Know Your Data Risk Score

Knowing your risk is the first step to ensuring the protection of your data and your organization. In just a few minutes of your time and with 15 questions we will give you a high, medium or low risk rating that will enable you to have more informed conversations regarding your security posture.

Are you ready to learn more?

Get Started
Question 1 / 15

Do you need to comply with regulations and ensure specific data is protected?

No
Unsure
Yes
Question 2 / 15

Are you able to automatically detect and remove an unauthorized email recipient from an outgoing email?

No
Unsure
Yes
Back
Question 3 / 15

Can you control how an authorized partner or contractor accesses and shares your sensitive data?

No
Unsure
Yes
Back
Question 4 / 15

Are you alerted to anomalous user behavior, such as simultaneous logins to an application, excessive outgoing emails or downloads of sensitive data?

No
Unsure
Yes
Back
Question 5 / 15

Are you able to set policies to automatically detect and encrypt sensitive data being downloaded to personal devices?

No
Unsure
Yes
Back
Question 6 / 15

Would you know if sensitive data is being shared externally or if public links to sensitive information are available externally?

No
Unsure
Yes
Back
Question 7 / 15

Are you able to detect and protect sensitive data, such as health, personal, or financial information from leaking externally?

No
Unsure
Yes
Back
Question 8 / 15

Do you integrate with industry classifications so that you can detect and protect sensitive information that is specific to your industry?

No
Unsure
Yes
Back
Question 9 / 15

Can you differentiate in real-time between corporate and personal instances of applications, such as Google Workspace and Office 365, so that you can respect user privacy while also protecting sensitive corporate data?

No
Unsure
Yes
Back
Question 10 / 15

Are you concerned about using VPN to access any of your enterprise applications?

No
Unsure
Yes
Back
Question 11 / 15

Can you enforce acceptable use policies to meet compliance requirements and protect users and your organization from malicious websites and data leakage to personal websites?

No
Unsure
Yes
Back
Question 12 / 15

Are you able to consistently apply security policies across all cloud services to avoid security gaps (e.g., SaaS apps, internet, email, and private apps)?

No
Unsure
Yes
Back
Question 13 / 15

Do you have visibility into potential data leakage via collaboration tools such as Slack or Microsoft Teams?

No
Unsure
Yes
Back
Question 14 / 15

Are you currently alerted to user activities that indicate an insider threat within your organization?

No
Unsure
Yes
Back
Question 15 / 15

Can you prevent private enterprise applications from being discovered by unauthorized users or bad actors?

No
Unsure
Yes
Back

Please fill out the form below to view your security assessment results.

Your Lookout Risk Assessment Results

High

Based on your responses, your risk score is high, which means your organization is 3X more likely to experience a data breach than those with a low risk score.

Results Summary

Based on your responses, below is a summary of potential security gaps and recommendations for improving your security posture.

Security Gaps

  • You likely lack the visibility and control of your sensitive data that is required for compliance with data privacy regulations. 
  • You might not be able to prevent sensitive data from leaking to unauthorized recipients via email or other collaboration tools like Slack or Teams.
  • You are not able to detect anomalous user activity that is needed to prevent insider threats.
  • You lack visibility into personal apps and are unable to prevent sensitive data leakage to these apps.
  • You likely use VPN as your primary remote access solution, which provides excessive access to your entire network, which can be exploited by an attacker.

Recommendations

If you have not yet done so, you should take steps to move your security stack to the cloud. It is only with cloud-native security that you can properly secure your hybrid workforce and sensitive data in cloud apps.

Adoption of a Security Services Edge (SSE) solution will enable you to provide secure seamless access to the internet, SaaS apps, and private enterprise apps. It also provides the necessary foundation for comprehensive data protection.

The right SSE solution will have natively-integrated data loss prevention, digital rights management, and user entity behavior analytics. These protections work together to ensure you can securely share data with internal and external parties, detect anomalous user behavior to prevent insider threats, and encrypt data that is downloaded to unmanaged devices.

An SSE solution will also enable you to phase out your VPN deployment in favor of remote access to private apps that is seamless and secure. Since access is only provided to the specific app rather than the entire network, an attacker cannot move laterally throughout the network in the event of a breach.

Finally, select an SSE solution that is provided from a single platform with natively integrated components so that unified policies can be applied across all cloud services. This will enable you to consolidate IT administration, reduce costs, and improve security.

