The cyber activity risk assessment is designed to review how clients use connected devices, communicate online and travel in order to assist in establishing an overall cyber risk management approach. Cyber security risk management is important to understand from a personal perspective. The results can be used to determine the level of potential exposure of accessible private information.

The cyber risk activity assessment reviews how data is accessed and shared in order to determine the potential exposure of private information. The results can be reviewed to establish an overall risk exposure.


The personally connected devices allow for increased storage and transfer of private information such as notes, photos, contacts, financial accounts, saved passwords, and more. It is important to properly secure and manage devices to protect your personal information. The assessment includes: ƒ

  • Personal computers ƒ
  • Tablets ƒ
  • Phones ƒ
  • Wearable devices ƒ
  • Smart homes


Various activities can increase the exposure of personal information to potential compromise. The following types of activities are reviewed to include: ƒ

  • Previous identity theft ƒ
  • Personal IT infrastructure ƒ
  • Use of Wi-Fi services ƒ
  • Online banking ƒ
  • Online shopping ƒ
  • Mobile payment systems ƒ
  • File sharing ƒ
  • Cloud services ƒ
  • Browsers ƒ
  • Email ƒ
  • Social media ƒ
  • Instant message and chat services ƒ
  • Voice over IP services ƒ
  • Commonly used applications ƒ
  • Use of shared services


Traveling can create potential digital exposures due to the destination infrastructure, regulations, hacking activity, economic espionage and corporate intellectual property interest. The travel profile includes: ƒ

  • Destination risk assessments ƒ
  • Before traveling considerations ƒ
  • During travel considerations ƒ
  • Considerations upon return


Best practices and recommended settings are provided in order to improve the overall level of security are in place to guide remediation such as understanding the types of data at risk. This includes: ƒ

  • Personal computers ƒ
  • Tablets ƒ
  • Phones ƒ
  • Browsers
  • Social Media ƒ
  • Email ƒ
  • Travel

Additional Services

The assessment can lead to additional questions or concerns. These can be supported on a case by case basis with services such as: ƒ

  • Cyber security awareness training ƒ
  • Online reputation assessments ƒ
  • Cyber security assessments ƒ
  • Lifestyle assessments ƒ
  • Personal security awareness training ƒ
  • Assistance with coordinating security services ƒ
  • Electronic countermeasures assessments