document.write("    "+"\n");
document.write("    <style type=\"text/css\">"+"\n");
document.write("                    body {"+"\n");
document.write("                padding: 0;"+"\n");
document.write("                margin: 0;"+"\n");
document.write("            }"+"\n");
document.write("                    </style>"+"\n");
document.write("    <script type=\"text/javascript\">"+"\n");
document.write("        "+"\n");
document.write("    </script>"+"\n");
document.write("<div id=\"fsform-container-4058587\" class=\"fsform-container\" data-formid=\"4058587\"></div>"+"\n");
document.write("<script type=\"text/javascript\" src=\"https://static.formstack.com/forms/forms-renderer/builds/public/form_63e62c92dc.js\"></script>"+"\n");
document.write("<script type=\"text/javascript\" nonce=\"eb7e37806613ebed2a3f5cc80285e65ad7e35efb4a2e9caae3c4be49e8a3cad9\">"+"\n");
document.write("  FSForm.render({\"fullscreen\":false,\"id\":4058587,\"loggingConfig\":{\"disabled\":true,\"sessionSampleRate\":1},\"shouldAutofocusForm\":false,\"target\":\"fsform-container-4058587\",\"viewKey\":\"KW2lA3J2A6\"},"+"\n");
document.write("    {"+"\n");
document.write("      formResponse: {\"error\":null,\"form\":{\"analytics\":{\"baseUrl\":\"https:\\/\\/fordfoundationtech.formstack.com\",\"isEnabled\":true,\"viewMethod\":\"embedded\"},\"id\":\"4058587\",\"isEncrypted\":false,\"language\":\"en\",\"meta\":{\"ctaParams\":\"utm_source=formstack&utm_medium=product&utm_campaign=build+your+own\",\"ctaType\":\"s-prod-form\",\"extra\":{\"columns\":1,\"customIdentifier\":null,\"discountCode\":null,\"fileUploadsPerSubmission\":20,\"invisibleCaptcha\":false,\"invisibleCaptchaPublicKey\":\"\",\"kioskMode\":false,\"labelPosition\":\"top\",\"oneQuestion\":false,\"progressIndicator\":true,\"promptForLocation\":false,\"saveAndResume\":true,\"shareButtons\":null,\"showReferralBadge\":false,\"showSecurityLogo\":false,\"skipValidationBetweenPages\":false},\"fileUploadActionsDto\":{\"baseUrl\":\"https:\\/\\/fordfoundationtech.formstack.com\",\"getUploadUrlAction\":\"\\/live-form\\/fileUpload\\/getUploadUrls\"},\"hasEncryptionPassword\":false,\"hiddenSubmitFields\":[{\"key\":\"displayTime\",\"value\":\"2025-02-16T03:00:17-05:00\"}],\"isWorkflowForm\":false,\"isWorkspaceSubmission\":null,\"redirectUrl\":null,\"shouldTrackPartialSubmission\":null,\"stylesheets\":null,\"submitButtonTitle\":\"Submit Form\",\"timezone\":\"US\\/Eastern\",\"welcomeMessage\":null},\"name\":\"BUILD Cybersecurity Focus Group - v2\",\"password\":null,\"paymentIntegrations\":[],\"plugins\":[],\"portal\":null,\"publicFileUrl\":\"https:\\/\\/static.formstack.com\\/forms\\/forms-renderer\",\"sections\":[{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesSectionDto\",\"content\":\"\",\"heading\":\"\",\"labelPosition\":\"\",\"languageFormat\":\"\",\"numColumns\":0,\"usePageBreak\":false},\"fields\":[],\"general\":{\"autofill\":null,\"columnSpan\":0,\"hidden\":false,\"hideLabel\":false,\"id\":\"0\",\"internalLabel\":null,\"isRootSection\":true,\"label\":\"\",\"language\":null,\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":null,\"section\":\"\",\"shouldForceSkipValidation\":null,\"supportingText\":null,\"type\":\"section\",\"unique\":false,\"useCallout\":null},\"logic\":null,\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesSectionDto\",\"content\":\"\",\"heading\":\"Get Started\",\"labelPosition\":\"\",\"languageFormat\":\"default\",\"numColumns\":\"0\",\"usePageBreak\":true},\"fields\":[{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<p style=\\\"text-align: center;\\\"><img src=\\\"https:\\/\\/s3.amazonaws.com\\/files.formstack.com\\/public\\/906765\\/image_BUILDcybersecuritycat.png\\\" style=\\\"width: 300px;\\\" class=\\\"fr-fic fr-dib\\\"><\\/p><p dir=\\\"ltr\\\">Please click \\\"next\\\" to begin. &nbsp;The CAT (Cybersecurity Assessment Tool) &nbsp;is currently in beta. This is version v1.0 from November 2020, developed for the use of Ford\'s BUILD grantees. Once you have completed it, the assessment tool will display a series of recommendations. Print or save that information for your organization\'s use.&nbsp;<\\/p>\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101833404\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"101822906\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"richtext\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null}],\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101822906\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"section\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesSectionDto\",\"content\":\"\",\"heading\":\"Operational Security (1of 3)\",\"labelPosition\":\"\",\"languageFormat\":\"default\",\"numColumns\":\"0\",\"usePageBreak\":true},\"fields\":[{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<div class=\\\"surveySubHeader\\\">\\n    Risk Analysis and Threat Assessment\\n<\\/div>\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101927581\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"98895195\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"embed\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":{\"calculationAllowNegatives\":\"\",\"calculationCategory\":\"text\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"fieldOneCalculation\":\"\",\"fieldTwoCalculation\":\"\",\"rules\":[]},\"defaultValue\":{\"dtoType\":\"DefaultValueCheckboxDto\",\"otherValue\":null,\"useOtherValue\":false,\"value\":[]},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesCheckboxDto\",\"hideOptionButton\":true,\"imageDimensions\":\"customDimensions\",\"imageHeight\":100,\"imageLabelAlignment\":\"bottom\",\"imageWidth\":100,\"lockImageRatio\":true,\"lockImageRatioOption\":\"fitProportionally\",\"optionLayout\":\"vertical\",\"optionPartToStore\":\"value\",\"useCheckAll\":false,\"useImages\":false,\"useLabelsAndValues\":true,\"useOtherOption\":false,\"useRandomOption\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"98895196\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"What are your specific concerns about your organization\\u2019s cybersecurity? Choose your top three.\",\"language\":\"en\",\"options\":[{\"label\":\"Government activity\",\"value\":\"0.0\",\"imageUrl\":\"\"},{\"label\":\"Criminal activity\",\"value\":\"0.00\",\"imageUrl\":\"\"},{\"label\":\"Attacks from groups or individuals who dislike our work\",\"value\":\"0.000\",\"imageUrl\":\"\"},{\"label\":\"Lack of staff awareness about cybersecurity\",\"value\":\"0.0000\",\"imageUrl\":\"\"},{\"label\":\"My concerns aren\\u2019t listed here.\",\"value\":\"0\",\"imageUrl\":\"\"},{\"label\":\"I don\\u2019t have any concerns currently.\",\"value\":\"15\",\"imageUrl\":\"\"},{\"label\":\"I don\\u2019t know.\",\"value\":\"10\",\"imageUrl\":\"\"}],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":true,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"98895195\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"checkbox\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":{\"calculationAllowNegatives\":\"\",\"calculationCategory\":\"text\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"fieldOneCalculation\":\"\",\"fieldTwoCalculation\":\"\",\"rules\":[]},\"defaultValue\":{\"dtoType\":\"DefaultValueRadioDto\",\"otherValue\":\"\",\"value\":\"\"},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesRadioDto\",\"defaultValue\":\"\",\"hideRadioButtons\":false,\"imageDimensions\":\"customDimensions\",\"imageHeight\":100,\"imageLabelAlignment\":\"bottom\",\"imageWidth\":100,\"lockImageRatio\":true,\"lockImageRatioOption\":\"fitProportionally\",\"optionLayout\":\"vertical\",\"optionPartToStore\":\"value\",\"useImages\":false,\"useLabelsAndValues\":true,\"useOtherOption\":false,\"useRandomOption\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"98895200\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"Does your organization support a marginalized\\/minority group?\",\"language\":\"en\",\"options\":[{\"label\":\"Yes\",\"value\":\"10\",\"imageUrl\":\"\"},{\"label\":\"No\",\"value\":\"0\",\"imageUrl\":\"\"},{\"label\":\"My organization doesn\\u2019t know.\",\"value\":\"5\",\"imageUrl\":\"\"}],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":true,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"98895195\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"radio\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":{\"calculationAllowNegatives\":\"\",\"calculationCategory\":\"text\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"fieldOneCalculation\":\"\",\"fieldTwoCalculation\":\"\",\"rules\":[]},\"defaultValue\":{\"dtoType\":\"DefaultValueRadioDto\",\"otherValue\":\"\",\"value\":\"\"},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesRadioDto\",\"defaultValue\":\"\",\"hideRadioButtons\":false,\"imageDimensions\":\"customDimensions\",\"imageHeight\":100,\"imageLabelAlignment\":\"bottom\",\"imageWidth\":100,\"lockImageRatio\":true,\"lockImageRatioOption\":\"fitProportionally\",\"optionLayout\":\"vertical\",\"optionPartToStore\":\"value\",\"useImages\":false,\"useLabelsAndValues\":true,\"useOtherOption\":false,\"useRandomOption\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"98895201\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"Does your organization support refugee, exile, or displaced communities?\",\"language\":\"en\",\"options\":[{\"label\":\"Yes\",\"value\":\"10\",\"imageUrl\":\"\"},{\"label\":\"No\",\"value\":\"0\",\"imageUrl\":\"\"},{\"label\":\"My organization doesn\\u2019t know.\",\"value\":\"5\",\"imageUrl\":\"\"}],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":true,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"98895195\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"radio\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":{\"calculationAllowNegatives\":\"\",\"calculationCategory\":\"text\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"fieldOneCalculation\":\"\",\"fieldTwoCalculation\":\"\",\"rules\":[]},\"defaultValue\":{\"dtoType\":\"DefaultValueRadioDto\",\"otherValue\":\"\",\"value\":\"\"},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesRadioDto\",\"defaultValue\":\"\",\"hideRadioButtons\":false,\"imageDimensions\":\"customDimensions\",\"imageHeight\":100,\"imageLabelAlignment\":\"bottom\",\"imageWidth\":100,\"lockImageRatio\":true,\"lockImageRatioOption\":\"fitProportionally\",\"optionLayout\":\"vertical\",\"optionPartToStore\":\"value\",\"useImages\":false,\"useLabelsAndValues\":true,\"useOtherOption\":false,\"useRandomOption\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"98895202\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"Does your organization face opposition from corporate, state, or regional actors?\",\"language\":\"en\",\"options\":[{\"label\":\"Yes\",\"value\":\"10\",\"imageUrl\":\"\"},{\"label\":\"No\",\"value\":\"0\",\"imageUrl\":\"\"},{\"label\":\"My organization doesn\\u2019t know.\",\"value\":\"5\",\"imageUrl\":\"\"}],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":true,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"98895195\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"radio\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":{\"calculationAllowNegatives\":\"\",\"calculationCategory\":\"text\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"fieldOneCalculation\":\"\",\"fieldTwoCalculation\":\"\",\"rules\":[]},\"defaultValue\":{\"dtoType\":\"DefaultValueCheckboxDto\",\"otherValue\":null,\"useOtherValue\":false,\"value\":[]},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesCheckboxDto\",\"hideOptionButton\":true,\"imageDimensions\":\"customDimensions\",\"imageHeight\":100,\"imageLabelAlignment\":\"bottom\",\"imageWidth\":100,\"lockImageRatio\":true,\"lockImageRatioOption\":\"fitProportionally\",\"optionLayout\":\"vertical\",\"optionPartToStore\":\"value\",\"useCheckAll\":false,\"useImages\":false,\"useLabelsAndValues\":true,\"useOtherOption\":false,\"useRandomOption\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"98895203\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"Which areas of your organization\'s work do you believe create additional risk? Choose your top three.\\u00a0\",\"language\":\"en\",\"options\":[{\"label\":\"Communication\\/journalism\",\"value\":\"0\",\"imageUrl\":\"\"},{\"label\":\"Advocacy\",\"value\":\"0.0\",\"imageUrl\":\"\"},{\"label\":\"Research\",\"value\":\"0.00\",\"imageUrl\":\"\"},{\"label\":\"Grantmaking\",\"value\":\"0.000\",\"imageUrl\":\"\"},{\"label\":\"Partnerships\",\"value\":\"0.0000\",\"imageUrl\":\"\"},{\"label\":\"Other\",\"value\":\"0.00000\",\"imageUrl\":\"\"},{\"label\":\"We have no additional risks.\",\"value\":\"5\",\"imageUrl\":\"\"},{\"label\":\"We have never thought about it\",\"value\":\"10\",\"imageUrl\":\"\"}],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":true,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"98895195\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"checkbox\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":{\"calculationAllowNegatives\":\"\",\"calculationCategory\":\"text\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"fieldOneCalculation\":\"\",\"fieldTwoCalculation\":\"\",\"rules\":[]},\"defaultValue\":{\"dtoType\":\"DefaultValueRadioDto\",\"otherValue\":\"\",\"value\":\"\"},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesRadioDto\",\"defaultValue\":\"\",\"hideRadioButtons\":false,\"imageDimensions\":\"customDimensions\",\"imageHeight\":100,\"imageLabelAlignment\":\"bottom\",\"imageWidth\":100,\"lockImageRatio\":true,\"lockImageRatioOption\":\"fitProportionally\",\"optionLayout\":\"vertical\",\"optionPartToStore\":\"value\",\"useImages\":false,\"useLabelsAndValues\":false,\"useOtherOption\":false,\"useRandomOption\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"98896772\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"On average, how interested are your employees in cybersecurity resiliency and strengthening cybersecurity?\",\"language\":\"en\",\"options\":[{\"label\":\"We are very interested.\",\"value\":\"We are very interested.\",\"imageUrl\":null},{\"label\":\"We are somewhat interested.\",\"value\":\"We are somewhat interested.\",\"imageUrl\":null},{\"label\":\"We are not interested.\",\"value\":\"We are not interested.\",\"imageUrl\":null},{\"label\":\"I don\\u2019t know.\",\"value\":\"I don\\u2019t know.\",\"imageUrl\":\"\"}],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":true,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"98895195\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"radio\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":{\"calculationAllowNegatives\":null,\"calculationCategory\":\"number\",\"calculationOperator\":null,\"calculationUnits\":null,\"fieldOneCalculation\":null,\"fieldTwoCalculation\":null,\"rules\":[{\"fieldId\":\"98895196\",\"value\":null},{\"fieldId\":null,\"value\":\"+\"},{\"fieldId\":\"98895200\",\"value\":null},{\"fieldId\":null,\"value\":\"+\"},{\"fieldId\":\"98895201\",\"value\":null},{\"fieldId\":null,\"value\":\"+\"},{\"fieldId\":\"98895202\",\"value\":null},{\"fieldId\":null,\"value\":\"+\"},{\"fieldId\":\"98895203\",\"value\":null}]},\"defaultValue\":{\"dtoType\":\"DefaultValueStringDto\",\"value\":\"\"},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesTextDto\",\"autocompleteOptions\":null,\"calculationAllowNegatives\":0,\"calculationCategory\":\"number\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"charactersWide\":50,\"confirmationText\":\"\",\"defaultValue\":\"\",\"fieldOneCalculation\":0,\"fieldTwoCalculation\":0,\"maxLength\":0,\"minLength\":0,\"placeholderText\":\"\"},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":true,\"hideLabel\":false,\"id\":\"100822910\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"risk_from_activity\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":true,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"98895195\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"text\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":{\"hideInputCharacters\":false,\"removeDataFromEmailNotifications\":false,\"requireConfirmation\":false,\"restrictDataAccess\":false}},{\"calculation\":{\"calculationAllowNegatives\":null,\"calculationCategory\":\"number\",\"calculationOperator\":null,\"calculationUnits\":null,\"fieldOneCalculation\":null,\"fieldTwoCalculation\":null,\"rules\":[{\"fieldId\":\"100822910\",\"value\":null}]},\"defaultValue\":{\"dtoType\":\"DefaultValueStringDto\",\"value\":\"0\"},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesNumberDto\",\"calculationAllowNegatives\":0,\"calculationCategory\":\"number\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"charactersWide\":5,\"currency\":null,\"currencyFormat\":\"\",\"defaultValue\":\"0\",\"fieldOneCalculation\":0,\"fieldTwoCalculation\":0,\"maxValue\":null,\"minValue\":null,\"numberOfDecimals\":0,\"placeholderText\":\"\",\"useSlider\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":true,\"hideLabel\":false,\"id\":\"100823030\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"RISK FROM ACTIVITY SCORE\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":true,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"98895195\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"number\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":{\"calculationAllowNegatives\":\"\",\"calculationCategory\":\"text\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"fieldOneCalculation\":\"\",\"fieldTwoCalculation\":\"\",\"rules\":[]},\"defaultValue\":{\"dtoType\":\"DefaultValueRadioDto\",\"otherValue\":\"\",\"value\":\"\"},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesRadioDto\",\"defaultValue\":\"\",\"hideRadioButtons\":false,\"imageDimensions\":\"customDimensions\",\"imageHeight\":100,\"imageLabelAlignment\":\"bottom\",\"imageWidth\":100,\"lockImageRatio\":true,\"lockImageRatioOption\":\"fitProportionally\",\"optionLayout\":\"vertical\",\"optionPartToStore\":\"value\",\"useImages\":false,\"useLabelsAndValues\":true,\"useOtherOption\":false,\"useRandomOption\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"98897060\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"What is the general mood when cybersecurity comes up in conversation?\",\"language\":\"en\",\"options\":[{\"label\":\"We are excited.\",\"value\":\"0\",\"imageUrl\":null},{\"label\":\"We are stressed and anxious.\",\"value\":\"10\",\"imageUrl\":null},{\"label\":\"We are confused.\",\"value\":\"5\",\"imageUrl\":\"\"},{\"label\":\"We are bored.\",\"value\":\"1\",\"imageUrl\":null},{\"label\":\"We never talk about cybersecurity.