{"id":8,"date":"2019-12-05T12:51:22","date_gmt":"2019-12-05T12:51:22","guid":{"rendered":"https:\/\/www.cyberassessmentengine.com\/?page_id=5"},"modified":"2026-03-02T16:59:09","modified_gmt":"2026-03-02T16:59:09","slug":"front-page","status":"publish","type":"page","link":"https:\/\/www.smartercyberassurance.com\/","title":{"rendered":"Cyber Assurance Risk Analysis Tool"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"8\" class=\"elementor elementor-8\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-28533222 elementor-section-height-min-height elementor-section-boxed elementor-section-height-default elementor-section-items-middle\" data-id=\"28533222\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-6e4fae43\" data-id=\"6e4fae43\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-200466b elementor-widget elementor-widget-heading\" data-id=\"200466b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\"><br>IDENTIFY.<br>EDUCATE.<br>SAFEGUARD.<br><\/h1>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-6438170f\" data-id=\"6438170f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-9e75428 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"9e75428\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a8423d8\" data-id=\"a8423d8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-inner-section elementor-element elementor-element-1595c99 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1595c99\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-19ded39\" data-id=\"19ded39\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-eec98f8 elementor-widget elementor-widget-heading\" data-id=\"eec98f8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">ONLINE SMART CYBER ASSESSMENT<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-79bbe62 elementor-widget elementor-widget-text-editor\" data-id=\"79bbe62\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #7a7a7a; font-family: Arial, sans-serif; font-size: 17.3333px; white-space: pre-wrap;\">Our Cyber Assessment Engine utilises a simple Question and Answer format to enable you to build a risk profile of your organisation. Upon completion of the questions, our decision engine will evaluate your responses and identify any weaknesses\/vulnerabilities. The assessment engine takes into consideration how your business operates including your Personnel, Process, Procedural and Technological (P3T) protective measures utilised to mitigate identified risks.<\/span><\/p><p><span style=\"font-size: 17.3333px; white-space-collapse: preserve; color: #7a7a7a; font-family: Arial, sans-serif;\">During the assessment process you will be required to supply supporting evidence. <\/span><\/p><p><span style=\"color: #7a7a7a; font-family: Arial, sans-serif; font-size: 17.3333px; white-space: pre-wrap;\">On the basis of the report produced and with our help and support, you can put effective strategies in place to protect your critical information and assets.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-c7efb38\" data-id=\"c7efb38\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1689acd2 elementor-widget elementor-widget-image\" data-id=\"1689acd2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"715\" src=\"https:\/\/www.smartercyberassurance.com\/wp-content\/uploads\/2021\/02\/CAE.jpg\" class=\"attachment-full size-full wp-image-168\" alt=\"\" srcset=\"https:\/\/www.smartercyberassurance.com\/wp-content\/uploads\/2021\/02\/CAE.jpg 1024w, https:\/\/www.smartercyberassurance.com\/wp-content\/uploads\/2021\/02\/CAE-300x209.jpg 300w, https:\/\/www.smartercyberassurance.com\/wp-content\/uploads\/2021\/02\/CAE-768x536.jpg 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" title=\"Cyber Assessment Engine - Smarter Cyber Assurance\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-inner-section elementor-element elementor-element-c2fea8b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c2fea8b\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-0c76daa\" data-id=\"0c76daa\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-92cdfeb