Organizational Cybersecurity Survey
SECTION 1: Organizational Awareness and Culture (10 questions)

1. Do you know who is responsible for cybersecurity in your organization?*

1. Do you know who is responsible for cybersecurity in your organization?*

Clear selection

2. How confident are you that your organization takes cybersecurity seriously?*

2. How confident are you that your organization takes cybersecurity seriously?*

Not at all confident
Slightly confident
Moderately confident
Confident
Very confident
(Rate from 1 – Not confident to 5 – Very confident)
Clear selection

3. Have you received cybersecurity training in the past 12 months?*

3. Have you received cybersecurity training in the past 12 months?*

Clear selection

4. How often do you receive tips or updates about cyber risks (e.g., phishing alerts, scam updates)?*

4. How often do you receive tips or updates about cyber risks (e.g., phishing alerts, scam updates)?*

Clear selection

5. Have you ever reported a suspicious email or security incident?*

5. Have you ever reported a suspicious email or security incident?*

Clear selection
SECTION 1: Organizational Awareness and Culture (10 questions) cont...

6. To whom would you report a cybersecurity concern?*

6. To whom would you report a cybersecurity concern?*

Clear selection

7. How often do you change your passwords for work systems?*

7. How often do you change your passwords for work systems?*

Clear selection

8. Rate the following statement: "Cybersecurity is everyone’s responsibility."*

8. Rate the following statement: "Cybersecurity is everyone’s responsibility."*

Strongly Disagree
Disagree
Neutral / Neither Agree nor Disagree
Agree
Strongly Agree
(1 – Strongly disagree to 5 – Strongly agree)
Clear selection

9. Do you use the same password for multiple systems (work, email, banking, etc.)?*

9. Do you use the same password for multiple systems (work, email, banking, etc.)?*

Clear selection

10. Has your organization tested your cybersecurity readiness through a drill or simulation in the last 6 months (e.g., phishing test)?*

10. Has your organization tested your cybersecurity readiness through a drill or simulation in the last 6 months (e.g., phishing test)?*

Clear selection
SECTION 2: Infrastructure and Access Controls (10 questions)

11. Does your organization have an active antivirus or endpoint protection solution installed on all devices?*

11. Does your organization have an active antivirus or endpoint protection solution installed on all devices?*

Clear selection

12. Are employees required to use strong passwords or multi-factor authentication (MFA)?*

12. Are employees required to use strong passwords or multi-factor authentication (MFA)?*

Clear selection

13. Can staff access company systems remotely? If yes, how is it secured?*

13. Can staff access company systems remotely? If yes, how is it secured?*

Clear selection

14. Is there a policy restricting the use of USB drives or external storage on office devices?*

14. Is there a policy restricting the use of USB drives or external storage on office devices?*

Clear selection

15. Do you use secure cloud platforms for sharing documents (e.g., Google Workspace, Microsoft 365)?*

15. Do you use secure cloud platforms for sharing documents (e.g., Google Workspace, Microsoft 365)?*

Clear selection
SECTION 2: Infrastructure and Access Controls (10 questions) cont...

16. Rate the security of your organization’s Wi-Fi and network systems.*

16. Rate the security of your organization’s Wi-Fi and network systems.*

Very Insecure
Insecure
Neutral / Not Sure
Secure
Very Secure
(Please select the option that best reflects your perception)
Clear selection

17. When staff leave the organization, are their email accounts, devices, and system access promptly deactivated?*

17. When staff leave the organization, are their email accounts, devices, and system access promptly deactivated?*

Clear selection

18. Does your organization conduct regular IT security audits or vulnerability assessments?*

18. Does your organization conduct regular IT security audits or vulnerability assessments?*

Clear selection

19. Have any of your organization's systems been hacked, breached, or infected in the last 12 months?*

19. Have any of your organization's systems been hacked, breached, or infected in the last 12 months?*

Clear selection

20. Does your organization have a documented cybersecurity policy?*

20. Does your organization have a documented cybersecurity policy?*

Clear selection
SECTION 3: Incident Response and Data Protection (10 questions)

21. If a system goes down due to ransomware or cyberattack, does your organization have a recovery plan?*

21. If a system goes down due to ransomware or cyberattack, does your organization have a recovery plan?*

Clear selection

22. Is there a clear reporting channel and protocol in the event of a suspected data breach?*

22. Is there a clear reporting channel and protocol in the event of a suspected data breach?*

Clear selection

23. Has your organization tested its backup and recovery process in the last 6 months?*

23. Has your organization tested its backup and recovery process in the last 6 months?*

Clear selection

24. Are backups stored securely and offsite (or in the cloud)?*

24. Are backups stored securely and offsite (or in the cloud)?*

Clear selection

25. Do you know the difference between a security incident and a data breach?*

25. Do you know the difference between a security incident and a data breach?*

Clear selection
SECTION 3: Incident Response and Data Protection (10 questions) cont...

26. What is your organization’s biggest cybersecurity risk in your opinion?*

26. What is your organization’s biggest cybersecurity risk in your opinion?*

Clear selection

27. How prepared do you believe your team is to handle a cybersecurity emergency?*

27. How prepared do you believe your team is to handle a cybersecurity emergency?*

Very Unprepared
Unprepared
Neutral / Not Sure
Prepared
Very Prepared
(Please rate using the scale)
Clear selection

28. Do you think your organization would report a breach to affected stakeholders or regulators if one occurred?*

28. Do you think your organization would report a breach to affected stakeholders or regulators if one occurred?*

Clear selection

29. Which regulator or authority oversees data protection in Uganda?*

29. Which regulator or authority oversees data protection in Uganda?*

Clear selection

30. Does your organization have a designated Data Protection Officer (DPO)?*

30. Does your organization have a designated Data Protection Officer (DPO)?*

Clear selection
SECTION 4: Personal Practices and Behavior (10 questions)

31. Do you use your work laptop for personal activities (social media, banking, Netflix, etc.)?*

31. Do you use your work laptop for personal activities (social media, banking, Netflix, etc.)?*

Clear selection

32. How often do you click on links or download attachments from unknown senders?*

32. How often do you click on links or download attachments from unknown senders?*

Clear selection

33. How confident are you in identifying a phishing email?*

33. How confident are you in identifying a phishing email?*

Column 1
Row 1
Clear selection
You have been successfully Subscribed! Ops! Something went wrong, please try again.

About Us

 we specialize in bridging the gap between knowledge and application.

Recent news

  • All Post
  • Blog
  • Career Management
  • Computer Security
  • Cyber Defence
  • Cyber Incidence Response
  • Cyber Preparedness
  • Cyber Security
  • Data Privacy
  • Endpoint Security
  • Fraud Investigation and Examination
  • Fraud Management
  • IT Security Audit
  • Marketing
  • Mobile Security
  • Training
  • UX/UI Design
  • Web Development

© 2025 All rights reserved Institute of Forensics and ICT Security | IFIS is the training arm of Summit Consulting Ltd