Jose Felix Cruz

Jose Felix Cruz

US Navy Veteran transitioning to cybersecurity. Background in digital marketing with 16+ years of experience, now applying my strategic and analytical skills to cloud security challenges.

TechSecure Solutions - Cybersecurity Risk Assessment

Company Profile

Business: Small IT services company with 25 employees

Services: Managed IT services and custom software development

Revenue: $2.5 million annually

Infrastructure: Cloud-based systems, on-premise file server, employee laptops, VPN, public website

Dashboard
Risk Register
Risk Matrix
Action Plan

Risk Assessment Dashboard

Total Risks

7

Extreme Risks

1

High Risks

3

Medium Risks

3

Top Risks by Category

Category Risk Count Highest Rating
Data Protection 2 Extreme
Endpoint Security 1 High
Access Control 2 Medium
Business Continuity 1 High
Third-Party Risk 1 High

Implementation Status

Status Count
Not Started 2
Planning Phase 3
In Progress 2
Completed 0

Risk Register

CS-001: Client Data Breach
Extreme (11)

Risk Description

Unauthorized access to client data stored on company servers or cloud systems

Assets Affected: File server, cloud storage, employee devices with client data

Risk Assessment

Likelihood: Possible (clients' sensitive data makes the company a target)

Severity: Intolerable (could result in major reputational damage and legal liability)

Existing Controls

Basic firewall, standard antivirus, password policy

Effectiveness: Partially Effective

Required Actions

Implement encryption for all client data at rest and in transit
Establish strict access controls with least privilege principle
Deploy advanced threat protection solutions
Conduct regular security audits of systems with client data

Ownership & Timeline

Risk Owner: IT Director

Action Owner: Security Administrator

Implementation Date: Within 60 days

Review Date: Quarterly

Status: Planning Phase

25%
CS-002: Ransomware Attack
High (9)

Risk Description

Systems encrypted by ransomware resulting in business disruption and potential data loss

Assets Affected: File server, employee workstations, business systems

Risk Assessment

Likelihood: Probable (small IT companies are common targets)

Severity: Undesirable (could cause significant downtime)

Existing Controls

Basic antivirus, inconsistent backups

Effectiveness: Ineffective

Required Actions

Implement comprehensive backup solution with offline copies
Deploy advanced endpoint protection on all devices
Conduct phishing awareness training for all staff
Create incident response plan for ransomware events

Ownership & Timeline

Risk Owner: IT Director

Action Owner: Systems Administrator

Implementation Date: Within 30 days

Review Date: Monthly

Status: Not Started

0%
CS-003: Remote Access Compromise
Medium (5)

Risk Description

Unauthorized access to company systems via compromised remote access solutions

Assets Affected: VPN, remote desktop services, cloud applications

Risk Assessment

Likelihood: Possible

Severity: Tolerable

Existing Controls

Basic VPN with password authentication

Effectiveness: Partially Effective

Required Actions

Implement multi-factor authentication for all remote access
Establish VPN session timeouts
Deploy logging and monitoring for remote access attempts

Ownership & Timeline

Risk Owner: IT Manager

Action Owner: Network Administrator

Implementation Date: Within 45 days

Review Date: Quarterly

Status: Planning Phase

25%
CS-004: Third-Party Vendor Breach
High (8)

Risk Description

Data breach or service disruption due to security incident at a third-party vendor

Assets Affected: Cloud services, vendor-hosted applications, shared data

Risk Assessment

Likelihood: Possible

Severity: Undesirable

Existing Controls

Basic vendor contracts with minimal security requirements

Effectiveness: Ineffective

Required Actions

Develop vendor security assessment process
Update vendor contracts with security requirements
Implement vendor access monitoring
Create vendor incident response procedures

Ownership & Timeline

Risk Owner: Operations Director

Action Owner: Procurement Manager

Implementation Date: Within 90 days

Review Date: Bi-annually

Status: Not Started

0%

Risk Assessment Matrix

Risk Rating Key

LOW (0) MEDIUM (1) HIGH (2) EXTREME (3)
ACCEPTABLE
OK TO PROCEED
ALARP
TAKE MITIGATION EFFORTS
GENERALLY UNACCEPTABLE
SEEK SUPPORT
INTOLERABLE
PLACE EVENT ON HOLD

Risk Calculation Matrix

LIKELIHOOD vs SEVERITY
ACCEPTABLE TOLERABLE UNDESIRABLE INTOLERABLE
IMPROBABLE
(Risk is unlikely to occur)
LOW (1) LOW (4) MEDIUM (6) HIGH (10)
POSSIBLE
(Risk will likely occur)
LOW (2) MEDIUM (5)
CS-003
HIGH (8)
CS-004
EXTREME (11)
CS-001
PROBABLE
(Risk will occur)
MEDIUM (3) HIGH (7) HIGH (9)
CS-002
EXTREME (12)

Current Risk Distribution

The company's risks are distributed across the matrix as shown above. The following risks require immediate attention:

Action Plan

Prioritized Action Items

Priority Action Item Risk ID Owner Due Date Status
1 Implement comprehensive backup solution with offline copies CS-002 Systems Administrator May 11, 2025 Not Started
2 Deploy advanced endpoint protection on all devices CS-002 Systems Administrator May 11, 2025 Not Started
3 Implement encryption for all client data at rest and in transit CS-001 Security Administrator June 10, 2025 Planning
4 Establish strict access controls with least privilege principle CS-001 Security Administrator June 10, 2025 Planning
5 Implement multi-factor authentication for all remote access CS-003 Network Administrator May 26, 2025 Planning
6 Conduct phishing awareness training for all staff CS-002 Security Administrator May 11, 2025 Not Started
7 Develop vendor security assessment process CS-004 Procurement Manager July 10, 2025 Not Started

Resource Requirements

Resource Cost Estimate Timeline Risk Addressed
Backup solution $5,000 2 weeks to implement CS-002
Advanced Endpoint Protection $4,000 annually 1 week to deploy CS-002
Encryption solution $7,500 3 weeks to implement CS-001
Multi-factor authentication $2,500 annually 1 week to configure CS-003
Security awareness training $1,500 annually 1 day per quarter CS-002
Staff time for implementation 160 hours (approximate) Spread over 90 days All risks

Implementation Timeline

Timeframe Actions
Immediate (1-2 weeks)
Begin backup solution implementation
Start endpoint protection deployment
Short-term (30 days)
Complete ransomware protection measures
Conduct initial phishing awareness training
Start MFA implementation
Medium-term (60 days)
Complete encryption implementation
Finish access control improvements
Complete MFA rollout
Long-term (90 days)
Implement vendor security assessment process
Update vendor contracts
Begin ongoing security reviews