Do all user accounts use multi-factor authentication (MFA)?
Yes
Partial
No
MFA blocks over 99% of automated credential attacks. Without it, a single stolen password compromises your entire environment.
Are privileged/admin accounts separate from standard user accounts?
Yes
Partial
No
Admin accounts used for daily tasks dramatically increase the blast radius of a phishing attack or malware infection.
Do you have a formal process for revoking access when staff leave?
Yes
Partial
No
Orphaned accounts are one of the most common entry points for insider threats and ex-employee breaches.
Are all endpoints (laptops, desktops, mobiles) running up-to-date EDR/antivirus?
Yes
Partial
No
Traditional antivirus misses modern fileless malware. EDR (Endpoint Detection & Response) provides behavioural detection that signature-based tools cannot.
Are OS and application patches applied within 14 days of release?
Yes
Partial
No
The majority of ransomware attacks exploit known vulnerabilities with patches already available. Slow patching is the single biggest preventable risk.
Are personal/unmanaged devices blocked from accessing company systems?
Yes
Partial
No
BYOD without MDM controls means you have no visibility into the security posture of devices accessing your data.
Is your firewall actively managed and reviewed at least quarterly?
Yes
Partial
No
Firewall rules accumulate over time. Unreviewed rules often contain overly permissive access that attackers can exploit.
Is your Wi-Fi network segmented (guest network separate from corporate)?
Yes
Partial
No
A flat network means a compromised guest device can reach your servers and file shares directly.
Do remote workers connect via a managed VPN or zero-trust solution?
Yes
Partial
No
Uncontrolled remote access is the most common initial access vector in ransomware incidents targeting SMBs.
Are backups taken daily and stored offline or in an immutable cloud location?
Yes
Partial
No
Ransomware specifically targets and encrypts backup systems. Offline or immutable backups are your last line of defence.
Have you tested restoring from backup in the last 6 months?
Yes
Partial
No
Untested backups fail when you need them most. Recovery testing is the only way to know your backup actually works.
Is sensitive data encrypted at rest and in transit?
Yes
Partial
No
Encryption ensures that stolen data is useless to attackers. Without it, a breach immediately becomes a reportable GDPR incident.
Have all staff completed security awareness training in the last 12 months?
Yes
Partial
No
Over 90% of breaches involve a human element. Regular training and phishing simulations are the most cost-effective security control available.
Do you have a documented incident response plan?
Yes
Partial
No
Without a plan, organisations waste critical hours during an incident. The average cost of a breach is significantly lower for organisations with a tested IR plan.
Have you completed or are you working towards Cyber Essentials certification?
Yes
Partial
No
Cyber Essentials covers the five controls that prevent the majority of common cyber attacks. It is also required for UK government contracts.