Kirsch Group Security
Self-assessment Questionnaire

Kirsch Group Security
Self-assessment Questionnaire

Kirsch Group Security
Self-assessment Questionnaire

How safe are you? Take this self-assessment to see
where you may be vulnerable and need additional security assistance

How safe are you? Take this self-assessment to see
where you may be vulnerable and need additional security assistance

The Kirsch Group Security
Self-Assessment Questionnaire

The Kirsch Group Security
Self-Assessment Questionnaire



We live in a world with a dynamic and evolving threat landscape. While we all face security challenges, there are specific risks and vulnerabilities that are unique to you. They are created by your individual profile, activities and exposures and mitigated by the safeguards you put in place.

Try to answer the questions as honestly as possible to give yourself a fair assessment of where you may be vulnerable.

Simply click on “yes” or “no” for each question.

If you are uncomfortable with your answers to any of the questions and want help with your security , click the link below to personally speak with a member of our team at the Kirsch Group (KG).
Click Here to Contact Us
Note: We will not collect or share the results of your security self-assessment at any time. Your results are for information purposes only. This form does not get submitted, and your answers are not stored anywhere. When you answer a question, the feedback will pop up right away.

Ready? Let’s begin.

DID YOU KNOW...

Cybercriminals use your digital footprint and data leaked from hacked websites to target you? This is called phishing.

Phishing is a crime. Hackers use fake web pages or malicious links in emails to convince unsuspecting people to reveal sensitive, confidential information such as user names, passwords, social insurance/social security numbers, credit card numbers, and bank routing numbers.

Phishing victims can experience identity theft, fraud, corporate espionage, online harassment, invasion of privacy, and stalking.

Section 1:

Cyber Security

The following are questions about cyber security and whether you may have been exposed to cyber threats. Click either the “yes” or “no” button for each question.

YES

NO
1. Is your full name, date of birth, home address, phone number, email address, family pictures, mother’s maiden name, pet's name, or other personal information easy to find online?

2. Has an online service you currently use ever been the victim of a data leak?

3. Have you ever clicked a malicious email link or attachment or been unsure if an email you received was legitimate?

4. Do you have sensitive information on your personal computer or phone that you want to stay confidential, and that needs to be available to you at all times (you can’t afford to lose it or lose access to it)?

5. Do you use any cyber security tools such as a password manager, two-factor authentication, encryption, a VPN, secure shredding, or home network monitoring?

DID YOU KNOW...

Cybercriminals use your digital footprint and data leaked from hacked websites to target you? This is called phishing.

Phishing is a crime. Hackers use fake web pages or malicious links in emails to convince unsuspecting people to reveal sensitive, confidential information such as user names, passwords, social insurance/social security numbers, credit card numbers, and bank routing numbers.

Phishing victims can experience identity theft, fraud, corporate espionage, online harassment, invasion of privacy, and stalking.

Section 1:

Cyber Security

The following are questions about cyber security and whether you may have been exposed to cyber threats. Click either the “yes” or “no” button for each question.
1. Is your full name, date of birth, home address, phone number, email address, family pictures, mother’s maiden name, pet's name, or other personal information easy to find online?
YES

NO

2. Has an online service you currently use ever been the victim of a data leak?

YES

NO

3. Have you ever clicked a malicious email link or attachment or been unsure if an email you received was legitimate?

YES

NO

4. Do you have sensitive information on your personal computer or phone that you want to stay confidential, and that needs to be available to you at all times (you can’t afford to lose it or lose access to it)?

YES

NO

5. Do you use any cyber security tools such as a password manager, two-factor authentication, encryption, a VPN, secure shredding, or home network monitoring?

YES

NO


DID YOU KNOW...

Cybercriminals use your digital footprint and data leaked from hacked websites to target you? This is called phishing.

Phishing is a crime. Hackers use fake web pages or malicious links in emails to convince unsuspecting people to reveal sensitive, confidential information such as user names, passwords, social insurance/social security numbers, credit card numbers, and bank routing numbers.

Phishing victims can experience identity theft, fraud, corporate espionage, online harassment, invasion of privacy, and stalking.

