. We test security policies and controls frequently. (24%)
. We are fully compliant with cybersecurity-related regulations. (22%)
. We conduct periodic self-assessments to identify and priorities critical vulnerabilities and risks. (21%)
. We subscribe to a threat intelligence platform or threat intelligence data feeds to stay on top of adversary movements. (20%)
. We have cyber insurance or sufficient funds set aside in case of a ransomware attack. (19%)
. WE utilize expert managed security security services to keep us from being breached. (19%)
. We have developed an incident response playbook. (18%)
. we implement security controls and policies across our entire infrastructure. (18%)