Kirsch Group Security
Self-assessment Questionnaire
Kirsch Group Security
Self-assessment Questionnaire
Kirsch Group Security
Self-assessment Questionnaire
How safe are you? Take this self-assessment to see
where you may be vulnerable and need additional security assistance
How safe are you? Take this self-assessment to see
where you may be vulnerable and need additional security assistance
The Kirsch Group Security
Self-Assessment Questionnaire
The Kirsch Group Security
Self-Assessment Questionnaire
Try to answer the questions as honestly as possible to give yourself a fair assessment of where you may be vulnerable.
Simply click on “yes” or “no” for each question.
If you are uncomfortable with your answers to any of the questions and want help with your security , click the link below to personally speak with a member of our team at the Kirsch Group (KG).
Ready? Let’s begin.
DID YOU KNOW...
Cybercriminals use your digital footprint and data leaked from hacked websites to target you? This is called phishing.
Phishing is a crime. Hackers use fake web pages or malicious links in emails to convince unsuspecting people to reveal sensitive, confidential information such as user names, passwords, social insurance/social security numbers, credit card numbers, and bank routing numbers.
Phishing victims can experience identity theft, fraud, corporate espionage, online harassment, invasion of privacy, and stalking.
Section 1:
Cyber Security
YES
2. Has an online service you currently use ever been the victim of a data leak?
3. Have you ever clicked a malicious email link or attachment or been unsure if an email you received was legitimate?
4. Do you have sensitive information on your personal computer or phone that you want to stay confidential, and that needs to be available to you at all times (you can’t afford to lose it or lose access to it)?
5. Do you use any cyber security tools such as a password manager, two-factor authentication, encryption, a VPN, secure shredding, or home network monitoring?
DID YOU KNOW...
Phishing is a crime. Hackers use fake web pages or malicious links in emails to convince unsuspecting people to reveal sensitive, confidential information such as user names, passwords, social insurance/social security numbers, credit card numbers, and bank routing numbers.
Phishing victims can experience identity theft, fraud, corporate espionage, online harassment, invasion of privacy, and stalking.
Section 1:
Cyber Security
NO
2. Has an online service you currently use ever been the victim of a data leak?
NO
3. Have you ever clicked a malicious email link or attachment or been unsure if an email you received was legitimate?
NO
4. Do you have sensitive information on your personal computer or phone that you want to stay confidential, and that needs to be available to you at all times (you can’t afford to lose it or lose access to it)?
NO
5. Do you use any cyber security tools such as a password manager, two-factor authentication, encryption, a VPN, secure shredding, or home network monitoring?
NO
DID YOU KNOW...
Phishing is a crime. Hackers use fake web pages or malicious links in emails to convince unsuspecting people to reveal sensitive, confidential information such as user names, passwords, social insurance/social security numbers, credit card numbers, and bank routing numbers.
Phishing victims can experience identity theft, fraud, corporate espionage, online harassment, invasion of privacy, and stalking.
Section 1:
Cyber Security
NO
2. Has an online service you currently use ever been the victim of a data leak?
YES
NO
3. Have you ever clicked a malicious email link or attachment or been unsure if an email you received was legitimate?
NO
4. Do you have sensitive information on your personal computer or phone that you want to stay confidential, and that needs to be available to you at all times (you can’t afford to lose it or lose access to it)?
NO
5. Do you use any cyber security tools such as a password manager, two-factor authentication, encryption, a VPN, secure shredding, or home network monitoring?
NO
DID You Know...
Many local police forces will not respond to residential alarms unless there is evidence of a break-in (e.g., law enforcement in Toronto stopped responding in 2018).
The average burglar takes less than a minute to break into your home, and then only another 8 to 12 minutes total to steal your belongings and get out again.
Section 2:
Physical Security
2. Do you know everyone with a physical key, mechanical fob, or other means of access to your property?
3. Do you have any protections in place to prevent unauthorized access to valuable items such as watches, jewelry, or private or commercially sensitive information?
4. Should there be an attempt to enter your property or take your possessions without your consent, do you have monitoring alerts?
5. If you have a security issue, do you know who you will call for assistance?
Consider this:
- Many local police forces will not respond to residential alarms unless there is evidence of a break-in (e.g., law enforcement in Toronto stopped responding in 2018).
- The average burglar takes less than a minute to break into your home, and then only another 8 to 12 minutes total to steal your belongings and get out again.
Section 2:
Physical Security
2. Do you know everyone with a physical key, mechanical fob, or other means of access to your property?
3. Do you have any protections in place to prevent unauthorized access to valuable items such as watches, jewelry, or private or commercially sensitive information?
4. Should there be an attempt to enter your property or take your possessions without your consent, do you have monitoring alerts?
5. If you have a security issue, do you know who you will call for assistance?
Consider this:
- Many local police forces will not respond to residential alarms unless there is evidence of a break-in (e.g., law enforcement in Toronto stopped responding in 2018).
- The average burglar takes less than a minute to break into your home, and then only another 8 to 12 minutes total to steal your belongings and get out again.
Section 2:
Physical Security
2. Do you know everyone with a physical key, mechanical fob, or other means of access to your property?
3. Do you have any protections in place to prevent unauthorized access to valuable items such as watches, jewelry, or private or commercially sensitive information?
4. Should there be an attempt to enter your property or take your possessions without your consent, do you have monitoring alerts?
5. If you have a security issue, do you know who you will call for assistance?
Did You Know...
