Cyber Resilience Maturity Assessment

Self-Assessment Questionnaire

Assess Your Cyber Resilience in Just 5 Quick Questions

Question

1 of 5

We can reliably meet the 3-2-1 rule of backups without making multiple copies at multiple locations.

Why does this matter? At the time of recovery, your backups need to be available. No if's and no but's. The 3-2-1 rule increases the availability of backups - 3 copies, 2 locations, 1 offsite/air-gapped.

Question

2 of 5

We have root access to backup servers sufficiently restricted and protected.

Why does this matter? 93% of organizations hit by ransomware in the past year said that the cybercriminals attempted to compromise their backups during the attack. Backup data can be modified or deleted by negligent or compromised admins.

Question

3 of 5

We have an effective way to identify clean versus compromised data prior to recovery.

Why does this matter? When it's time for cyber recovery, there's a critical tradeoff between the need to recover quickly and the need to recover only clean data.

Question

4 of 5

We have a SIEM/XDR that can provide insights into abnormal activities in the backup environment.

Why does this matter? While investigating a cyber attack, SOC teams would often need access to a lot of information in order to pull together the full picture.

Question

5 of 5

We can detect and receive alerts for any threats to sensitive data and/or the backup environment.

Why does this matter? Bad actors often attempt to compromise the backups and prevent recovery.

Your Cyber Resilience Maturity Level

0%

Benchmarking

How you compare to everyone else.

marker

Benchmark

Level 1 : Backup Immutability

64%

level 1 result marker

Level 2 : Backup Security

67%

level 1 result marker

Level 3 : Cyber Remediation

60%

level 1 result marker

Level 4 : Cyber Investigation

62%

level 1 result marker

Level 5 : Cyber Detections

55%

level 1 result marker

Most organizations are flying blind—only 14% feel truly cyber resilient

We need just a couple of details