elementor-view-framed elementor-position-inline-start elementor-shape-circle elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"92cdfeb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-project-diagram\" viewBox=\"0 0 640 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M384 320H256c-17.67 0-32 14.33-32 32v128c0 17.67 14.33 32 32 32h128c17.67 0 32-14.33 32-32V352c0-17.67-14.33-32-32-32zM192 32c0-17.67-14.33-32-32-32H32C14.33 0 0 14.33 0 32v128c0 17.67 14.33 32 32 32h95.72l73.16 128.04C211.98 300.98 232.4 288 256 288h.28L192 175.51V128h224V64H192V32zM608 0H480c-17.67 0-32 14.33-32 32v128c0 17.67 14.33 32 32 32h128c17.67 0 32-14.33 32-32V32c0-17.67-14.33-32-32-32z\"><\/path><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tOur Methodology\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tWhilst our methodology aligns with other approaches, we have taken care to ensure that risk management is a core foundations. Intrusive technical questions are not prioritised within our approach.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-8414603\" data-id=\"8414603\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-aac6097 elementor-view-framed elementor-position-inline-start elementor-shape-circle elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"aac6097\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-bullseye\" viewBox=\"0 0 496 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M248 8C111.03 8 0 119.03 0 256s111.03 248 248 248 248-111.03 248-248S384.97 8 248 8zm0 432c-101.69 0-184-82.29-184-184 0-101.69 82.29-184 184-184 101.69 0 184 82.29 184 184 0 101.69-82.29 184-184 184zm0-312c-70.69 0-128 57.31-128 128s57.31 128 128 128 128-57.31 128-128-57.31-128-128-128zm0 192c-35.29 0-64-28.71-64-64s28.71-64 64-64 64 28.71 64 64-28.71 64-64 64z\"><\/path><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tRisk Management\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tAll businesses operate with a range of risks. Excluding legacy technologies, business functions, solutions, or business practices to acquire a certificate inhibits business operations and unlikely to prevent a cyber-attack.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-inner-section elementor-element elementor-element-5681c36 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5681c36\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-fd8f363\" data-id=\"fd8f363\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e9a7b28 elementor-view-framed elementor-position-inline-start elementor-shape-circle elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"e9a7b28\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-briefcase\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M320 336c0 8.84-7.16 16-16 16h-96c-8.84 0-16-7.16-16-16v-48H0v144c0 25.6 22.4 48 48 48h416c25.6 0 48-22.4 48-48V288H320v48zm144-208h-80V80c0-25.6-22.4-48-48-48H176c-25.6 0-48 22.4-48 48v48H48c-25.6 0-48 22.4-48 48v80h512v-80c0-25.6-22.4-48-48-48zm-144 0H192V96h128v32z\"><\/path><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tvalue of your data\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tData increasingly represents the core of many organisations and with businesses becoming more reliant on technology, data has become one of the most valuable assets owned.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-942a490\" data-id=\"942a490\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-73ac401 elementor-view-framed elementor-position-inline-start elementor-shape-circle elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"73ac401\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-list-alt\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M464 32H48C21.49 32 0 53.49 0 80v352c0 26.51 21.49 48 48 48h416c26.51 0 48-21.49 48-48V80c0-26.51-21.49-48-48-48zm-6 400H54a6 6 0 0 1-6-6V86a6 6 0 0 1 6-6h404a6 6 0 0 1 6 6v340a6 6 0 0 1-6 6zm-42-92v24c0 6.627-5.373 12-12 12H204c-6.627 0-12-5.373-12-12v-24c0-6.627 5.373-12 