US Navy Veteran transitioning to cybersecurity. Background in digital marketing with 16+ years of experience, now applying my strategic and analytical skills to cloud security challenges.
Business: Small IT services company with 25 employees
Services: Managed IT services and custom software development
Revenue: $2.5 million annually
Infrastructure: Cloud-based systems, on-premise file server, employee laptops, VPN, public website
| Category | Risk Count | Highest Rating |
|---|---|---|
| Data Protection | 2 | Extreme |
| Endpoint Security | 1 | High |
| Access Control | 2 | Medium |
| Business Continuity | 1 | High |
| Third-Party Risk | 1 | High |
| Status | Count |
|---|---|
| Not Started | 2 |
| Planning Phase | 3 |
| In Progress | 2 |
| Completed | 0 |
Unauthorized access to client data stored on company servers or cloud systems
Assets Affected: File server, cloud storage, employee devices with client data
Likelihood: Possible (clients' sensitive data makes the company a target)
Severity: Intolerable (could result in major reputational damage and legal liability)
Basic firewall, standard antivirus, password policy
Effectiveness: Partially Effective
Risk Owner: IT Director
Action Owner: Security Administrator
Implementation Date: Within 60 days
Review Date: Quarterly
Status: Planning Phase
Systems encrypted by ransomware resulting in business disruption and potential data loss
Assets Affected: File server, employee workstations, business systems
Likelihood: Probable (small IT companies are common targets)
Severity: Undesirable (could cause significant downtime)
Basic antivirus, inconsistent backups
Effectiveness: Ineffective
Risk Owner: IT Director
Action Owner: Systems Administrator
Implementation Date: Within 30 days
Review Date: Monthly
Status: Not Started
Unauthorized access to company systems via compromised remote access solutions
Assets Affected: VPN, remote desktop services, cloud applications
Likelihood: Possible
Severity: Tolerable
Basic VPN with password authentication
Effectiveness: Partially Effective
Risk Owner: IT Manager
Action Owner: Network Administrator
Implementation Date: Within 45 days
Review Date: Quarterly
Status: Planning Phase
Data breach or service disruption due to security incident at a third-party vendor
Assets Affected: Cloud services, vendor-hosted applications, shared data
Likelihood: Possible
Severity: Undesirable
Basic vendor contracts with minimal security requirements
Effectiveness: Ineffective
Risk Owner: Operations Director
Action Owner: Procurement Manager
Implementation Date: Within 90 days
Review Date: Bi-annually
Status: Not Started
| LOW (0) | MEDIUM (1) | HIGH (2) | EXTREME (3) |
|---|---|---|---|
| ACCEPTABLE OK TO PROCEED |
ALARP TAKE MITIGATION EFFORTS |
GENERALLY UNACCEPTABLE SEEK SUPPORT |
INTOLERABLE PLACE EVENT ON HOLD |
| LIKELIHOOD vs SEVERITY | ||||
|---|---|---|---|---|
| ACCEPTABLE | TOLERABLE | UNDESIRABLE | INTOLERABLE | |
| IMPROBABLE (Risk is unlikely to occur) |
LOW (1) | LOW (4) | MEDIUM (6) | HIGH (10) |
| POSSIBLE (Risk will likely occur) |
LOW (2) | MEDIUM (5) CS-003 |
HIGH (8) CS-004 |
EXTREME (11) CS-001 |
| PROBABLE (Risk will occur) |
MEDIUM (3) | HIGH (7) | HIGH (9) CS-002 |
EXTREME (12) |
The company's risks are distributed across the matrix as shown above. The following risks require immediate attention:
| Priority | Action Item | Risk ID | Owner | Due Date | Status |
|---|---|---|---|---|---|
| 1 | Implement comprehensive backup solution with offline copies | CS-002 | Systems Administrator | May 11, 2025 | Not Started |
| 2 | Deploy advanced endpoint protection on all devices | CS-002 | Systems Administrator | May 11, 2025 | Not Started |
| 3 | Implement encryption for all client data at rest and in transit | CS-001 | Security Administrator | June 10, 2025 | Planning |
| 4 | Establish strict access controls with least privilege principle | CS-001 | Security Administrator | June 10, 2025 | Planning |
| 5 | Implement multi-factor authentication for all remote access | CS-003 | Network Administrator | May 26, 2025 | Planning |
| 6 | Conduct phishing awareness training for all staff | CS-002 | Security Administrator | May 11, 2025 | Not Started |
| 7 | Develop vendor security assessment process | CS-004 | Procurement Manager | July 10, 2025 | Not Started |
| Resource | Cost Estimate | Timeline | Risk Addressed |
|---|---|---|---|
| Backup solution | $5,000 | 2 weeks to implement | CS-002 |
| Advanced Endpoint Protection | $4,000 annually | 1 week to deploy | CS-002 |
| Encryption solution | $7,500 | 3 weeks to implement | CS-001 |
| Multi-factor authentication | $2,500 annually | 1 week to configure | CS-003 |
| Security awareness training | $1,500 annually | 1 day per quarter | CS-002 |
| Staff time for implementation | 160 hours (approximate) | Spread over 90 days | All risks |
| Timeframe | Actions |
|---|---|
| Immediate (1-2 weeks) |
Begin backup solution implementation
Start endpoint protection deployment
|
| Short-term (30 days) |
Complete ransomware protection measures
Conduct initial phishing awareness training
Start MFA implementation
|
| Medium-term (60 days) |
Complete encryption implementation
Finish access control improvements
Complete MFA rollout
|
| Long-term (90 days) |
Implement vendor security assessment process
Update vendor contracts
Begin ongoing security reviews
|