\",\"value\":\"15\",\"imageUrl\":\"\"}],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":true,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"98895195\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"radio\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":{\"calculationAllowNegatives\":\"\",\"calculationCategory\":\"text\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"fieldOneCalculation\":\"\",\"fieldTwoCalculation\":\"\",\"rules\":[]},\"defaultValue\":{\"dtoType\":\"DefaultValueRadioDto\",\"otherValue\":\"\",\"value\":\"\"},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesRadioDto\",\"defaultValue\":\"\",\"hideRadioButtons\":false,\"imageDimensions\":\"customDimensions\",\"imageHeight\":100,\"imageLabelAlignment\":\"bottom\",\"imageWidth\":100,\"lockImageRatio\":true,\"lockImageRatioOption\":\"fitProportionally\",\"optionLayout\":\"vertical\",\"optionPartToStore\":\"value\",\"useImages\":false,\"useLabelsAndValues\":true,\"useOtherOption\":false,\"useRandomOption\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"98897115\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"How often do you consider cybersecurity when making decisions about internal workflow and processes?\",\"language\":\"en\",\"options\":[{\"label\":\"We put cybersecurity first when making such decisions.\",\"value\":\"0\",\"imageUrl\":null},{\"label\":\"We sometimes consider cybersecurity when making such decisions.\",\"value\":\"We sometimes consider cybersecurity when making such decisions.\",\"imageUrl\":null},{\"label\":\"We rarely consider cybersecurity when making such decisions.\",\"value\":\"We rarely consider cybersecurity when making such decisions.\",\"imageUrl\":null},{\"label\":\"We never consider cybersecurity when making such decisions.\",\"value\":\"We never consider cybersecurity when making such decisions.\",\"imageUrl\":\"\"},{\"label\":\"I don\'t know.\",\"value\":\"15\",\"imageUrl\":\"\"}],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":true,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"98895195\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"radio\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":{\"calculationAllowNegatives\":\"\",\"calculationCategory\":\"text\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"fieldOneCalculation\":\"\",\"fieldTwoCalculation\":\"\",\"rules\":[]},\"defaultValue\":{\"dtoType\":\"DefaultValueRadioDto\",\"otherValue\":\"\",\"value\":\"\"},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesRadioDto\",\"defaultValue\":\"\",\"hideRadioButtons\":false,\"imageDimensions\":\"customDimensions\",\"imageHeight\":100,\"imageLabelAlignment\":\"bottom\",\"imageWidth\":100,\"lockImageRatio\":true,\"lockImageRatioOption\":\"fitProportionally\",\"optionLayout\":\"vertical\",\"optionPartToStore\":\"value\",\"useImages\":false,\"useLabelsAndValues\":true,\"useOtherOption\":false,\"useRandomOption\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"98897350\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"How does your organization pay for cybersecurity?\",\"language\":\"en\",\"options\":[{\"label\":\"Cybersecurity is part of our operations budget.\",\"value\":\"5\",\"imageUrl\":null},{\"label\":\"Cybersecurity has its own line item in our annual budget.\",\"value\":\"0\",\"imageUrl\":null},{\"label\":\"We raise funds for cybersecurity.\",\"value\":\"10\",\"imageUrl\":null},{\"label\":\"We do not have a consistent way to pay for cybersecurity.\",\"value\":\"15\",\"imageUrl\":\"\"}],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":true,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"98895195\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"radio\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":{\"calculationAllowNegatives\":\"\",\"calculationCategory\":\"text\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"fieldOneCalculation\":\"\",\"fieldTwoCalculation\":\"\",\"rules\":[]},\"defaultValue\":{\"dtoType\":\"DefaultValueRadioDto\",\"otherValue\":\"\",\"value\":\"\"},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesRadioDto\",\"defaultValue\":\"\",\"hideRadioButtons\":false,\"imageDimensions\":\"customDimensions\",\"imageHeight\":100,\"imageLabelAlignment\":\"bottom\",\"imageWidth\":100,\"lockImageRatio\":true,\"lockImageRatioOption\":\"fitProportionally\",\"optionLayout\":\"vertical\",\"optionPartToStore\":\"value\",\"useImages\":false,\"useLabelsAndValues\":true,\"useOtherOption\":false,\"useRandomOption\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101547390\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"How would you best describe your approach to cybersecurity?\",\"language\":\"en\",\"options\":[{\"label\":\"We have a staff person who manages cybersecurity.\",\"value\":\"0\",\"imageUrl\":null},{\"label\":\"We have a third-party consultant who manages cybersecurity.\",\"value\":\"5\",\"imageUrl\":null},{\"label\":\"We haven\\u2019t thought about cybersecurity much within our organization.\",\"value\":\"15\",\"imageUrl\":null},{\"label\":\"I don\\u2019t know.\",\"value\":\"10\",\"imageUrl\":\"\"}],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":true,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"98895195\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"radio\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":{\"calculationAllowNegatives\":null,\"calculationCategory\":\"number\",\"calculationOperator\":null,\"calculationUnits\":null,\"fieldOneCalculation\":null,\"fieldTwoCalculation\":null,\"rules\":[{\"fieldId\":\"98897060\",\"value\":null},{\"fieldId\":null,\"value\":\"+\"},{\"fieldId\":\"98897115\",\"value\":null},{\"fieldId\":null,\"value\":\"+\"},{\"fieldId\":\"98897350\",\"value\":null},{\"fieldId\":null,\"value\":\"+\"},{\"fieldId\":\"101547390\",\"value\":null}]},\"defaultValue\":{\"dtoType\":\"DefaultValueStringDto\",\"value\":\"\"},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesTextDto\",\"autocompleteOptions\":null,\"calculationAllowNegatives\":0,\"calculationCategory\":\"number\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"charactersWide\":50,\"confirmationText\":\"\",\"defaultValue\":\"\",\"fieldOneCalculation\":0,\"fieldTwoCalculation\":0,\"maxLength\":0,\"minLength\":0,\"placeholderText\":\"\"},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":true,\"hideLabel\":false,\"id\":\"101787011\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"cyber_immaturity\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":true,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"98895195\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"text\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":{\"hideInputCharacters\":false,\"removeDataFromEmailNotifications\":false,\"requireConfirmation\":false,\"restrictDataAccess\":false}},{\"calculation\":{\"calculationAllowNegatives\":null,\"calculationCategory\":\"number\",\"calculationOperator\":null,\"calculationUnits\":null,\"fieldOneCalculation\":null,\"fieldTwoCalculation\":null,\"rules\":[{\"fieldId\":\"101787011\",\"value\":null}]},\"defaultValue\":{\"dtoType\":\"DefaultValueStringDto\",\"value\":\"\"},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesNumberDto\",\"calculationAllowNegatives\":0,\"calculationCategory\":\"number\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"charactersWide\":5,\"currency\":null,\"currencyFormat\":\"\",\"defaultValue\":\"\",\"fieldOneCalculation\":0,\"fieldTwoCalculation\":0,\"maxValue\":null,\"minValue\":null,\"numberOfDecimals\":0,\"placeholderText\":\"\",\"useSlider\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":true,\"hideLabel\":false,\"id\":\"101787017\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"CYBER IMMATURITY SCORE\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":true,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"98895195\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"number\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":{\"calculationAllowNegatives\":null,\"calculationCategory\":\"number\",\"calculationOperator\":null,\"calculationUnits\":null,\"fieldOneCalculation\":null,\"fieldTwoCalculation\":null,\"rules\":[{\"fieldId\":\"100823030\",\"value\":null},{\"fieldId\":null,\"value\":\"+\"},{\"fieldId\":\"101787017\",\"value\":null}]},\"defaultValue\":{\"dtoType\":\"DefaultValueStringDto\",\"value\":\"\"},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesNumberDto\",\"calculationAllowNegatives\":0,\"calculationCategory\":\"number\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"charactersWide\":5,\"currency\":null,\"currencyFormat\":\"\",\"defaultValue\":\"\",\"fieldOneCalculation\":0,\"fieldTwoCalculation\":0,\"maxValue\":null,\"minValue\":null,\"numberOfDecimals\":0,\"placeholderText\":\"\",\"useSlider\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":true,\"hideLabel\":false,\"id\":\"101930228\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"CYBER IMMATURITY + RISK FROM\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":true,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"98895195\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"number\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<div class=\\\"surveySubHeader\\\">\\n    Documentation and Policy\\n<\\/div>\\n\\n\\n\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101927658\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"98895195\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"embed\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":{\"calculationAllowNegatives\":\"\",\"calculationCategory\":\"text\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"fieldOneCalculation\":\"\",\"fieldTwoCalculation\":\"\",\"rules\":[]},\"defaultValue\":{\"dtoType\":\"DefaultValueRadioDto\",\"otherValue\":\"\",\"value\":\"\"},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesRadioDto\",\"defaultValue\":\"\",\"hideRadioButtons\":false,\"imageDimensions\":\"customDimensions\",\"imageHeight\":100,\"imageLabelAlignment\":\"bottom\",\"imageWidth\":100,\"lockImageRatio\":true,\"lockImageRatioOption\":\"fitProportionally\",\"optionLayout\":\"vertical\",\"optionPartToStore\":\"value\",\"useImages\":false,\"useLabelsAndValues\":true,\"useOtherOption\":false,\"useRandomOption\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"98895204\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"What written internal security policies does your organization have?\",\"language\":\"en\",\"options\":[{\"label\":\"We have a formal written policy.\",\"value\":\"0\",\"imageUrl\":\"\"},{\"label\":\"We discuss policies but do not write them down.\",\"value\":\"5\",\"imageUrl\":\"\"},{\"label\":\"We do not have a policy.\",\"value\":\"10\",\"imageUrl\":\"\"},{\"label\":\"My organization is not familiar with security policies.\",\"value\":\"15\",\"imageUrl\":\"\"}],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":true,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"98895195\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"radio\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":{\"calculationAllowNegatives\":\"\",\"calculationCategory\":\"text\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"fieldOneCalculation\":\"\",\"fieldTwoCalculation\":\"\",\"rules\":[]},\"defaultValue\":{\"dtoType\":\"DefaultValueRadioDto\",\"otherValue\":\"\",\"value\":\"\"},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesRadioDto\",\"defaultValue\":\"\",\"hideRadioButtons\":false,\"imageDimensions\":\"customDimensions\",\"imageHeight\":100,\"imageLabelAlignment\":\"bottom\",\"imageWidth\":100,\"lockImageRatio\":true,\"lockImageRatioOption\":\"fitProportionally\",\"optionLayout\":\"vertical\",\"optionPartToStore\":\"value\",\"useImages\":false,\"useLabelsAndValues\":true,\"useOtherOption\":false,\"useRandomOption\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"98895205\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"What written policy about any aspect of digital safety (email use, phone use, etc.) does your organization have?\",\"language\":\"en\",\"options\":[{\"label\":\"We have a formal written policy.\",\"value\":\"0\",\"imageUrl\":\"\"},{\"label\":\"We discuss policies but do not write them down.\",\"value\":\"5\",\"imageUrl\":\"\"},{\"label\":\"We do not have a policy.\",\"value\":\"10\",\"imageUrl\":\"\"},{\"label\":\"My organization is not familiar with security policies.\",\"value\":\"15\",\"imageUrl\":\"\"}],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":true,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"98895195\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"radio\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":{\"calculationAllowNegatives\":\"\",\"calculationCategory\":\"text\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"fieldOneCalculation\":\"\",\"fieldTwoCalculation\":\"\",\"rules\":[]},\"defaultValue\":{\"dtoType\":\"DefaultValueRadioDto\",\"otherValue\":\"\",\"value\":\"\"},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesRadioDto\",\"defaultValue\":\"\",\"hideRadioButtons\":false,\"imageDimensions\":\"customDimensions\",\"imageHeight\":100,\"imageLabelAlignment\":\"bottom\",\"imageWidth\":100,\"lockImageRatio\":true,\"lockImageRatioOption\":\"fitProportionally\",\"optionLayout\":\"vertical\",\"optionPartToStore\":\"value\",\"useImages\":false,\"useLabelsAndValues\":true,\"useOtherOption\":false,\"useRandomOption\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"98895206\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"Do you have a comprehensive, regularly updated list of what cybersecurity measures are in place in your organization? Is it written down? Verbal?\",\"language\":\"en\",\"options\":[{\"label\":\"Yes, we have a list written down.\",\"value\":\"0\",\"imageUrl\":\"\"},{\"label\":\"Yes, we have a verbal list.\",\"value\":\"5\",\"imageUrl\":\"\"},{\"label\":\"No, we do not have a list.\",\"value\":\"10\",\"imageUrl\":\"\"},{\"label\":\"I don\\u2019t know.\",\"value\":\"15\",\"imageUrl\":\"\"}],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":true,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"98895195\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"radio\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":{\"calculationAllowNegatives\":\"\",\"calculationCategory\":\"text\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"fieldOneCalculation\":\"\",\"fieldTwoCalculation\":\"\",\"rules\":[]},\"defaultValue\":{\"dtoType\":\"DefaultValueRadioDto\",\"otherValue\":\"\",\"value\":\"\"},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesRadioDto\",\"defaultValue\":\"\",\"hideRadioButtons\":false,\"imageDimensions\":\"customDimensions\",\"imageHeight\":100,\"imageLabelAlignment\":\"bottom\",\"imageWidth\":100,\"lockImageRatio\":true,\"lockImageRatioOption\":\"fitProportionally\",\"optionLayout\":\"vertical\",\"optionPartToStore\":\"value\",\"useImages\":false,\"useLabelsAndValues\":true,\"useOtherOption\":false,\"useRandomOption\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"98895207\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"When was the last time your organization updated or reviewed your security policies?\",\"language\":\"en\",\"options\":[{\"label\":\"We update our policy once a year or more.\",\"value\":\"0\",\"imageUrl\":\"\"},{\"label\":\"We update our policy only after a threat occurs.\",\"value\":\"5\",\"imageUrl\":\"\"},{\"label\":\"We do not update our policy.\",\"value\":\"10.0\",\"imageUrl\":\"\"},{\"label\":\"We do not have a policy.\",\"value\":\"15\",\"imageUrl\":\"\"},{\"label\":\"I don\\u2019t know.\",\"value\":\"10\",\"imageUrl\":\"\"}],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":true,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"98895195\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"radio\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":{\"calculationAllowNegatives\":\"\",\"calculationCategory\":\"text\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"fieldOneCalculation\":\"\",\"fieldTwoCalculation\":\"\",\"rules\":[]},\"defaultValue\":{\"dtoType\":\"DefaultValueRadioDto\",\"otherValue\":\"\",\"value\":\"\"},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesRadioDto\",\"defaultValue\":\"\",\"hideRadioButtons\":false,\"imageDimensions\":\"customDimensions\",\"imageHeight\":100,\"imageLabelAlignment\":\"bottom\",\"imageWidth\":100,\"lockImageRatio\":true,\"lockImageRatioOption\":\"fitProportionally\",\"optionLayout\":\"vertical\",\"optionPartToStore\":\"value\",\"useImages\":false,\"useLabelsAndValues\":true,\"useOtherOption\":false,\"useRandomOption\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"98895208\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"How often do you believe your employees are following your security policies?\",\"language\":\"en\",\"options\":[{\"label\":\"Often\",\"value\":\"0\",\"imageUrl\":\"\"},{\"label\":\"Sometimes\",\"value\":\"5\",\"imageUrl\":\"\"},{\"label\":\"Rarely\",\"value\":\"10.0\",\"imageUrl\":\"\"},{\"label\":\"Never\",\"value\":\"15.0\",\"imageUrl\":\"\"},{\"label\":\"I don\'t know.\",\"value\":\"15\",\"imageUrl\":\"\"}],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":true,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"98895195\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"radio\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":{\"calculationAllowNegatives\":null,\"calculationCategory\":\"number\",\"calculationOperator\":null,\"calculationUnits\":null,\"fieldOneCalculation\":null,\"fieldTwoCalculation\":null,\"rules\":[{\"fieldId\":\"98895204\",\"value\":null},{\"fieldId\":null,\"value\":\"+\"},{\"fieldId\":\"98895205\",\"value\":null},{\"fieldId\":null,\"value\":\"+\"},{\"fieldId\":\"98895206\",\"value\":null},{\"fieldId\":null,\"value\":\"+\"},{\"fieldId\":\"98895208\",\"value\":null}]},\"defaultValue\":{\"dtoType\":\"DefaultValueStringDto\",\"value\":\"\"},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesNumberDto\",\"calculationAllowNegatives\":0,\"calculationCategory\":\"number\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"charactersWide\":5,\"currency\":null,\"currencyFormat\":\"\",\"defaultValue\":\"\",\"fieldOneCalculation\":0,\"fieldTwoCalculation\":0,\"maxValue\":null,\"minValue\":null,\"numberOfDecimals\":0,\"placeholderText\":\"\",\"useSlider\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":true,\"hideLabel\":false,\"id\":\"101932231\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"DOCUMENTATION_POLICY SCORE\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"98895195\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"number\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<div class=\\\"surveySubHeader\\\">\\n    Internal Risks (Intentional or Unintentional)\\n<\\/div>\\n\\n\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101932411\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"98895195\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"embed\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":{\"calculationAllowNegatives\":\"\",\"calculationCategory\":\"text\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"fieldOneCalculation\":\"\",\"fieldTwoCalculation\":\"\",\"rules\":[]},\"defaultValue\":{\"dtoType\":\"DefaultValueRadioDto\",\"otherValue\":\"\",\"value\":\"\"},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesRadioDto\",\"defaultValue\":\"\",\"hideRadioButtons\":false,\"imageDimensions\":\"customDimensions\",\"imageHeight\":100,\"imageLabelAlignment\":\"bottom\",\"imageWidth\":100,\"lockImageRatio\":true,\"lockImageRatioOption\":\"fitProportionally\",\"optionLayout\":\"vertical\",\"optionPartToStore\":\"value\",\"useImages\":false,\"useLabelsAndValues\":true,\"useOtherOption\":false,\"useRandomOption\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"98895209\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"How many times in the past year have you identified security concerns within your organization?