We use cookies to ensure that we give you the best experience on our website. If you continue we'll assume that you are happy to receive all cookies on the SUPPLIERASSURANCE website.

copy to clipboardcopied to clipboard
  1. Home
  2. Help

Search help

Frequently asked Questions

Quickly find answers to the most popular frequently asked questions.

What is malware (malicious software)?

Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.

Malware is designed to covertly operate on a compromised system without the consent of the user, such as: Trojan Horse - disguised in what appears to be legitimate software, relies on the user to download it and run it on the target. Virus - infects other programs/files of a target via code injectio…

Will the Cyber Safe Check impact my systems while it does the scan?

The Cyber Safe Check is a non-intrusive external scan on the IP address or domain that you have provided and given consent for us to scan. It should have no adverse effect on your systems while the scan is undertaken.

The Cyber Safe Check will typically take place within the 24 hours after you have confirm the relevant IP address/domain name details. When you provide the IP address/domain name details, you also have the option to provide specific exclusion times when you do not want the scan to take place. These…

What does vulnerability management mean?

A security practice specifically designed to proactively mitigate or prevent the exploitation of IT vulnerabilities which exist in a system or organization.

Vulnerability management is the practice of knowing what vulnerabilities (either software defects that require patches to remedy, or configuration issues that require administrative activity to resolve) are present within computer systems and checking on a regular basis, as well as assessing, triagi…

Why have I received an invitation to complete a Cyber Safe Check assessment scan?

You have received an invitation because your customer would like you to complete this assessment and share this with them in order to view your results.

Your customer may need you to complete this assessment. This may be a mandatory requirement as part of their supplier selection process or for compliance management and reporting purposes.. You need to use the correct invitation code on the platform so that your assessment is linked to the customer…

1. If you are the correct person to complete the questionnaire and you do not have an account on the platform, follow the instructions on the 'How do I register my organisation' help page
2. If you already have an account on the platform go to the 'Sign in' page and enter your login details
3. Go to…

What is the difference between encryption at rest and encryption in transit?

Encryption at rest is like storing your data in a vault, encryption in transit is like putting it in an armoured vehicle for transport.

For encryption in transit, the data is encrypted before transmission; the computer system endpoints are then authenticated; and the data is decrypted and verified on arrival. This is to protect data if communications are intercepted while data moves between two computer systems. For encryption at re…

What is encryption?

The process of converting information or data into a code, especially to prevent unauthorized access.

Encryption is a term for the method by which data is converted from a readable form to an encoded version that can only be decoded by another entity if they have access to a decryption key, in other words, this is the process of changing data to make it unintelligible and scrambled if accessed by an…

What is the Cyber CS-1 Guideline?

A common set of minimum security guidelines created by a team of OEM Chief Information Security Officers (CISO) including FCA, Ford, General Motors, Honda, and facilitated by the Automotive Industry Action Group (AIAG), which apply to all 3rd Parties who handle an OEM's data in an external environment.

These security requirements focus on the secure exchange and protection of information between the OEMs and their business partners, and are known as the AIAG Cyber CS-1 Guideline.

If you have any further questions regarding the SupplierAssurance platform, please use our Live Web chat where our s…

What is a penetration test?

The practice of testing a computer system, network or web application to find security vulnerabilities that an attacker could exploit.

A penetration test is essentially an authorized simulated cyber attack on a computer system, performed to identify weaknesses (also referred to as vulnerabilities) including the potential for unauthorized parties to gain access to the system's features and data.

If you have any further questions r…

What is phishing?

Phishing is a form of fraud in which an attacker masquerades as a reputable entity or person in email or other communication channels.

Phishing emails distribute malicious links or attachments that can perform a variety of functions, including the extraction of login credentials or account information from victims. A victim can receive a message that appears to have been sent by a known contact or organization, which can include co…

How do I start a Cybersafe Check Assessment with an invitation code?

To start your Cybersafe Check Assessment select 'Enter invitation code' on your dashboard.

Your customer(s) may need you to complete a questionnaire on the platform about a topic or policy area that is important to them. This may be a mandatory requirement as part of their supplier selection process or for compliance management and reporting purposes. You need to use the correct invitatio…

1. Go to the 'Enter the invitation code' page from Options on the Dashboard
2. Enter the invitation code that you have received
3. Check that the code relates to the correct buyer
4. Answer the questionnaire and ensure that you submit your answers by the deadline requested by your customer

If you…

Can't find an answer to your question? Contact us

Contact us

Still need help? Our Team is available to answer any further questions that you may have.

Contact us
Your session will end in less than two minutes unless we detect activity in your browser
Are you sure you wish to end this chat? Are you sure you wish to disconnect this chat? New chat message from Please use the 'End Chat' link to end this chat and close the window. Do you want to reset the chat window position? Reset windows