Consulting with a Conscience™

A cruciallogics blog

Written by CrucialLogics
on March 07, 2019

For the majority of CIOs, security remains a top priority. With nearly 1 million[1] new threats emerging each day, and the challenge of Bring-Your-Own-Device policies changing the security landscape, it’s understandable why organizations would be focusing on ways to enhance their protection infrastructure.

And while you may be tempted to pat yourself on the back for running a tight ship, security is one area where we can never afford to let our guard down. In 2018 alone, we saw massive brands suffer damaging data breaches[2], including Amazon, Facebook, Under Armour, and Delta Airlines. With the average breach costing an organization $3.5 Million[3], taking frequent inventory of your organization’s security measures is critical to mitigating risk.

Today, we’re sharing an easy 10-question quiz that will reveal just how secure your organization is.

1) Do you have a Single Sign On (SSO) identity framework?
SSO not only makes it easier for your employees to log into various applications, but it also heightens security. The best case scenario would be to use Multi-Factor Authentication through a platform like Azure Active Directory and Identity Protection.

2) How sturdy is your disaster recovery program?
Automatic backups, business continuity exercise drills, and recovery services like Azure Site Recovery are an excellent way to make sure that in the event of a breach, all data remains accessible.

3) Do you monitor for unauthorized intrusions?
Custom intrusion detection systems are built to specifically meet your network and business needs. They run continually, ensuring that the responsibility of checking for intrusions isn’t left up to an individual team member, making them much more reliable.

4) What is your security policy?
Having a defined security policy enables your team to continually be on the same page regarding your objectives and responsibilities as they pertain to your cybersecurity infrastructure. Base your policy on ISO 27001 to ensure compliance and alignment with best practices.

5) How do you connect to cloud services?
Given that nearly a quarter of information[4] contained on the cloud is sensitive, it’s critical that organizations ensure that their cloud connections are conducted in a safe fashion. Azure Virtual Network and Office 365 provide secure connectivity to the cloud via secure portal solutions.

6) How do you monitor for data leaks?
Too many companies place the responsibility of security monitoring onto individual team members. It’s a job far too big for any human to handle. The most secure companies are those that have a comprehensive data protection program in place with rule detection logic. Thankfully, Azure and Office 365 can offer the technology to develop a custom program that meets your needs.

7) How efficient are your software security updates?
The ability to install updates on time is critical to the mitigation of risk. For providers such as Microsoft, threat detection knowledge from global sources is continually being integrated into new functionality, and every second spent waiting to update is a second that’s exposed to known danger. Running your applications in an environment like Azure or Office 365 in which updates are automatically installed is an easy way to ensure that new functionality is being utilized.

8) Who can access which resources?
Does your organization limit or restrict access to certain resources? If not, you could be placing your data in danger of breach. Azure AD allows the user to deploy access control features, which launch an authentication process prior to granting access to employees seeking contact with resources.

9) Do you assess your environment for vulnerability?
A secure system is a system that is continually audited to assess its challenges. Choose a vulnerability management system that has cloud offerings, and train your IT team handle vulnerability reports. Once an issue is discovered, commit to fixing it immediately.

10) How prepared are you for a ransomware attack?
To ensure that the propagation of malware is stopped in its tracks, you should be using a comprehensive solution for all systems. Patch systems and apps regularly, and stay up to date with bug reports and awareness campaigns to remain aware of zero-day potential risks.

How Did You Score?
Depending on your answers to the 10 quiz questions, you may have discovered that your organization isn’t as secure as you previously thought. As a Microsoft Gold Partner, our clients benefit from our DEEP technical expertise. We harness the unparalleled security features of Microsoft 365 and Azure and put them to work for your organization quickly and seamlessly, ensuring that each system is optimized to address your unique security concerns.

To learn more about how CrucialLogics can help your organization to become more secure, contact our team today.


[1] CNN Business, “Nearly 1 Million New Malware Threats Released Every Day”,

[2] Forbes, “Cybersecurity Predictions for 2019”,

[3] Ponemon Institute, “2014 Cost of Data Breach: Global Analysis”

[4] BizTech, “3 Cybersecurity Threats Businesses Should Look Out for in 2019”, ersecurity-threats-businesses-should-look-out-2019

You may also like:

Security Press Release

CrucialLogics Joins Forces with The MEARIE Group's Cyber Risk Referral Program to Offer Reliable Cyber Risk Mitigation Services to the Energy Industry

Security Data Security Cloud Security

A Guide to Cloud Security Monitoring & Benefits (+best practices)

Modern technologies bring solutions, but sometimes they come with pain points that, if ignored, lead to failure. Compani...

Security Migration

Cloud Migration Security Risks (+ Checklist & Strategy)

As more companies migrate their operations to the cloud, cyber security becomes an increasingly prevalent concern.