<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1602061480087256&amp;ev=PageView&amp;noscript=1">
Question #.
Do you have employees?
Tip
Criminals are targeting payroll and W-2 information. Use of an outside data processing company does not absolve the employer from the responsibility of protecting this information.
Question #.
Do you offer any benefits to your employees, i.e. health insurance, life insurance? 
Tip

It is required that you obtain social security information on all employees, spouses, children that are part of the benefit plans.  This information is required by law to be protected and your company will be held liable if it is accessed or disclosed.

Question #.
Do you require a pre-employment application?
Tip

Personal information is collected in the application, drivers license number, date of birth, social security number. These are pieces of personally identifiable information that are required to be protected.

Question #.
Do you run background checks on job applicants?
Tip

Information such as drivers license number, date of birth, name and address are required to run the check. This is private information that needs to be protected.

Question #.
Do you require applicants to provide you with proof of residency?
Tip
Name and address, in conjunction with personally identifiable information (drivers license, date of birth, social security number, etc.) is private information that needs to be protected.
Question #.
Do you store data electronically?
Tip

This information needs to be protected no matter the format in which it is stored.
Risk to the business is the same whether the information is stolen electronically, by physical theft, office break-in, or
employee theft.

Question #.
Do you use the internet to conduct business?
Tip
Ransomware is the leading cause of cyber crime. Can your business continue operations without internet service?
Question #.
Do you accept credit card payments for goods or services?
Tip

Credit card numbers continue to be a target for criminals. All businesses that store, process or transmit cardholder data are required to follow the PCI DSS security standards. The use of their party processors does not eliminate obligations to protect cardholder data.

Question #.
Do you utilize EFT or ACH payments?
Tip

Bank information is a target for criminals using various phishing email attacks.

Question #.
Do you share information with vendors or advisors?
Tip

Business associations and vendors are the cause of over 20% of data breaches.

Question #.
Do you use any software to conduct your business?
Tip
The average network downtime due to an attack is 22 hours. Can your business continue without the use of proprietary software?
Question #.
Do you collect or require any confidential information from your customers?
Tip

The theft of confidential business information, including intellectual property of valued customers can be catastrophic for a business.

Question #.
Is your business subject to any regulatory or governmental body?
Tip

Government regulators, including the Office of Civil Rights (HIPAA), and the FTC, along with the Payment Card industry and other industry-specific bodies can fine/penalize companies following the breach of protected information.

Question #.
Do your employees use email?
Tip
Employees are the targets of sophisticated phishing email schemes to trick individuals into releasing confidential information.

Your Score is

#/#

We hope this assessment helped you better understand some of the cyber risks businesses face. For more information on cyber liability click the button below.

Learn More
Score: 0/100
Progress: 80%