Essential Digital Services Questionnaire

Complete your digital ecosystem assessment

The Challenge

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. 

The Solution

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. 

Essential Digital Services Questionnaire

This is a rapid quiz to check how secure your business digital systems are. This will give you a preliminary view of how exposed your security is and what areas you need to concentrate on ensuring are
Hi Mike
Just a quick note here mate
This is where the summary will go for the quiz.

Instructions and guides and stuff.

Still working on the elements here however you can get the gist and we can amend and tweak.
Can your business survive without digital resources; internet, websites, email, apps, etc.?
If your systems were interrupted or shut down by securior technical issues, how long could all or some of your business functions operate before your clients are affected, or the costs and resources of your business are affected. Can you still operate with your digital systems affected?
Field is required!
Field is required!
Do you know what the costs for your business to respond to & recover from a serious cyber incident?
What is your cost to repair your online presence, or to replace your entire site or mobile app? Or, what would be the cost to hire rapid resources at last minute to remedy your cyber incidents? Do you know the cost involved? The time it may take? Or the other impacted facilities that could also be cost burdened?
Field is required!
Field is required!
Do you know what data and IT systems your business needs to keep operating if exposed to cyber breach?
Can you survive with a generic email account? What about your social accounts and websites; what if they go down or are hijacked? Do you know what you will need as a minimum for your business to survive?
Field is required!
Field is required!
Do you know who has access to your business systems and data?
Are you aware of your personnel that has access to your systems and data? What access do former staff or contractors have? Are there any former staff that have access to your systems, and have they been removed from access privileges?
Field is required!
Field is required!
Do you know how your digital assets are protected?
Are you, or your IT administrators able to understand your minimum security and protection systems for your digital assets?
Field is required!
Field is required!
Are all computers protected by a properly configured firewall?
Are firewalls configured correctly on your systems? This includes PC's and devices connected to your network. Has this ever been switched off to allow for applications and hardware to connect to your network.
Field is required!
Field is required!
Do you have policies in place to ensure safe and proper use of internet and email?
Are your staff aware of your operating procedures and practices for internet and email access and usage? The majority of system issues is largely caused by staff opening malicious emails and attachments, as well as browsing non-work related sites and applications.
Field is required!
Field is required!
Are staff prevented from installing software without prior approval?
A large number of devices are not restricted from downloading software and applications. Updates should be on an automated schedule (outside of work hours) and devices should be largely restricted from accessing and installing software without a network administrators assessment and approval. We see large amounts of vulnerabilities and issues caused by staff installing software without permission.
Field is required!
Field is required!
Do you have controls in place to ensure authorised access only?
Are logins shared for some applications and software? Are some staff or contractors granted access to systems with poor credential management? Do you have 2FA (Two Factor Authorisation)?
Field is required!
Field is required!
Do you have sufficient password obligations and strength levels?
Are your passwords multi character and symbol based? Are they more than 12 characters long? Are they based on best practices for strong authority protocols?
Field is required!
Field is required!
Do you know where your critical business information and data is stored?
On internal computer systems, Australian based data centres, international data centres or cloud based servers? A lot of our newer clients are not aware that their sensitive company and client data is stored on less than adequate servers in offshore countries. There are significant risks associated to poor server and traffic management protocols.
Field is required!
Field is required!
Do you understand the risks associated with data held by your third party suppliers?
Not all businesses are able to store and utilise data on premises. Using third part software providers may allow for them to use your data for their own purposes. Are you protected against risk and intrusion by needlessly exposing your data or your clients data?
Field is required!
Field is required!
Do you have backup measures and disaster recovery plans in place?
Is your data and digital presence (Websites, portals, apps, etc.) automatically backed up at regular intervals? Are you able to access this data rapidly and without restrictions?
Field is required!
Field is required!
Do you have an independent mentor to discuss your IT needs from time to time?
Are your IT services audited by a third party to ensure you have the best practices in place and are operating efficiently whom can assess works done by your internal IT administrators, or any third party providers used?
Field is required!
Field is required!
Do you regularly evaluate the market to ensure that your IT services are still the best ‘fit’ for your business?
Prices for services and equipment change as often as the hardware and software itself is updated. It's important to ensure that evaluations are conducted to ensure that you're operating with the latest technology for the most economical prices.
Field is required!
Field is required!
Are you protected from viruses, Trojans, spyware, and general threats?
How often is updated? When does it run on your systems/devices? Who monitors and maintains these systems? Is it effective at removing threats from incoming emails? Can you guarantee that your messages and files sent to clients is not infected with any threats?
Field is required!
Field is required!
Is your data restricted to only those staff that require it and only when needed?
Is your data restricted to role specific tasks? Are staff able to access your entire database/s? Is the data accessible from outside the office or in remote working environments?
Field is required!
Field is required!
Is any critical business data stored on easily-lost USB sticks or external hard drives?
Are systems restricted from transferring client records, contracts, data, etc. to external drives and portable storage? Can your entire customer list be copied onto a USB drive by staff or contractors?
Field is required!
Field is required!
Have you considered cyber insurance as part of your cyber risk management strategy?
Are you aware of cyber-insurance? Are you currently covered under your existing business insurance for protection from digital threats? Will your insurer cover you against hardware/software issues? Against hacking and hijacking? Will they cover your recovery and rebuild costs?
Field is required!
Field is required!
Have you established a working relationship with an external IT specialist who is familiar with your business?
It is essential that you are able to call on resources and support in a rapid manner. A trusted resource will be of benefit in an emergency as well as with general consultation. Specialists familiar with your server setup and digital ecosystem can be available at short notice to fix urgent server problems, saving selection processes and further errors and issues with recovery or just updates.
Field is required!
Field is required!

