CyberVital
Frequently Asked Questions
How does the CyberVital Security Check actually work?
CyberVital is an online computer cyber risk assessment tool that will scan and assess the cybersecurity settings of a computer.
After the CyberVital check, a tailor-made email report, which will be sent to the user's account, gives each scanned computer a set of scores that will benchmark the cybersecurity settings. CyberVital software offers a built-in one-click solution to rectify the computer security setting such that user can improve the security setting in one go. With regular and repeated scanning, the user can understand how he/she can improve the cybersecurity posture of the computer over a period of time.
What are the steps to run the Health Check?
What will CyberVital Report tell me?
For Trial User (Free for first 3 Scans), we will show the CyberVital Scores on 3 major computer security settings and 2 Records of computer access:
4. Remote Access Record: to assess the vulnerability of computer which enables 'Remote Access' function. Computer with Remote access client devices generally have weaker protection than standard client devices.They may be used in hostile environments but not configured for them. CyberVital will show all the login and logout record via Remote Access. User can also take note of the irregular access of account during odd hours.
5. Login and Logout Record: to record the log in & out time of different users on a same computer. For computer which has multiple users, especially kids, this record will give users a clear historical record of users log in and log out behavior.
What standard is the assessment based on?
And how do you calculate the scores on the CyberVital Report?
Our assessment is a computer cyber risk assessment and therefore, we will scan and assess the cybersecurity setting of a computer by giving a CyberVital score according to different computer functions.
CyberVital score is based on how many high risk Attack Vector/ Surface your computer is currently facing. We identify the attack vectors that are being exploited according to a list of well-known online malware and ransomware attacks (that is the main reason for high risk exposure). Eliminating this attack vector will therefore reduce the chance of a cyber attack.
What is Attack Vector or Surface?
Imagine your computer is a fortress protecting your valuable assets. Attack vector is like the window or door on the fortress, every attack will start with these openings and attackers will spend more time on trying to exploit them.
Security researcher call this types of attack entrance point, attack vectors. Not all attack vector are high risk and should be eliminated. However, we cannot have a fortress without windows or doors as it will be suffocating.
What are the system requirements for this security health check?
What would you do to the data collected by the security check?
We only collect information from your Windows and other program settings, which helps us identify which weak points you have, and helps us create a personalized report. We do not collect any other personal information from your computer, and we will never share any of your provided personal or identifying information to anyone.
Besides, we would aggregate your computer’s information with other companies’ for our own analysis. No information from a single user is going to be published. Furthermore, all data transfer to Hoplite will keep a copy at the company for 6 months.
During the assessment process, the data volume transmitted is low. We do not connect to Internet when performing the assessment. The results (logs and reports) are stored locally first. And then it is copied to the user's email account.
What is the purpose of the assessment report?
Regular, automated and risk-based security assessment is an essential tool to understand cybersecurity posture and prevent the next cyber attack. The CyberVital report will enable the computer administrator to oversees key components of his IT infrastructure and user behavior.
What is the difference between CyberVital Computer Health Check and Anti-virus or a Firewall?
Hoplite CyberVital is not replacing anti-virus or firewall. Digital assets in a computer will generally have multiple risks associated with them. Equipment failure, theft, or misuse can affect hardware, while viruses, upgrade problems, or bugs in the code may affect software.
Even if your computer systems are timely upgraded and patched regularly with anti-virus software, there are still other weakness in the access control like wrong setting of firewall, weak password or vulnerabilities in the network that might expose the computer systems to cyber threats. Therefore, our CyberVital Security Check is a thorough cyber risk scan on the digital assets that you would have.
Still have questions? Chat with us now.
OR Let us know any more questions you have, and we'll get back to you soon.
© 2018-2023