{"id":7321,"date":"2022-09-09T12:07:30","date_gmt":"2022-09-09T09:07:30","guid":{"rendered":"https:\/\/cyberone.bg\/?page_id=7321"},"modified":"2022-09-09T12:11:48","modified_gmt":"2022-09-09T09:11:48","slug":"risk-assessment","status":"publish","type":"page","link":"https:\/\/cyberone.bg\/en\/risk-assessment","title":{"rendered":"Risk assessment"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"7321\" class=\"elementor elementor-7321 elementor-6554\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b50a57f elementor-section-content-middle elementor-section-full_width ot-traditional elementor-section-height-default elementor-section-height-default\" data-id=\"b50a57f\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-21ced5e ot-flex-column-vertical\" data-id=\"21ced5e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-cb9fbab elementor-widget elementor-widget-iheading\" data-id=\"cb9fbab\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iheading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"ot-heading\">\r\n\t        \t            <span>\/\/ Cyber Incident Risk Assessment<\/span>\r\n\t        <h2 class=\"main-heading\">Risk Assessment\n<\/h2>\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bfb7204 elementor-widget elementor-widget-text-editor\" data-id=\"bfb7204\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>CYBERONE can perform a full cyber security risk assessment of your company, based on hundreds of risk factors, technical questions, checks and other activities performed by our team. We can also perform a risk assessment based on your company&#8217;s public infrastructure, which is subject to attacks on a daily basis by malicious individuals. The service is carried out by our proven cyber security specialists and at the end of each assessment a formal report is issued outlining all findings, recommendations and an impact assessment. The main purpose of a cyber risk assessment is to keep stakeholders informed and recommend appropriate actions against identified risks. Risk assessments also provide a summary to help executives and directors make informed decisions about their company&#8217;s security. The information security risk assessment process is concerned with answering the following questions:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5488228 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"5488228\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-chevron-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">What are our organization's most important IT assets?<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-chevron-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">What cyber incident would have a major impact on our business, whether from malware, cyber attack or human error?<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-chevron-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Can all sources of threat be identified in the event of an incident?<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-chevron-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">What is the level of potential impact of each identified threat?<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-chevron-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">What are the internal and external threats?<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-chevron-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">What is the impact if these vulnerabilities are exploited?<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-chevron-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">What is the likelihood of exploitation?<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-chevron-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">What cyber-attacks, cyber-threats or security incidents could affect the ability of the business to function?<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-chevron-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">What is the level of risk that my organization can take without problems?<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-1f64329 ot-flex-column-vertical\" data-id=\"1f64329\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-65c2372 elementor-widget elementor-widget-image\" data-id=\"65c2372\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/At-the-office-amico-1024x1024.png\" class=\"attachment-large size-large wp-image-6475\" alt=\"\" srcset=\"https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/At-the-office-amico-1024x1024.png 1024w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/At-the-office-amico-300x300.png 300w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/At-the-office-amico-150x150.png 150w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/At-the-office-amico-768x768.png 768w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/At-the-office-amico-1536x1536.png 1536w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/At-the-office-amico-720x720.png 720w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/At-the-office-amico.png 2000w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-21512f5 elementor-section-content-middle elementor-section-full_width ot-traditional elementor-section-height-default elementor-section-height-default\" data-id=\"21512f5\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-95c0098 ot-flex-column-vertical\" data-id=\"95c0098\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d0101ac elementor-widget elementor-widget-iheading\" data-id=\"d0101ac\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iheading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"ot-heading\">\r\n\t        \t            <span>\/\/ Cyber Incident Risk Assessment<\/span>\r\n\t        <h2 class=\"main-heading\">Why carry out a risk assessment?<\/h2>\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f45d016 elementor-widget elementor-widget-text-editor\" data-id=\"f45d016\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>There are a number of reasons why you might want to conduct a cyber risk assessment, and several reasons why you <span style=\"text-decoration: underline;\">absolutely should<\/span>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e97b941 elementor-widget elementor-widget-text-editor\" data-id=\"e97b941\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h5>LONG TERM COST REDUCTION<\/h5><p>Identifying potential threats and vulnerabilities and then working to mitigate them has the potential to prevent or reduce security incidents, saving your organization money and\/or reputational damage in the long run.<\/p><h5>PROVIDES A CYBERSECURITY RISK ASSESSMENT BASIS FOR FUTURE ASSESSMENTS<\/h5><p>Cyber \u200b\u200brisk assessments are not one of the processes, you need to continuously update them, if you make a good first move you will ensure repeatable processes even with staff turnover.<\/p><h5>BETTER ORGANIZATIONAL KNOWLEDGE<\/h5><p>Knowing organizational problems and shortcomings gives you a clear idea of \u200b\u200bwhere your organization needs to improve.<\/p><h5>AVOIDING SECURITY INCIDENTS<\/h5><p>Any security incident can have a huge financial and reputational impact on any organization, regardless of its size.<\/p><h5>DATA LOSS<\/h5><p>The theft of trade secrets, code or other key information assets could mean you lose business to competitors. Additionally, cyber risk assessments are an integral part of any organization&#8217;s IT risk management and broader risk management strategy.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>\/\/ Cyber Incident Risk Assessment Risk Assessment CYBERONE can perform a full cyber security risk assessment of your company, based on hundreds of risk factors, technical questions, checks and other activities performed by our team. We can also perform a risk assessment based on your company&#8217;s public infrastructure, which is subject to attacks on a [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-7321","page","type-page","status-publish","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/pages\/7321","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/comments?post=7321"}],"version-history":[{"count":5,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/pages\/7321\/revisions"}],"predecessor-version":[{"id":7326,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/pages\/7321\/revisions\/7326"}],"wp:attachment":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/media?parent=7321"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}