7W Cybersecurity Assessment

In today’s rapidly evolving digital landscape, safeguarding your organization’s assets, data, and reputation is paramount. Seventh Wall hasĀ  crafted this assessment form to evaluate the robustness of your cybersecurity posture. By answering the questions below, you’ll gain insights into potential vulnerabilities and areas of improvement. Together, with our expertise, we can chart a path to a safer, more secure digital future for your enterprise. Your vigilance today is the cornerstone of tomorrow’s security.

Optimal spam filters adeptly sieve out malicious emails while ensuring legitimate communications remain unaffected. Phishing emails, masquerading as genuine communications, remain the predominant initial attack vector for cybercriminals. Effective spam solutions can lead to substantial productivity gains, reducing clutter and associated risks.

Given the primacy of phishing in cyber-attack strategies, continuous awareness and training are indispensable. Even with robust spam countermeasures, there's always a risk of threats bypassing these defenses. Periodic test campaigns serve as invaluable rehearsal, honing your team's discernment without the ramifications of an actual breach.

A firewall, sometimes termed a security gateway or appliance, should be capable of signaling both functional and security-centric events, including crucial software updates. Essentially, envision your network as an extensive digital ecosystem linking various devices; it necessitates the same vigilance as any single computer. It's worth noting that typical ISPs don't extend the level of oversight and governance referenced herein.

The IRP is specifically tailored to address and mitigate the immediate impacts of a cyber intrusion, while the BCP is dedicated to restoring and maintaining operational continuity post-incident. Consider this: should your enterprise IT infrastructure falter unexpectedly, is your organization equipped to persevere? More pointedly, is there an accessible, structured plan in place for your personnel to navigate such crises? An adept IRP aims to constrict the scope and fiscal ramifications of a breach, whereas a BCP serves to safeguard the financial stability and sustainability of the enterprise.

Also labeled as 2FA, this mechanism requires a combination of username, password, and a transient code for authentication. If a breach into any of your platforms would be deemed critical, it's imperative that MFA is operational on said platform. This remains one of the paramount proactive security controls available.


Often referred to as MDR or XDR, it's vital that all enterprise-grade workstations, laptops, and servers integrate this solution. Compliance regulations and cyber insurance stipulations frequently necessitate a robust EDR deployment. Note: An EDR in "detect only mode" will identify threats but requires human intervention for mitigation. If your EDR isn't configured and overseen correctly, please answer "no" to this inquiry.


An immutable backup is a sacrosanct digital repository, impervious to alteration, deletion, or modification. Key data sources, from workstations to cloud solutions like Microsoft 365 or Google Workspace, need immutable backup mechanisms. Be wary: traditional backup mediums, like external drives, are no longer deemed "immutable" by discerning insurers due to the pervasive threat of ransomware. Authentic backups must be isolated from your primary network and maintain comprehensive versioning capabilities.