An employee's password appears in a public data breach dump. What does your organisation do first?
Breached credentials are sold and reused within hours. Speed of response directly limits damage.
A new hire starts on Monday. How does your team set up their system access?
Onboarding is where least-privilege either starts strong or fails from day one.
Your monitoring tool flags unusual outbound traffic from an internal server at 2 AM. What happens next?
Unexpected outbound traffic can indicate data exfiltration or a compromised system calling home.
A customer emails asking for a copy of all personal data you hold on them. How does your team respond?
Data subject access requests are a legal right under GDPR and similar regulations. A clear process avoids fines.
It's 3 AM and your security tool sends a critical alert: possible ransomware activity detected. What happens?
The first 60 minutes of a ransomware incident determine whether you lose a server or the entire network.
An employee forwards a suspicious email to IT saying "I almost clicked this — it looked real." What happens next?
How you respond to good reporting behaviour determines whether employees keep reporting or stay silent.
A new SaaS vendor needs direct access to your customer database to deliver their service. How do you proceed?
Third-party access to sensitive data is one of the fastest-growing attack surfaces.
A developer accidentally deploys a storage bucket with public read access containing internal documents. How is this caught?
Cloud misconfigurations are the leading cause of data breaches. Detection speed is everything.
A visitor is found wandering unescorted near the server room. How does your team handle it?
Physical access bypasses most digital controls. Visitor management is a critical security layer.
Your Cyber Score
Create a free account to see your full domain breakdown, personalised roadmap, and learning recommendations.