PhiShield

Cyber Risk Analysis

The Cyber Risk Analysis Initiative comprises of the analysis of both a technology risk assessment, as well as a human risk element of a business. Please complete/see the sections below for a high-level assessment at no cost.

Customer details

Contact details of the recipient of the report

Technology Risk Assessment

The Technology Risk Assessment comprises of a high-level vulnerability scan, as well as a short questionnaire.

A. Vulnerability Scan

A vulnerability scan is effectively a site inspection that establishes if there are any access point of unwanted entry by threats. Phishield employs the services of a third party, Cybersafe Consultants, to perform the scan to Phishield’s partners on behalf of their customers.

IP address discovery

If you do not know your IP addresses, they can be auto discovered with your consent.
(Please note that not all IP addresses are discoverable. Neither Phishield nor Cybersafe guarantee the accuracy of IP searches)

Authorisation

By submitting your information, you, the Customer, hereby authorise CyberSafe to use this information to perform the agreed ethical hacking on behalf of Phishield UMA (Pty) Ltd, which is necessary to evaluate the security of the Customer’s computer network resources( Internet Facing addresses, ranges, or any other additional resources). By submitting this form, the Customer certifies that all the information provided including the IP addresses of devices belonging to the customer’s organisation is correct. Your information, including personal information collected, will only be used to perform the above agreed ethical hacking and, vulnerability scan and provide the results to yourself and Phishield for further assistance

B. Risk Assessment Questionnaire

The six questions below highlight specific areas of concern regarding cyber-related risks for a business

Does your Business have an active, comprehensive, paid for internet security software installed on all computer systems?

Data Backup

Do you back up your data on a daily / weekly basis?

Do you perform recovery testing at least once per year?

Is your data stored separately from your main computer e.g. via the cloud or on and offline hard disk?

Do you regularly update and patch your computers so that they always have the latest security patches installed?

Are all the emails received and sent by your workplace computers and network checked for viruses / malware via an email filter?

Are your employees regularly advised about the secure use of their workplace computer, expecially regarding the dangers of using the internet / email?

If you answered no to any of the questions above, your company could be at risk and you should contact your IT provider, and/or insurance broker, with regards to the possible software/insurance solutions.