Due Diligence takes many forms. Below are just a few:
- Reference, credit and criminal background checks
- Comprehensive open source and dark-web reporting
- Private investigation services
Threat intelligence can uncover risks surrounding country-specific travel and evaluate domestic threats like radical activism occurring near you in the form of demonstrations or rallies.
Section 3:
Due Diligence
2. Did you vet or conduct any due diligence on business partners, investors, or close associates (i.e. those who could harm your reputation or financial standing)?
3. Do you work or have business interests in a sector that may be considered sensitive or controversial?
4. Do you travel outside of North America for work or pleasure?
5. Do you have access to or receive up-to-date threat-related information to assess the risk of an industry you work in or a location you travel to?
Did You Know...
Due Diligence takes many forms. Below are just a few:
- Reference, credit and criminal background checks
- Comprehensive open source and dark-web reporting
- Private investigation services
Threat intelligence can uncover risks surrounding country-specific travel and evaluate domestic threats like radical activism occurring near you in the form of demonstrations or rallies.
Section 3:
Due Diligence
2. Did you vet or conduct any due diligence on business partners, investors, or close associates (i.e. those who could harm your reputation or financial standing)?
3. Do you work or have business interests in a sector that may be considered sensitive or controversial?
4. Do you travel outside of North America for work or pleasure?
5. Do you have access to or receive up-to-date threat-related information to assess the risk of an industry you work in or a location you travel to?
Did You Know...
Due Diligence takes many forms. Below are just a few:
- Reference, credit and criminal background checks
- Comprehensive open source and dark-web reporting
- Private investigation services
Threat intelligence can uncover risks surrounding country-specific travel and evaluate domestic threats like radical activism occurring near you in the form of demonstrations or rallies.
Section 3:
Due Diligence
2. Did you vet or conduct any due diligence on business partners, investors, or close associates (i.e. those who could harm your reputation or financial standing)?
3. Do you work or have business interests in a sector that may be considered sensitive or controversial?
YES
4. Do you travel outside of North America for work or pleasure?
5. Do you have access to or receive up-to-date threat-related information to assess the risk of an industry you work in or a location you travel to?
Did you Know...
You could expose yourself to liabilities and consequences if you’re negligent of your responsibilities.
Family members, business associates or employees may undertake risky behavior that could put themselves or others at risk. Risky behavior includes gambling, substance abuse, other illegal conduct, and dangerous online activity such as hyper-social media use, sexting, or recklessly interacting with strangers. Other security threats you need to be aware of include telephone or door-to-door scams targeting the elderly or vulnerable.
Section 4:
Duty of Care
2. Do you know where people under your care or responsibility are at all times?
3. Have you established protocols to communicate with your family and those under your care or responsibility in the case of an accident or unforeseen circumstance?
4. Do you, your family or close associates have a reputation for risk-taking that has caused harm or is currently causing harm? Have these behaviors placed you or your family at risk?
5. Are your family members, employees, and associates aware of current security threats and challenges?
Did you Know...
You could expose yourself to liabilities and consequences if you’re negligent of your responsibilities.
Family members, business associates or employees may undertake risky behavior that could put themselves or others at risk. Risky behavior includes gambling, substance abuse, other illegal conduct, and dangerous online activity such as hyper-social media use, sexting, or recklessly interacting with strangers. Other security threats you need to be aware of include telephone or door-to-door scams targeting the elderly or vulnerable.
Section 4:
Duty of Care
2. Do you know where people under your care or responsibility are at all times?
3. Have you established protocols to communicate with your family and those under your care or responsibility in the case of an accident or unforeseen circumstance?
4. Do you, your family or close associates have a reputation for risk-taking that has caused harm or is currently causing harm? Have these behaviors placed you or your family at risk?
5. Are your family members, employees, and associates aware of current security threats and challenges?
Did you Know...
You could expose yourself to liabilities and consequences if you’re negligent of your responsibilities.
Family members, business associates or employees may undertake risky behavior that could put themselves or others at risk. Risky behavior includes gambling, substance abuse, other illegal conduct, and dangerous online activity such as hyper-social media use, sexting, or recklessly interacting with strangers. Other security threats you need to be aware of include telephone or door-to-door scams targeting the elderly or vulnerable.
Section 4:
Duty of Care
2. Do you know where people under your care or responsibility are at all times?
3. Have you established protocols to communicate with your family and those under your care or responsibility in the case of an accident or unforeseen circumstance?
4. Do you, your family or close associates have a reputation for risk-taking that has caused harm or is currently causing harm? Have these behaviors placed you or your family at risk?
5. Are your family members, employees, and associates aware of current security threats and challenges?
Did you Know...
Section 5:
Insurance
2. Do you have personal cyber insurance?
3. Are you a director or officer of a company covered under a corporate insurance policy?
4. Are there security measures you could implement that would reduce your insurance premiums?
5. Do you know who you would call if you were a victim of a cyber-attack such as ransomware or extortion?
Did you Know...
Section 5:
Insurance
2. Do you have personal cyber insurance?
3. Are you a director or officer of a company covered under a corporate insurance policy?
4. Are there security measures you could implement that would reduce your insurance premiums?
5. Do you know who you would call if you were a victim of a cyber-attack such as ransomware or extortion?
YES
Did you Know...
Section 5:
Insurance
2. Do you have personal cyber insurance?
NO
3. Are you a director or officer of a company covered under a corporate insurance policy?
4. Are there security measures you could implement that would reduce your insurance premiums?
5. Do you know who you would call if you were a victim of a cyber-attack such as ransomware or extortion?