- 1. Security Toolkit: An Overview of Topics in Cyber Security
- 2. Security Toolkit: Introduction
- 3. Security Toolkit: Assessing Your Current Cyber Security Practices
- 3.1. Security Toolkit: Self-Assessment for Organizations
- 3.2. Security Toolkit: Self-Assessment for Individual Users
- 4. Security Toolkit: Specific Security Topics: What to Look into and Why
- 4.1. Security Toolkit: Endpoint Detection and Response (EDR)
- 4.2. Security Toolkit: Multi-Factor Authentication (MFA)
- 4.3. Security Toolkit: Backups and Securing Backups
- 4.4. Security Toolkit: Email Security
- 4.5. Security Toolkit: Data Sharing
- 4.6. Security Toolkit: Password Management
- 4.7. Security Toolkit: Encryption
- 4.8. Security Toolkit: Other Tips on Technology Setup
- 5. Security Toolkit: Security Policies
- 6. Security Toolkit: Training
- 7. Security Toolkit: When you Experience an Incident
- 8. Security Toolkit: 2021 Security Webinar Series
3.2. Security Toolkit: Self-Assessment for Individual Users
Self-Assessment for Individual Users
How are you keeping your devices secure (mobile phones, tablets, USB, laptops, desktops)?
Below is a self-assessment tool that individuals may use to start to gauge how secure their personal tech practices are. We encourage this assessment for anyone working for your organization. We also encourage all users to regularly participate in cyber security trainings geared for end users. After the assessment, you will be given recommendations on how you can improve your security practices.
Click Here to start the Self-Assessment for Individual Users