How does the CyberVital Security Check actually work?
CyberVital is an online computer cyber risk assessment tool that will scan and assess the cybersecurity settings of a computer.
After the CyberVital check, a tailor-made email report, which will be sent to the user's account, gives each scanned computer a set of scores that will benchmark the cybersecurity settings. CyberVital software offers a built-in one-click solution to rectify the computer security setting such that user can improve the security setting in one go. With regular and repeated scanning, the user can understand how he/she can improve the cybersecurity posture of the computer over a period of time.
What are the steps to run the Health Check?
Fill in & submit the Sign-up Form. We just require the essential contact information of the user, i.e. Name & Email address.
Our system (from email@example.com email account) will send you a link to download CyberVital Software and there will be an ‘Access Code’ attached in this email.
User will need to download and execute the software on the PC. Once you run the software, it will ask for an authentication code. The 8 digit code is in the registration email and you need to copy the ‘Access Code’ from the email.
The Software will show you the scanning status and will notify you when the scanning is done.
Within 10 mins, there will an email from firstname.lastname@example.org with a CyberVital Report attachment in PDF format.
What will CyberVital Report tell me?
For Trial User (Free for first 3 Scans), we will show the CyberVital Scores on 3 major computer security settings and 2 Records of computer access:
Online Payment & Financial Transaction Security Check: to assess if there is any vulnerability that will lead to credit card or other epayment data loss. We evaluated the user's browser settings and checked if there have been any unwanted programs or websites stealing financial data from the user. An Online Payment Risk Score will be given on CyberVital Report.
Ransomware Check: to prevent installation of malicious software and check if there is any unknown remotely control of user’s computer. Ransomware prevents user from accessing the system or personal files and demands payment in order to regain access. We looked into user's settings to see if you have been protected against malicious ransomware. A Ransomeware Risk Score will be given on CyberVital Report
Network Speed and Quality Check: to ensure the network speed will not hinder user's work. Network speed directly affects the performance of user's network access and video conferencing. We ran a series of speed tests to check Internet speed as well as network latency.
4. Remote Access Record: to assess the vulnerability of computer which enables 'Remote Access' function. Computer with Remote access client devices generally have weaker protection than standard client devices.They may be used in hostile environments but not configured for them. CyberVital will show all the login and logout record via Remote Access. User can also take note of the irregular access of account during odd hours.
5. Login and Logout Record: to record the log in & out time of different users on a same computer. For computer which has multiple users, especially kids, this record will give users a clear historical record of users log in and log out behavior.
What standard is the assessment based on?
And how do you calculate the scores on the CyberVital Report?
Our assessment is a computer cyber risk assessment and therefore, we will scan and assess the cybersecurity setting of a computer by giving a CyberVital score according to different computer functions.
CyberVital score is based on how many high risk Attack Vector/ Surface your computer is currently facing. We identify the attack vectors that are being exploited according to a list of well-known online malware and ransomware attacks (that is the main reason for high risk exposure). Eliminating this attack vector will therefore reduce the chance of a cyber attack.
What is Attack Vector or Surface?
Imagine your computer is a fortress protecting your valuable assets. Attack vector is like the window or door on the fortress, every attack will start with these openings and attackers will spend more time on trying to exploit them.
Security researcher call this types of attack entrance point, attack vectors. Not all attack vector are high risk and should be eliminated. However, we cannot have a fortress without windows or doors as it will be suffocating.
What are the system requirements for this security health check?
Windows 10 OS
User has rights to install software - Administrator right
Computer has Internet access
PDF Reader installed
The user’s computer OS should be Windows 10. While utilizing the scan, the computer needs to have Internet access and the user is able to login with the ability to download and execute software.
What would you do to the data collected by the security check?
We only collect information from your Windows and other program settings, which helps us identify which weak points you have, and helps us create a personalized report. We do not collect any other personal information from your computer, and we will never share any of your provided personal or identifying information to anyone.
Besides, we would aggregate your computer’s information with other companies’ for our own analysis. No information from a single user is going to be published. Furthermore, all data transfer to Hoplite will keep a copy at the company for 6 months.
During the assessment process, the data volume transmitted is low. We do not connect to Internet when performing the assessment. The results (logs and reports) are stored locally first. And then it is copied to the user's email account.
What is the purpose of the assessment report?
Regular, automated and risk-based security assessment is an essential tool to understand cybersecurity posture and prevent the next cyber attack. The CyberVital report will enable the computer administrator to oversees key components of his IT infrastructure and user behavior.
What is the difference between CyberVital Computer Health Check and Anti-virus or a Firewall?
Hoplite CyberVital is not replacing anti-virus or firewall. Digital assets in a computer will generally have multiple risks associated with them. Equipment failure, theft, or misuse can affect hardware, while viruses, upgrade problems, or bugs in the code may affect software.
Even if your computer systems are timely upgraded and patched regularly with anti-virus software, there are still other weakness in the access control like wrong setting of firewall, weak password or vulnerabilities in the network that might expose the computer systems to cyber threats. Therefore, our CyberVital Security Check is a thorough cyber risk scan on the digital assets that you would have.