Section 1:

Cyber Security

The following are questions about cyber security and whether you may have been exposed to cyber threats. Click either the “yes” or “no” button for each question.
1. Is your full name, date of birth, home address, phone number, email address, family pictures, mother’s maiden name, pet's name, or other personal information easy to find online?
YES

NO

2. Has an online service you currently use ever been the victim of a data leak?

YES

NO

3. Have you ever clicked a malicious email link or attachment or been unsure if an email you received was legitimate?

YES

NO

4. Do you have sensitive information on your personal computer or phone that you want to stay confidential, and that needs to be available to you at all times (you can’t afford to lose it or lose access to it)?

YES

NO

5. Do you use any cyber security tools such as a password manager, two-factor authentication, encryption, a VPN, secure shredding, or home network monitoring?

YES

NO


DID You Know...

Many local police forces will not respond to residential alarms unless there is evidence of a break-in (e.g., law enforcement in Toronto stopped responding in 2018).

The average burglar takes less than a minute to break into your home, and then only another 8 to 12 minutes total to steal your belongings and get out again.


Section 2:

Physical Security

The following are questions about physical security and whether your home or the property you are responsible for may be vulnerable to physical threats.
YES
NO
1. Do you have sufficient fencing, lighting, cameras, high-security locks, and signage to deter a would-be criminal from attempting unauthorized entry into your premise?

2. Do you know everyone with a physical key, mechanical fob, or other means of access to your property?

3. Do you have any protections in place to prevent unauthorized access to valuable items such as watches, jewelry, or private or commercially sensitive information?

4. Should there be an attempt to enter your property or take your possessions without your consent, do you have monitoring alerts?

5. If you have a security issue, do you know who you will call for assistance?

Consider this:

  • Many local police forces will not respond to residential alarms unless there is evidence of a break-in (e.g., law enforcement in Toronto stopped responding in 2018).
  • The average burglar takes less than a minute to break into your home, and then only another 8 to 12 minutes total to steal your belongings and get out again.

Section 2:

Physical Security

The following are questions about physical security and whether your home or the property you are responsible for may be vulnerable to physical threats.
1. Do you have sufficient fencing, lighting, cameras, high-security locks, and signage to deter a would-be criminal from attempting unauthorized entry into your premise?
YES

NO

2. Do you know everyone with a physical key, mechanical fob, or other means of access to your property?

YES

NO

3. Do you have any protections in place to prevent unauthorized access to valuable items such as watches, jewelry, or private or commercially sensitive information?

YES

NO

4. Should there be an attempt to enter your property or take your possessions without your consent, do you have monitoring alerts?

YES

NO

5. If you have a security issue, do you know who you will call for assistance?

YES

NO


Consider this:

  • Many local police forces will not respond to residential alarms unless there is evidence of a break-in (e.g., law enforcement in Toronto stopped responding in 2018).
  • The average burglar takes less than a minute to break into your home, and then only another 8 to 12 minutes total to steal your belongings and get out again.

Section 2:

Physical Security

The following are questions about physical security and whether your home or the property you are responsible for may be vulnerable to physical threats.
1. Do you have sufficient fencing, lighting, cameras, high-security locks, and signage to deter a would-be criminal from attempting unauthorized entry into your premise?
YES

NO

2. Do you know everyone with a physical key, mechanical fob, or other means of access to your property?

YES

NO

3. Do you have any protections in place to prevent unauthorized access to valuable items such as watches, jewelry, or private or commercially sensitive information?

YES

NO

4. Should there be an attempt to enter your property or take your possessions without your consent, do you have monitoring alerts?

YES

NO

5. If you have a security issue, do you know who you will call for assistance?

YES

NO


Did You Know...

Due Diligence takes many forms. Below are just a few:

  • Reference, credit and criminal background checks
  • Comprehensive open source and dark-web reporting
  • Private investigation services


Threat intelligence can uncover risks surrounding country-specific travel and evaluate domestic threats like radical activism occurring near you in the form of demonstrations or rallies.


Section 3:

Due Diligence

The following are a few due diligence questions that will help you understand if you may be exposed to any threats caused by a lack of due diligence on your or your employer's part.
YES
NO
1. Before providing physical access to your home, office, valuable assets, or sensitive information, did you vet or conduct any due diligence on employees or business partners?

2. Did you vet or conduct any due diligence on business partners, investors, or close associates (i.e. those who could harm your reputation or financial standing)?

