Comprsa

Small Business Cybersecurity Risk Assessment

Thank you for taking our Small Business Cybersecurity Survey! Using your responses, we have determined your risk level in five key cybersecurity areas by assigning a value of High to Low to each response where “strongly disagree” = High and “strongly agree” = Low. Each category was then averaged to determine your overall risk level. We provide insights and best practices customized for you so you can increase the security posture of your business starting today!
Overall cybersecurity risk level
Based upon your responses we determined your overall cybersecurity risk level is medium. A summary of your risk in each cybersecurity category is shown below. Detailed responses and feedback follow on the next pages.
Overall cybersecurity risk level = Medium
  • 100
  • 80
  • 60
  • 40
  • 20
  • 0
Continent 100 80 60 40 20 0
GRC $30K
NS $30K
SAS $30K
DP $30K
DRR $30K

Governance, Risk, and Compliance

Risk Level M
StatementResponseScore
Our company has a documented Remote Access policySometimesM
Our company has a documented Chanage Management policySometimesM
We understand our compliance obligations and regularly assess our adherence to those requirementsNeutralM
We have purchased cyber liability insuranceNeutralM
Our company has a documented Acceptable Use of IT Assets policySometimesM
We provide security training to our employeesOnly at onboardingL
Our company has a documented IT Asset Management policySometimesM
Our company has a documented Data Classification and Handling policySometimesM
Our company has a documented Third-Party Management policySometimesM
Our company has a documented Identity and Access Management policySometimesM
Our company has a documented Security Awareness and Training policySometimesM
Our company has a documented Backup and Recovery policySometimesM
We assess our third-party service providers and suppliers to evaluate their security controls and potential riskNeutralM
The last time we performed an IT security assessment was3+ years agoL
Our company has a documented Data Retention and Disposal policySometimesM
Your self-assessment indicates your current governance, risk, and compliance capabilities are mature. Cybersecurity is not just an IT risk, and governance, risk, and compliance processes are important in appropriately managing cybersecurity risk across the entire organization.
Best Practices:
  1. Best practices:
  2. Your company should implement an employee training program, with security training occurring during new hire onboarding and at least once per year thereafter.
  3. Your company should implement an employee training program, with security training occurring during new hire onboarding and at least once per year thereafter.
  4. Your company should implement an employee training program, with security training occurring during new hire onboarding and at least once per year thereafter.

Network Security

Risk Level M
StatementResponseScore
The last time we performed an external penetration test on our internet facing systems was3+ years agoM
We have implemented remote access solutions for our internal systemsSometimesM
Our company has a well documented inventory of our network infrastructureNeutralM
We have implemented firewalls with Intrusion Detection and Intrusion Prevention capabilities enabledNeutralM
We require multi-factor authentication for our remote access solutionsNeutralM
Your self-assessment indicates your current network security capabilities are mature. Cybersecurity risks must be managed in a layered manner, with network security being the foundation on which the rest of your technical security controls rely. .
Best Practices:

System and Application Security

Risk Level M
StatementResponseScore
Our company has a well documented inventory of our systems and applicationsNeutralM
Access to our internal applications is controlled through Active Directory, not locally managed user accountsSometimesH
We utilize Active Directory or another centralized authentication source for managing employee accessSometimesM
We develop proprietary applications for internal useSometimesM
We have a documented change management processSometimesM
The last time we performed internal vulnerability scanning on our internal systems and applications was3+ years agoM
We have implemented antivirus/antimalware solutions on end user computersSometimesM
Your self-assessment indicates your current network security capabilities are mature. Cybersecurity risks must be managed in a layered manner, with network security being the foundation on which the rest of your technical security controls rely. .
Best Practices:

Data Protection

Risk Level M
StatementResponseScore
We securely dispose of sensitive data when it is no longer neededNeutralM
We encrypt sensitive data when stored at rest, whether on end user workstations, removeable media, or internal databases.NeutralM
We require third-parties that we share sensitive data with to meet minimum data protection standardsNeutralM
We encrypt sensitive data when transmitted internally or to third-partiesNeutralM
We perform regular data backupsSometimesM
Our company maintains an inventory of where our most sensitive data is stored, processed, or transmitted.NeutralM
Your self-assessment indicates your current network security capabilities are mature. Cybersecurity risks must be managed in a layered manner, with network security being the foundation on which the rest of your technical security controls rely. .
Best Practices:

Detection, Response, and Recovery

Risk Level H
StatementResponseScore
We last tested our business continuity, disaster recovery, and cybersecurity incident response plansWithin the last 12 monthsH
Our IT team receives an alert when a security event occursStrongly AgreeH
Our company has documented business continuity and disaster recovery plansStrongly AgreeH
Our company has documented cybersecurity incident response plansStrongly AgreeH
Your self-assessment indicates your current governance, risk, and compliance capabilities are mature. Cybersecurity is not just an IT risk, and governance, risk, and compliance processes are important in appropriately managing cybersecurity risk across the entire organization.
Best Practices:
  1. Best practices:
  2. Your company should implement an employee training program, with security training occurring during new hire onboarding and at least once per year thereafter.
  3. Your company should implement an employee training program, with security training occurring during new hire onboarding and at least once per year thereafter.
  4. Your company should implement an employee training program, with security training occurring during new hire onboarding and at least once per year thereafter.

For More Information

Please contact at Email Brian.Nichols@bakertilly.com For More Information
CONNECT WITH US
@BakerTillyUS
Baker Tilly US, LLP
bakertilly.com
ABOUT BAKER TILLY
Baker Tilly US, LLP (Baker Tilly) is a leading advisory, tax and assurance firm whose specialized professionals guide clients through an ever-changing business world, helping them win now and anticipate tomorrow. Headquartered in Chicago, Baker Tilly, and its affiliated entities, have operations in North America, South America, Europe, Asia and Australia.
The information provided here is of a general nature and is not intended to address the specific circumstances of any individual or entity. In specific circumstances, the services of a professional should be sought. Tax information, if any, contained in this communication was not intended or written to be used by any person for the purpose of avoiding penalties, nor should such information be construed as an opinion upon which any person may rely. The intended recipients of this communication and any attachments are not subject to any limitation on the disclosure of the tax treatment or tax structure of any transaction or matter that is the subject of this communication and any attachments. Baker Tilly US, LLP trading as Baker Tilly is a member of the global network of Baker Tilly International Ltd., the members of which are separate and independent legal entities. © 2022 Baker Tilly US, LLP