems are located to make it harder for cybercriminals to succeed by attacking a single location); and the type of data collected.

15. To what extent is your organisation prepared for the latest data protection requirements?

Organisations that control and / or process personal information are commonly subject to data protection requirements. Organisations that fail to meet such requirements may be subject to fines for data breaches.

16. Has your organisation undertaken penetration testing in the last 2 years?

Penetration testing, also known as ‘ethical hacking’, enables cyber security systems and processes to be tested. Independent, specialist and accredited penetration testers can test whether your cyber security is keeping pace with evolving cyber threats.

17. How frequently does your organisation securely back up all its data in multiple secure locations off-site?

Regular data back-up is a key component of cyber resilience, providing the ultimate backstop in the event of a significant adverse cyber incident. Back-ups should be held securely, in multiple locations, and be ring-fenced from organisational networks.

18. How strong is your organisation’s cybercrime awareness?

Cybercrime awareness includes the extent to which staff understand their role in protecting the organisation from cybercrime and adverse cyber incidents. It also includes the extent to which insider vulnerabilities have been assessed, appropriate access permissions and controls have been implemented, and whether potential staff are vetted.

19. How well developed are your organisation’s plans to manage the crisis that an adverse cyber incident would represent?

An adverse cyber incident can have significant disruptive impacts on an organisation, consuming time and energy at the expense of usual operational activity. Good practice is to have a crisis plan in place that covers how the crisis will be managed in the immediate and subsequent phases, by whom, and how normal operational activity will be maintained.

20. How well established are your organisation’s arrangements to investigate an adverse cyber incident?

The initial stages of an adverse cyber incident are incredibly important. Organisations should have an agreed procedure to ensure resources are available to quickly and expertly respond and establish the extent of an incident, its origins, its likely/potential impacts, and how the situation can be recovered. Arrangements with external providers should be in place in advance of an incident.

21. How well prepared are your organisation’s arrangements to manage the public relations implications of an adverse cyber incident?

The immediate impacts of an adverse cyber incident may be financial, but over the longer term the reputational impacts can be much more significant. Organisations should have a communications plan to ensure all stakeholders receive the communications they need when they need them. The plan should cover the immediate and subsequent phases after an adverse cyber incident to quickly and expertly manage, mitigate and recover from any reputational damage. Arrangements with external providers should be in place in advance of an incident.

22. How well prepared are your organisation’s arrangements to mitigate the potential legal and regulatory implications of an adverse cyber incident?

Breaches of personal information may need to be reported to the relevant data protection competent authority. Organisations should have an agreed resource on call to quickly and expertly understand whether a breach has occurred, whether a regulator should be informed, and to mitigate the legal and regulatory response.

23. Does your organisation have insurances in place that adequately cover the financial costs of a major cyber breach?

A major cyber breach can be expensive and disrupt normal business operations. Cyber-specific insurance can cover losses related to mitigating a breach, recovering to business as usual, and potentially fines levied by regulatory agencies.

Please answer all the questions.

The report will be generated here...

Users’ data given in this form, and any further information given via personal contact, are used in strictest confidence. We are scrupulous both about the data we process and our users’ privacy and control over their personal data. If you have any questions about this statement, please contact jim.gee@crowe.co.uk