\",\"language\":\"en\",\"options\":[{\"label\":\"Often\",\"value\":\"0\",\"imageUrl\":\"\"},{\"label\":\"Sometimes\",\"value\":\"5\",\"imageUrl\":\"\"},{\"label\":\"Rarely\",\"value\":\"10\",\"imageUrl\":\"\"},{\"label\":\"Never\",\"value\":\"15\",\"imageUrl\":\"\"},{\"label\":\"I don\'t know.\",\"value\":\"15.0\",\"imageUrl\":\"\"}],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":true,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"98895195\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"radio\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null}],\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"98895195\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"section\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesSectionDto\",\"content\":\"\",\"heading\":\"Operational Security (2 of 3)\",\"labelPosition\":\"\",\"languageFormat\":\"default\",\"numColumns\":\"0\",\"usePageBreak\":true},\"fields\":[{\"calculation\":{\"calculationAllowNegatives\":\"\",\"calculationCategory\":\"text\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"fieldOneCalculation\":\"\",\"fieldTwoCalculation\":\"\",\"rules\":[]},\"defaultValue\":{\"dtoType\":\"DefaultValueRadioDto\",\"otherValue\":\"\",\"value\":\"\"},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesRadioDto\",\"defaultValue\":\"\",\"hideRadioButtons\":false,\"imageDimensions\":\"customDimensions\",\"imageHeight\":100,\"imageLabelAlignment\":\"bottom\",\"imageWidth\":100,\"lockImageRatio\":true,\"lockImageRatioOption\":\"fitProportionally\",\"optionLayout\":\"vertical\",\"optionPartToStore\":\"value\",\"useImages\":false,\"useLabelsAndValues\":true,\"useOtherOption\":false,\"useRandomOption\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"98897839\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"Do you feel that everyone on your staff understands the cybersecurity risks to your organization?\",\"language\":\"en\",\"options\":[{\"label\":\"Everyone understands these risks.\",\"value\":\"0\",\"imageUrl\":null},{\"label\":\"Some understand these risks better than others.\",\"value\":\"5\",\"imageUrl\":null},{\"label\":\"None understand these risks.\",\"value\":\"15\",\"imageUrl\":null},{\"label\":\"I don\'t know.\",\"value\":\"I don\'t know.\",\"imageUrl\":\"\"}],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":true,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"100611056\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"radio\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":{\"calculationAllowNegatives\":\"\",\"calculationCategory\":\"text\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"fieldOneCalculation\":\"\",\"fieldTwoCalculation\":\"\",\"rules\":[]},\"defaultValue\":{\"dtoType\":\"DefaultValueRadioDto\",\"otherValue\":\"\",\"value\":\"\"},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesRadioDto\",\"defaultValue\":\"\",\"hideRadioButtons\":false,\"imageDimensions\":\"customDimensions\",\"imageHeight\":100,\"imageLabelAlignment\":\"bottom\",\"imageWidth\":100,\"lockImageRatio\":true,\"lockImageRatioOption\":\"fitProportionally\",\"optionLayout\":\"vertical\",\"optionPartToStore\":\"value\",\"useImages\":false,\"useLabelsAndValues\":true,\"useOtherOption\":false,\"useRandomOption\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"98897892\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"Do you have a policy for removing access to data after a staff member leaves your organization?\",\"language\":\"en\",\"options\":[{\"label\":\"Yes, we have a policy.\",\"value\":\"0\",\"imageUrl\":null},{\"label\":\"No, we do not have a policy.\",\"value\":\"15\",\"imageUrl\":null},{\"label\":\"Nobody has left, but we do have such a policy.\",\"value\":\"5\",\"imageUrl\":null},{\"label\":\"We are not concerned about this risk.\",\"value\":\"10\",\"imageUrl\":\"\"}],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":true,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"100611056\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"radio\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":{\"calculationAllowNegatives\":\"\",\"calculationCategory\":\"text\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"fieldOneCalculation\":\"\",\"fieldTwoCalculation\":\"\",\"rules\":[]},\"defaultValue\":{\"dtoType\":\"DefaultValueRadioDto\",\"otherValue\":\"\",\"value\":\"\"},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesRadioDto\",\"defaultValue\":\"\",\"hideRadioButtons\":false,\"imageDimensions\":\"customDimensions\",\"imageHeight\":100,\"imageLabelAlignment\":\"bottom\",\"imageWidth\":100,\"lockImageRatio\":true,\"lockImageRatioOption\":\"fitProportionally\",\"optionLayout\":\"vertical\",\"optionPartToStore\":\"value\",\"useImages\":false,\"useLabelsAndValues\":true,\"useOtherOption\":false,\"useRandomOption\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"98898020\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"Does your staff understand the reputation that your organization has and how that might affect their chances of being arrested, detained, or questioned as they do their work?\",\"language\":\"en\",\"options\":[{\"label\":\"Everyone understands these risks.\",\"value\":\"0\",\"imageUrl\":null},{\"label\":\"Some understand these risks.\",\"value\":\"10\",\"imageUrl\":null},{\"label\":\"Few members understand these risks.\",\"value\":\"15\",\"imageUrl\":null},{\"label\":\"Our organization does not face these risks.\",\"value\":\"5.0\",\"imageUrl\":\"\"}],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":true,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"100611056\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"radio\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":{\"calculationAllowNegatives\":\"\",\"calculationCategory\":\"text\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"fieldOneCalculation\":\"\",\"fieldTwoCalculation\":\"\",\"rules\":[]},\"defaultValue\":{\"dtoType\":\"DefaultValueRadioDto\",\"otherValue\":\"\",\"value\":\"\"},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesRadioDto\",\"defaultValue\":\"\",\"hideRadioButtons\":false,\"imageDimensions\":\"customDimensions\",\"imageHeight\":100,\"imageLabelAlignment\":\"bottom\",\"imageWidth\":100,\"lockImageRatio\":true,\"lockImageRatioOption\":\"fitProportionally\",\"optionLayout\":\"vertical\",\"optionPartToStore\":\"value\",\"useImages\":false,\"useLabelsAndValues\":true,\"useOtherOption\":false,\"useRandomOption\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"98895210\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"Is anyone on your staff focused on information technology (IT) for your organization?\",\"language\":\"en\",\"options\":[{\"label\":\"Yes, we have at least one staff member focused on IT.\",\"value\":\"0\",\"imageUrl\":\"\"},{\"label\":\"No, we use an outside IT provider\\/consultant.\",\"value\":\"5\",\"imageUrl\":\"\"},{\"label\":\"No, we use a volunteer.\",\"value\":\"10\",\"imageUrl\":\"\"},{\"label\":\"No, we do not have any IT support.\",\"value\":\"15\",\"imageUrl\":\"\"},{\"label\":\"I don\'t know.\",\"value\":\"15.0\",\"imageUrl\":\"\"}],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":true,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"100611056\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"radio\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":{\"calculationAllowNegatives\":\"\",\"calculationCategory\":\"text\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"fieldOneCalculation\":\"\",\"fieldTwoCalculation\":\"\",\"rules\":[]},\"defaultValue\":{\"dtoType\":\"DefaultValueRadioDto\",\"otherValue\":\"\",\"value\":\"\"},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesRadioDto\",\"defaultValue\":\"\",\"hideRadioButtons\":false,\"imageDimensions\":\"customDimensions\",\"imageHeight\":100,\"imageLabelAlignment\":\"bottom\",\"imageWidth\":100,\"lockImageRatio\":true,\"lockImageRatioOption\":\"fitProportionally\",\"optionLayout\":\"vertical\",\"optionPartToStore\":\"value\",\"useImages\":false,\"useLabelsAndValues\":true,\"useOtherOption\":false,\"useRandomOption\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"98895211\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"Is anyone on your staff focused on cybersecurity for your organization?\",\"language\":\"en\",\"options\":[{\"label\":\"Yes, we have at least one staff member focused on cybersecurity.\",\"value\":\"0\",\"imageUrl\":\"\"},{\"label\":\"No, we use an outside cybersecurity provider\\/consultant.\",\"value\":\"5\",\"imageUrl\":\"\"},{\"label\":\"No, we use a volunteer.\",\"value\":\"10\",\"imageUrl\":\"\"},{\"label\":\"No, we do not have any cybersecurity support.\",\"value\":\"15\",\"imageUrl\":\"\"},{\"label\":\"I don\'t know.\",\"value\":\"15.0\",\"imageUrl\":\"\"}],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":true,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"100611056\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"radio\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":{\"calculationAllowNegatives\":null,\"calculationCategory\":\"number\",\"calculationOperator\":null,\"calculationUnits\":null,\"fieldOneCalculation\":null,\"fieldTwoCalculation\":null,\"rules\":[{\"fieldId\":\"98895209\",\"value\":null},{\"fieldId\":null,\"value\":\"+\"},{\"fieldId\":\"98897839\",\"value\":null},{\"fieldId\":null,\"value\":\"+\"},{\"fieldId\":\"98897892\",\"value\":null},{\"fieldId\":null,\"value\":\"+\"},{\"fieldId\":\"98898020\",\"value\":null},{\"fieldId\":null,\"value\":\"+\"},{\"fieldId\":\"98895210\",\"value\":null},{\"fieldId\":null,\"value\":\"+\"},{\"fieldId\":\"98895211\",\"value\":null}]},\"defaultValue\":{\"dtoType\":\"DefaultValueStringDto\",\"value\":\"\"},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesNumberDto\",\"calculationAllowNegatives\":0,\"calculationCategory\":\"number\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"charactersWide\":5,\"currency\":null,\"currencyFormat\":\"\",\"defaultValue\":\"\",\"fieldOneCalculation\":0,\"fieldTwoCalculation\":0,\"maxValue\":null,\"minValue\":null,\"numberOfDecimals\":0,\"placeholderText\":\"\",\"useSlider\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":true,\"hideLabel\":false,\"id\":\"101932656\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"UNINTENDED_RISK SCORE\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":true,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"100611056\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"number\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<div class=\\\"surveySubHeader\\\">\\n    Staff Training and Support\\n<\\/div>\\n\\n\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101932627\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"100611056\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"embed\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":{\"calculationAllowNegatives\":\"\",\"calculationCategory\":\"text\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"fieldOneCalculation\":\"\",\"fieldTwoCalculation\":\"\",\"rules\":[]},\"defaultValue\":{\"dtoType\":\"DefaultValueRadioDto\",\"otherValue\":\"\",\"value\":\"\"},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesRadioDto\",\"defaultValue\":\"\",\"hideRadioButtons\":false,\"imageDimensions\":\"customDimensions\",\"imageHeight\":100,\"imageLabelAlignment\":\"bottom\",\"imageWidth\":100,\"lockImageRatio\":true,\"lockImageRatioOption\":\"fitProportionally\",\"optionLayout\":\"vertical\",\"optionPartToStore\":\"value\",\"useImages\":false,\"useLabelsAndValues\":true,\"useOtherOption\":false,\"useRandomOption\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"98895213\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"Which groups within your organization do you currently provide cybersecurity training to?\",\"language\":\"en\",\"options\":[{\"label\":\"Staff only\",\"value\":\"10\",\"imageUrl\":\"\"},{\"label\":\"Staff and volunteers\\/interns\\/contractors\",\"value\":\"0.0\",\"imageUrl\":\"\"},{\"label\":\"Staff, volunteers\\/interns\\/contractors, and users of our systems\\/platforms\",\"value\":\"0\",\"imageUrl\":\"\"},{\"label\":\"We don\\u2019t provide security training.\",\"value\":\"15\",\"imageUrl\":\"\"},{\"label\":\"None of these apply.\",\"value\":\"5.0\",\"imageUrl\":\"\"},{\"label\":\"My organization doesn\\u2019t know.\",\"value\":\"15.0\",\"imageUrl\":\"\"}],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":true,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"100611056\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"radio\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":{\"calculationAllowNegatives\":\"\",\"calculationCategory\":\"text\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"fieldOneCalculation\":\"\",\"fieldTwoCalculation\":\"\",\"rules\":[]},\"defaultValue\":{\"dtoType\":\"DefaultValueRadioDto\",\"otherValue\":\"\",\"value\":\"\"},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesRadioDto\",\"defaultValue\":\"\",\"hideRadioButtons\":false,\"imageDimensions\":\"customDimensions\",\"imageHeight\":100,\"imageLabelAlignment\":\"bottom\",\"imageWidth\":100,\"lockImageRatio\":true,\"lockImageRatioOption\":\"fitProportionally\",\"optionLayout\":\"vertical\",\"optionPartToStore\":\"value\",\"useImages\":false,\"useLabelsAndValues\":true,\"useOtherOption\":false,\"useRandomOption\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"98895214\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"How often does your organization provide cybersecurity training to these groups?\",\"language\":\"en\",\"options\":[{\"label\":\"Once a month or more frequently\",\"value\":\"0.0\",\"imageUrl\":\"\"},{\"label\":\"Once a quarter\",\"value\":\"5\",\"imageUrl\":\"\"},{\"label\":\"Once a year\",\"value\":\"10\",\"imageUrl\":\"\"},{\"label\":\"Only during onboarding\",\"value\":\"15.0\",\"imageUrl\":\"\"},{\"label\":\"After a threat occurs\",\"value\":\"10.0\",\"imageUrl\":\"\"},{\"label\":\"We don\\u2019t provide security training.\",\"value\":\"15\",\"imageUrl\":\"\"},{\"label\":\"My organization doesn\\u2019t know.\",\"value\":\"15.00\",\"imageUrl\":\"\"}],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":true,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"100611056\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"radio\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":{\"calculationAllowNegatives\":\"\",\"calculationCategory\":\"text\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"fieldOneCalculation\":\"\",\"fieldTwoCalculation\":\"\",\"rules\":[]},\"defaultValue\":{\"dtoType\":\"DefaultValueRadioDto\",\"otherValue\":\"\",\"value\":\"\"},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesRadioDto\",\"defaultValue\":\"\",\"hideRadioButtons\":false,\"imageDimensions\":\"customDimensions\",\"imageHeight\":100,\"imageLabelAlignment\":\"bottom\",\"imageWidth\":100,\"lockImageRatio\":true,\"lockImageRatioOption\":\"fitProportionally\",\"optionLayout\":\"vertical\",\"optionPartToStore\":\"value\",\"useImages\":false,\"useLabelsAndValues\":true,\"useOtherOption\":false,\"useRandomOption\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"98895215\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"Does your organization provide cybersecurity training to new employees (onboarding)?\",\"language\":\"en\",\"options\":[{\"label\":\"Yes\",\"value\":\"0.0\",\"imageUrl\":\"\"},{\"label\":\"Yes, but only to some staff members\",\"value\":\"10.0\",\"imageUrl\":\"\"},{\"label\":\"No\",\"value\":\"15.0\",\"imageUrl\":\"\"},{\"label\":\"I don\'t know.\",\"value\":\"I don\'t know.\",\"imageUrl\":\"\"}],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":true,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"100611056\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"radio\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":{\"calculationAllowNegatives\":\"\",\"calculationCategory\":\"text\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"fieldOneCalculation\":\"\",\"fieldTwoCalculation\":\"\",\"rules\":[]},\"defaultValue\":{\"dtoType\":\"DefaultValueRadioDto\",\"otherValue\":\"\",\"value\":\"\"},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesRadioDto\",\"defaultValue\":\"\",\"hideRadioButtons\":false,\"imageDimensions\":\"customDimensions\",\"imageHeight\":100,\"imageLabelAlignment\":\"bottom\",\"imageWidth\":100,\"lockImageRatio\":true,\"lockImageRatioOption\":\"fitProportionally\",\"optionLayout\":\"vertical\",\"optionPartToStore\":\"value\",\"useImages\":false,\"useLabelsAndValues\":true,\"useOtherOption\":false,\"useRandomOption\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"98895216\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"Does your organization use a documented offboarding process that specifically focuses on cybersecurity when a staff member leaves?\",\"language\":\"en\",\"options\":[{\"label\":\"Yes, and we always follow the process.\",\"value\":\"0.0\",\"imageUrl\":\"\"},{\"label\":\"Yes, but we do not always follow the process.\",\"value\":\"5.0\",\"imageUrl\":\"\"},{\"label\":\"No\",\"value\":\"15.0\",\"imageUrl\":\"\"},{\"label\":\"I don\'t know.