3. Do you work or have business interests in a sector that may be considered sensitive or controversial?

4. Do you travel outside of North America for work or pleasure?

5. Do you have access to or receive up-to-date threat-related information to assess the risk of an industry you work in or a location you travel to?

Did You Know...

Due Diligence takes many forms. Below are just a few:

  • Reference, credit and criminal background checks
  • Comprehensive open source and dark-web reporting
  • Private investigation services


Threat intelligence can uncover risks surrounding country-specific travel and evaluate domestic threats like radical activism occurring near you in the form of demonstrations or rallies.

Section 3:

Due Diligence

The following are a few due diligence questions that will help you understand if you may be exposed to any threats caused by a lack of due diligence on your or your employer's part.
1. Before providing physical access to your home, office, valuable assets, or sensitive information, did you vet or conduct any due diligence on employees or business partners?
YES

NO

2. Did you vet or conduct any due diligence on business partners, investors, or close associates (i.e. those who could harm your reputation or financial standing)?

Yes

NO

3. Do you work or have business interests in a sector that may be considered sensitive or controversial?

Yes

NO

4. Do you travel outside of North America for work or pleasure?

Yes

NO

5. Do you have access to or receive up-to-date threat-related information to assess the risk of an industry you work in or a location you travel to?

Yes

NO


Did You Know...

Due Diligence takes many forms. Below are just a few:

  • Reference, credit and criminal background checks
  • Comprehensive open source and dark-web reporting
  • Private investigation services


Threat intelligence can uncover risks surrounding country-specific travel and evaluate domestic threats like radical activism occurring near you in the form of demonstrations or rallies.

Section 3:

Due Diligence

The following are a few due diligence questions that will help you understand if you may be exposed to any threats caused by a lack of due diligence on your or your employer's part.
1. Before providing physical access to your home, office, valuable assets, or sensitive information, did you vet or conduct any due diligence on employees or business partners?
YES

NO

2. Did you vet or conduct any due diligence on business partners, investors, or close associates (i.e. those who could harm your reputation or financial standing)?

YES

NO

3. Do you work or have business interests in a sector that may be considered sensitive or controversial?

YES

NO

4. Do you travel outside of North America for work or pleasure?

YES

NO

5. Do you have access to or receive up-to-date threat-related information to assess the risk of an industry you work in or a location you travel to?

YES

NO


Did you Know...

Duty of Care is the legal obligation of a person or organization to avoid acts or omissions that could likely cause harm to others.

You could expose yourself to liabilities and consequences if you’re negligent of your responsibilities.

Family members, business associates or employees may undertake risky behavior that could put themselves or others at risk. Risky behavior includes gambling, substance abuse, other illegal conduct, and dangerous online activity such as hyper-social media use, sexting, or recklessly interacting with strangers. Other security threats you need to be aware of include telephone or door-to-door scams targeting the elderly or vulnerable.

Section 4:

Duty of Care

The following are questions about how much you are paying attention to those in your care and if you may have been exposed or exposed to any security threats.
YES
NO
1. For people under your care or responsibility, do you provide them with timely threat-related information when they travel?

2. Do you know where people under your care or responsibility are at all times?

3. Have you established protocols to communicate with your family and those under your care or responsibility in the case of an accident or unforeseen circumstance?

4. Do you, your family or close associates have a reputation for risk-taking that has caused harm or is currently causing harm? Have these behaviors placed you or your family at risk?

5. Are your family members, employees, and associates aware of current security threats and challenges?

Did you Know...

Duty of Care is the legal obligation of a person or organization to avoid acts or omissions that could likely cause harm to others.

You could expose yourself to liabilities and consequences if you’re negligent of your responsibilities.

Family members, business associates or employees may undertake risky behavior that could put themselves or others at risk. Risky behavior includes gambling, substance abuse, other illegal conduct, and dangerous online activity such as hyper-social media use, sexting, or recklessly interacting with strangers. Other security threats you need to be aware of include telephone or door-to-door scams targeting the elderly or vulnerable.

Section 4:

Duty of Care

The following are questions about how much you are paying attention to those in your care and if you may have been exposed or exposed to any security threats.
1. For people under your care or responsibility, do you provide them with timely threat-related information when they travel?
YES

NO

2. Do you know where people under your care or responsibility are at all times?

YES

NO

3. Have you established protocols to communicate with your family and those under your care or responsibility in the case of an accident or unforeseen circumstance?

