Skip to main content
Assessment of Security Landscape in Industry
Page
1
There was an error on your page. Please correct any required fields and submit again.
Go to the first error
*
1.
Question 1.
Approximately how large is your organisation?
Required
- Required.
1-19 (Small)
20-49 (Small)
50-99 (Medium)
over 100 (Large)
over 1000 (Enterprise)
*
2.
Question 2.
In which industry is your organisation?
Required
- Required.
Charity
Education
Finance
Retail
Healthcare
Military
Government
Services
Other (please specify):
This is required
Input box for - Other (please specify):
*
3.
Question 3.
Please select all known security protocols that are implemented within the organisation.
Required
- Required.
SSL1 - primarily web-based (https), but can also be deployed in other protocols (such as ftps)
SSL2 - superedes SSL1
SSL3 - supersedes SSL2
TLS1 - supersedes SSL3
TLS1.1 - supersedes TLS1
TLS1.2 - supersedes TLS 1.1
IPSEC - implemented at the router level to encrypt data between two configured routers.
PGP (and forks, such as GPG) - encryption applied on a per-file basis.
Full Disk or Virtual Disk Encryption (Truecrypt, VeraCrypt, Bitlocker, FileVault, etc)
Unknown
Not willing to disclose.
None.
Other (please specify):
This is required
Input box for - Other (please specify):
*
4.
Question 4.
In which kind of environments does your organisation implement encryption technologies?
Required
- Required.
Public-facing systems (primarily website environments such as websites, intranets, and extranets)
Internet bound internal systems (inter-office virtual private networks, business systems based on clouds, etcetera)
Internal systems (business intelligence, HR, payroll - any system that is not publicly accessible)
Unknown
Not at all
Other (please specify):
This is required
Input box for - Other (please specify):
*
5.
Question 5.
If applicable, are security certificates self-signed (defined by the server) or purchased from a third party certificate authority?
Required
- Required.
Unknown
Self Signed
Purchased
Not Applicable
Both depending on environment
*
6.
Question 6.
How often are these certificates updated, cycled, or otherwise changed?
Required
- Required.
Yearly
2-6 months
1-8 weeks
Every few years
Unknown
Never
Not Applicable
*
7.
Question 7.
Are non-IT members of staff trained in recognising or avoiding cyber security threats, such as phishing emails or viruses?
Required
- Required.
Yes
No
*
8.
Question 8.
Has your organisation ever suffered from data theft?
Required
- Required.
Yes
No
Unwilling to disclose
Unknown
*
9.
Question 9.
How would you rate your organisations approach to cyber security?
Required
- Required.
1 (Worst)
2
3
4
5
6
7
8
9
10 (Best)
Rating
1 (Worst)
2
3
4
5
6
7
8
9
10 (Best)
*
10.
Question 10.
What level of importance would you give to low latency (high speed) and security in areas of your network that deal with business critical or sensitive data?
Required
- Required.
1 - no importance
2
3
4
5
6
7
8
9
10 - utmost importance
Importance of Latency
1 - no importance
2
3
4
5
6
7
8
9
10 - utmost importance
Importance of Security
1 - no importance
2
3
4
5
6
7
8
9
10 - utmost importance
*
11.
Question 11.
Does your organisation encrypt data-at-rest within the infrastructure? For example, storage encryption or per file encryption.
Required
- Required.
Yes
No
Unknown
Unwilling to Disclose
Please write any additional comments regarding your question choices here