12-12h200c6.627 0 12 5.373 12 12zm0-96v24c0 6.627-5.373 12-12 12H204c-6.627 0-12-5.373-12-12v-24c0-6.627 5.373-12 12-12h200c6.627 0 12 5.373 12 12zm0-96v24c0 6.627-5.373 12-12 12H204c-6.627 0-12-5.373-12-12v-24c0-6.627 5.373-12 12-12h200c6.627 0 12 5.373 12 12zm-252 12c0 19.882-16.118 36-36 36s-36-16.118-36-36 16.118-36 36-36 36 16.118 36 36zm0 96c0 19.882-16.118 36-36 36s-36-16.118-36-36 16.118-36 36-36 36 16.118 36 36zm0 96c0 19.882-16.118 36-36 36s-36-16.118-36-36 16.118-36 36-36 36 16.118 36 36z\"><\/path><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tRisk Analysis Tool\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tThe Cyber Assessment Engine is a risk analysis tool which has been created to enable organisations to identify and therefore enable you to mitigate cyber and security risks.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-inner-section elementor-element elementor-element-b669881 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b669881\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-27da4d6\" data-id=\"27da4d6\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-085f613 elementor-view-framed elementor-position-inline-start elementor-shape-circle elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"085f613\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-credit-card\" viewBox=\"0 0 576 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M527.9 32H48.1C21.5 32 0 53.5 0 80v352c0 26.5 21.5 48 48.1 48h479.8c26.6 0 48.1-21.5 48.1-48V80c0-26.5-21.5-48-48.1-48zM54.1 80h467.8c3.3 0 6 2.7 6 6v42H48.1V86c0-3.3 2.7-6 6-6zm467.8 352H54.1c-3.3 0-6-2.7-6-6V256h479.8v170c0 3.3-2.7 6-6 6zM192 332v40c0 6.6-5.4 12-12 12h-72c-6.6 0-12-5.4-12-12v-40c0-6.6 5.4-12 12-12h72c6.6 0 12 5.4 12 12zm192 0v40c0 6.6-5.4 12-12 12H236c-6.6 0-12-5.4-12-12v-40c0-6.6 5.4-12 12-12h136c6.6 0 12 5.4 12 12z\"><\/path><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tprotecting your assets\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tIt is now widely acknowledged that the risks associated with the loss of data and the impact of a compromise, on both a personal and business level, is significant. <br>Protecting your assets has become a priority and the Cyber Assessment Engine can help you achieve that.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-99073b6\" data-id=\"99073b6\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-effc2cf elementor-view-framed elementor-position-inline-start elementor-shape-circle elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"effc2cf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-calculator\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M400 0H48C22.4 0 0 22.4 0 48v416c0 25.6 22.4 48 48 48h352c25.6 0 48-22.4 48-48V48c0-25.6-22.4-48-48-48zM128 435.2c0 6.4-6.4 12.8-12.8 12.8H76.8c-6.4 0-12.8-6.4-12.8-12.8v-38.4c0-6.4 6.4-12.8 12.8-12.8h38.4c6.4 0 12.8 6.4 12.8 12.8v38.4zm0-128c0 6.4-6.4 12.8-12.8 12.8H76.8c-6.4 0-12.8-6.4-12.8-12.8v-38.4c0-6.4 6.4-12.8 12.8-12.8h38.4c6.4 0 12.8 6.4 12.8 12.8v38.4zm128 128c0 6.4-6.4 12.8-12.8 12.8h-38.4c-6.4 0-12.8-6.4-12.8-12.8v-38.4c0-6.4 6.4-12.8 12.8-12.8h38.4c6.4 0 12.8 6.4 12.8 12.8v38.4zm0-128c0 6.4-6.4 12.8-12.8 12.8h-38.4c-6.4 0-12.8-6.4-12.8-12.8v-38.4c0-6.4 6.4-12.8 12.8-12.8h38.4c6.4 0 12.8 6.4 12.8 12.8v38.4zm128 128c0 6.4-6.4 12.8-12.8 12.8h-38.4c-6.4 0-12.8-6.4-12.8-12.8V268.8c0-6.4 6.4-12.8 12.8-12.8h38.4c6.4 0 12.8 6.4 12.8 12.8v166.4zm0-256c0 6.4-6.4 12.8-12.8 12.8H76.8c-6.4 0-12.8-6.4-12.8-12.8V76.8C64 70.4 70.4 64 76.8 64h294.4c6.4 0 12.8 6.4 12.8 12.8v102.4z\"><\/path><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tAssociated benefits\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tBy gaining an insight into your security posture, a clear action plan identifying your priority issues can inform your risk management strategy. <br>Our extensive report provides findings and recommendations enabling informed decision making.