\",\"value\":\"10.0\",\"imageUrl\":\"\"}],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":true,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"100611056\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"radio\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":{\"calculationAllowNegatives\":\"\",\"calculationCategory\":\"text\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"fieldOneCalculation\":\"\",\"fieldTwoCalculation\":\"\",\"rules\":[]},\"defaultValue\":{\"dtoType\":\"DefaultValueRadioDto\",\"otherValue\":\"\",\"value\":\"\"},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesRadioDto\",\"defaultValue\":\"\",\"hideRadioButtons\":false,\"imageDimensions\":\"customDimensions\",\"imageHeight\":100,\"imageLabelAlignment\":\"bottom\",\"imageWidth\":100,\"lockImageRatio\":true,\"lockImageRatioOption\":\"fitProportionally\",\"optionLayout\":\"vertical\",\"optionPartToStore\":\"value\",\"useImages\":false,\"useLabelsAndValues\":true,\"useOtherOption\":false,\"useRandomOption\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"98897963\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"Does your organization conduct exit interviews that include a discussion of security (an honest conversation with the staff member about vulnerabilities and areas of improvement they\\u2019ve noticed) prior to an employee leaving?\",\"language\":\"en\",\"options\":[{\"label\":\"We always conduct exit interviews about security.\",\"value\":\"0.0\",\"imageUrl\":null},{\"label\":\"We sometimes conduct exit interviews about security.\",\"value\":\"5.0\",\"imageUrl\":null},{\"label\":\"We do not conduct exit interviews about security.\",\"value\":\"10.0\",\"imageUrl\":null},{\"label\":\"We do not conduct exit interviews.\",\"value\":\"15.0\",\"imageUrl\":\"\"},{\"label\":\"I don\\u2019t know.\",\"value\":\"I don\\u2019t know.\",\"imageUrl\":\"\"}],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":true,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"100611056\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"radio\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":{\"calculationAllowNegatives\":null,\"calculationCategory\":\"number\",\"calculationOperator\":null,\"calculationUnits\":null,\"fieldOneCalculation\":null,\"fieldTwoCalculation\":null,\"rules\":[{\"fieldId\":\"98895213\",\"value\":null},{\"fieldId\":null,\"value\":\"+\"},{\"fieldId\":\"98895214\",\"value\":null},{\"fieldId\":null,\"value\":\"+\"},{\"fieldId\":\"98895215\",\"value\":null},{\"fieldId\":null,\"value\":\"+\"},{\"fieldId\":\"98895216\",\"value\":null},{\"fieldId\":null,\"value\":\"+\"},{\"fieldId\":\"98897963\",\"value\":null}]},\"defaultValue\":{\"dtoType\":\"DefaultValueStringDto\",\"value\":\"\"},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesNumberDto\",\"calculationAllowNegatives\":0,\"calculationCategory\":\"number\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"charactersWide\":5,\"currency\":null,\"currencyFormat\":\"\",\"defaultValue\":\"\",\"fieldOneCalculation\":0,\"fieldTwoCalculation\":0,\"maxValue\":null,\"minValue\":null,\"numberOfDecimals\":0,\"placeholderText\":\"\",\"useSlider\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":true,\"hideLabel\":false,\"id\":\"101933095\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"STAFF_TRAINING SCORE\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":true,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"100611056\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"number\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<div class=\\\"surveySubHeader\\\">\\n    Travel Security\\n<\\/div>\\n\\n\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101933065\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"100611056\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"embed\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":{\"calculationAllowNegatives\":\"\",\"calculationCategory\":\"text\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"fieldOneCalculation\":\"\",\"fieldTwoCalculation\":\"\",\"rules\":[]},\"defaultValue\":{\"dtoType\":\"DefaultValueRadioDto\",\"otherValue\":\"\",\"value\":\"\"},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesRadioDto\",\"defaultValue\":\"\",\"hideRadioButtons\":false,\"imageDimensions\":\"customDimensions\",\"imageHeight\":100,\"imageLabelAlignment\":\"bottom\",\"imageWidth\":100,\"lockImageRatio\":true,\"lockImageRatioOption\":\"fitProportionally\",\"optionLayout\":\"vertical\",\"optionPartToStore\":\"value\",\"useImages\":false,\"useLabelsAndValues\":true,\"useOtherOption\":false,\"useRandomOption\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"98895217\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"Does your organization have security-related policies in place for travel?\",\"language\":\"en\",\"options\":[{\"label\":\"Yes, and we mostly follow these policies.\",\"value\":\"0.0\",\"imageUrl\":\"\"},{\"label\":\"Yes, but we do not always follow these policies.\",\"value\":\"5.0\",\"imageUrl\":\"\"},{\"label\":\"No, we do not have travel safety policies.\",\"value\":\"15.0\",\"imageUrl\":\"\"},{\"label\":\"No, we do not travel for work.\",\"value\":\"0\",\"imageUrl\":\"\"},{\"label\":\"I don\'t know.\",\"value\":\"10.0\",\"imageUrl\":\"\"}],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":true,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"100611056\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"radio\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":{\"calculationAllowNegatives\":\"\",\"calculationCategory\":\"text\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"fieldOneCalculation\":\"\",\"fieldTwoCalculation\":\"\",\"rules\":[]},\"defaultValue\":{\"dtoType\":\"DefaultValueRadioDto\",\"otherValue\":\"\",\"value\":\"\"},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesRadioDto\",\"defaultValue\":\"\",\"hideRadioButtons\":false,\"imageDimensions\":\"customDimensions\",\"imageHeight\":100,\"imageLabelAlignment\":\"bottom\",\"imageWidth\":100,\"lockImageRatio\":true,\"lockImageRatioOption\":\"fitProportionally\",\"optionLayout\":\"vertical\",\"optionPartToStore\":\"value\",\"useImages\":false,\"useLabelsAndValues\":true,\"useOtherOption\":false,\"useRandomOption\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"98900626\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"What risks are covered in your travel security-related policy?\",\"language\":\"en\",\"options\":[{\"label\":\"Physical security\",\"value\":\"10.0\",\"imageUrl\":null},{\"label\":\"Physical security and cybersecurity\",\"value\":\"0.0\",\"imageUrl\":null},{\"label\":\"We do not have travel safety policies.\",\"value\":\"15.0\",\"imageUrl\":null},{\"label\":\"We do not travel for work.\",\"value\":\"0\",\"imageUrl\":\"\"},{\"label\":\"I don\'t know.\",\"value\":\"I don\'t know.\",\"imageUrl\":\"\"}],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":true,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"100611056\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"radio\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":{\"calculationAllowNegatives\":null,\"calculationCategory\":\"number\",\"calculationOperator\":null,\"calculationUnits\":null,\"fieldOneCalculation\":null,\"fieldTwoCalculation\":null,\"rules\":[{\"fieldId\":\"98895217\",\"value\":null},{\"fieldId\":null,\"value\":\"+\"},{\"fieldId\":\"98900626\",\"value\":null}]},\"defaultValue\":{\"dtoType\":\"DefaultValueStringDto\",\"value\":\"\"},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesNumberDto\",\"calculationAllowNegatives\":0,\"calculationCategory\":\"number\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"charactersWide\":5,\"currency\":null,\"currencyFormat\":\"\",\"defaultValue\":\"\",\"fieldOneCalculation\":0,\"fieldTwoCalculation\":0,\"maxValue\":null,\"minValue\":null,\"numberOfDecimals\":0,\"placeholderText\":\"\",\"useSlider\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":true,\"hideLabel\":false,\"id\":\"101933324\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"TRAVEL_SECURITY SCORE\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":true,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"100611056\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"number\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<div class=\\\"surveySubHeader\\\">\\n    Data Security\\n<\\/div>\\n\\n\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101933410\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"100611056\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"embed\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":{\"calculationAllowNegatives\":\"\",\"calculationCategory\":\"text\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"fieldOneCalculation\":\"\",\"fieldTwoCalculation\":\"\",\"rules\":[]},\"defaultValue\":{\"dtoType\":\"DefaultValueRadioDto\",\"otherValue\":\"\",\"value\":\"\"},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesRadioDto\",\"defaultValue\":\"\",\"hideRadioButtons\":false,\"imageDimensions\":\"customDimensions\",\"imageHeight\":100,\"imageLabelAlignment\":\"bottom\",\"imageWidth\":100,\"lockImageRatio\":true,\"lockImageRatioOption\":\"fitProportionally\",\"optionLayout\":\"vertical\",\"optionPartToStore\":\"value\",\"useImages\":false,\"useLabelsAndValues\":true,\"useOtherOption\":false,\"useRandomOption\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"98895218\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"What data retention policy does your organization have (a policy that controls how much sensitive information you store, how long, and where)?\",\"language\":\"en\",\"options\":[{\"label\":\"We have a policy for all data.\",\"value\":\"0.0\",\"imageUrl\":\"\"},{\"label\":\"We have a policy for some data (e.g. email and work-related files).\",\"value\":\"5.0\",\"imageUrl\":\"\"},{\"label\":\"We do not have a data retention policy.\",\"value\":\"15\",\"imageUrl\":\"\"},{\"label\":\"I don\'t know.\",\"value\":\"10.0\",\"imageUrl\":\"\"}],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":true,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"100611056\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"radio\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null}],\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"100611056\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"section\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesSectionDto\",\"content\":\"\",\"heading\":\"Operational Security (3 of 3)\",\"labelPosition\":\"\",\"languageFormat\":\"default\",\"numColumns\":\"0\",\"usePageBreak\":true},\"fields\":[{\"calculation\":{\"calculationAllowNegatives\":\"\",\"calculationCategory\":\"text\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"fieldOneCalculation\":\"\",\"fieldTwoCalculation\":\"\",\"rules\":[]},\"defaultValue\":{\"dtoType\":\"DefaultValueRadioDto\",\"otherValue\":\"\",\"value\":\"\"},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesRadioDto\",\"defaultValue\":\"\",\"hideRadioButtons\":false,\"imageDimensions\":\"customDimensions\",\"imageHeight\":100,\"imageLabelAlignment\":\"bottom\",\"imageWidth\":100,\"lockImageRatio\":true,\"lockImageRatioOption\":\"fitProportionally\",\"optionLayout\":\"vertical\",\"optionPartToStore\":\"value\",\"useImages\":false,\"useLabelsAndValues\":true,\"useOtherOption\":false,\"useRandomOption\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"98895219\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"Does your organization categorize the data you store by sensitivity\\/risk?\",\"language\":\"en\",\"options\":[{\"label\":\"Yes, we categorize all our data by sensitivity\\/risk.\",\"value\":\"0.0\",\"imageUrl\":\"\"},{\"label\":\"Yes, we categorize some of our data by sensitivity\\/risk.\",\"value\":\"5.0\",\"imageUrl\":\"\"},{\"label\":\"No, we don\'t categorize our data by sensitivity\\/risk.\",\"value\":\"15.0\",\"imageUrl\":\"\"},{\"label\":\"I don\'t know.\",\"value\":\"10.0\",\"imageUrl\":\"\"}],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":true,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"100610891\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"radio\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":{\"calculationAllowNegatives\":\"\",\"calculationCategory\":\"text\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"fieldOneCalculation\":\"\",\"fieldTwoCalculation\":\"\",\"rules\":[]},\"defaultValue\":{\"dtoType\":\"DefaultValueRadioDto\",\"otherValue\":\"\",\"value\":\"\"},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesRadioDto\",\"defaultValue\":\"\",\"hideRadioButtons\":false,\"imageDimensions\":\"customDimensions\",\"imageHeight\":100,\"imageLabelAlignment\":\"bottom\",\"imageWidth\":100,\"lockImageRatio\":true,\"lockImageRatioOption\":\"fitProportionally\",\"optionLayout\":\"vertical\",\"optionPartToStore\":\"value\",\"useImages\":false,\"useLabelsAndValues\":true,\"useOtherOption\":false,\"useRandomOption\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"98895220\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"Does your organization control who has access to the data you store based on its sensitivity\\/risk?\",\"language\":\"en\",\"options\":[{\"label\":\"Yes, only authorized staff members can access sensitive data.\",\"value\":\"0.0\",\"imageUrl\":\"\"},{\"label\":\"Yes, only particular staff members can access sensitive data.\",\"value\":\"5.0\",\"imageUrl\":\"\"},{\"label\":\"No, anyone in our organization can access sensitive data.\",\"value\":\"10.0\",\"imageUrl\":\"\"},{\"label\":\"No, we do not organize our data by its sensitivity.\",\"value\":\"15.0\",\"imageUrl\":\"\"},{\"label\":\"I don\'t know.\",\"value\":\"I don\'t know.\",\"imageUrl\":\"\"}],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":true,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"100610891\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"radio\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":{\"calculationAllowNegatives\":\"\",\"calculationCategory\":\"text\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"fieldOneCalculation\":\"\",\"fieldTwoCalculation\":\"\",\"rules\":[]},\"defaultValue\":{\"dtoType\":\"DefaultValueRadioDto\",\"otherValue\":\"\",\"value\":\"\"},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesRadioDto\",\"defaultValue\":\"\",\"hideRadioButtons\":false,\"imageDimensions\":\"customDimensions\",\"imageHeight\":100,\"imageLabelAlignment\":\"bottom\",\"imageWidth\":100,\"lockImageRatio\":true,\"lockImageRatioOption\":\"fitProportionally\",\"optionLayout\":\"vertical\",\"optionPartToStore\":\"value\",\"useImages\":false,\"useLabelsAndValues\":true,\"useOtherOption\":false,\"useRandomOption\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"98902100\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"What is your process for keeping a regularly updated backup of your organization\\u2019s most important data?\",\"language\":\"en\",\"options\":[{\"label\":\"We use automated backups ourselves.\",\"value\":\"0.0\",\"imageUrl\":null},{\"label\":\"We manually back up our data ourselves.\",\"value\":\"5.0\",\"imageUrl\":null},{\"label\":\"We use an outside contractor\\/IT professional to back up our data.\",\"value\":\"10.0\",\"imageUrl\":null},{\"label\":\"We do not back up our data regularly.\",\"value\":\"15.0\",\"imageUrl\":\"\"},{\"label\":\"I don\'t know.\",\"value\":\"10\",\"imageUrl\":\"\"}],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":true,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"100610891\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"radio\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":{\"calculationAllowNegatives\":null,\"calculationCategory\":\"number\",\"calculationOperator\":null,\"calculationUnits\":null,\"fieldOneCalculation\":null,\"fieldTwoCalculation\":null,\"rules\":[{\"fieldId\":\"98895218\",\"value\":null},{\"fieldId\":null,\"value\":\"+\"},{\"fieldId\":\"98895219\",\"value\":null},{\"fieldId\":null,\"value\":\"+\"},{\"fieldId\":\"98895220\",\"value\":null},{\"fieldId\":null,\"value\":\"+\"},{\"fieldId\":\"98902100\",\"value\":null}]},\"defaultValue\":{\"dtoType\":\"DefaultValueStringDto\",\"value\":\"\"},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesNumberDto\",\"calculationAllowNegatives\":0,\"calculationCategory\":\"number\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"charactersWide\":5,\"currency\":null,\"currencyFormat\":\"\",\"defaultValue\":\"\",\"fieldOneCalculation\":0,\"fieldTwoCalculation\":0,\"maxValue\":null,\"minValue\":null,\"numberOfDecimals\":0,\"placeholderText\":\"\",\"useSlider\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":true,\"hideLabel\":false,\"id\":\"101934232\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"DATA_SECURITY SCORE\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":true,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"100610891\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"number\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<div class=\\\"surveySubHeader\\\">\\n    Website Security\\n<\\/div>\\n\\n\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101934231\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"100610891\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"embed\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":{\"calculationAllowNegatives\":\"\",\"calculationCategory\":\"text\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"fieldOneCalculation\":\"\",\"fieldTwoCalculation\":\"\",\"rules\":[]},\"defaultValue\":{\"dtoType\":\"DefaultValueRadioDto\",\"otherValue\":\"\",\"value\":\"\"},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesRadioDto\",\"defaultValue\":\"\",\"hideRadioButtons\":false,\"imageDimensions\":\"customDimensions\",\"imageHeight\":100,\"imageLabelAlignment\":\"bottom\",\"imageWidth\":100,\"lockImageRatio\":true,\"lockImageRatioOption\":\"fitProportionally\",\"optionLayout\":\"vertical\",\"optionPartToStore\":\"value\",\"useImages\":false,\"useLabelsAndValues\":true,\"useOtherOption\":false,\"useRandomOption\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"98895221\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"How concerned are you that your website will become a target for people who want to do harm to your organization?\",\"language\":\"en\",\"options\":[{\"label\":\"Very likely\",\"value\":\"0.0\",\"imageUrl\":\"\"},{\"label\":\"Somewhat likely\",\"value\":\"10.0\",\"imageUrl\":\"\"},{\"label\":\"Not likely\",\"value\":\"15.0\",\"imageUrl\":\"\"},{\"label\":\"I don\'t know.\",\"value\":\"15\",\"imageUrl\":\"\"},{\"label\":\"We don\'t have a website.