| Resume a previously saved form
Resume Later

In order to be able to resume this form later, please enter your email and choose a password.

Password must contain the following:
  • 12 Characters
  • 1 Uppercase letter
  • 1 Lowercase letter
  • 1 Number
  • 1 Special character

Digital Security Assessment

This assessment has been specifically designed to help you, as a grantee, gain a clear understanding of your organization's digital security strengths and any areas that may need improvement.


Throughout the assessment, you will be asked questions covering key aspects of digital security, such as password management, data protection, network security, endpoint security, incident response, and more. The information you provide will help us generate a personalized security report tailored to your organization's current needs and vulnerabilities. This report will offer practical, actionable recommendations for enhancing your digital security posture.


We recommend that this assessment be filled out by someone who is familiar with your organization's IT systems, such as an IT provider or operations lead. However, if you’re not that person, don’t worry—each section comes with clear instructions to guide you through the process. Only one person should complete the assessment on behalf of your organization.


To make things easier, you can save your progress at any time and come back later to finish. This flexibility allows you to gather any additional information you might need before submitting your responses.


After completing the assessment, you'll receive immediate feedback, including a customized security report and a risk score. This will give you a clear picture of where your organization stands and provide the insights needed to take the next steps in improving your digital security. Your participation is crucial in helping us support your organization in building a stronger, more resilient defense against digital threats.

If you have any questions or concerns, feel free to reach out to us at [email protected] 




Score Keys
Staff Digital Security Awareness

Tell us about your organization's incident response planning and the measures in place to handle security breaches or other cyber incidents. We’ll ask about your incident response protocols, who is responsible for managing incidents, and how often your plans are reviewed and tested.

You'll also be asked about your organization's approach to identifying, containing, and recovering from security incidents. If you're unsure about certain processes or roles.


Computers and Endpoint Systems

We’d like to learn a bit about the computers and systems your organization uses. This will help us understand how things work for you and make sure everything is running smoothly and safely. We’ll ask a few questions, like how many computers you use, what types they are (for example, Windows or Mac), and how you protect them from viruses or other online problems (like using a firewall). We’re also interested in how you save and back up important files, and any special ways you keep your information safe, such as using strong passwords or encrypting files. These questions will help us ensure your organization’s computers are secure and working well.


Cloud Platforms and Security

Tell us about the cloud systems your organization currently uses and the security measures in place. We’ll ask which cloud platforms you use, whether Two-Factor Authentication (2FA) or Multi-Factor Authentication (MFA) is enabled for each, and how frequently passwords are updated.


You'll also be asked about the management of these platforms, including who oversees administration and billing. If you're unsure whether certain features, like 2FA, are enabled, there



DNS and Website Security


Tell us about the DNS and website systems your organization currently uses and the security measures in place. We’ll ask about your domain management, hosting provider, SSL certificates, and any protections you have implemented to safeguard your website.


You'll also be asked about who manages these systems, including DNS records, website updates, and security monitoring. If you're unsure about certain features or configurations, there will be an option to indicate that as well.

Finally, share any additional security measures or concerns related to your DNS and website systems to help ensure the integrity and safety of your online presence.


Network Security


Tell us about the network security measures your organization currently uses to protect its systems and data. We’ll ask about firewalls, intrusion detection systems, VPN usage, and other protocols in place to safeguard your network infrastructure.


You'll also be asked about who manages network security, including monitoring, access controls, and response strategies for potential threats. If you're unsure about certain configurations or tools, there will be an option to indicate that as well.