top of page

Technological Threats (cyberattacks, breaches, ransomware, sabotage, Deepfakes/Deepvoice/Fake News)

Score 6-10

Risk exposure: Controls are present but uneven. Attack surface may be expanding (vendors, cloud, remote work), and “good enough” practices can still allow material disruption—especially via ransomware or unauthorized disclosure.


Risk solutions/services

Prioritize consistency:

  • harden identity/access (MFA, PAM),

  • tighten data governance,

  • enhance monitoring/EDR, and

  • formalize third-party tech risk reviews.

Add a board-approved incident response plan with clear decision rights and escalation triggers.

​​

​

Back to Score Analysis

bottom of page