Cyber Risk Healthcheck | Jensten Insurance Brokers
Feefo logo
Feefo logo

CyberRisk Health Check 2024

Cyber Security and Risks are here to stay, and future-proofing your business has never been more important. 

Our CyberRisk Health Check asks some of the key questions that should be front of mind when thinking about your business’s IT security. 

Furthermore, complete our survey and be in with a chance of winning an iPad*.

Get Ahead of Your Digital Risks

By answering our simple questions on the key areas of cyber security, you can reflect on what strategies your IT department or outsourced IT provider is deploying.

IT Security should be considered one part of your IT risk management strategy, the other part of Cyber Insurance.

Click here to find out more about Cyber Insurance.

Cyber Risk Health Check 2024
press Enter
Do you back up data at least weekly via a secure cloud or maintain offline copies disconnected from the network?
Do you have Multi-Factor Authentication enabled for remote access to your network?
Multi-factor authentication (MFA) is a multi-step account login process that requires users to enter more information than just a password. For example, along with the password, users might be asked to enter a code sent to their email, answer a secret question, or scan a fingerprint.
Do you conduct (at least) annual staff training for all staff on anti-fraud, cyber security?
Do you encrypt data whilst at rest in your network?
Data at rest—this is inactive data, which is not currently moving between networks or devices. This information is stored, and is often archived, and is thus less vulnerable than data in other states. However, the information that companies store is typically very valuable to hackers, and has become a target for cyberattacks.
If your system was compromised, would you feel confident in rectifying any fallout from this incident
Personally identifiable information (PII) is information that, when used alone or with other relevant data, can identify an individual, for example; such as a persons name, address, email, phone number, or date of birth.
Do you have a formal written information security policy in place?
An Information Security Policy (or IT security policy) is a document that spells out the rules, expectations, and overall approach that an business uses to maintain the confidentiality, integrity, and availability of its data.
Have you engaged in any planning, testing, or training in regards to cyber incident response preparedness?
Do you have processes to validate the payment/invoice and the bank account details when transferring funds to an account you have not paid into before?
Would you like a quotation from or to talk to your Jensten contact about the benefits of Cyber Insurance and how it could benefit your business?
And finally... For information on how we use your personal data please refer to our Privacy Notice. Please refer to our Terms and Conditions regarding the prize draw.
You can opt out of marketing communications at any time by contacting us.
Use Shift+Tab to go back

Why have we put this Health Check together?

Our CyberRisk Health Check provides clients with a moment to reflect on their IT Security strategies, and to understand where they might have gaps in their IT security.

There are many reasons why an IT Security strategy could fail, after all, it only takes one single point of failure in your systems, processes and within your employees for a cyber-criminal to exploit a vulnerability. 

For example, a significant factor in cyber events is often human error or behaviour (whether negligent or malicious acts). Many organisations are identifying the root causes of these employee behaviours and aspects of workplace culture that may be contributing to information security risk.

What is Cyber Insurance?

Cyber attacks continue evolving as technology does. Cyber Criminals are blessed with a whole industry of suppliers and hackers who are constantly looking for vulnerabilities in IT security.

Knowing your risks and their potential impact is more important than ever. A data breach, incorrect payment or cyber attack can have an irreversible impact on your business and brand – it’s imperative your IT Security Strategy consists of two important elements:

  1. cybersecurity risk management
  2. cyber insurance

Cyber Insurance is a safety net that can provide breach/investigation response services, notification costs and financial compensation for insurable losses.

For example, it can cover the cost of getting your systems back online, compensation claims you may face, fines from regulatory bodies, compensation if you have been a victim of a cyber crime, plus lost income*1.

Some policies also come with risk management services and tools for you to use before a cyber event happens.

There are a myriad of cyber insurance policies in the insurance market. When we work with our clients, we look to understand their concerns, where they have gaps in IT Security appear and what cover they are looking for.

Our Brokers can then work with our insurer partners to provide the appropriate Cyber Insurance policy the fulfils the requirements of our clients.

Cyber security

The prize and terms and conditions.

The prize: Apple iPad 10th Generation, 256GB, WIFI only, no pen, no keyboard, no Applecare. https://www.apple.com/uk/shop/buy-ipad/ipad/256gb-blue-wifi

Terms and conditions are available here.

*1 – the prize draws for a iPad 10th Generation