\",\"value\":\"0\",\"imageUrl\":\"\"}],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":true,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"100610891\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"radio\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":{\"calculationAllowNegatives\":\"\",\"calculationCategory\":\"text\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"fieldOneCalculation\":\"\",\"fieldTwoCalculation\":\"\",\"rules\":[]},\"defaultValue\":{\"dtoType\":\"DefaultValueRadioDto\",\"otherValue\":\"\",\"value\":\"\"},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesRadioDto\",\"defaultValue\":\"\",\"hideRadioButtons\":false,\"imageDimensions\":\"customDimensions\",\"imageHeight\":100,\"imageLabelAlignment\":\"bottom\",\"imageWidth\":100,\"lockImageRatio\":true,\"lockImageRatioOption\":\"fitProportionally\",\"optionLayout\":\"vertical\",\"optionPartToStore\":\"value\",\"useImages\":false,\"useLabelsAndValues\":true,\"useOtherOption\":false,\"useRandomOption\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"98895223\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"Does your organization share information of public interest on your website that could upset powerful groups?\",\"language\":\"en\",\"options\":[{\"label\":\"Yes, we frequently share such information.\",\"value\":\"15\",\"imageUrl\":\"\"},{\"label\":\"Yes, we sometimes share such information.\",\"value\":\"10\",\"imageUrl\":\"\"},{\"label\":\"No, we rarely share such information.\",\"value\":\"5\",\"imageUrl\":\"\"},{\"label\":\"I don\\u2019t know.\",\"value\":\"15.0\",\"imageUrl\":\"\"},{\"label\":\"We don\'t have a website.\",\"value\":\"0.0\",\"imageUrl\":\"\"}],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":true,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"100610891\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"radio\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":{\"calculationAllowNegatives\":\"\",\"calculationCategory\":\"text\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"fieldOneCalculation\":\"\",\"fieldTwoCalculation\":\"\",\"rules\":[]},\"defaultValue\":{\"dtoType\":\"DefaultValueRadioDto\",\"otherValue\":\"\",\"value\":\"\"},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesRadioDto\",\"defaultValue\":\"\",\"hideRadioButtons\":false,\"imageDimensions\":\"customDimensions\",\"imageHeight\":100,\"imageLabelAlignment\":\"bottom\",\"imageWidth\":100,\"lockImageRatio\":true,\"lockImageRatioOption\":\"fitProportionally\",\"optionLayout\":\"vertical\",\"optionPartToStore\":\"value\",\"useImages\":false,\"useLabelsAndValues\":true,\"useOtherOption\":false,\"useRandomOption\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"98895224\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"If someone hacked your website, what types of information could they get?\",\"language\":\"en\",\"options\":[{\"label\":\"Only publicly available information\",\"value\":\"5\",\"imageUrl\":\"\"},{\"label\":\"Publicly available information and unpublished information (draft blog posts, press releases, etc.)\",\"value\":\"10\",\"imageUrl\":\"\"},{\"label\":\"Publicly available information and sensitive private information (addresses, payment records, etc.)\",\"value\":\"15\",\"imageUrl\":\"\"},{\"label\":\"I don\\u2019t know.\",\"value\":\"15.0\",\"imageUrl\":\"\"},{\"label\":\"We don\'t have a website.\",\"value\":\"0.0\",\"imageUrl\":\"\"}],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":true,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"100610891\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"radio\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":{\"calculationAllowNegatives\":\"\",\"calculationCategory\":\"text\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"fieldOneCalculation\":\"\",\"fieldTwoCalculation\":\"\",\"rules\":[]},\"defaultValue\":{\"dtoType\":\"DefaultValueRadioDto\",\"otherValue\":\"\",\"value\":\"\"},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesRadioDto\",\"defaultValue\":\"\",\"hideRadioButtons\":false,\"imageDimensions\":\"customDimensions\",\"imageHeight\":100,\"imageLabelAlignment\":\"bottom\",\"imageWidth\":100,\"lockImageRatio\":true,\"lockImageRatioOption\":\"fitProportionally\",\"optionLayout\":\"vertical\",\"optionPartToStore\":\"value\",\"useImages\":false,\"useLabelsAndValues\":true,\"useOtherOption\":false,\"useRandomOption\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"98895225\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"What is your process for keeping a regularly updated backup of your website?\",\"language\":\"en\",\"options\":[{\"label\":\"We use automated backups ourselves.\",\"value\":\"0.0\",\"imageUrl\":\"\"},{\"label\":\"We manually back up our website ourselves.\",\"value\":\"5.0\",\"imageUrl\":\"\"},{\"label\":\"We use an outside contractor\\/IT professional to back up our website.\",\"value\":\"10.0\",\"imageUrl\":\"\"},{\"label\":\"We do not back up our website regularly.\",\"value\":\"15\",\"imageUrl\":\"\"},{\"label\":\"I don\'t know.\",\"value\":\"15.0\",\"imageUrl\":\"\"},{\"label\":\"We don\'t have a website.\",\"value\":\"0\",\"imageUrl\":\"\"}],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":true,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"100610891\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"radio\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":{\"calculationAllowNegatives\":\"\",\"calculationCategory\":\"text\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"fieldOneCalculation\":\"\",\"fieldTwoCalculation\":\"\",\"rules\":[]},\"defaultValue\":{\"dtoType\":\"DefaultValueRadioDto\",\"otherValue\":\"\",\"value\":\"\"},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesRadioDto\",\"defaultValue\":\"\",\"hideRadioButtons\":false,\"imageDimensions\":\"customDimensions\",\"imageHeight\":100,\"imageLabelAlignment\":\"bottom\",\"imageWidth\":100,\"lockImageRatio\":true,\"lockImageRatioOption\":\"fitProportionally\",\"optionLayout\":\"vertical\",\"optionPartToStore\":\"value\",\"useImages\":false,\"useLabelsAndValues\":true,\"useOtherOption\":false,\"useRandomOption\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"98895257\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"Which of the following versions of your website does your organization have: HTTP, HTTPS, or both?\",\"language\":\"en\",\"options\":[{\"label\":\"HTTP\",\"value\":\"30.0\",\"imageUrl\":\"\"},{\"label\":\"HTTPS\",\"value\":\"0.0\",\"imageUrl\":\"\"},{\"label\":\"HTTPS but my browser says \\\"insecure\\\"\",\"value\":\"15\",\"imageUrl\":\"\"},{\"label\":\"Both\",\"value\":\"10\",\"imageUrl\":\"\"},{\"label\":\"I don\'t know.\",\"value\":\"15.00\",\"imageUrl\":\"\"}],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":true,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"100610891\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"radio\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":{\"calculationAllowNegatives\":null,\"calculationCategory\":\"number\",\"calculationOperator\":null,\"calculationUnits\":null,\"fieldOneCalculation\":null,\"fieldTwoCalculation\":null,\"rules\":[{\"fieldId\":\"98895221\",\"value\":null},{\"fieldId\":null,\"value\":\"+\"},{\"fieldId\":\"98895223\",\"value\":null},{\"fieldId\":null,\"value\":\"+\"},{\"fieldId\":\"98895224\",\"value\":null},{\"fieldId\":null,\"value\":\"+\"},{\"fieldId\":\"98895225\",\"value\":null},{\"fieldId\":null,\"value\":\"+\"},{\"fieldId\":\"98895257\",\"value\":null}]},\"defaultValue\":{\"dtoType\":\"DefaultValueStringDto\",\"value\":\"\"},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesNumberDto\",\"calculationAllowNegatives\":0,\"calculationCategory\":\"number\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"charactersWide\":5,\"currency\":null,\"currencyFormat\":\"\",\"defaultValue\":\"\",\"fieldOneCalculation\":0,\"fieldTwoCalculation\":0,\"maxValue\":null,\"minValue\":null,\"numberOfDecimals\":0,\"placeholderText\":\"\",\"useSlider\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":true,\"hideLabel\":false,\"id\":\"101934667\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"WEBSITE_SECURITY SCORE\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":true,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"100610891\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"number\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<div class=\\\"surveySubHeader\\\">\\n    Office Security\\n<\\/div>\\n\\n\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101934254\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"100610891\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"embed\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":{\"calculationAllowNegatives\":\"\",\"calculationCategory\":\"text\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"fieldOneCalculation\":\"\",\"fieldTwoCalculation\":\"\",\"rules\":[]},\"defaultValue\":{\"dtoType\":\"DefaultValueRadioDto\",\"otherValue\":\"\",\"value\":\"\"},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesRadioDto\",\"defaultValue\":\"\",\"hideRadioButtons\":false,\"imageDimensions\":\"customDimensions\",\"imageHeight\":100,\"imageLabelAlignment\":\"bottom\",\"imageWidth\":100,\"lockImageRatio\":true,\"lockImageRatioOption\":\"fitProportionally\",\"optionLayout\":\"vertical\",\"optionPartToStore\":\"value\",\"useImages\":false,\"useLabelsAndValues\":true,\"useOtherOption\":false,\"useRandomOption\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"98908928\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"How does your organization control who enters your offices?\",\"language\":\"en\",\"options\":[{\"label\":\"Visitors can come and go at will.\",\"value\":\"15.0\",\"imageUrl\":null},{\"label\":\"We only let visitors in when we recognize them.\",\"value\":\"10.0\",\"imageUrl\":null},{\"label\":\"We require an ID, but we don\\u2019t enforce this policy.\",\"value\":\"8.0\",\"imageUrl\":null},{\"label\":\"Only visitors with proper ID can enter our offices.\",\"value\":\"5.0\",\"imageUrl\":\"\"},{\"label\":\"We work in a shared space that controls access.\",\"value\":\"5\",\"imageUrl\":\"\"},{\"label\":\"We don\\u2019t have a physical office.\",\"value\":\"0.0\",\"imageUrl\":\"\"},{\"label\":\"I don\'t know.\",\"value\":\"15\",\"imageUrl\":\"\"}],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":true,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"100610891\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"radio\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":{\"calculationAllowNegatives\":\"\",\"calculationCategory\":\"text\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"fieldOneCalculation\":\"\",\"fieldTwoCalculation\":\"\",\"rules\":[]},\"defaultValue\":{\"dtoType\":\"DefaultValueRadioDto\",\"otherValue\":\"\",\"value\":\"\"},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesRadioDto\",\"defaultValue\":\"\",\"hideRadioButtons\":false,\"imageDimensions\":\"customDimensions\",\"imageHeight\":100,\"imageLabelAlignment\":\"bottom\",\"imageWidth\":100,\"lockImageRatio\":true,\"lockImageRatioOption\":\"fitProportionally\",\"optionLayout\":\"vertical\",\"optionPartToStore\":\"value\",\"useImages\":false,\"useLabelsAndValues\":true,\"useOtherOption\":false,\"useRandomOption\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"98912929\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"Does your organization have an alarm system or cameras in your offices?\",\"language\":\"en\",\"options\":[{\"label\":\"We have some form of video monitoring for our office.\",\"value\":\"10\",\"imageUrl\":null},{\"label\":\"We have some form of an alarm system in our office.\",\"value\":\"5.0\",\"imageUrl\":null},{\"label\":\"We have an alarm system that will capture the time and date when it goes off.\",\"value\":\"0.0\",\"imageUrl\":null},{\"label\":\"We have an alarm system that only makes warning noises.\",\"value\":\"10.0\",\"imageUrl\":\"\"},{\"label\":\"We have no security system.\",\"value\":\"15.0\",\"imageUrl\":\"\"},{\"label\":\"I don\'t know.\",\"value\":\"15\",\"imageUrl\":\"\"}],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":true,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"100610891\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"radio\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":{\"calculationAllowNegatives\":\"\",\"calculationCategory\":\"text\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"fieldOneCalculation\":\"\",\"fieldTwoCalculation\":\"\",\"rules\":[]},\"defaultValue\":{\"dtoType\":\"DefaultValueRadioDto\",\"otherValue\":\"\",\"value\":\"\"},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesRadioDto\",\"defaultValue\":\"\",\"hideRadioButtons\":false,\"imageDimensions\":\"customDimensions\",\"imageHeight\":100,\"imageLabelAlignment\":\"bottom\",\"imageWidth\":100,\"lockImageRatio\":true,\"lockImageRatioOption\":\"fitProportionally\",\"optionLayout\":\"vertical\",\"optionPartToStore\":\"value\",\"useImages\":false,\"useLabelsAndValues\":true,\"useOtherOption\":false,\"useRandomOption\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"98915673\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"Do you have a process for closing up at the end of the day in all your offices?\",\"language\":\"en\",\"options\":[{\"label\":\"We have a written checklist that includes storing devices and clearing off desks, as well as a special process for the last person out of the office.\",\"value\":\"0.0\",\"imageUrl\":null},{\"label\":\"We have a verbal procedure that includes storing devices and clearing off desks, as well as a special process for the last person out of the office.\",\"value\":\"5.0\",\"imageUrl\":null},{\"label\":\"We do not have a formal process.\",\"value\":\"15.0\",\"imageUrl\":null},{\"label\":\"I don\'t know.\",\"value\":\"15\",\"imageUrl\":\"\"}],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":true,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"100610891\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"radio\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":{\"calculationAllowNegatives\":\"\",\"calculationCategory\":\"text\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"fieldOneCalculation\":\"\",\"fieldTwoCalculation\":\"\",\"rules\":[]},\"defaultValue\":{\"dtoType\":\"DefaultValueRadioDto\",\"otherValue\":\"\",\"value\":\"\"},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesRadioDto\",\"defaultValue\":\"\",\"hideRadioButtons\":false,\"imageDimensions\":\"customDimensions\",\"imageHeight\":100,\"imageLabelAlignment\":\"bottom\",\"imageWidth\":100,\"lockImageRatio\":true,\"lockImageRatioOption\":\"fitProportionally\",\"optionLayout\":\"vertical\",\"optionPartToStore\":\"value\",\"useImages\":false,\"useLabelsAndValues\":true,\"useOtherOption\":false,\"useRandomOption\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"98913018\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"Do you have rules governing the disposal of printed information?\",\"language\":\"en\",\"options\":[{\"label\":\"We keep shredders closer than garbage cans and shred all printed information.\",\"value\":\"0.0\",\"imageUrl\":null},{\"label\":\"We have a single shredder, and staff are instructed to shred all paper.\",\"value\":\"5.0\",\"imageUrl\":null},{\"label\":\"We don\\u2019t have particular rules on what gets shredded or disposed of.\",\"value\":\"10,0\",\"imageUrl\":null},{\"label\":\"We do not dispose of any paper documents.\",\"value\":\"15.0\",\"imageUrl\":\"\"},{\"label\":\"I don\'t know.\",\"value\":\"15\",\"imageUrl\":\"\"}],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":true,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"100610891\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"radio\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":{\"calculationAllowNegatives\":null,\"calculationCategory\":\"number\",\"calculationOperator\":null,\"calculationUnits\":null,\"fieldOneCalculation\":null,\"fieldTwoCalculation\":null,\"rules\":[{\"fieldId\":\"98908928\",\"value\":null},{\"fieldId\":null,\"value\":\"+\"},{\"fieldId\":\"98912929\",\"value\":null},{\"fieldId\":null,\"value\":\"+\"},{\"fieldId\":\"98915673\",\"value\":null},{\"fieldId\":null,\"value\":\"+\"},{\"fieldId\":\"98913018\",\"value\":null}]},\"defaultValue\":{\"dtoType\":\"DefaultValueStringDto\",\"value\":\"\"},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesNumberDto\",\"calculationAllowNegatives\":0,\"calculationCategory\":\"number\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"charactersWide\":5,\"currency\":null,\"currencyFormat\":\"\",\"defaultValue\":\"\",\"fieldOneCalculation\":0,\"fieldTwoCalculation\":0,\"maxValue\":null,\"minValue\":null,\"numberOfDecimals\":0,\"placeholderText\":\"\",\"useSlider\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":true,\"hideLabel\":false,\"id\":\"101934492\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"OFFICE_SECURITY SCORE\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":true,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"100610891\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"number\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<div class=\\\"surveySubHeader\\\">\\n   Messaging and Collaboration\\n<\\/div>\\n\\n\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101934488\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"100610891\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"embed\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":{\"calculationAllowNegatives\":\"\",\"calculationCategory\":\"text\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"fieldOneCalculation\":\"\",\"fieldTwoCalculation\":\"\",\"rules\":[]},\"defaultValue\":{\"dtoType\":\"DefaultValueRadioDto\",\"otherValue\":\"\",\"value\":\"\"},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesRadioDto\",\"defaultValue\":\"\",\"hideRadioButtons\":false,\"imageDimensions\":\"customDimensions\",\"imageHeight\":100,\"imageLabelAlignment\":\"bottom\",\"imageWidth\":100,\"lockImageRatio\":true,\"lockImageRatioOption\":\"fitProportionally\",\"optionLayout\":\"vertical\",\"optionPartToStore\":\"value\",\"useImages\":false,\"useLabelsAndValues\":true,\"useOtherOption\":false,\"useRandomOption\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"98895229\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"How does your organization collaborate or message with each other privately and securely?\",\"language\":\"en\",\"options\":[{\"label\":\"We use secure messaging and collaboration tools (Signal, Wire, Semaphor, etc.).