• Put your data and network security to the test.

    Cyber crime has become increasingly frequent, complex and costly. In the wake of an event, would you know who to call, how to react, or what to tell your employees, customers and media? Could your organization handle the potential financial and reputational impact of a lawsuit? What could your company be doing to better manage the risk? Take our four-part questionnaire to find out. Est. completion time: 5 minutes

    The Cyber Risk
    Pressure Test

    Start Button
    Disclaimer: Please note our use of “company” in this quiz includes all types of organizations such as non-profits and public entities in addition to businesses. The information you provide while taking the Cyber Risk Pressure Test will only be used in an aggregate format to enhance our services to the users; it will not be used to identify your company or your company’s risk in any particular area. We will not sell or market your information to any third party. We reserve the right to change the data or output at any time without notice. Your use of this tool does not amend, or otherwise affect, the provisions or coverage of any insurance policy or bond issued by Travelers or any of its subsidiaries, nor is it a representation that coverage does or does not exist for any particular claim or loss under any such policy or bond. Coverage depends on the facts and circumstances involved in the claim or loss, all applicable policy or bond provisions, and any applicable law.
  • Section 1 Icon
    Section 2 Icon
    Section 3 Icon
    Section 1 Icon
    Section 2 Icon
    Section 3 Icon

    Identifying the systems and information most critical to your operations, as well as who has access to them, is the first step in protecting your company against cyber threats.

    Section 1
    Next button
  • Section 1 Icon
    Section 2 Icon
    Section 3 Icon
    Section 1 Icon
    Section 2 Icon
    Section 3 Icon

    Taking the necessary measures to protect your company against a data breach or attack is an important component of any cyber security strategy.

    Section 2
    Next button
  • Section 1 Icon
    Section 2 Icon
    Section 3 Icon
    Section 1 Icon
    Section 2 Icon
    Section 3 Icon

    Remaining prepared to respond to, mitigate and recover from a data breach or cyber attack is a key component in a successful cyber risk management strategy.

    Section 3
    Next button
  • Just one last thing...

    You’re almost done. The last few questions will allow us to show how your results compare to similar businesses. They will not affect your risk assessment and your personally identifiable information will not be saved or sold to any third parties.

    Results button