Your Health Scores
Use this to instantly get a health check of your ICT ecosystem based on the polices and best practises employed by your business, as you progress through your accreditation you will see your health scores improve.
LEVEL 2: Business Intelligence
Overview of your accreditation progress and level achieved.
If a disaster strikes your business, how many hours will it take you to recover normal operations based on your accreditations answers.
This chart is populated from your accreditation answers, use this to understand your risk posture, the higher the score the higher your risk, risks can be reduced with stronger policies, procedures and ongoing cyber awareness training.
Your Awards
By undertaking your accreditation you have demonstrated you have best-practise methods employed within your business.
- Proactive Maintenance
- Peripherals
- Basic IT Security
- Environment and Lifecycle
- Internet Redundancy
- Data Management & Backups
- Email Security
- Policies and Procedures
- Ecosystem Documentation
- Productivity Gains
- Business Continuity
- Business Presence
Next Level
- How do you improve on perfection?
With continued training and upskilling of your staff with Cyber Awareness Training! - Cyber Awareness Training
Your Badges
Showcase your success and prove to your business partners that you have quality IT processes and systems – web badges can be added to your website and email signature – you got this far, you might as well show off a little!
Your Accreditation Questions
Below you will see a list of topics that formed your accreditation and any answers you submitted that have been approved by ICTAA.
Your Questions |
Your Answers |
1.1.1 Are your backups no more than 30 days old? | ![]() |
1.1.2. Shared access to data | ![]() |
1.1.3. Backup Schedules | ![]() |
1.1.4. Document Backup Provider | ![]() |
1.2.1. Internet and Email Usage Policy | ![]() |
1.2.2 Email Backups | ![]() |
1.2.3. Email Spam Filtering | ![]() |
1.2.4. Email Anti-virus | ![]() |
1.2.5 Document Email Service Provider | ![]() |
1.3.1 Ventilation | ![]() |
1.3.2 Equipment Disposal | ![]() |
1.3.3 Surge Protection | ![]() |
1.3.4 ICT Insurance | ![]() |
1.3.5 Asset Register | ![]() |
1.4.1 Document ISP provider | ![]() |
1.4.2 Document 3G/4G telco provider | ![]() |
1.4.3 Document External Providers | ![]() |
1.5.1 Regular Maintenance | ![]() |
1.5.2 Document IT provider | ![]() |
1.6.1 Passwords | ![]() |
1.6.2 Password Strength | ![]() |
1.6.3 Computer anti-virus | ![]() |
1.6.4 Anti-virus Updates and Scanning | ![]() |
1.6.5 Malware Protection | ![]() |
1.6.6 WIFI Security | ![]() |
1.7.1 Document Printers | ![]() |
1.7.2 Printers | ![]() |
1.7.3 Document other equipment | ![]() |
1.8.1 Document Telco | ![]() |
1.8.2 Document Fax (or eFax) | ![]() |
1.8.3 Document 1300/1800 Numbers and Call Groups | ![]() |
1.8.5 Document Domain Host | ![]() |
1.8.6 Document Website Host | ![]() |
Your Questions |
Your Answers |
2.5.1. Backup Reporting | ![]() |
2.1.2. Offsite Backups | ![]() |
2.1.3. Backup Versioning | ![]() |
2.1.4. Backup System Testing | ![]() |
2.1.5. Are backups no more than 7 days old? | ![]() |
2.2.1. Email archiving | ![]() |
2.2.2. Email Policies | ![]() |
2.3.1. Paper Waste | ![]() |
2.3.2. UPS Testing | ![]() |
2.3.3. Surge Protection PBX | ![]() |
2.4.1. Networks Summary | ![]() |
2.5.1. ICT Monitoring | ![]() |
2.6.1. Commercial AV protection | ![]() |
2.6.2. Device Default Passwords | ![]() |
Your Questions |
Your Answers |
3.1.1. Data Retention | |
3.1.2. Online Backups Storage | |
3.1.3. Storage Disk Redundancy | |
3.1.4. Backup Encryption | |
3.1.5. Are you backups no more than 24 hours old? | |
3.3.1. ICT Lifecycles | |
3.3.2. Shutdown automation with UPS | |
3.4.1. Internet Redundancy | |
3.5.1. Maintenance is being recorded | |
3.5.2. ICT Service Providers | |
3.6.1. Complex Passwords | |
3.6.3. Firewall Management | |
3.6.4. Guest WIFI | |
3.6.5. Firewalls when Teleworking | |
3.7.1 Spare Tonners / Inks |