Documented Role-Based Access Control (RBAC) policy
Access Review
No regular access reviews
Inconsistent access removal for departing employees
Regular user access reviews (at least semi-annual)
2.2 Authentication
Multi-Factor Authentication
No MFA implementation
MFA for critical systems only
MFA required for all external access
Password Management
Basic password policies (minimum length only)
Password complexity requirements enforced
Advanced password policies with regular rotation
Component
Level 1
Level 2
Level 3
3.1 Training Program
Security Awareness
No formal security awareness program
Basic security awareness training program
Comprehensive security awareness program
Training Frequency
Training limited to annual compliance requirement
Annual mandatory security training
Quarterly security awareness communications
3.2 Phishing Defense
Phishing Simulations
No phishing simulation tests
Occasional phishing tests without targeted follow-up
Regular phishing simulations with metrics
Incident Reporting
No clear reporting channels for security concerns
Some incident reporting channels established
Clear incident reporting channels for all employees
Your Cybersecurity Score
0/150
Select your industry on the first page for benchmarking
Select your industry to see how you compare against industry peers.
Your Performance by Section
Security Leadership0/50
0%
Access Control0/50
0%
Security Training0/50
0%
Note: This free assessment covers only 3 of 8 critical security domains. For a complete cybersecurity maturity analysis including Network Protection, Endpoint Security, Data Protection, Incident Response, and Vendor Management, please register for the full assessment.
Your Security Analysis
Based on your responses, our analysis reveals your organization's security maturity across the three assessed domains.
Below are detailed visualizations and insights showing:
Maturity Distribution: How your security controls are distributed across basic, intermediate, and advanced levels
Industry Benchmarking: Your position relative to organizations in your sector
Risk Exposure: Critical vulnerabilities identified based on your current security posture
Implementation Roadmap: 3-year plan to address gaps and improve your security maturity
LOCKED
Unlock Results of Free Analysis
Create a free account to view your assessment results
Want the Complete Picture?
Get comprehensive analysis covering all 8 security domains, detailed recommendations, tailored policies, and board-ready reports