Cyber Resilience Maturity Assessment
Self-Assessment Questionnaire
Assess Your Cyber Resilience in Just 5 Quick Questions
Question
1 of 5
We can reliably meet the 3-2-1 rule of backups without making multiple copies at multiple locations.
Why does this matter? At the time of recovery, your backups need to be available. No if's and no but's. The 3-2-1 rule increases the availability of backups - 3 copies, 2 locations, 1 offsite/air-gapped.
Question
2 of 5
We have root access to backup servers sufficiently restricted and protected.
Why does this matter? 93% of organizations hit by ransomware in the past year said that the cybercriminals attempted to compromise their backups during the attack. Backup data can be modified or deleted by negligent or compromised admins.
Question
3 of 5
We have an effective way to identify clean versus compromised data prior to recovery.
Why does this matter? When it's time for cyber recovery, there's a critical tradeoff between the need to recover quickly and the need to recover only clean data.
Question
4 of 5
We have a SIEM/XDR that can provide insights into abnormal activities in the backup environment.
Why does this matter? While investigating a cyber attack, SOC teams would often need access to a lot of information in order to pull together the full picture.
Question
5 of 5
We can detect and receive alerts for any threats to sensitive data and/or the backup environment.
Why does this matter? Bad actors often attempt to compromise the backups and prevent recovery.
Your Cyber Resilience Maturity Level
Benchmarking
How you compare to everyone else.

Benchmark