Select Page
Managed IT Pricing      Buyer's Guide      Support Desk      Call Us: 1-312-985-6810
Cyber Risk Score Calculator

How Secure Is Your Business—Really?

It’s easy to focus on the price of cybersecurity tools. But what about the risk you’re carrying day to day—phishing, ransomware, data loss, account takeovers?

In a few clicks, this calculator shows your current risk posture and where to improve first.

  • Fast: takes 2–3 minutes
  • Private: calculated in your browser—no data sent
  • Actionable: clear next steps based on your score

Check your score now!

Cyber Score Calculator

Score: 0%
Tick what you already have.

Check the protections you use. The score bar at the top will update.

+1
Company-managed AV in place.
+3
Regular awareness training.
+3
Only company devices access data.
+3
Clear way to report issues fast.
+3
External tests at least yearly.
+3
Only approved apps; restrict actions.
+3
Firewalls/switches/Wi-Fi auto-update.
+3
Blocks risky sites.
+3
Email anti-spoof policy enforced/monitored.
+3
Email authentication records set.
+3
Security Operations Centre in place.
+3
Policy covers cyber incidents.
+4
Stops spam and phishing.
+4
Block or limit removable media.
+4
Business continuity & recovery plan.
+4
Drives are encrypted.
+4
Regular scans for weaknesses.
+4
Endpoint detection & response.
+4
Separate critical parts of the network.
+4
+5
Shared vaults, strong passwords.
+5
Admins only when needed.
+5
Control how data is used in apps.
+5
Only trusted/healthy devices connect.
+5
Backups for M365/Google/etc.
+5
Offline/immutable backup copy.
+4
Remote access is restricted and protected.
+6
Patches are applied within two weeks.
+5
Phones/tablets are enrolled and managed.
+2
Security/audit logs kept for at least 90 days.
0 selected

What your Score Means

  • 90–100 (Excellent): Strong posture. Keep policies current and test recovery regularly.
  • 75–89 (Strong): Good foundation; close gaps like MFA coverage, backups, and patch cadence.
  • 50–74 (Fair): Some key controls missing—prioritize identity, email security, and backups.
  • 0–49 (High Risk): Urgent improvements needed; start with MFA, endpoint protection, and offline backups.

Tip: You don’t need every control to reduce risk. Focus on the high-impact basics first.

Ready to Improve Your Score?

When you’re ready to invest in reliable, right-sized security, book a quick 15-minute video call. We’ll review your results and outline a 90-day improvement plan.

Prefer to Talk to a Human?

Contact us. Tell us about your goals and current tools—we’ll reach out with next steps.

Prefer to Talk to a Human?

Contact us. Tell us about your goals and current tools—we’ll reach out with next steps.

Ready to Improve Your Score?

When you’re ready to invest in reliable, right-sized security, book a quick 15-minute video call. We’ll review your results and outline a 90-day improvement plan.

What We Recommend for Most Businesses

  • MFA/passkeys for all users and a password manager
  • Endpoint protection (EDR or next-gen AV)
  • Fast updates (OS/apps within 14 days)
  • Advanced email filtering + DMARC/SPF/DKIM
  • Backups with an offline/immutable copy (and test restores quarterly)

FAQs

Is this a certification?
No. It’s a quick self-check to guide priorities. If you need formal assurance (e.g., SOC 2 or ISO 27001), we can advise.

Does a 100% score mean zero risk?
No one has zero risk. A high score means you’ve addressed the highest-value controls most attackers exploit.

Can you help us implement improvements?
Yes—Rollout of MFA/passkeys, email security, backups, endpoint protection, policy updates, and staff education.

Other Services You Might Find Valuable

IT Projects & Support

Stay ahead in a rapidly evolving tech landscape. Our nationwide network invests in cutting-edge research and expertise to bring the latest innovations directly to your business.

Icon Web Hosting and Domain Management

Managed IT Services

Enjoy top-tier security and availability—anytime, anywhere, on any device. With our three-tiered managed IT services, your network remains secure and operational.

Icon Cloud Security and Compliance

Cloud Services

Leverage the power of the cloud to expand your business capabilities. Whether you need public, private, or hybrid solutions, our experts will guide you toward the best fit for your needs.

Let's get started

Ready to Make a Real Change? Let's Build this Thing Together!

Mastodon