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>IDENTIFY.EDUCATE.SAFEGUARD. ONLINE SMART CYBER ASSESSMENT Our Cyber Assessment Engine utilises a simple Question and Answer format to enable you to build a risk profile of your organisation. Upon completion of the questions, our decision engine will evaluate your responses and identify any weaknesses\/vulnerabilities. The assessment engine takes into consideration how your business operates including your [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-8","page","type-page","status-publish","hentry"],"aioseo_notices":[],"aioseo_head":"\n\t\t<!-- All in One SEO Pro 4.9.6.2 - aioseo.com -->\n\t<meta name=\"description\" content=\"Explore the importance of Cyber Assurance in safeguarding digital assets with our expert insights and strategic approaches.\" \/>\n\t<meta name=\"robots\" content=\"max-image-preview:large\" \/>\n\t<link rel=\"canonical\" href=\"https:\/\/www.smartercyberassurance.com\/\" \/>\n\t<meta name=\"generator\" content=\"All in One SEO Pro (AIOSEO) 4.9.6.2\" \/>\n\t\t<meta property=\"og:locale\" content=\"en_GB\" \/>\n\t\t<meta property=\"og:site_name\" content=\"Smarter Cyber Assurance - Identify, Educate, Safeguard\" \/>\n\t\t<meta property=\"og:type\" content=\"website\" \/>\n\t\t<meta property=\"og:title\" content=\"Master Cyber Assurance with Our Easy-to-Use Cyber Risk Engine\" \/>\n\t\t<meta property=\"og:description\" content=\"Explore the importance of Cyber Assurance in safeguarding digital assets with our expert insights and strategic approaches.\" \/>\n\t\t<meta property=\"og:url\" content=\"https:\/\/www.smartercyberassurance.com\/\" \/>\n\t\t<meta property=\"og:image\" content=\"https:\/\/www.smartercyberassurance.com\/wp-content\/uploads\/2021\/02\/cropped-watermark.jpg\" \/>\n\t\t<meta property=\"og:image:secure_url\" content=\"https:\/\/www.smartercyberassurance.com\/wp-content\/uploads\/2021\/02\/cropped-watermark.jpg\" \/>\n\t\t<meta property=\"og:image:width\" content=\"512\" \/>\n\t\t<meta property=\"og:image:height\" content=\"512\" \/>\n\t\t<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n\t\t<meta name=\"twitter:title\" content=\"Master Cyber Assurance with Our Easy-to-Use Cyber Risk Engine\" \/>\n\t\t<meta name=\"twitter:description\" content=\"Explore the importance of Cyber Assurance in safeguarding digital assets with our expert insights and strategic approaches.\" \/>\n\t\t<meta name=\"twitter:image\" content=\"https:\/\/www.smartercyberassurance.com\/wp-content\/uploads\/2021\/02\/cropped-watermark.jpg\" \/>\n\t\t<script type=\"application\/ld+json\" class=\"aioseo-schema\">\n\t\t\t{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.smartercyberassurance.com\\\/#breadcrumblist\",\"itemListElement\":[{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.smartercyberassurance.com#listItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.smartercyberassurance.com\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.smartercyberassurance.com\\\/#listItem\",\"name\":\"Cyber Assurance Risk Analysis Tool\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.smartercyberassurance.com\\\/#listItem\",\"position\":2,\"name\":\"Cyber Assurance Risk Analysis Tool\",\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.smartercyberassurance.com#listItem\",\"name\":\"Home\"}}]},{\"@type\":\"LocalBusiness\",\"@id\":\"https:\\\/\\\/www.smartercyberassurance.com\\\/#localbusiness\",\"name\":\"#Smarter Cyber Assurance\",\"brand\":{\"@id\":\"https:\\\/\\\/www.smartercyberassurance.com\\\/#organization\"},\"url\":\"https:\\\/\\\/www.smartercyberassurance.com\\\/\",\"image\":\"https:\\\/\\\/www.smartercyberassurance.com\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/jpeg.jpg\",\"logo\":\"https:\\\/\\\/www.smartercyberassurance.com\\\/#logo\",\"telephone\":\"+443303031444\",\"openingHoursSpecification\":[{\"@type\":\"OpeningHoursSpecification\",\"dayOfWeek\":[\"https:\\\/\\\/schema.org\\\/Monday\"],\"opens\":\"09:00\",\"closes\":\"17:00\"},{\"@type\":\"OpeningHoursSpecification\",\"dayOfWeek\":[\"https:\\\/\\\/schema.org\\\/Tuesday\"],\"opens\":