Almost complete...

Just need a few details from you so as we can send you your results. Your information is safe and we DO NOT disclose or distribute your information to any third party.
Your First Name
Field is required!
Field is required!
Your Last Name
Field is required!
Field is required!
Business Name
Your business or company name
Field is required!
Field is required!
Phone Number:
Your phone number
Field is required!
Field is required!
Your Email Address
Enter Your E-mail Address
Field is required!
Field is required!
What is your business website?
www. enter your business website .com.au
Field is required!
Field is required!

0% Risk

You have selected that your business digital ecosystem is 100% secured and effective. While this is a great initial result, we consistently find that some of our newer clients are misunderstanding their systems and potential threats. We recommend a full professional evaluation in order to ascertain that there are no real time vulnerabilities in the system as it curtebntky operates.

5% Risk

You have covered most areas of your vulnerabilities. This is great! However with a 5% risk of exposure, we highly recommend a full systems assessment and review in order to ensure you have business continuity.

10% Risk

You have covered most areas of your vulnerabilities. This is great! However with a 10% risk of exposure, we highly recommend a full systems assessment and review in order to ensure you have business continuity.

15% Risk

You have covered most areas of your vulnerabilities. This is great! However with a 15% risk of exposure, we highly recommend a full systems assessment and review in order to ensure you have business continuity.

20% Risk

You have covered most areas of your vulnerabilities. This is great! However with a 20% risk of exposure, we highly recommend a full systems assessment and review in order to ensure you have business continuity.

25% Risk

You have covered most areas of your vulnerabilities. This is great! However with a 25% risk of exposure, we highly recommend a full systems assessment and review in order to ensure you have business continuity.

30% Risk

You have covered most areas of your vulnerabilities. This is great! However with a 30% risk of exposure, we highly recommend a full systems assessment and review in order to ensure you have business continuity.

35% Risk

You have covered most areas of your vulnerabilities. This is great! However with a 35% risk of exposure, we highly recommend a full systems assessment and review in order to ensure you have business continuity.

40% Risk

You have covered most areas of your vulnerabilities. This is great! However with a 40% risk of exposure, we highly recommend a full systems assessment and review in order to ensure you have business continuity.

45% Risk

You have covered most areas of your vulnerabilities. This is great! However with a 45% risk of exposure, we highly recommend a full systems assessment and review in order to ensure you have business continuity.

50% Risk

You have covered most areas of your vulnerabilities. This is great! However with a 50% risk of exposure, we highly recommend a full systems assessment and review in order to ensure you have business continuity.

55% Risk

You have covered most areas of your vulnerabilities. This is great! However with a 55% risk of exposure, we highly recommend a full systems assessment and review in order to ensure you have business continuity.