\",\"value\":\"0.0\",\"imageUrl\":\"\"},{\"label\":\"We use our personal devices and personal email accounts.\",\"value\":\"16.0\",\"imageUrl\":\"\"},{\"label\":\"We use work email on our personal devices.\",\"value\":\"10.0\",\"imageUrl\":\"\"},{\"label\":\"We don\\u2019t use any special tools to collaborate securely.\",\"value\":\"20.0\",\"imageUrl\":\"\"},{\"label\":\"I don\'t know.\",\"value\":\"I don\'t know.\",\"imageUrl\":\"\"}],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":true,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"100610891\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"radio\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":{\"calculationAllowNegatives\":\"\",\"calculationCategory\":\"text\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"fieldOneCalculation\":\"\",\"fieldTwoCalculation\":\"\",\"rules\":[]},\"defaultValue\":{\"dtoType\":\"DefaultValueRadioDto\",\"otherValue\":\"\",\"value\":\"\"},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesRadioDto\",\"defaultValue\":\"\",\"hideRadioButtons\":false,\"imageDimensions\":\"customDimensions\",\"imageHeight\":100,\"imageLabelAlignment\":\"bottom\",\"imageWidth\":100,\"lockImageRatio\":true,\"lockImageRatioOption\":\"fitProportionally\",\"optionLayout\":\"vertical\",\"optionPartToStore\":\"value\",\"useImages\":false,\"useLabelsAndValues\":true,\"useOtherOption\":false,\"useRandomOption\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"98895230\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"Does your organization have a process for working on sensitive topics?\",\"language\":\"en\",\"options\":[{\"label\":\"We have a dedicated workflow when working on sensitive topics.\",\"value\":\"0.0\",\"imageUrl\":\"\"},{\"label\":\"Some members of our staff  have a different workflow, but we have no official process.\",\"value\":\"5.0\",\"imageUrl\":\"\"},{\"label\":\"We don\\u2019t have a process for working on sensitive topics.\",\"value\":\"15.0\",\"imageUrl\":\"\"},{\"label\":\"We don\\u2019t work on sensitive topics.\",\"value\":\"0\",\"imageUrl\":\"\"},{\"label\":\"I don\'t know.\",\"value\":\"15\",\"imageUrl\":\"\"}],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":true,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"100610891\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"radio\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":{\"calculationAllowNegatives\":null,\"calculationCategory\":\"number\",\"calculationOperator\":null,\"calculationUnits\":null,\"fieldOneCalculation\":null,\"fieldTwoCalculation\":null,\"rules\":[{\"fieldId\":\"98895229\",\"value\":null},{\"fieldId\":null,\"value\":\"+\"},{\"fieldId\":\"98895230\",\"value\":null}]},\"defaultValue\":{\"dtoType\":\"DefaultValueStringDto\",\"value\":\"\"},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesNumberDto\",\"calculationAllowNegatives\":0,\"calculationCategory\":\"number\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"charactersWide\":5,\"currency\":null,\"currencyFormat\":\"\",\"defaultValue\":\"\",\"fieldOneCalculation\":0,\"fieldTwoCalculation\":0,\"maxValue\":null,\"minValue\":null,\"numberOfDecimals\":0,\"placeholderText\":\"\",\"useSlider\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":true,\"hideLabel\":false,\"id\":\"101935523\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"MESSAGING_SECURELY SCORE\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":true,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"100610891\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"number\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<div class=\\\"surveySubHeader\\\">\\n  Legal Risks\\n<\\/div>\\n\\n\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101935303\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"100610891\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"embed\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":{\"calculationAllowNegatives\":\"\",\"calculationCategory\":\"text\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"fieldOneCalculation\":\"\",\"fieldTwoCalculation\":\"\",\"rules\":[]},\"defaultValue\":{\"dtoType\":\"DefaultValueRadioDto\",\"otherValue\":\"\",\"value\":\"\"},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesRadioDto\",\"defaultValue\":\"\",\"hideRadioButtons\":false,\"imageDimensions\":\"customDimensions\",\"imageHeight\":100,\"imageLabelAlignment\":\"bottom\",\"imageWidth\":100,\"lockImageRatio\":true,\"lockImageRatioOption\":\"fitProportionally\",\"optionLayout\":\"vertical\",\"optionPartToStore\":\"value\",\"useImages\":false,\"useLabelsAndValues\":true,\"useOtherOption\":false,\"useRandomOption\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"98895231\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"What concerns do you have about potential legal requests for your organization\\u2019s internal documents?\",\"language\":\"en\",\"options\":[{\"label\":\"We are very concerned about legal requests for internal documents.\",\"value\":\"0.0\",\"imageUrl\":\"\"},{\"label\":\"We are somewhat concerned about legal requests for internal documents.\",\"value\":\"5.0\",\"imageUrl\":\"\"},{\"label\":\"We are not concerned about legal requests for internal documents.\",\"value\":\"10.0\",\"imageUrl\":\"\"},{\"label\":\"We\'ve never had a legal request for internal documents.\",\"value\":\"We\'ve never had a legal request for internal documents.\",\"imageUrl\":\"\"},{\"label\":\"I don\'t know.\",\"value\":\"I don\'t know.\",\"imageUrl\":\"\"}],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":true,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"100610891\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"radio\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":{\"calculationAllowNegatives\":null,\"calculationCategory\":\"number\",\"calculationOperator\":null,\"calculationUnits\":null,\"fieldOneCalculation\":null,\"fieldTwoCalculation\":null,\"rules\":[{\"fieldId\":\"98895231\",\"value\":null}]},\"defaultValue\":{\"dtoType\":\"DefaultValueStringDto\",\"value\":\"\"},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesNumberDto\",\"calculationAllowNegatives\":0,\"calculationCategory\":\"number\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"charactersWide\":5,\"currency\":null,\"currencyFormat\":\"\",\"defaultValue\":\"\",\"fieldOneCalculation\":0,\"fieldTwoCalculation\":0,\"maxValue\":null,\"minValue\":null,\"numberOfDecimals\":0,\"placeholderText\":\"\",\"useSlider\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":true,\"hideLabel\":false,\"id\":\"101935877\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"LEGAL_RISKS SCORE\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":true,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"100610891\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"number\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null}],\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"100610891\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"section\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesSectionDto\",\"content\":\"\",\"heading\":\"\",\"labelPosition\":\"\",\"languageFormat\":\"default\",\"numColumns\":\"0\",\"usePageBreak\":true},\"fields\":[{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<p>You have completed the Operational Security portion of this survey.<br><br><strong>Operational Security<\\/strong><br>Device Security<br>Associated Risks<br>Account Security<br><br><\\/p><p><br><\\/p>\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"100611179\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"100611159\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"richtext\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null}],\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"100611159\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"section\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesSectionDto\",\"content\":\"\",\"heading\":\"Device Security\",\"labelPosition\":\"\",\"languageFormat\":\"default\",\"numColumns\":\"0\",\"usePageBreak\":true},\"fields\":[{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<div class=\\\"surveySubHeader\\\">\\n  Device Security and Compartmentalization\\n<\\/div>\\n\\n\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101936101\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"98895235\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"embed\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":{\"calculationAllowNegatives\":\"\",\"calculationCategory\":\"text\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"fieldOneCalculation\":\"\",\"fieldTwoCalculation\":\"\",\"rules\":[]},\"defaultValue\":{\"dtoType\":\"DefaultValueRadioDto\",\"otherValue\":\"\",\"value\":\"\"},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesRadioDto\",\"defaultValue\":\"\",\"hideRadioButtons\":false,\"imageDimensions\":\"customDimensions\",\"imageHeight\":100,\"imageLabelAlignment\":\"bottom\",\"imageWidth\":100,\"lockImageRatio\":true,\"lockImageRatioOption\":\"fitProportionally\",\"optionLayout\":\"vertical\",\"optionPartToStore\":\"value\",\"useImages\":false,\"useLabelsAndValues\":true,\"useOtherOption\":false,\"useRandomOption\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"98895237\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"Do members of your staff use their personal email for work-related tasks?\",\"language\":\"en\",\"options\":[{\"label\":\"Yes, all staff members do.\",\"value\":\"15.0\",\"imageUrl\":\"\"},{\"label\":\"Yes, some staff members do.\",\"value\":\"10.0\",\"imageUrl\":\"\"},{\"label\":\"No, our staff members do not.\",\"value\":\"0.0\",\"imageUrl\":\"\"},{\"label\":\"My organization doesn\\u2019t know.\",\"value\":\"15\",\"imageUrl\":\"\"}],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":true,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"98895235\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"radio\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":{\"calculationAllowNegatives\":null,\"calculationCategory\":\"number\",\"calculationOperator\":null,\"calculationUnits\":null,\"fieldOneCalculation\":null,\"fieldTwoCalculation\":null,\"rules\":[{\"fieldId\":\"98895237\",\"value\":null}]},\"defaultValue\":{\"dtoType\":\"DefaultValueStringDto\",\"value\":\"\"},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesNumberDto\",\"calculationAllowNegatives\":0,\"calculationCategory\":\"number\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"charactersWide\":5,\"currency\":null,\"currencyFormat\":\"\",\"defaultValue\":\"\",\"fieldOneCalculation\":0,\"fieldTwoCalculation\":0,\"maxValue\":null,\"minValue\":null,\"numberOfDecimals\":0,\"placeholderText\":\"\",\"useSlider\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":true,\"hideLabel\":false,\"id\":\"101936426\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"DEVICE_COMPARTMENTALIZE SCORE\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":true,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"98895235\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"number\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"\\n<div class=\\\"surveySubHeader\\\">\\n    Software Security\\n<\\/div>\\n\\n\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101936240\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"98895235\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"embed\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":{\"calculationAllowNegatives\":\"\",\"calculationCategory\":\"text\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"fieldOneCalculation\":\"\",\"fieldTwoCalculation\":\"\",\"rules\":[]},\"defaultValue\":{\"dtoType\":\"DefaultValueRadioDto\",\"otherValue\":\"\",\"value\":\"\"},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesRadioDto\",\"defaultValue\":\"\",\"hideRadioButtons\":false,\"imageDimensions\":\"customDimensions\",\"imageHeight\":100,\"imageLabelAlignment\":\"bottom\",\"imageWidth\":100,\"lockImageRatio\":true,\"lockImageRatioOption\":\"fitProportionally\",\"optionLayout\":\"vertical\",\"optionPartToStore\":\"value\",\"useImages\":false,\"useLabelsAndValues\":true,\"useOtherOption\":false,\"useRandomOption\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"98895238\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"How does your staff get work-related software?\",\"language\":\"en\",\"options\":[{\"label\":\"Our staff purchases work-related software online from a marketplace (app store, retailer, etc.).\",\"value\":\"5.0\",\"imageUrl\":\"\"},{\"label\":\"We share work-related software with another organization.\",\"value\":\"10\",\"imageUrl\":\"\"},{\"label\":\"We use other means to get our software.\",\"value\":\"15.0\",\"imageUrl\":\"\"},{\"label\":\"I don\'t know.\",\"value\":\"15\",\"imageUrl\":\"\"}],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":true,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"98895235\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"radio\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":{\"calculationAllowNegatives\":\"\",\"calculationCategory\":\"text\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"fieldOneCalculation\":\"\",\"fieldTwoCalculation\":\"\",\"rules\":[]},\"defaultValue\":{\"dtoType\":\"DefaultValueRadioDto\",\"otherValue\":\"\",\"value\":\"\"},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesRadioDto\",\"defaultValue\":\"\",\"hideRadioButtons\":false,\"imageDimensions\":\"customDimensions\",\"imageHeight\":100,\"imageLabelAlignment\":\"bottom\",\"imageWidth\":100,\"lockImageRatio\":true,\"lockImageRatioOption\":\"fitProportionally\",\"optionLayout\":\"vertical\",\"optionPartToStore\":\"value\",\"useImages\":false,\"useLabelsAndValues\":true,\"useOtherOption\":false,\"useRandomOption\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"98895239\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"Does your staff download pirated personal or work-related software?\",\"language\":\"en\",\"options\":[{\"label\":\"Yes, our staff often downloads pirated personal\\/work-related software.\",\"value\":\"35\",\"imageUrl\":\"\"},{\"label\":\"Yes, our staff sometimes downloads pirated personal\\/work-related software.\",\"value\":\"20\",\"imageUrl\":\"\"},{\"label\":\"No, our staff only downloads software from an approved source.\",\"value\":\"0.0\",\"imageUrl\":\"\"},{\"label\":\"I don\\u2019t know.\",\"value\":\"15.0\",\"imageUrl\":\"\"}],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":true,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"98895235\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"radio\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":{\"calculationAllowNegatives\":\"\",\"calculationCategory\":\"text\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"fieldOneCalculation\":\"\",\"fieldTwoCalculation\":\"\",\"rules\":[]},\"defaultValue\":{\"dtoType\":\"DefaultValueRadioDto\",\"otherValue\":\"\",\"value\":\"\"},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesRadioDto\",\"defaultValue\":\"\",\"hideRadioButtons\":false,\"imageDimensions\":\"customDimensions\",\"imageHeight\":100,\"imageLabelAlignment\":\"bottom\",\"imageWidth\":100,\"lockImageRatio\":true,\"lockImageRatioOption\":\"fitProportionally\",\"optionLayout\":\"vertical\",\"optionPartToStore\":\"value\",\"useImages\":false,\"useLabelsAndValues\":true,\"useOtherOption\":false,\"useRandomOption\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101550992\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"Is your staff permitted to download any software onto work devices?\",\"language\":\"en\",\"options\":[{\"label\":\"Yes, our staff is permitted to download any software.\",\"value\":\"20\",\"imageUrl\":\"\"},{\"label\":\"No, our staff is not permitted to download any software.\",\"value\":\"0\",\"imageUrl\":\"\"},{\"label\":\"I don\\u2019t know.\",\"value\":\"15.0\",\"imageUrl\":\"\"}],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":true,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"98895235\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"radio\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":{\"calculationAllowNegatives\":null,\"calculationCategory\":\"number\",\"calculationOperator\":null,\"calculationUnits\":null,\"fieldOneCalculation\":null,\"fieldTwoCalculation\":null,\"rules\":[{\"fieldId\":\"98895238\",\"value\":null},{\"fieldId\":null,\"value\":\"+\"},{\"fieldId\":\"98895239\",\"value\":null},{\"fieldId\":null,\"value\":\"+\"},{\"fieldId\":\"101550992\",\"value\":null}]},\"defaultValue\":{\"dtoType\":\"DefaultValueStringDto\",\"value\":\"\"},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesNumberDto\",\"calculationAllowNegatives\":0,\"calculationCategory\":\"number\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"charactersWide\":5,\"currency\":null,\"currencyFormat\":\"\",\"defaultValue\":\"\",\"fieldOneCalculation\":0,\"fieldTwoCalculation\":0,\"maxValue\":null,\"minValue\":null,\"numberOfDecimals\":0,\"placeholderText\":\"\",\"useSlider\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":true,\"hideLabel\":false,\"id\":\"101936568\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"SOFTWARE_SECURITY SCORE\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":true,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"98895235\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"number\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"\\n<div class=\\\"surveySubHeader\\\">\\n    Data Encryption\\n<\\/div>\\n\\n\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101936569\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"98895235\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"embed\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":{\"calculationAllowNegatives\":\"\",\"calculationCategory\":\"text\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"fieldOneCalculation\":\"\",\"fieldTwoCalculation\":\"\",\"rules\":[]},\"defaultValue\":{\"dtoType\":\"DefaultValueRadioDto\",\"otherValue\":\"\",\"value\":\"\"},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesRadioDto\",\"defaultValue\":\"\",\"hideRadioButtons\":false,\"imageDimensions\":\"customDimensions\",\"imageHeight\":100,\"imageLabelAlignment\":\"bottom\",\"imageWidth\":100,\"lockImageRatio\":true,\"lockImageRatioOption\":\"fitProportionally\",\"optionLayout\":\"vertical\",\"optionPartToStore\":\"value\",\"useImages\":false,\"useLabelsAndValues\":true,\"useOtherOption\":false,\"useRandomOption\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"98895240\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"Does your organization encrypt backups and\\/or external media (hard drives, USB drives, etc.)