For too long cyber security has been seen as an IT issue. It's essential organisations embrace a security-first culture that brings together technology, staff skills, operations and training so that everyone, from board-level to entry-level employees, are on the same security journey.

  1. What Security Measures Are in Place?
    • What antivirus and anti-malware solutions are being used?
    • Are firewalls and intrusion detection/prevention systems in place?
    • How is data encryption handled for sensitive information?
  2. How Often Are Software and Systems Updated?
    • Are operating systems and software regularly updated with security patches?
    • Is there a system for managing software updates and patches?
  3. What Is the Backup and Disaster Recovery Plan?
    • How often are backups performed, and where are they stored?
    • What is the plan for recovering data in case of a disaster or data breach?
  4. How Is Employee Training Handled?
    • Is there a cybersecurity training program for employees?
    • What measures are in place to raise awareness about phishing and other security threats?
  5. What Access Controls Are in Place?
    • How are user accounts and permissions managed?
    • Is multi-factor authentication (MFA) implemented for critical systems?
  6. How Are Mobile Devices Secured?
    • How are mobile devices, such as smartphones and tablets, secured?
    • Are there policies in place for bring-your-own-device (BYOD) scenarios?
  7. What Incident Response Plan Is in Place?
    • Is there a plan for responding to security incidents and breaches?
    • What steps are taken to mitigate the impact of security incidents?
  8. How Is Data Privacy Managed?
    • How is sensitive customer or employee data handled and protected?
    • Is there compliance with data protection regulations (e.g., GDPR)?
  9. What Vendor and Third-Party Security Measures Are Taken?
    • How are the security practices of third-party vendors and suppliers evaluated?
    • Are there contracts and agreements in place regarding data security with third parties?
  10. How Are Security Policies Enforced?
    • What measures are taken to ensure that employees comply with security policies?
    • Is there a process for monitoring and auditing security practices?
  11. What Is the BYOD Policy?
    • Is there a policy for employees using personal devices for work purposes?
    • How is data security managed in BYOD scenarios?
  12. What Is the Plan for Emerging Threats?
    • How does the IT department stay informed about new cybersecurity threats and trends?
    • Is there a plan for addressing emerging threats proactively?
  13. How Do You Handle Password Security?
    • Are there policies in place for creating and managing strong passwords?
    • Is password expiration and change enforced?
  14. What Is the Procedure for Reporting Security Concerns?
    • How can employees report security concerns or incidents?
    • Is there a clear process for handling and investigating reports?
  15. How Is Security Awareness Promoted?
    • Are there regular security awareness campaigns or training sessions?
    • How are employees kept informed about the latest security risks?