Raising the Bar in Cybersecurity Awareness and Information Security

Infosec Check helps every business size: from small to enterprise size organizations to properly addressing security risk awareness and threat mitigation.

Learn More

Infosec Check serves as an awareness checkpoint for business and individuals

to check their information security awareness against best practices and authoritative guidelines.

Step 1

Take our infosec quiz

The first step to the process confidentiality agreements and to take a high level assessment quiz.  This quiz may include in depth materials and aspects not suited to home users but give it a try!

Take the Infosec Check Quiz

Step 2

confidential feedback

After you complete the quiz, schedule a confidential feedback "Quiz Results Follow up" session.  This session should only be scheduled after Step 1 where you complete the quiz and select a code pin for review.

Schedule Feedback

Step 3

schedule engagement

After you complete the quiz, complete a confidential feedback session to determine your posture, MainBoard Consulting is ready to serve your security needs. Schedule an engagement session here.

Schedule Engagement

Infosec Check Framework (NIST Cybersecurity Framework)


Indentify

Helping you find what you need to protect in the first step.  Do you have all connections inventoried? 


Protect

Up next is to protect what's in place. Developing a proper strategy to secure existing vulnerabilities, protect the ongoing operations and keep up to date with those standards.


Detect

How do you know when something is wrong when the tactics used by the criminal include evasion?  Your expert or your employee needs to be trained to think like the criminal, your  tools, countermeasures and systems need to be able to help you identify when you are under attack.


Respond

Don't panic when an alert goes off.  This process consists of proper planning, communication, and a procedural guidelines strategic execution to help mitigate the problem. 


Recover

Get back to business, mitigate the losses and figure out what you could have done better, test and implement.  There is no perfect secure system, process or expert that can keep you perfectly protected, it simply doesn't exist yet.  So, we do what is best and plan for when it happens.