{"id":7321,"date":"2022-09-09T12:07:30","date_gmt":"2022-09-09T09:07:30","guid":{"rendered":"https:\/\/cyberone.bg\/?page_id=7321"},"modified":"2022-09-09T12:11:48","modified_gmt":"2022-09-09T09:11:48","slug":"risk-assessment","status":"publish","type":"page","link":"https:\/\/cyberone.bg\/en\/risk-assessment","title":{"rendered":"Risk assessment"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"7321\" class=\"elementor elementor-7321 elementor-6554\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b50a57f elementor-section-content-middle elementor-section-full_width ot-traditional elementor-section-height-default elementor-section-height-default\" data-id=\"b50a57f\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-21ced5e ot-flex-column-vertical\" data-id=\"21ced5e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-cb9fbab elementor-widget elementor-widget-iheading\" data-id=\"cb9fbab\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iheading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"ot-heading\">\r\n\t        \t            <span>\/\/ Cyber Incident Risk Assessment<\/span>\r\n\t        <h2 class=\"main-heading\">Risk Assessment\n<\/h2>\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bfb7204 elementor-widget elementor-widget-text-editor\" data-id=\"bfb7204\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>CYBERONE can perform a full cyber security risk assessment of your company, based on hundreds of risk factors, technical questions, checks and other activities performed by our team. We can also perform a risk assessment based on your company\u2019s public infrastructure, which is subject to attacks on a daily basis by malicious individuals. The service is carried out by our proven cyber security specialists and at the end of each assessment a formal report is issued outlining all findings, recommendations and an impact assessment. The main purpose of a cyber risk assessment is to keep stakeholders informed and recommend appropriate actions against identified risks. Risk assessments also provide a summary to help executives and directors make informed decisions about their company\u2019s security. The information security risk assessment process is concerned with answering the following questions:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5488228 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"5488228\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-chevron-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">What are our organization's most important IT assets?<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-chevron-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">What cyber incident would have a major impact on our business, whether from malware, cyber attack or human error?<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-chevron-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Can all sources of threat be identified in the event of an incident?<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-chevron-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">What is the level of potential impact of each identified threat?<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-chevron-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">What are the internal and external threats?<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-chevron-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">What is the impact if these vulnerabilities are exploited?<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-chevron-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">What is the likelihood of exploitation?<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-chevron-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">What cyber-attacks, cyber-threats or security incidents could affect the ability of the business to function?<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-chevron-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">What is the level of risk that my organization can take without problems?<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-1f64329 ot-flex-column-vertical\" data-id=\"1f64329\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-65c2372 elementor-widget elementor-widget-image\" data-id=\"65c2372\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/At-the-office-amico-1024x1024.png\" class=\"attachment-large size-large wp-image-6475\" alt=\"\" srcset=\"https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/At-the-office-amico-1024x1024.png 1024w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/At-the-office-amico-300x300.png 300w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/At-the-office-amico-150x150.png 150w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/At-the-office-amico-768x768.png 768w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/At-the-office-amico-1536x1536.png 1536w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/At-the-office-amico-720x720.png 720w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/At-the-office-amico.png 2000w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-21512f5 elementor-section-content-middle elementor-section-full_width ot-traditional elementor-section-height-default elementor-section-height-default\" data-id=\"21512f5\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-95c0098 ot-flex-column-vertical\" data-id=\"95c0098\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d0101ac elementor-widget elementor-widget-iheading\" data-id=\"d0101ac\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iheading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"ot-heading\">\r\n\t        \t            <span>\/\/ Cyber Incident Risk Assessment<\/span>\r\n\t        <h2 class=\"main-heading\">Why carry out a risk assessment?<\/h2>\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f45d016 elementor-widget elementor-widget-text-editor\" data-id=\"f45d016\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>There are a number of reasons why you might want to conduct a cyber risk assessment, and several reasons why you <span style=\"text-decoration: underline;\">absolutely should<\/span>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e97b941 elementor-widget elementor-widget-text-editor\" data-id=\"e97b941\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h5>LONG TERM COST REDUCTION<\/h5><p>Identifying potential threats and vulnerabilities and then working to mitigate them has the potential to prevent or reduce security incidents, saving your organization money and\/or reputational damage in the long run.<\/p><h5>PROVIDES A CYBERSECURITY RISK ASSESSMENT BASIS FOR FUTURE ASSESSMENTS<\/h5><p>Cyber \u200b\u200brisk assessments are not one of the processes, you need to continuously update them, if you make a good first move you will ensure repeatable processes even with staff turnover.<\/p><h5>BETTER ORGANIZATIONAL KNOWLEDGE<\/h5><p>Knowing organizational problems and shortcomings gives you a clear idea of \u200b\u200bwhere your organization needs to improve.<\/p><h5>AVOIDING SECURITY INCIDENTS<\/h5><p>Any security incident can have a huge financial and reputational impact on any organization, regardless of its size.<\/p><h5>DATA LOSS<\/h5><p>The theft of trade secrets, code or other key information assets could mean you lose business to competitors. Additionally, cyber risk assessments are an integral part of any organization\u2019s IT risk management and broader risk management strategy.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>\/\/ Cyber Incident Risk Assessment Risk Assessment CYBERONE can perform a full cyber security risk assessment of your company, based on hundreds of risk factors, technical questions, checks and other activities performed by our team. We can also perform a risk assessment based on your company\u2019s public infrastructure, which is subject to attacks on a [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-7321","page","type-page","status-publish","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/pages\/7321","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/comments?post=7321"}],"version-history":[{"count":5,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/pages\/7321\/revisions"}],"predecessor-version":[{"id":7326,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/pages\/7321\/revisions\/7326"}],"wp:attachment":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/media?parent=7321"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}