The effectiveness of security in a corporate environment



Companies are often the subject of cyber attacks, and the volume of cyber attacks is increasing. The information security must be improved. The solution is a compound of information security awareness and data protection measures. Monitoring, processes, and technology form the foundation of an information security system.

SKU: c12442a2-ad8b-4660-a16e-bdbf7b02120a Category: Tags: , , , , , , , , , , , , , , , , , , ,
Available in: English, Dutch, French, German, Spanish
  • The CIO who needs to ensire the safety of his organzation.
  • The startup who needs the right processes to have a secure base to build on.
  • The auditor that needs to find security weaknesses.
  • The consulting partner addressing her client's security requirements.
  • The SME owner who needs a security checklist.
Protecting the enterprise
how to protect your company

Cyber attack prevention
what you need to know about cyber attacks

Attacks & tools
use security tools and training

As you can see, you're not asking your respondents for opinions, satisfaction or agreement. Our scientific research has shown that these are very bad fuel for algorithms. Instead, we ask for verifiable facts or -behaviour. For further reading, you can download our AMAIZE magazine dedicated to this topic or discover the scientific papers in the Resources section.

After you have downloaded this questionnaire, you can - in your Toolbox - edit, add/delete, and translate questions & answers to your liking. Clicking the "Help me PRAIORITIZE" buttons in the Toolbox activates our A.I. to help you finish your masterpiece..

Q. How are employees protected against cyber security risks?
  1. Not
  2. Reactive
  3. Proactive (and this is known to employees)

Q. How does the company ensure that employees are not victims of scams?
  1. This does not happen because it is not possible to know where employees are online.
  2. Periodic reporting from employees if they see something that may be a scam.
  3. Periodic reporting from employees AND employees have access to a portal where information about scams is shared.
The artificial intelligence creating the questionnaires for the store has been inspired by over 11.000 whitepapers from more than 100 noted consultancy firms. Algorithms selected the 20% best papers and grouped papers from different consultancy firms into specific questionnaires. Why settle for less? Here is a summary how we did it.

If you feel you need outside support after conducting your assessment, we recommend the firms that have written the below mentioned whitepapers. Not having a paper selected does NOT mean that a firm does not give good advice.
You will download so much more than a set of questions and answers. This questionnaire contains everything for the full consultancy experience:
  • Respondent profiles for a helicopter view of your audience.
  • A maturity model with which algorithms calculate a six times smarter improvement target (compared to when you leave that to a human).
  • Improvement suggestions (per question) how to move from one answer to another
  • Suggested follow-on projects. After all, moving your organization from A to B might require more than just doing an assessment.
This English questionnaire is also available in Dutch, French, German, and Spanish.


    There are no reviews yet.

    Be the first to review “The effectiveness of security in a corporate environment”

    Your email address will not be published. Required fields are marked *