?\",\"language\":\"en\",\"options\":[{\"label\":\"Yes\",\"value\":\"0.0\",\"imageUrl\":\"\"},{\"label\":\"No\",\"value\":\"8.0\",\"imageUrl\":\"\"},{\"label\":\"I don\'t know.\",\"value\":\"10.0\",\"imageUrl\":\"\"}],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":true,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"98895235\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"radio\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":{\"calculationAllowNegatives\":\"\",\"calculationCategory\":\"text\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"fieldOneCalculation\":\"\",\"fieldTwoCalculation\":\"\",\"rules\":[]},\"defaultValue\":{\"dtoType\":\"DefaultValueRadioDto\",\"otherValue\":\"\",\"value\":\"\"},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesRadioDto\",\"defaultValue\":\"\",\"hideRadioButtons\":false,\"imageDimensions\":\"customDimensions\",\"imageHeight\":100,\"imageLabelAlignment\":\"bottom\",\"imageWidth\":100,\"lockImageRatio\":true,\"lockImageRatioOption\":\"fitProportionally\",\"optionLayout\":\"vertical\",\"optionPartToStore\":\"value\",\"useImages\":false,\"useLabelsAndValues\":true,\"useOtherOption\":false,\"useRandomOption\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"98916381\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"Do you have a process for acquiring, maintaining, and disposing of hardware and devices that includes security procedures (for example, erasing devices between uses)?\",\"language\":\"en\",\"options\":[{\"label\":\"Yes\",\"value\":\"0.0\",\"imageUrl\":null},{\"label\":\"No\",\"value\":\"20.0\",\"imageUrl\":null},{\"label\":\"I don\'t know.\",\"value\":\"5.0\",\"imageUrl\":\"\"}],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":true,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"98895235\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"radio\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":{\"calculationAllowNegatives\":null,\"calculationCategory\":\"number\",\"calculationOperator\":null,\"calculationUnits\":null,\"fieldOneCalculation\":null,\"fieldTwoCalculation\":null,\"rules\":[{\"fieldId\":\"98895240\",\"value\":null},{\"fieldId\":null,\"value\":\"+\"}]},\"defaultValue\":{\"dtoType\":\"DefaultValueStringDto\",\"value\":\"\"},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesNumberDto\",\"calculationAllowNegatives\":0,\"calculationCategory\":\"number\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"charactersWide\":5,\"currency\":null,\"currencyFormat\":\"\",\"defaultValue\":\"\",\"fieldOneCalculation\":0,\"fieldTwoCalculation\":0,\"maxValue\":null,\"minValue\":null,\"numberOfDecimals\":0,\"placeholderText\":\"\",\"useSlider\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":true,\"hideLabel\":false,\"id\":\"101937043\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"DATA_N_ENCRYPTION\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":true,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"98895235\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"number\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null}],\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"98895235\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"section\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesSectionDto\",\"content\":\"\",\"heading\":\"\",\"labelPosition\":\"\",\"languageFormat\":\"default\",\"numColumns\":\"0\",\"usePageBreak\":true},\"fields\":[{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<p>You have completed the Device Security portion of this survey.<\\/p><p><br><strong>Operational Security<\\/strong><br><strong>Device Security<\\/strong><br>Account Security<br>Associated Risks<\\/p>\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"100847343\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"100610587\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"richtext\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null}],\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"100610587\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"section\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesSectionDto\",\"content\":\"\",\"heading\":\"Account Security\",\"labelPosition\":\"\",\"languageFormat\":\"default\",\"numColumns\":\"0\",\"usePageBreak\":true},\"fields\":[{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<div class=\\\"surveySubHeader\\\">\\n      Password Management and Authentication\\n<\\/div>\\n\\n\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101937129\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"98895247\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"embed\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":{\"calculationAllowNegatives\":\"\",\"calculationCategory\":\"text\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"fieldOneCalculation\":\"\",\"fieldTwoCalculation\":\"\",\"rules\":[]},\"defaultValue\":{\"dtoType\":\"DefaultValueRadioDto\",\"otherValue\":\"\",\"value\":\"\"},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesRadioDto\",\"defaultValue\":\"\",\"hideRadioButtons\":false,\"imageDimensions\":\"customDimensions\",\"imageHeight\":100,\"imageLabelAlignment\":\"bottom\",\"imageWidth\":100,\"lockImageRatio\":true,\"lockImageRatioOption\":\"fitProportionally\",\"optionLayout\":\"vertical\",\"optionPartToStore\":\"value\",\"useImages\":false,\"useLabelsAndValues\":true,\"useOtherOption\":false,\"useRandomOption\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"98895248\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"Do members of your organization use a password manager?\",\"language\":\"en\",\"options\":[{\"label\":\"Yes, all staff members do.\",\"value\":\"0\",\"imageUrl\":\"\"},{\"label\":\"Yes, some staff members do.\",\"value\":\"5.0\",\"imageUrl\":\"\"},{\"label\":\"No, our staff members do not.\",\"value\":\"15.0\",\"imageUrl\":\"\"},{\"label\":\"I don\\u2019t know.\",\"value\":\"I don\\u2019t know.\",\"imageUrl\":\"\"}],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":true,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"98895247\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"radio\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":{\"calculationAllowNegatives\":\"\",\"calculationCategory\":\"text\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"fieldOneCalculation\":\"\",\"fieldTwoCalculation\":\"\",\"rules\":[]},\"defaultValue\":{\"dtoType\":\"DefaultValueRadioDto\",\"otherValue\":\"\",\"value\":\"\"},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesRadioDto\",\"defaultValue\":\"\",\"hideRadioButtons\":false,\"imageDimensions\":\"customDimensions\",\"imageHeight\":100,\"imageLabelAlignment\":\"bottom\",\"imageWidth\":100,\"lockImageRatio\":true,\"lockImageRatioOption\":\"fitProportionally\",\"optionLayout\":\"vertical\",\"optionPartToStore\":\"value\",\"useImages\":false,\"useLabelsAndValues\":true,\"useOtherOption\":false,\"useRandomOption\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"98895249\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"Do members of your organization store their existing passwords in the password manager, use it to generate new passwords, or both?\",\"language\":\"en\",\"options\":[{\"label\":\"Store existing passwords\",\"value\":\"10.0\",\"imageUrl\":\"\"},{\"label\":\"Generate new passwords\",\"value\":\"0.0\",\"imageUrl\":\"\"},{\"label\":\"Both\",\"value\":\"5.0\",\"imageUrl\":\"\"},{\"label\":\"We don\'t use a password manager.\",\"value\":\"15.0\",\"imageUrl\":\"\"},{\"label\":\"I don\'t know.\",\"value\":\"I don\'t know.\",\"imageUrl\":\"\"}],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":true,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"98895247\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"radio\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":{\"calculationAllowNegatives\":\"\",\"calculationCategory\":\"text\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"fieldOneCalculation\":\"\",\"fieldTwoCalculation\":\"\",\"rules\":[]},\"defaultValue\":{\"dtoType\":\"DefaultValueRadioDto\",\"otherValue\":\"\",\"value\":\"\"},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesRadioDto\",\"defaultValue\":\"\",\"hideRadioButtons\":false,\"imageDimensions\":\"customDimensions\",\"imageHeight\":100,\"imageLabelAlignment\":\"bottom\",\"imageWidth\":100,\"lockImageRatio\":true,\"lockImageRatioOption\":\"fitProportionally\",\"optionLayout\":\"vertical\",\"optionPartToStore\":\"value\",\"useImages\":false,\"useLabelsAndValues\":true,\"useOtherOption\":false,\"useRandomOption\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"98895250\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"To log in to your email and other services, do members of your organization use two-factor\\/multi-factor authentication, such as Okta, DUO Security, Google Authenticator, Authy, or RSA ID?\",\"language\":\"en\",\"options\":[{\"label\":\"Yes, all staff members do.\",\"value\":\"0\",\"imageUrl\":\"\"},{\"label\":\"Yes, some staff members do.\",\"value\":\"5.0\",\"imageUrl\":\"\"},{\"label\":\"No, our staff members do not.\",\"value\":\"15.0\",\"imageUrl\":\"\"},{\"label\":\"I don\'t know.\",\"value\":\"15\",\"imageUrl\":\"\"}],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":true,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"98895247\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"radio\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":{\"calculationAllowNegatives\":null,\"calculationCategory\":\"number\",\"calculationOperator\":null,\"calculationUnits\":null,\"fieldOneCalculation\":null,\"fieldTwoCalculation\":null,\"rules\":[{\"fieldId\":\"98895248\",\"value\":null},{\"fieldId\":null,\"value\":\"+\"},{\"fieldId\":\"98895249\",\"value\":null},{\"fieldId\":null,\"value\":\"+\"},{\"fieldId\":\"98895250\",\"value\":null}]},\"defaultValue\":{\"dtoType\":\"DefaultValueStringDto\",\"value\":\"\"},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesNumberDto\",\"calculationAllowNegatives\":0,\"calculationCategory\":\"number\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"charactersWide\":5,\"currency\":null,\"currencyFormat\":\"\",\"defaultValue\":\"\",\"fieldOneCalculation\":0,\"fieldTwoCalculation\":0,\"maxValue\":null,\"minValue\":null,\"numberOfDecimals\":0,\"placeholderText\":\"\",\"useSlider\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":true,\"hideLabel\":false,\"id\":\"101937201\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"PASSWORD_MANAGER_N_AUTH SCORE\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":true,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"98895247\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"number\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<div class=\\\"surveySubHeader\\\">\\n      Updates\\n<\\/div>\\n\\n\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101942766\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"98895247\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"embed\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":{\"calculationAllowNegatives\":\"\",\"calculationCategory\":\"text\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"fieldOneCalculation\":\"\",\"fieldTwoCalculation\":\"\",\"rules\":[]},\"defaultValue\":{\"dtoType\":\"DefaultValueRadioDto\",\"otherValue\":\"\",\"value\":\"\"},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesRadioDto\",\"defaultValue\":\"\",\"hideRadioButtons\":false,\"imageDimensions\":\"customDimensions\",\"imageHeight\":100,\"imageLabelAlignment\":\"bottom\",\"imageWidth\":100,\"lockImageRatio\":true,\"lockImageRatioOption\":\"fitProportionally\",\"optionLayout\":\"vertical\",\"optionPartToStore\":\"value\",\"useImages\":false,\"useLabelsAndValues\":true,\"useOtherOption\":false,\"useRandomOption\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"98895251\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"How does your organization make sure that critical systems (computers, servers, etc.) receive the latest security updates in a timely manner?\",\"language\":\"en\",\"options\":[{\"label\":\"Our internal IT department installs updates on a regular\\/standard schedule.\",\"value\":\"0\",\"imageUrl\":\"\"},{\"label\":\"An outside contractor\\/IT provider installs updates on a regular\\/standard schedule.\",\"value\":\"5\",\"imageUrl\":\"\"},{\"label\":\"We do not have a policy for system updates.\",\"value\":\"15\",\"imageUrl\":\"\"},{\"label\":\"We make installing updates the responsibility of each individual user.\",\"value\":\"10\",\"imageUrl\":\"\"},{\"label\":\"We do not install system updates regularly.\",\"value\":\"20\",\"imageUrl\":\"\"},{\"label\":\"I don\'t know.\",\"value\":\"I don\'t know.\",\"imageUrl\":\"\"}],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":true,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"98895247\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"radio\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":{\"calculationAllowNegatives\":null,\"calculationCategory\":\"number\",\"calculationOperator\":null,\"calculationUnits\":null,\"fieldOneCalculation\":null,\"fieldTwoCalculation\":null,\"rules\":[{\"fieldId\":\"98895251\",\"value\":null}]},\"defaultValue\":{\"dtoType\":\"DefaultValueStringDto\",\"value\":\"\"},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesNumberDto\",\"calculationAllowNegatives\":0,\"calculationCategory\":\"number\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"charactersWide\":5,\"currency\":null,\"currencyFormat\":\"\",\"defaultValue\":\"\",\"fieldOneCalculation\":0,\"fieldTwoCalculation\":0,\"maxValue\":null,\"minValue\":null,\"numberOfDecimals\":0,\"placeholderText\":\"\",\"useSlider\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":true,\"hideLabel\":false,\"id\":\"101942786\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"UPDATES_SECURITY SCORE\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":true,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"98895247\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"number\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<div class=\\\"surveySubHeader\\\">\\n      Operational Continuity\\n<\\/div>\\n\\n\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101942809\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"98895247\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"embed\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":{\"calculationAllowNegatives\":\"\",\"calculationCategory\":\"text\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"fieldOneCalculation\":\"\",\"fieldTwoCalculation\":\"\",\"rules\":[]},\"defaultValue\":{\"dtoType\":\"DefaultValueRadioDto\",\"otherValue\":\"\",\"value\":\"\"},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesRadioDto\",\"defaultValue\":\"\",\"hideRadioButtons\":false,\"imageDimensions\":\"customDimensions\",\"imageHeight\":100,\"imageLabelAlignment\":\"bottom\",\"imageWidth\":100,\"lockImageRatio\":true,\"lockImageRatioOption\":\"fitProportionally\",\"optionLayout\":\"vertical\",\"optionPartToStore\":\"value\",\"useImages\":false,\"useLabelsAndValues\":true,\"useOtherOption\":false,\"useRandomOption\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"98895252\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"Do you have a contingency plan in case your main method of communication (e.g., email) becomes unreliable?\",\"language\":\"en\",\"options\":[{\"label\":\"We have a written contingency plan.\",\"value\":\"0\",\"imageUrl\":\"\"},{\"label\":\"We have a contingency plan, but it\\u2019s not written down.\",\"value\":\"10\",\"imageUrl\":\"\"},{\"label\":\"We do not have a contingency plan for this situation.\",\"value\":\"15\",\"imageUrl\":\"\"},{\"label\":\"I don\'t know.\",\"value\":\"I don\'t know.\",\"imageUrl\":\"\"}],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":true,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"98895247\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"radio\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":{\"calculationAllowNegatives\":\"\",\"calculationCategory\":\"text\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"fieldOneCalculation\":\"\",\"fieldTwoCalculation\":\"\",\"rules\":[]},\"defaultValue\":{\"dtoType\":\"DefaultValueRadioDto\",\"otherValue\":\"\",\"value\":\"\"},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesRadioDto\",\"defaultValue\":\"\",\"hideRadioButtons\":false,\"imageDimensions\":\"customDimensions\",\"imageHeight\":100,\"imageLabelAlignment\":\"bottom\",\"imageWidth\":100,\"lockImageRatio\":true,\"lockImageRatioOption\":\"fitProportionally\",\"optionLayout\":\"vertical\",\"optionPartToStore\":\"value\",\"useImages\":false,\"useLabelsAndValues\":true,\"useOtherOption\":false,\"useRandomOption\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"98895253\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"How would you continue your organization\\u2019s operations in case an emergency prevents access to your physical office or online systems (such as a natural disaster)?\",\"language\":\"en\",\"options\":[{\"label\":\"We have a written remote work policy.\",\"value\":\"0\",\"imageUrl\":\"\"},{\"label\":\"We have a verbal agreement but no documented policy.\",\"value\":\"10\",\"imageUrl\":\"\"},{\"label\":\"We do not have a contingency plan for such a situation.\",\"value\":\"15\",\"imageUrl\":\"\"},{\"label\":\"I don\'t know.\",\"value\":\"I don\'t know.\",\"imageUrl\":\"\"}],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":true,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"98895247\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"radio\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":{\"calculationAllowNegatives\":\"\",\"calculationCategory\":\"text\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"fieldOneCalculation\":\"\",\"fieldTwoCalculation\":\"\",\"rules\":[]},\"defaultValue\":{\"dtoType\":\"DefaultValueRadioDto\",\"otherValue\":\"\",\"value\":\"\"},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesRadioDto\",\"defaultValue\":\"\",\"hideRadioButtons\":false,\"imageDimensions\":\"customDimensions\",\"imageHeight\":100,\"imageLabelAlignment\":\"bottom\",\"imageWidth\":100,\"lockImageRatio\":true,\"lockImageRatioOption\":\"fitProportionally\",\"optionLayout\":\"vertical\",\"optionPartToStore\":\"value\",\"useImages\":false,\"useLabelsAndValues\":true,\"useOtherOption\":false,\"useRandomOption\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"98916448\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"How would your organization recover from fire, flood, theft, or other incidents?