1. Home

Help

What is malware (malicious software)?

Answer Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.   Background Malware is designed to covertly operate on a compromised system without the consent of the user, such as:Trojan Horse – disguised in what appears to be legitimate s…

How do I update an expired assessment/scan?

Answer To update an expired questionnaire select the option to ‘Update SAQ 3.0’ on the location you wish to update.   Background Some of the supporting documents or certificates that you upload to your SAQ may have expiry dates on them. Once an expiry date has passed, the SAQ will be classe…

What does vulnerability management mean?

Answer A security practice specifically designed to proactively mitigate or prevent the exploitation of IT vulnerabilities which exist in a system or organization. Background Vulnerability management is the practice of knowing what vulnerabilities (either software defects that require patches to…

Will the Cyber Safe Check impact my systems while it does the scan?

Answer The Cyber Safe Check is a non-intrusive external scan on the IP address or domain that you have provided and given consent for us to scan. It should have no adverse effect on your systems while the scan is undertaken. Background The Cyber Safe Check will typically take place within the 24…

What is encryption?

Answer The process of converting information or data into a code, especially to prevent unauthorized access. Background Encryption is a term for the method by which data is converted from a readable form to an encoded version that can only be decoded by another entity if they have access to a dec…

Why have I received an invitation to complete a Cyber Safe Check assessment scan?

Answer You have received an invitation because your customer would like you to complete this assessment and share this with them in order to view your results.  Background Your customer may need you to complete this assessment. This may be a mandatory requirement as part of their supplier select…

What is phishing?

Answer Phishing is a form of fraud in which an attacker masquerades as a reputable entity or person in email or other communication channels. Background Phishing emails distribute malicious links or attachments that can perform a variety of functions, including the extraction of login credentials…

What is the Cyber CS-1 Guideline?

Answer A common set of minimum security guidelines created by a team of OEM Chief Information Security Officers (CISO) including FCA, Ford, General Motors, Honda, and facilitated by the Automotive Industry Action Group (AIAG), which apply to all 3rd Parties who handle an OEM's data in an external e…

What is a penetration test?

Answer The practice of testing a computer system, network or web application to find security vulnerabilities that an attacker could exploit. Background A penetration test is essentially an authorized simulated cyber attack on a computer system, performed to identify weaknesses (also referred to…

What is the difference between encryption at rest and encryption in transit?

Answer Encryption at rest is like storing your data in a vault, encryption in transit is like putting it in an armored vehicle for transport. Background For encryption in transit, the data is encrypted before transmission; the computer system endpoints are then authenticated; and the data is decr…

How do I start a Cybersafe Check Assessment with an invitation code?

Answer To start your Cybersafe Check Assessment, go to the 'Enter invitation code' under the ‘Options’ tab on your dashboard.   Background Your customer(s) may need you to complete a questionnaire on the platform about a topic or policy area that is important to them. This may be a mandator…

Why have I received an access request for a user completing a Cybersafe Check Assessment?

Answer You have received an access request for a user completing a Cybersafe Check Assessment as they are required to complete this for their customer.   Background If an organization is existing on the SupplierAssurance platform, a new user will have to have their access approved by the organi…


Can't find an answer to your question? Contact us


Your session will end in less than two minutes unless we detect activity in your browser
Are you sure you wish to end this chat? Are you sure you wish to disconnect this chat? New chat message from Please use the 'End Chat' link to end this chat and close the window. Do you want to reset the chat window position? Reset windows