\"09:00\",\"closes\":\"17:00\"},{\"@type\":\"OpeningHoursSpecification\",\"dayOfWeek\":[\"https:\\\/\\\/schema.org\\\/Wednesday\"],\"opens\":\"09:00\",\"closes\":\"17:00\"},{\"@type\":\"OpeningHoursSpecification\",\"dayOfWeek\":[\"https:\\\/\\\/schema.org\\\/Thursday\"],\"opens\":\"09:00\",\"closes\":\"17:00\"},{\"@type\":\"OpeningHoursSpecification\",\"dayOfWeek\":[\"https:\\\/\\\/schema.org\\\/Friday\"],\"opens\":\"09:00\",\"closes\":\"17:00\"},{\"@type\":\"OpeningHoursSpecification\",\"dayOfWeek\":[\"https:\\\/\\\/schema.org\\\/Saturday\"],\"opens\":\"09:00\",\"closes\":\"17:00\"},{\"@type\":\"OpeningHoursSpecification\",\"dayOfWeek\":[\"https:\\\/\\\/schema.org\\\/Sunday\"],\"opens\":\"09:00\",\"closes\":\"17:00\"}]},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.smartercyberassurance.com\\\/#organization\",\"name\":\"#Smarter Cyber Assurance\",\"description\":\"Identify, Educate, Safeguard\",\"url\":\"https:\\\/\\\/www.smartercyberassurance.com\\\/\",\"telephone\":\"+443303031444\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.smartercyberassurance.com\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/jpeg.jpg\",\"@id\":\"https:\\\/\\\/www.smartercyberassurance.com\\\/#organizationLogo\",\"width\":862,\"height\":361},\"image\":{\"@id\":\"https:\\\/\\\/www.smartercyberassurance.com\\\/#organizationLogo\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.smartercyberassurance.com\\\/#webpage\",\"url\":\"https:\\\/\\\/www.smartercyberassurance.com\\\/\",\"name\":\"Master Cyber Assurance with Our Easy-to-Use Cyber Risk Engine\",\"description\":\"Explore the importance of Cyber Assurance in safeguarding digital assets with our expert insights and strategic approaches.\",\"inLanguage\":\"en-GB\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.smartercyberassurance.com\\\/#website\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.smartercyberassurance.com\\\/#breadcrumblist\"},\"datePublished\":\"2019-12-05T12:51:22+00:00\",\"dateModified\":\"2026-03-02T16:59:09+00:00\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.smartercyberassurance.com\\\/#website\",\"url\":\"https:\\\/\\\/www.smartercyberassurance.com\\\/\",\"name\":\"Smarter Cyber Assurance\",\"description\":\"Identify, Educate, Safeguard\",\"inLanguage\":\"en-GB\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.smartercyberassurance.com\\\/#organization\"}}]}\n\t\t<\/script>\n\t\t<!-- All in One SEO Pro -->\r\n\t\t<title>Master Cyber Assurance with Our Easy-to-Use Cyber Risk Engine<\/title>\n\n","aioseo_head_json":{"title":"Master Cyber Assurance with Our Easy-to-Use Cyber Risk Engine","description":"Explore the importance of Cyber Assurance in safeguarding digital assets with our expert insights and strategic approaches.","canonical_url":"https:\/\/www.smartercyberassurance.com\/","robots":"max-image-preview:large","keywords":"","webmasterTools":{"miscellaneous":""},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"BreadcrumbList","@id":"https:\/\/www.smartercyberassurance.com\/#breadcrumblist","itemListElement":[{"@type":"ListItem","@id":"https:\/\/www.smartercyberassurance.com#listItem","position":1,"name":"Home","item":"https:\/\/www.smartercyberassurance.com","nextItem":{"@type":"ListItem","@id":"https:\/\/www.smartercyberassurance.com\/#listItem","name":"Cyber Assurance Risk Analysis Tool"}},{"@type":"ListItem","@id":"https:\/\/www.smartercyberassurance.com\/#listItem","position":2,"name":"Cyber Assurance Risk Analysis Tool","previousItem":{"@type":"ListItem","@id":"https:\/\/www.smartercyberassurance.com#listItem","name":"Home"}}]},{"@type":"LocalBusiness","@id":"https:\/\/www.smartercyberassurance.com\/#localbusiness","name":"#Smarter Cyber