Next Steps

We encourage you to further explore your security gaps by taking advantage of our free SaaS Risk Evaluation. We monitor the SaaS apps of your choice for two-weeks and provide you with actionable insights and recommendations. At the end of the evaluation, you will receive a report that details security risks to help you make informed decisions about data security.

Download Results
Medium

Based on your responses, your risk score is medium, which means your organization is 2X as likely to experience a data breach than those with a low risk score.

Results Summary

Based on your responses, below is a summary of potential security gaps and recommendations for improving your security posture.

Security Gaps

  • You may not have moved your security stack to the cloud and lack visibility into your apps and data.
  • You might have an on-premise DLP solution that cannot prevent sensitive data loss via email or other SaaS apps.
  • You likely do not have the ability to detect anomalous user activity to prevent insider threats.
  • You probably lack adequate protection against internet-based threats and data leakage.
  • You likely use VPN as your primary remote access solution, which provides excessive access to your entire network, which can be exploited by an attacker.

Recommendations

If you have not yet done so, you should take steps to move your security stack to the cloud. It is only with cloud-native security that you can properly secure your hybrid workforce and sensitive data in cloud apps.

Adoption of a Security Services Edge (SSE) solution will enable you to provide secure seamless access to the internet, SaaS apps, and private enterprise apps. It also provides the necessary foundation for comprehensive data protection.

The right SSE solution will have natively-integrated data loss prevention, digital rights management, and user entity behavior analytics. These protections work together to ensure you can securely share data with internal and external parties, detect anomalous user behavior to prevent insider threats, and encrypt data that is downloaded to unmanaged devices.

An SSE solution will also enable you to phase out your VPN deployment in favor of remote access to private apps that is seamless and secure. Since access is only provided to the specific app rather than the entire network, an attacker cannot move laterally throughout the network in the event of a breach.

Finally, select an SSE solution that is provided from a single platform with natively integrated components so that unified policies can be applied across all cloud services. This will enable you to consolidate IT administration, reduce costs, and improve security.

Next Steps

We encourage you to further explore your security gaps by taking advantage of our free SaaS Risk Evaluation. We monitor the SaaS apps of your choice for two-weeks and provide you with actionable insights and recommendations. At the end of the evaluation, you will receive a report that details security risks to help you make informed decisions about data security. 

Download Results
Low

Based on your responses, your risk score is low, which means your organization is 3X less likely to experience a data breach than those with a high risk score.

Results Summary

Based on your responses, below is a summary of potential security gaps and recommendations for improving your security posture.

Security Gaps

  • You have likely moved most of your security stack to the cloud but still have some on-premises solutions that need to be moved.
  • You can prevent sensitive data from being shared across most of your cloud services but some gaps still exist among on-premises solutions that are not covered by policies.
  • You have a process in place to detect anomalous user activity across your environment but full visibility across all your cloud services is not available yet. This means you can prevent an insider threat in many scenarios but blind spots still exist.
  • You have replaced VPN with zero trust network access for several of your private enterprise applications. However, these protection policies are likely administered separately from those applied to your other cloud services, creating potential for inconsistent policy application.

Recommendations

Continue to move your full security stack to the cloud so that you have complete visibility and control over your data and cloud services. It is only with fully integrated cloud security that you can properly secure your hybrid workforce and sensitive data in cloud apps.

Adoption of a Security Services Edge (SSE) solution will enable you to provide secure seamless access to the internet, SaaS apps, and private enterprise apps. It also provides the necessary foundation for comprehensive data protection.

The right SSE solution will have natively-integrated data loss prevention, digital rights management, and user entity behavior analytics. These protections work together to ensure you can securely share data with internal and external parties, detect anomalous user behavior to prevent insider threats, and encrypt data that is downloaded to unmanaged devices.

An SSE solution will also enable you to phase out your VPN deployment in favor of remote access to private apps that is seamless and secure. Since access is only provided to the specific app rather than the entire network, an attacker cannot move laterally throughout the network in the event of a breach.

Finally, select an SSE solution that is provided from a single platform with natively integrated components so that unified policies can be applied across all cloud services. This will enable you to consolidate IT administration, reduce costs, and improve security.

Next Steps

We encourage you to further explore your security gaps by taking advantage of our free SaaS Risk Evaluation. We monitor the SaaS apps of your choice for two-weeks and provide you with actionable insights and recommendations. At the end of the evaluation, you will receive a report that details security risks to help you make informed decisions about data security.

Download Results
Previous
Next step