Q1: Does your organization have a documented information security policy?
Q2: How often does your organization perform risk assessments?
Q3: How is user access to critical systems controlled?
Q4: Are multi-factor authentication (MFA) mechanisms implemented?
Q5: Are network security controls (firewalls, IDS/IPS) implemented?
Test Question
Enter your details below to receive your full report: