Free resource • Checklist
Free Vulnerability Checklist
Find gaps before attackers or auditors do — a plain-English checklist across people, process, and technology. Takes about 10 minutes and helps you prioritise quick wins.
Non-technical • Based on real assessments • Useful for Cyber Essentials prep
Preview
What’s inside
A quick self-check across the areas that most often cause incidents and audit pain.
Passwords & access
- MFA enabled for email and admin accounts.
- Leaver access removed within 24 hours; reviewed monthly.
- Default passwords disabled on all devices and apps.
Updates & patching
- Critical updates applied within 14 days (or vendor SLA).
- Unsupported software removed or isolated.
- Automatic updates enabled where practical.
Devices & networks
- Firewalls enabled and reviewed (incl. cloud security groups).
- Remote access secured (VPN/MFA) and restricted by need.
- Admin interfaces not exposed to the public internet.
Backups & recovery
- Backups run automatically and are monitored for failures.
- A recent restore test confirms backups actually work.
- Backups are protected from ransomware (separation/immutable storage).
How to use it
Run the check in 10 minutes
Answer yes/no, circle gaps, then tackle the high-impact fixes first.
-
1
Download and scan for quick wins
Start with MFA, patching cadence, and admin access — these deliver fast risk reduction.
-
2
Prioritise by impact
Fix items that reduce broad attack paths (identity, patching, backups, exposure).
-
3
Book a review if you want a plan
We’ll help validate priorities and turn gaps into a simple remediation checklist.
Complimentary consultation
Want help reviewing your results?
Book a free 20-minute call and we’ll talk through quick wins, priorities, and next steps.