Assurance","brand":{"@id":"https:\/\/www.smartercyberassurance.com\/#organization"},"url":"https:\/\/www.smartercyberassurance.com\/","image":"https:\/\/www.smartercyberassurance.com\/wp-content\/uploads\/2023\/06\/jpeg.jpg","logo":"https:\/\/www.smartercyberassurance.com\/#logo","telephone":"+443303031444","openingHoursSpecification":[{"@type":"OpeningHoursSpecification","dayOfWeek":["https:\/\/schema.org\/Monday"],"opens":"09:00","closes":"17:00"},{"@type":"OpeningHoursSpecification","dayOfWeek":["https:\/\/schema.org\/Tuesday"],"opens":"09:00","closes":"17:00"},{"@type":"OpeningHoursSpecification","dayOfWeek":["https:\/\/schema.org\/Wednesday"],"opens":"09:00","closes":"17:00"},{"@type":"OpeningHoursSpecification","dayOfWeek":["https:\/\/schema.org\/Thursday"],"opens":"09:00","closes":"17:00"},{"@type":"OpeningHoursSpecification","dayOfWeek":["https:\/\/schema.org\/Friday"],"opens":"09:00","closes":"17:00"},{"@type":"OpeningHoursSpecification","dayOfWeek":["https:\/\/schema.org\/Saturday"],"opens":"09:00","closes":"17:00"},{"@type":"OpeningHoursSpecification","dayOfWeek":["https:\/\/schema.org\/Sunday"],"opens":"09:00","closes":"17:00"}]},{"@type":"Organization","@id":"https:\/\/www.smartercyberassurance.com\/#organization","name":"#Smarter Cyber Assurance","description":"Identify, Educate, Safeguard","url":"https:\/\/www.smartercyberassurance.com\/","telephone":"+443303031444","logo":{"@type":"ImageObject","url":"https:\/\/www.smartercyberassurance.com\/wp-content\/uploads\/2023\/06\/jpeg.jpg","@id":"https:\/\/www.smartercyberassurance.com\/#organizationLogo","width":862,"height":361},"image":{"@id":"https:\/\/www.smartercyberassurance.com\/#organizationLogo"}},{"@type":"WebPage","@id":"https:\/\/www.smartercyberassurance.com\/#webpage","url":"https:\/\/www.smartercyberassurance.com\/","name":"Master Cyber Assurance with Our Easy-to-Use Cyber Risk Engine","description":"Explore the importance of Cyber Assurance in safeguarding digital assets with our expert insights and strategic approaches.","inLanguage":"en-GB","isPartOf":{"@id":"https:\/\/www.smartercyberassurance.com\/#website"},"breadcrumb":{"@id":"https:\/\/www.smartercyberassurance.com\/#breadcrumblist"},"datePublished":"2019-12-05T12:51:22+00:00","dateModified":"2026-03-02T16:59:09+00:00"},{"@type":"WebSite","@id":"https:\/\/www.smartercyberassurance.com\/#website","url":"https:\/\/www.smartercyberassurance.com\/","name":"Smarter Cyber Assurance","description":"Identify, Educate, Safeguard","inLanguage":"en-GB","publisher":{"@id":"https:\/\/www.smartercyberassurance.com\/#organization"}}]},"og:locale":"en_GB","og:site_name":"Smarter Cyber Assurance - Identify, Educate, Safeguard","og:type":"website","og:title":"Master Cyber Assurance with Our Easy-to-Use Cyber Risk Engine","og:description":"Explore the importance of Cyber Assurance in safeguarding digital assets with our expert insights and strategic approaches.","og:url":"https:\/\/www.smartercyberassurance.com\/","og:image":"https:\/\/www.smartercyberassurance.com\/wp-content\/uploads\/2021\/02\/cropped-watermark.jpg","og:image:secure_url":"https:\/\/www.smartercyberassurance.com\/wp-content\/uploads\/2021\/02\/cropped-watermark.jpg","og:image:width":512,"og:image:height":512,"twitter:card":"summary_large_image","twitter:title":"Master Cyber Assurance with Our Easy-to-Use Cyber Risk Engine","twitter:description":"Explore the importance of Cyber Assurance in safeguarding digital assets with our expert insights and strategic approaches.","twitter:image":"https:\/\/www.smartercyberassurance.com\/wp-content\/uploads\/2021\/02\/cropped-watermark.jpg"},"aioseo_meta_data":{"post_id":"8","title":"Master Cyber Assurance with Our Easy-to-Use Cyber Risk Engine","description":"Explore the importance of Cyber Assurance in safeguarding digital assets with our expert insights and strategic approaches.","keywords":null,"keyphrases":{"focus":{"keyphrase":"Cyber