60% Risk

You have covered most areas of your vulnerabilities. This is great! However with a 60% risk of exposure, we highly recommend a full systems assessment and review in order to ensure you have business continuity.

65% Risk

You have covered most areas of your vulnerabilities. This is great! However with a 65% risk of exposure, we highly recommend a full systems assessment and review in order to ensure you have business continuity.

70% Risk

You have covered most areas of your vulnerabilities. This is great! However with a 70% risk of exposure, we highly recommend a full systems assessment and review in order to ensure you have business continuity.

75% Risk

You have covered most areas of your vulnerabilities. This is great! However with a 75% risk of exposure, we highly recommend a full systems assessment and review in order to ensure you have business continuity.

80% Risk

You have covered most areas of your vulnerabilities. This is great! However with a 80% risk of exposure, we highly recommend a full systems assessment and review in order to ensure you have business continuity.

85% Risk

You have covered most areas of your vulnerabilities. This is great! However with a 85% risk of exposure, we highly recommend a full systems assessment and review in order to ensure you have business continuity.

90% Risk

You have covered most areas of your vulnerabilities. This is great! However with a 90% risk of exposure, we highly recommend a full systems assessment and review in order to ensure you have business continuity.

95% Risk

You have covered most areas of your vulnerabilities. This is great! However with a 95% risk of exposure, we highly recommend a full systems assessment and review in order to ensure you have business continuity.

100% Risk

You are at massive risk of digital threats and disruption. It is highly recommended that you engage your IT admin to secure your digital business services. We can assist you in resolving your vulnerabilities and assuring business continuity.

Essential Digital Services - Self-Evaluation

This is our quick self-evaluation, to check how secure your business digital systems are. This will give you a preliminary view of how exposed your security is and what areas you need to concentrate on ensuring are secure and protected.

With twenty questions you will be able to quickly see which areas of your digital ecosystem are in need of further review, repair, monitoring or updating. We encourage all businesses to regularly use this tool so as to ascertain any weak points in your current IT systems.

1 / 20

Do you know what the costs for your business to respond to & recover from a serious cyber incident?

What is your cost to repair your online presence, or to replace your entire site or mobile app?

Or, what would be the cost to hire rapid resources at last minute to remedy your cyber incidents?

Do you know the cost involved? The time it may take? Or the other impacted facilities that could also be cost burdened?

2 / 20

Can your business survive without digital resources; internet, websites, email, apps, etc.?

If your systems were interrupted or shut down by intrusion or technical issues, how long could all/some of your business functions operate before your clients are affected?

Or the costs and resources of your business are affected?

Can you still operate with your website down, CRM intrusion, email hacked, or any of your digital systems affected?

3 / 20

Do you know what data and IT systems your business needs to keep operating if exposed to cyber breach?

Can you survive with a third party email account like Gmail?

What about your social media accounts and websites; what if they go down or are hijacked?

Do you know what you will need as a resource minimum for your business to continue operating and survive?

4 / 20

Do you know who has access to your business systems and data?

Are you aware of your personnel that has access to your systems and data?

What access do former staff or contractors have, or still have access to?

Are there any former staff that have access to your systems, and have they been removed from access privileges and their email accounts have forwards and allocation correctly?

5 / 20

Do you know how your digital assets are protected?

Are you, or your IT administrators able to understand your minimum security and protection systems for your digital assets?

It's a simple question, however should involve an informed answer.

6 / 20

Are all computers protected by a properly configured firewall?

Are firewalls configured correctly on your systems?

This includes PC's and devices connected to your network.

Have your firewalls ever been switched off to allow for applications and hardware to connect to your network?

7 / 20

Do you have policies in place to ensure safe and proper use of internet and email?

Are your staff aware of your operating procedures and practices for internet and email access and usage?

The majority of system issues can be contributed to staff opening malicious emails and attachments, as well as browsing non-work related sites and applications.

8 / 20

Are staff prevented from installing software without prior approval?

Many devices are not restricted from downloading software and applications automatically. Updates should only be on an automated schedule (outside of work hours) and device users, (staff & contractors) should be restricted from accessing and installing software without a network administrators assessment and approval.

