Enter a domain to get the Cyber Score

By clicking "Get Score" you are agreeing to our Terms of Service and Privacy Policy.

Loading score data, just a moment... (This may take up to a minute.)

Oops, look's like there was an error with your URL - please try again.

Cyber Score Card

Shield graphic with PCB wires and nodes flowing out Iceberg Cyber Logo


Email Security

Email Spoofing Protection
Email Breaches
Secure Email Gateway

Website Security

Website Security Settings
WordPress Plugin Security
Website Encryption
Website Firewall

Score Details

  • Email Spoofing Protection
    You shouldn't be seeing this text >:C
  • Email Breaches
    No peeking
  • Breached List:
    Shh, I am full of secrets
  • Secure Email Gateway
    If you want to see more,
  • Website Security Settings
    then you'll need to log in like everyone else!
  • WordPress Plugin Security
    There was definitely a better way to hide this element
  • Website Encryption
    But you see it's Friday,
  • Website Firewall
    and this still does the trick. Now re-hide my parent element!

Understanding your Cyber Score

For small businesses, the digital landscape presents vast opportunities but also potential pitfalls. Cyber criminals often target small businesses knowing they may lack the necessary resources or personnel to maintain robust cybersecurity measures. Yet, simplicity and cost-effectiveness are attainable. Continuous cyber risk monitoring is an investment in proactive protection that can save substantial costs in the long run. It's the digital equivalent of preventative healthcare - far more cost-effective and less disruptive than dealing with a full-blown illness. By implementing such measures, small businesses not only secure their operations and customer data but also demonstrate a commitment to their clients' safety, which builds trust and reputation.

Email Spoofing Protection

Imagine your email as a credit card. SPF, DKIM, and DMARC are like the pin, signature, and security chip, preventing others from misusing it. Without these, anyone could impersonate your business email, tricking your clients or staff, damaging your reputation, and possibly causing financial harm. These tools help keep your business communications secure and trustworthy.

- SPF (Sender Policy Framework): It's like an entry pass for sending mail from your domain. SPF lets you define which mail servers are allowed to send mail for your domain. When you receive an email, your server checks the SPF record to ensure it's sent from an authorized server. This stops others from sending emails pretending to be from your domain, keeping your reputation intact.

- DKIM (DomainKeys Identified Mail): This is like a digital signature for your emails. It uses encryption to confirm that the email is actually from your domain and hasn't been tampered with during transit. It adds an extra layer of trust that the email is genuinely from you.

- DMARC (Domain-based Message Authentication Reporting and Conformance): This is like a security guard checking both the pass and signature. It uses SPF and DKIM to verify the email, and lets you tell receiving servers what to do if the checks don't pass - like rejecting the email. It also reports back to you about any failures.

Email Breaches

Consider your employee's account details as keys to your office. When they sign up for various online services (like social media or shopping), they're making copies of those keys. If these services get hacked (a third-party data breach), those keys can fall into the wrong hands.

If these stolen keys (credentials) are your employee's, it's like a thief has keys to your office. They could access sensitive information, manipulate data, or even lock you out of your own systems. The risk is not just financial loss, but also potential damage to your business reputation.

Just as you wouldn't want a stranger to have keys to your office, you don't want your business credentials available to cyber criminals. Regular credential changes, unique passwords, multi-factor authentication, and monitoring are crucial practices to prevent unauthorized access, protect your business data, and maintain trust with your clients.

Secure Email Gateway

A Secure Email Gateway is like your firm's personal mail inspector, scanning every email for threats before it reaches your inboxes. It's crucial because it protects against phishing, where criminals disguise themselves as trustworthy entities to trick employees into revealing sensitive data or downloading harmful software. It's like preventing a thief from entering your office in disguise. If successful, a phishing attack can lead to significant data loss, financial damage, and reputational harm. Therefore, a Secure Email Gateway is a vital line of defense, ensuring your email communication remains secure and your business's integrity is upheld.

Website Security Settings

HTTP Security settings like Content Security Policy (CSP) and X-Frame Options are your website's security guards. CSP allows you to control what content (like scripts or images) can load on your website, preventing unwanted malicious activity. X-Frame Options protects against "clickjacking", where a user is tricked into clicking something harmful. These settings are crucial because an unprotected website can be manipulated by cybercriminals, potentially damaging your business operations, finances, and reputation. Just like you wouldn't leave your physical office unsecured, these settings ensure your online 'office' is safe, guarding your business in the digital world.

WordPress Plugin Security

Think of WordPress plugins like the tools in your office. Just as outdated, faulty tools can cause accidents or inefficiency, outdated plugins can expose your website to cyber threats. Hackers often exploit known vulnerabilities in older versions. Keeping plugins up-to-date is like maintaining your office tools, ensuring they're in the best shape to serve their purpose. Regular plugin monitoring and updates are crucial because a compromised website can lead to data loss, operational disruption, and damaged business reputation. So, just as you maintain your office, maintaining your WordPress plugins helps ensure your digital 'office' is safe and secure.

Website Encryption

SSL certificates are like secret handshakes between your website and your visitors' browsers. They ensure that the information exchanged is encrypted, making it unreadable to anyone else. Without SSL, data transmitted is like a postcard, visible to anyone who intercepts it. But with SSL, it's like a sealed letter, protecting the information from prying eyes. This is crucial for your business because an unencrypted website could expose sensitive customer information or even your business data to cybercriminals. So, having an SSL certificate not only secures your website but also builds trust with your visitors, reassuring them that their data is safe with you.

Website Firewall

A Web Application Firewall (WAF) is like a bouncer at the door of your website, deciding who gets in. It closely examines incoming traffic, blocking any suspicious or malicious requests, such as attempts to exploit weaknesses in your site or overload it with traffic. Without a WAF, your website could be vandalized, taken down, or used to attack your clients. It's crucial because it not only protects your website from harmful attacks but also ensures the safety of your clients when they visit your site. Thus, a WAF is a critical shield, safeguarding your online business presence from cyber threats.

Iceberg’s Cyber Scores are made possible by the vision and leadership of the team at https://haveibeenpwned.com/.