Skip to the content
Call:
(208) 336-7733
Google Maps Logo (opens in new tab)
Facebook Logo (opens in new tab)
Request Risk Evaluation
(opens in new tab)
Home Page (opens in new tab)
Insurance Services
Personal Insurance
Auto Insurance
Boat & Marine Insurance
Condominium Insurance
Homeowners Insurance
Flood Insurance
Motorcycle Insurance
Renters Insurance
- View All Personal
Business Insurance
Business Interruption Insurance
Commercial Auto Insurance
Business Owners Package Insurance
Commercial Property Insurance
Commercial Umbrella Insurance
General Liability Insurance
Hotel & Motel Hospitality Insurance
Professional Liability (E&O) Insurance
Surety Bonds
Workers’ Compensation Insurance
- View All Business
Workers' Compensation
Life & Health Insurance
Individual Life Insurance
Individual & Family Health Insurance
Individual Disability Insurance
Individual Dental Insurance
- View All Life and Health
About
About Us
Pledge of Performance
Our Insurance Carriers
Meet Our Team
Customer Reviews
Careers
Insurance Blog
Media
Support
Make A Payment
File A Claim
Auto ID Card Request
Certificate of Insurance Request
Policy Change Request
Annual Insurance Checklist
Insurance Resources
Contact
Boise Office
Coeur d’Alene Office
Secure Contact Form
Refer a Friend
PEAK360
Make A Payment
Home
>
Cyber Liability: Risk Check Survey
Cyber Liability: Risk Check Survey
The Risk Check Survey encompasses the degree to which your firm provides comprehensive policies, programs, and training focused on protecting your organization.
Date
*
MM slash DD slash YYYY
Organization Name:
*
Person Completing Survey:
*
Title:
*
Phone
*
Email
*
Rate the effectiveness or success of the organization’s actions:
1. To what degree does your organization have a dedicated Information Security individual or team who is responsible for overall privacy and network security protection?
*
N/A
INEFFECTIVE
MARGINALLY EFFECTIVE
MODERATELY EFFECTIVE
EFFECTIVE
HIGHLY EFFECTIVE
2. To what extent does your organization have a breach incident response plan in place to determine proactively which breach services firms, PR firm, forensics investigator, etc. your organization would use after a data breach event?
*
N/A
INEFFECTIVE
MARGINALLY EFFECTIVE
MODERATELY EFFECTIVE
EFFECTIVE
HIGHLY EFFECTIVE
3. How would you rate your organization at backing up all valuable/sensitive data on a daily basis and testing/validating it periodically?
*
N/A
INEFFECTIVE
MARGINALLY EFFECTIVE
MODERATELY EFFECTIVE
EFFECTIVE
HIGHLY EFFECTIVE
4. To what degree does your organization perform regular software updates and patching procedures?
*
N/A
INEFFECTIVE
MARGINALLY EFFECTIVE
MODERATELY EFFECTIVE
EFFECTIVE
HIGHLY EFFECTIVE
5. To what extent is encryption is in place for sensitive data, especially on portable devices?
*
N/A
INEFFECTIVE
MARGINALLY EFFECTIVE
MODERATELY EFFECTIVE
EFFECTIVE
HIGHLY EFFECTIVE
6. How would you gauge your organization’s ability to regularly conduct cyber security audits of your own systems as well as those of your third-party vendors?
*
N/A
INEFFECTIVE
MARGINALLY EFFECTIVE
MODERATELY EFFECTIVE
EFFECTIVE
HIGHLY EFFECTIVE
7. How effective is your organization at training and regularly testing your employees on recognizing and avoiding phishing, social engineering and email scams?
*
N/A
INEFFECTIVE
MARGINALLY EFFECTIVE
MODERATELY EFFECTIVE
EFFECTIVE
HIGHLY EFFECTIVE
9. To what extent does your organization limit employee access to sensitive data based upon their role in the company and their business need to access such data?
*
N/A
INEFFECTIVE
MARGINALLY EFFECTIVE
MODERATELY EFFECTIVE
EFFECTIVE
HIGHLY EFFECTIVE
10. How would you rate your organization at requiring training for employees on the appropriate business use of social media?
*
N/A
INEFFECTIVE
MARGINALLY EFFECTIVE
MODERATELY EFFECTIVE
EFFECTIVE
HIGHLY EFFECTIVE
11. How effective is your organization at retrieving key documents, data, and sensitive information from former vendors and contractors (who no longer work for you) and from exiting employees?
*
N/A
INEFFECTIVE
MARGINALLY EFFECTIVE
MODERATELY EFFECTIVE
EFFECTIVE
HIGHLY EFFECTIVE
12. To what degree is your organization in compliance with regulations regarding sensitive data that applies to your business including, but not limited to, HIPAA/HiTECH?
*
N/A
INEFFECTIVE
MARGINALLY EFFECTIVE
MODERATELY EFFECTIVE
EFFECTIVE
HIGHLY EFFECTIVE
13. If your organization accepts payment cards, to what extent is it in compliance with applicable Payment Card Industry Data Security Standards (PCI/DSS)?
*
N/A
INEFFECTIVE
MARGINALLY EFFECTIVE
MODERATELY EFFECTIVE
EFFECTIVE
HIGHLY EFFECTIVE
15. How would you rate your organization at requiring all third parties that manage, host and access your data to have comprehensive professional liability (if applicable) and cyber liability insurance?
*
N/A
INEFFECTIVE
MARGINALLY EFFECTIVE
MODERATELY EFFECTIVE
EFFECTIVE
HIGHLY EFFECTIVE
16. To what degree does your organization carefully review the hold-harmless agreements and insurance requirements for contracts with third parties that grant you access to their data to ensure that they are balanced to both parties?
*
N/A
INEFFECTIVE
MARGINALLY EFFECTIVE
MODERATELY EFFECTIVE
EFFECTIVE
HIGHLY EFFECTIVE
17. How effective is your organization’s data destruction policy to remove PII from our systems when no longer needed?
*
N/A
INEFFECTIVE
MARGINALLY EFFECTIVE
MODERATELY EFFECTIVE
EFFECTIVE
HIGHLY EFFECTIVE
18. When acting upon a request to wire transfer funds to a third party, whether the request is from someone internally or externally, to what degree does your organization verify that the request is valid (either in person or by calling a known valid number)?
*
N/A
INEFFECTIVE
MARGINALLY EFFECTIVE
MODERATELY EFFECTIVE
EFFECTIVE
HIGHLY EFFECTIVE
19. If your organization currently has or is contemplating the purchase of a cyber policy, to what extent have you reviewed the coverages and exclusions to determine if you have procured broadest terms available?
*
N/A
INEFFECTIVE
MARGINALLY EFFECTIVE
MODERATELY EFFECTIVE
EFFECTIVE
HIGHLY EFFECTIVE
20. If your organization currently has or is contemplating the purchase of a cyber policy, how effectively have you reviewed your insurance portfolio to determine if any overlapping coverages exist?
*
N/A
INEFFECTIVE
MARGINALLY EFFECTIVE
MODERATELY EFFECTIVE
EFFECTIVE
HIGHLY EFFECTIVE
Δ