We see large amounts of vulnerabilities and issues caused by staff installing software without proper knowledge of it and administrator permission.

9 / 20

Do you have controls in place to ensure authorised access only?

Are logins shared for some applications and software?

Are some staff or contractors granted access to systems with poor credential management?

Do you have 2FA (Two Factor Authorisation) on hardware and/or your key software and cloud storage?

10 / 20

Do you have sufficient credential and password management?

Are your passwords multi character, symbol based, and more than 12 characters?

Are they based on best practices for strong authority protocols?

11 / 20

Do you know where your critical business information and data is stored?

On internal computer systems, Australian based data centres, international data centres or cloud based servers?

A lot of our newer clients are not aware that their sensitive company and client data is stored on adequate servers, however are in offshore locations. There are significant risks associated to poor server and traffic management protocols.

12 / 20

Do you understand the risks associated with data held by your third party suppliers?

Not all businesses are able to store and utilise data on premises. Using third part software providers may allow for them to use your data for their own purposes.

Are you protected against risk and intrusion by needlessly exposing your data or your clients data?

13 / 20

Do you have backup measures and disaster recovery plans in place?

Is your data and digital presence (Websites, portals, apps, etc.) automatically backed up at regular intervals? Are you able to access this data rapidly and without restrictions?

14 / 20

Do you have an independent mentor to discuss your IT needs from time to time?

Are your IT services audited by a third party to ensure you have the best practices in place and are operating efficiently whom can assess works done by your internal IT administrators, or any third party providers used?

15 / 20

Do you regularly evaluate the market to ensure that your IT services are still the best ‘fit’ for your business?

Prices for services and equipment change as often as the hardware and software itself is updated. It's important to ensure that evaluations are conducted to ensure that you're operating with the latest technology for the most economical prices.

16 / 20

Does your anti-virus software address viruses, trojans, spyware, key-logging software and warns against suspect web pages?

How often is updated? When does it run on your systems/devices? Who monitors and maintains these systems? Is it effective at removing threats from incoming emails? Can you guarantee that your messages and files sent to clients is not infected with any threats?

17 / 20

Is your data restricted to only those staff that require it and only when needed?

Is your data restricted to role specific tasks?

Are staff able to access your entire database/s?

Is the data accessible from outside the office or in remote working environments?

18 / 20

Is any critical business data stored on easily-lost USB sticks or external hard drives?

Are systems restricted from transferring client records, contracts, data, etc. to external drives and portable storage?

Can your customer list be copied onto a USB drive by staff or contractors?

19 / 20

Have you considered cyber insurance as part of your cyber risk management strategy?

Are you aware of cyber-insurance?

Are you currently covered under your existing business insurance for protection from digital threats?

Will your insurer cover you against hardware/software issues? Against hacking and hijacking? Will they cover your recovery and rebuild costs?

20 / 20

Have you established a working relationship with an external IT specialist who is familiar with your business?

It is essential that you are able to call on resources and support swiftly and deploy solutions quickly. A trusted resource will be a massive benefit in an emergency as well as with general consultation.

Specialists familiar with your server setup and digital ecosystem need to be available on short notice, to fix urgent server, website, software and hardware problems. Saving selection processes and further errors and issues with recovery or just updates.

Enter Your Details

We will send you your results to your email account.

Mobile Sites Are Where You’re Seen, F1rst.

Mobile Refresh

Did you require your current site or app refreshed for the latest features/UX, security, commerce, analytics, or integrations?

Rebuild From the Inside Out

Do you need to start from scratch and build a whole new website, mobile app, social media and digital presence?

Maintain & Update

Does your website need attanetion and ongoing support or maintenence?  

  • Mobile Sales 80% 80%
  • Website Traffic 50% 50%
  • Conversion Rate 75% 75%
  • Email Subscribers 60% 60%

The Results Can Be Amazing

With correct design, development, deployment, and management; your website can have higher traffic and conversion rates than market competitors. 

The best websites are arriving daily. Unless you’re experianced enough in several specilaty fields; we highly recomend at least speaking with us first. If we can’t help you; we know the people who can.

We Rethought Everything

Complete Corporate Identity

Interested In Working With Us?