Assurance","score":57,"analysis":{"keyphraseInTitle":{"score":9,"maxScore":9,"error":0},"keyphraseInDescription":{"score":9,"maxScore":9,"error":0},"keyphraseLength":{"score":9,"maxScore":9,"error":0,"length":2},"keyphraseInIntroduction":{"score":3,"maxScore":9,"error":1},"keyphraseInSubHeadings":{"score":3,"maxScore":9,"error":1},"keyphraseInImageAlt":{"score":3,"maxScore":9,"error":1},"keywordDensity":{"score":0,"type":"low","maxScore":9,"error":1}}},"additional":[]},"primary_term":null,"canonical_url":null,"og_title":null,"og_description":null,"og_object_type":"website","og_image_type":"default","og_image_url":null,"og_image_width":null,"og_image_height":null,"og_image_custom_url":null,"og_image_custom_fields":null,"og_video":"","og_custom_url":null,"og_article_section":null,"og_article_tags":null,"twitter_use_og":false,"twitter_card":"default","twitter_image_type":"default","twitter_image_url":null,"twitter_image_custom_url":null,"twitter_image_custom_fields":null,"twitter_title":null,"twitter_description":null,"schema":{"blockGraphs":[],"customGraphs":[],"default":{"data":{"Article":[],"Course":[],"Dataset":[],"FAQPage":[],"Movie":[],"Person":[],"Product":[],"ProductReview":[],"Car":[],"Recipe":[],"Service":[],"SoftwareApplication":[],"WebPage":[]},"graphName":"WebPage","isEnabled":true},"graphs":[]},"schema_type":"default","schema_type_options":null,"pillar_content":false,"robots_default":true,"robots_noindex":false,"robots_noarchive":false,"robots_nosnippet":false,"robots_nofollow":false,"robots_noimageindex":false,"robots_noodp":false,"robots_notranslate":false,"robots_max_snippet":"-1","robots_max_videopreview":"-1","robots_max_imagepreview":"large","priority":null,"frequency":"default","local_seo":null,"seo_analyzer_scan_date":"2026-03-02 17:01:21","breadcrumb_settings":null,"limit_modified_date":false,"reviewed_by":"0","open_ai":null,"ai":{"faqs":[],"keyPoints":[],"titles":["Enhance Cyber Assurance: Comprehensive Online Risk Assessment Tool","Master Cyber Assurance with Our Easy-to-Use Cyber Risk Engine","Build Your Cyber Assurance Strategy: Trusted Online Assessment Solution","Identify and Mitigate Risks with Our Cyber Assurance Platform","Strengthen Your Security Posture Through Expert Cyber Assurance Evaluation"],"descriptions":["Explore the importance of Cyber Assurance in safeguarding digital assets with our expert insights and strategic approaches.","Learn how effective Cyber Assurance practices help organizations identify vulnerabilities, assess risks, and strengthen security measures.","Discover key methodologies in Cyber Assurance to improve your organization's cyber resilience and protect critical information.","Gain a clear understanding of Cyber Assurance's role in comprehensive cybersecurity management and threat mitigation.","Enhance your cybersecurity strategy with proven Cyber Assurance principles that ensure robust protection and risk reduction."],"socialPosts":{"email":[],"linkedin":[],"twitter":[],"facebook":[],"instagram":[]}},"created":"2025-09-16 09:16:30","updated":"2026-03-02 17:55:28"},"aioseo_breadcrumb":"<div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.smartercyberassurance.com\" title=\"Home\">Home<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">&raquo;<\/span><span class=\"aioseo-breadcrumb\">\n\tCyber Assurance Risk Analysis Tool\n<\/span><\/div>","aioseo_breadcrumb_json":[{"label":"Home","link":"https:\/\/www.smartercyberassurance.com"},{"label":"Cyber Assurance Risk Analysis Tool","link":"https:\/\/www.smartercyberassurance.com\/"}],"_links":{"self":[{"href":"https:\/\/www.smartercyberassurance.com\/index.php\/wp-json\/wp\/v2\/pages\/8","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.smartercyberassurance.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.smartercyberassurance.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.smartercyberassurance.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.smartercyberassurance.com\/index.php\/wp-json\/wp\/v2\/comments?post=8"}],"version-history":[{"count":1,"href":"https:\/\/www.smartercyberassurance.com\/index.php\/wp-json\/wp\/v2\/pages\/8\/revisions"}],"predecessor-version":[{"id":553,"href":"https:\/\/www.smartercyberassurance.com\/index.php\/wp-json\/wp\/v2\/pages\/8\/revisions\/553"}],"wp:attachment":[{"href":"https:\/\/www.smartercyberassurance.com\/index.php\/wp-json\/wp\/v2\/media?parent=8"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}