YES

NO

4. Do you, your family or close associates have a reputation for risk-taking that has caused harm or is currently causing harm? Have these behaviors placed you or your family at risk?

YES

NO

5. Are your family members, employees, and associates aware of current security threats and challenges?

YES

NO


Did you Know...

Duty of Care is the legal obligation of a person or organization to avoid acts or omissions that could likely cause harm to others.

You could expose yourself to liabilities and consequences if you’re negligent of your responsibilities.

Family members, business associates or employees may undertake risky behavior that could put themselves or others at risk. Risky behavior includes gambling, substance abuse, other illegal conduct, and dangerous online activity such as hyper-social media use, sexting, or recklessly interacting with strangers. Other security threats you need to be aware of include telephone or door-to-door scams targeting the elderly or vulnerable.

Section 4:

Duty of Care

The following are questions about how much you are paying attention to those in your care and if you may have been exposed or exposed to any security threats.
1. For people under your care or responsibility, do you provide them with timely threat-related information when they travel?
YES

NO

2. Do you know where people under your care or responsibility are at all times?

YES

NO

3. Have you established protocols to communicate with your family and those under your care or responsibility in the case of an accident or unforeseen circumstance?

YES

NO

4. Do you, your family or close associates have a reputation for risk-taking that has caused harm or is currently causing harm? Have these behaviors placed you or your family at risk?

YES

NO

5. Are your family members, employees, and associates aware of current security threats and challenges?

YES

NO


Did you Know...

That insurance companies will offer lower premiums if you demonstrate that you take precautions with your personal security?

Section 5:

Insurance

The following are questions relating to insurance.
YES
NO
1. Do you have comprehensive insurance coverage for your valuable assets?

2. Do you have personal cyber insurance?

3. Are you a director or officer of a company covered under a corporate insurance policy?

4. Are there security measures you could implement that would reduce your insurance premiums?

5. Do you know who you would call if you were a victim of a cyber-attack such as ransomware or extortion?

Click Here to Contact Us

Did you Know...

That insurance companies will offer lower premiums if you demonstrate that you take precautions with your personal security?

Section 5:

Insurance

The following are questions relating to insurance.
1. Do you have comprehensive insurance coverage for your valuable assets?
YES

NO

2. Do you have personal cyber insurance?

YES

NO

3. Are you a director or officer of a company covered under a corporate insurance policy?

YES

NO

4. Are there security measures you could implement that would reduce your insurance premiums?

YES

NO

5. Do you know who you would call if you were a victim of a cyber-attack such as ransomware or extortion?

YES

NO

Click Here to Contact Us
Click Here to Contact Us

Did you Know...

That insurance companies will offer lower premiums if you demonstrate that you take precautions with your personal security?

Section 5:

Insurance

The following are questions relating to insurance.
1. Do you have comprehensive insurance coverage for your valuable assets?
YES

NO

2. Do you have personal cyber insurance?

YES

NO

3. Are you a director or officer of a company covered under a corporate insurance policy?

YES

NO

4. Are there security measures you could implement that would reduce your insurance premiums?

YES

NO

5. Do you know who you would call if you were a victim of a cyber-attack such as ransomware or extortion?

YES

NO

Click Here to Contact Us

End of Security
Self-assessment

We must all make our own choices about how much risk we are willing to accept. If you are uncomfortable with your answers and would like to discuss solutions please get in touch. Kirsch Group is here to provide advice and guidance to make yourself, your family, and your business more secure. We have been in the personal and corporate security business for years and know exactly what it takes to protect you, your business, and your family from the world's threats. Click the link below to book a consultation with one of our security professionals
Click Here to Contact Us

End of Security
Self-assessment

We must all make our own choices about how much risk we are willing to accept. If you are uncomfortable with your answers and would like to discuss solutions please get in touch. Kirsch Group is here to provide advice and guidance to make yourself, your family, and your business more secure. We have been in the personal and corporate security business for years and know exactly what it takes to protect you, your business, and your family from the world's threats. Click the link below to book a consultation with one of our security professionals
Click Here to Contact Us