Survey: Cybersecurity Questionnaire

With the growing prosperity and digitization, comes new risks and vulnerabilities that could undermine progress. Chief among these is the rise of cybercrime. According to the Information Network Security Agency (INSA), cyber-attacks in Ethiopia has become a major threat to economic development and national security. According to the Agency, 40% of all cyber-attacks in Ethiopia targeted websites and the remaining targeted key infrastructure facilities as well as hacking attempts on public and private entities. Further, in the past few days, it has been widely reported that hackers based in Egypt carried out a cyber-attack aiming at Ethiopia to create a multi-faceted pressure on Ethiopia in connection with the filling and operation of the Grand Ethiopian Renaissance Dam (GERD).

Our mission is to be the forefront leader in tackling cybercrime in Ethiopia. We do this by way of creating a cyber resilience business framework, raising awareness among key stakeholders including security professionals, and building skills among the youth to protect Ethiopian core infrastructures, information, and its related systems. This survey will assist us in gathering information and understanding the state of cybersecurity in Ethiopia. We would like to thank you in advance for filling this survey.        

Question Title

* 2. Select the security topics that you are interested in (select all that apply) and rate your familiarity with each topic (scale ranges from 1 - 5; 1 = not familiar, 5 = extremely familiar).

  1 2 3 4 5 N/A
Desktop ( Laptop ) Security
Network Security
Vulnerability/Penetration Assessment
Email Security
Web Security
Incident/Risk Management
Cyber Insurance

Question Title

* 3. If you already have a cybersecurity program in place, is it: (Select all that apply)

Question Title

* 4. How confident are you in your organization’s overall cybersecurity posture? (select one)

Question Title

* 5. How would you rate your organization’s overall ability to resist cyber threats in each of the following areas? (scale ranges from 1 - 5;1 = low, 5 = high).

  1 2 3 4 5 N/A
Web applications
Cloud applications or platforms (e.g., IaaS, PaaS, SaaS)
Legacy applications
Datacenter hardware (i.e.,physical or virtualized computer systems hardware)
Network Perimeter (i.e., including consideration of devices such as firewalls, switches, routers, or wireless access points)
End-user devices (e.g., desktops or laptops)
Mobile end-user devices (e.g., mobile phones or tablets)
User awareness, training, and experience

Question Title

* 6. Select all of the applicable negative impacts that security incidents have had on your organization in the past 12 months.

Question Title

* 7. Select all of the barriers that may inhibit your organization from adequately defending against cyber threats.

Question Title

* 8. Does your organization currently perform security control validation? Please select all applicable

Question Title

* 9. Select the remote access features that your organization utilizes: 

Question Title

* 10. Regarding your remote access system(s), how satisfied are you with:

  Extremely satisfied Very satisfied Somewhat satisfied Not so satisfied Not satisfied at all  N/A
Usability
Speed/Performance
Accessibility
Device support
Customer support

Question Title

* 11. To what extent does your budget have an impact on the security solutions you are purchasing?

Question Title

* 12. How is your security budget changing in the next 12 months? (Select one and please specify by what percentage?)

Question Title

* 13. If the following security solutions are affordable

  Definitely would buy Probably would buy Might or might not buy Probably would not buy Definitely would not buy N/A
Antivirus
Endpoint Detection and Response (EDR)
Application Control
Password/Privilege Management
Firewall NextGen ( IPS/Antibot/Antivirus)
Network Access Control ( NAC )
Email Security 
Phishing Drill
Employee training 
Incident Management 
Risk Management 
Cyber Insrance

Question Title

* 14. Which of the following areas does your organization plan to invest over the next 12 months (select all that applies)?

Question Title

* 15. What is your organization’s approximate annual IT security spend as a percentage of overall IT budget (excluding headcount)?

Question Title

* 16. Who ultimately determines the security spend in your organization? (select one)

Question Title

* 17. Does your organization conduct phishing drills?

Question Title

* 18. Are your employees and contractors required to attend security training?

Question Title

* 19. Does your organization have an external vendor perform penetration tests?

Question Title

* 20. Is there a formal incident and risk management program in place?

Question Title

* 21. What antivirus product does your organization use?

Question Title

* 22. What kind of application control do you use?

Question Title

* 23. What kind of endpoint detection and response program (i.e., EDR program) does your organization use?

Question Title

* 24. What kind of NextGen Firewall/IPS/IDS system do you use?

Question Title

* 25. What kind of remote access system does your organization use?

Question Title

* 26. What kind of Network Access Control (NAC) does your organization use?

Question Title

* 27. What kind of internal and external vulnerability management system does your organization use?

Question Title

* 28. What kind of Cloud service does your organization use?

Question Title

* 29. What kind of Email protection system do you use?

Question Title

* 30. If you want us to contact you further to discuss your security architecture, please fill the information below and submit. ( You can also send us an email to info@cyberGasha.com ). All personal and contact information collected from this survey will not be associated with the answers you have provided so far and will only be used for communication purposes. 

Page1 / 1
 
100% of survey complete.

T