\",\"language\":\"en\",\"options\":[{\"label\":\"We could start over because we have full copies of the data on our devices stored locally (off-line).\",\"value\":\"0\",\"imageUrl\":null},{\"label\":\"We could start over because our data is stored in the cloud.\",\"value\":\"10\",\"imageUrl\":null},{\"label\":\"We have some printed documents and materials that we might be able to use.\",\"value\":\"15\",\"imageUrl\":null},{\"label\":\"This would be catastrophic because we do not have any backups of our data.\",\"value\":\"20\",\"imageUrl\":\"\"},{\"label\":\"I don\'t know.\",\"value\":\"I don\'t know.\",\"imageUrl\":\"\"}],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":true,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"98895247\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"radio\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":{\"calculationAllowNegatives\":null,\"calculationCategory\":\"number\",\"calculationOperator\":null,\"calculationUnits\":null,\"fieldOneCalculation\":null,\"fieldTwoCalculation\":null,\"rules\":[{\"fieldId\":\"98895252\",\"value\":null},{\"fieldId\":null,\"value\":\"+\"},{\"fieldId\":\"98895253\",\"value\":null},{\"fieldId\":null,\"value\":\"+\"},{\"fieldId\":\"98916448\",\"value\":null}]},\"defaultValue\":{\"dtoType\":\"DefaultValueStringDto\",\"value\":\"\"},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesNumberDto\",\"calculationAllowNegatives\":0,\"calculationCategory\":\"number\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"charactersWide\":5,\"currency\":null,\"currencyFormat\":\"\",\"defaultValue\":\"\",\"fieldOneCalculation\":0,\"fieldTwoCalculation\":0,\"maxValue\":null,\"minValue\":null,\"numberOfDecimals\":0,\"placeholderText\":\"\",\"useSlider\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":true,\"hideLabel\":false,\"id\":\"101943127\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"CONTINUITY_SECURITY SCORE\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":true,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"98895247\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"number\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<div class=\\\"surveySubHeader\\\">\\n      Third Party Services\\n<\\/div>\\n\\n\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101943152\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"98895247\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"embed\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":{\"calculationAllowNegatives\":\"\",\"calculationCategory\":\"text\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"fieldOneCalculation\":\"\",\"fieldTwoCalculation\":\"\",\"rules\":[]},\"defaultValue\":{\"dtoType\":\"DefaultValueRadioDto\",\"otherValue\":\"\",\"value\":\"\"},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesRadioDto\",\"defaultValue\":\"\",\"hideRadioButtons\":false,\"imageDimensions\":\"customDimensions\",\"imageHeight\":100,\"imageLabelAlignment\":\"bottom\",\"imageWidth\":100,\"lockImageRatio\":true,\"lockImageRatioOption\":\"fitProportionally\",\"optionLayout\":\"vertical\",\"optionPartToStore\":\"value\",\"useImages\":false,\"useLabelsAndValues\":true,\"useOtherOption\":false,\"useRandomOption\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"98895254\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"Are you actively keeping track of the external online services (e.g. social media, Github, etc.) that your organization uses?\",\"language\":\"en\",\"options\":[{\"label\":\"We have an updated list that is written down.\",\"value\":\"0\",\"imageUrl\":\"\"},{\"label\":\"We have a list that is written down but not updated.\",\"value\":\"10\",\"imageUrl\":\"\"},{\"label\":\"We have a verbal list but nothing written down.\",\"value\":\"15\",\"imageUrl\":\"\"},{\"label\":\"We do not have a list\",\"value\":\"20\",\"imageUrl\":\"\"},{\"label\":\"I don\'t know.\",\"value\":\"15.0\",\"imageUrl\":\"\"}],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":true,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"98895247\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"radio\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":{\"calculationAllowNegatives\":\"\",\"calculationCategory\":\"text\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"fieldOneCalculation\":\"\",\"fieldTwoCalculation\":\"\",\"rules\":[]},\"defaultValue\":{\"dtoType\":\"DefaultValueRadioDto\",\"otherValue\":\"\",\"value\":\"\"},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesRadioDto\",\"defaultValue\":\"\",\"hideRadioButtons\":false,\"imageDimensions\":\"customDimensions\",\"imageHeight\":100,\"imageLabelAlignment\":\"bottom\",\"imageWidth\":100,\"lockImageRatio\":true,\"lockImageRatioOption\":\"fitProportionally\",\"optionLayout\":\"vertical\",\"optionPartToStore\":\"value\",\"useImages\":false,\"useLabelsAndValues\":true,\"useOtherOption\":false,\"useRandomOption\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"98895255\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"Do you have guidelines or documentation within your organization on how to use external online services safely?\",\"language\":\"en\",\"options\":[{\"label\":\"We have written guidelines for external services.\",\"value\":\"0\",\"imageUrl\":\"\"},{\"label\":\"We have a verbal understanding but no written policy.\",\"value\":\"10\",\"imageUrl\":\"\"},{\"label\":\"We do not have any guidelines for using these services.\",\"value\":\"20\",\"imageUrl\":\"\"},{\"label\":\"I don\\u2019t know.\",\"value\":\"I don\\u2019t know.\",\"imageUrl\":\"\"}],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":true,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"98895247\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"radio\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":{\"calculationAllowNegatives\":\"\",\"calculationCategory\":\"text\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"fieldOneCalculation\":\"\",\"fieldTwoCalculation\":\"\",\"rules\":[]},\"defaultValue\":{\"dtoType\":\"DefaultValueRadioDto\",\"otherValue\":\"\",\"value\":\"\"},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesRadioDto\",\"defaultValue\":\"\",\"hideRadioButtons\":false,\"imageDimensions\":\"customDimensions\",\"imageHeight\":100,\"imageLabelAlignment\":\"bottom\",\"imageWidth\":100,\"lockImageRatio\":true,\"lockImageRatioOption\":\"fitProportionally\",\"optionLayout\":\"vertical\",\"optionPartToStore\":\"value\",\"useImages\":false,\"useLabelsAndValues\":true,\"useOtherOption\":false,\"useRandomOption\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"98917501\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"Do you use non-business platforms (e.g. Facebook Messenger, WeTransfer, Instagram, etc.) to share or receive sensitive information?\",\"language\":\"en\",\"options\":[{\"label\":\"We often share or receive sensitive information via non-business platforms.\",\"value\":\"20\",\"imageUrl\":null},{\"label\":\"We sometimes share or receive sensitive information via non-business platforms.\",\"value\":\"10\",\"imageUrl\":null},{\"label\":\"We rarely share or receive sensitive information via non-business platforms.\",\"value\":\"0\",\"imageUrl\":null},{\"label\":\"I don\'t know.\",\"value\":\"15\",\"imageUrl\":\"\"}],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":true,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"98895247\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"radio\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":{\"calculationAllowNegatives\":\"\",\"calculationCategory\":\"text\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"fieldOneCalculation\":\"\",\"fieldTwoCalculation\":\"\",\"rules\":[]},\"defaultValue\":{\"dtoType\":\"DefaultValueRadioDto\",\"otherValue\":\"\",\"value\":\"\"},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesRadioDto\",\"defaultValue\":\"\",\"hideRadioButtons\":false,\"imageDimensions\":\"customDimensions\",\"imageHeight\":100,\"imageLabelAlignment\":\"bottom\",\"imageWidth\":100,\"lockImageRatio\":true,\"lockImageRatioOption\":\"fitProportionally\",\"optionLayout\":\"vertical\",\"optionPartToStore\":\"value\",\"useImages\":false,\"useLabelsAndValues\":true,\"useOtherOption\":false,\"useRandomOption\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"98917570\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"When you upgrade or stop using a service, is there a process for turning it off or deleting accounts?\",\"language\":\"en\",\"options\":[{\"label\":\"We have a written process.\",\"value\":\"0\",\"imageUrl\":null},{\"label\":\"We have a verbal process but nothing written.\",\"value\":\"10\",\"imageUrl\":null},{\"label\":\"We do not have a process.\",\"value\":\"20\",\"imageUrl\":null},{\"label\":\"I don\'t know.\",\"value\":\"I don\'t know.\",\"imageUrl\":\"\"}],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":true,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"98895247\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"radio\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":{\"calculationAllowNegatives\":null,\"calculationCategory\":\"number\",\"calculationOperator\":null,\"calculationUnits\":null,\"fieldOneCalculation\":null,\"fieldTwoCalculation\":null,\"rules\":[{\"fieldId\":\"98917570\",\"value\":null},{\"fieldId\":null,\"value\":\"+\"},{\"fieldId\":\"98917501\",\"value\":null},{\"fieldId\":null,\"value\":\"+\"},{\"fieldId\":\"98895255\",\"value\":null},{\"fieldId\":null,\"value\":\"+\"},{\"fieldId\":\"98895254\",\"value\":null}]},\"defaultValue\":{\"dtoType\":\"DefaultValueStringDto\",\"value\":\"\"},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesNumberDto\",\"calculationAllowNegatives\":0,\"calculationCategory\":\"number\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"charactersWide\":5,\"currency\":null,\"currencyFormat\":\"\",\"defaultValue\":\"\",\"fieldOneCalculation\":0,\"fieldTwoCalculation\":0,\"maxValue\":null,\"minValue\":null,\"numberOfDecimals\":0,\"placeholderText\":\"\",\"useSlider\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":true,\"hideLabel\":false,\"id\":\"101943348\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"THIRD_PARTY_SECURITY SCORE\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":true,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"98895247\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"number\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<div class=\\\"surveySubHeader\\\">\\n      VPN\\n<\\/div>\\n\\n\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101943495\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"98895247\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"embed\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":{\"calculationAllowNegatives\":\"\",\"calculationCategory\":\"text\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"fieldOneCalculation\":\"\",\"fieldTwoCalculation\":\"\",\"rules\":[]},\"defaultValue\":{\"dtoType\":\"DefaultValueRadioDto\",\"otherValue\":\"\",\"value\":\"\"},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesRadioDto\",\"defaultValue\":\"\",\"hideRadioButtons\":false,\"imageDimensions\":\"customDimensions\",\"imageHeight\":100,\"imageLabelAlignment\":\"bottom\",\"imageWidth\":100,\"lockImageRatio\":true,\"lockImageRatioOption\":\"fitProportionally\",\"optionLayout\":\"vertical\",\"optionPartToStore\":\"value\",\"useImages\":false,\"useLabelsAndValues\":true,\"useOtherOption\":false,\"useRandomOption\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"98895256\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"Do members of your organization use a VPN (virtual private network) when connecting to a public network?\",\"language\":\"en\",\"options\":[{\"label\":\"Yes, all staff members do.\",\"value\":\"0\",\"imageUrl\":\"\"},{\"label\":\"Yes, most staff members do.\",\"value\":\"5.0\",\"imageUrl\":\"\"},{\"label\":\"Yes, some staff members do.\",\"value\":\"10\",\"imageUrl\":\"\"},{\"label\":\"No, our staff members do not.\",\"value\":\"20\",\"imageUrl\":\"\"},{\"label\":\"I don\'t know.\",\"value\":\"I don\'t know.\",\"imageUrl\":\"\"}],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":true,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"98895247\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"radio\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":{\"calculationAllowNegatives\":null,\"calculationCategory\":\"number\",\"calculationOperator\":null,\"calculationUnits\":null,\"fieldOneCalculation\":null,\"fieldTwoCalculation\":null,\"rules\":[{\"fieldId\":\"98895256\",\"value\":null}]},\"defaultValue\":{\"dtoType\":\"DefaultValueStringDto\",\"value\":\"\"},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesNumberDto\",\"calculationAllowNegatives\":0,\"calculationCategory\":\"number\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"charactersWide\":5,\"currency\":null,\"currencyFormat\":\"\",\"defaultValue\":\"\",\"fieldOneCalculation\":0,\"fieldTwoCalculation\":0,\"maxValue\":null,\"minValue\":null,\"numberOfDecimals\":0,\"placeholderText\":\"\",\"useSlider\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":true,\"hideLabel\":false,\"id\":\"101943957\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"VPN_SECURITY SCORE\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":true,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"98895247\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"number\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null}],\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"98895247\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"section\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesSectionDto\",\"content\":\"\",\"heading\":\"\",\"labelPosition\":\"\",\"languageFormat\":\"default\",\"numColumns\":\"0\",\"usePageBreak\":true},\"fields\":[{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<p>You have completed the Account Security portion of this survey.<\\/p><p><br><strong>Operational Security<\\/strong><br><strong>Device Security<\\/strong><br><strong>Account Security<br><\\/strong>Associated Risks<\\/p>\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"100847456\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"100847454\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"richtext\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null}],\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"100847454\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"section\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesSectionDto\",\"content\":\"\",\"heading\":\"Associated Risks\",\"labelPosition\":\"\",\"languageFormat\":\"default\",\"numColumns\":\"0\",\"usePageBreak\":true},\"fields\":[{\"calculation\":{\"calculationAllowNegatives\":\"\",\"calculationCategory\":\"text\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"fieldOneCalculation\":\"\",\"fieldTwoCalculation\":\"\",\"rules\":[]},\"defaultValue\":{\"dtoType\":\"DefaultValueRadioDto\",\"otherValue\":\"\",\"value\":\"\"},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesRadioDto\",\"defaultValue\":\"\",\"hideRadioButtons\":false,\"imageDimensions\":\"customDimensions\",\"imageHeight\":100,\"imageLabelAlignment\":\"bottom\",\"imageWidth\":100,\"lockImageRatio\":true,\"lockImageRatioOption\":\"fitProportionally\",\"optionLayout\":\"vertical\",\"optionPartToStore\":\"value\",\"useImages\":false,\"useLabelsAndValues\":true,\"useOtherOption\":false,\"useRandomOption\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"98895243\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"Has anyone at your organization experienced \\u201cdoxxing,\\u201d or the release of private information online in a targeted manner?\",\"language\":\"en\",\"options\":[{\"label\":\"Yes, one or more staff members have had their private information released online.\",\"value\":\"50\",\"imageUrl\":\"\"},{\"label\":\"No, none has had their private information released online.\",\"value\":\"0\",\"imageUrl\":\"\"},{\"label\":\"I don\'t know.\",\"value\":\"15\",\"imageUrl\":\"\"}],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":true,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"98916729\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"radio\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":{\"calculationAllowNegatives\":\"\",\"calculationCategory\":\"text\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"fieldOneCalculation\":\"\",\"fieldTwoCalculation\":\"\",\"rules\":[]},\"defaultValue\":{\"dtoType\":\"DefaultValueRadioDto\",\"otherValue\":\"\",\"value\":\"\"},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesRadioDto\",\"defaultValue\":\"\",\"hideRadioButtons\":false,\"imageDimensions\":\"customDimensions\",\"imageHeight\":100,\"imageLabelAlignment\":\"bottom\",\"imageWidth\":100,\"lockImageRatio\":true,\"lockImageRatioOption\":\"fitProportionally\",\"optionLayout\":\"vertical\",\"optionPartToStore\":\"value\",\"useImages\":false,\"useLabelsAndValues\":true,\"useOtherOption\":false,\"useRandomOption\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"98895244\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"Has anyone at your organization been physically harassed?\",\"language\":\"en\",\"options\":[{\"label\":\"Yes, one or more staff members have been physically harassed.\",\"value\":\"60\",\"imageUrl\":\"\"},{\"label\":\"No, none has been physically harassed.\",\"value\":\"0\",\"imageUrl\":\"\"},{\"label\":\"I don\'t know.\",\"value\":\"15\",\"imageUrl\":\"\"}],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":true,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"98916729\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"radio\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":{\"calculationAllowNegatives\":\"\",\"calculationCategory\":\"text\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"fieldOneCalculation\":\"\",\"fieldTwoCalculation\":\"\",\"rules\":[]},\"defaultValue\":{\"dtoType\":\"DefaultValueRadioDto\",\"otherValue\":\"\",\"value\":\"\"},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesRadioDto\",\"defaultValue\":\"\",\"hideRadioButtons\":false,\"imageDimensions\":\"customDimensions\",\"imageHeight\":100,\"imageLabelAlignment\":\"bottom\",\"imageWidth\":100,\"lockImageRatio\":true,\"lockImageRatioOption\":\"fitProportionally\",\"optionLayout\":\"vertical\",\"optionPartToStore\":\"value\",\"useImages\":false,\"useLabelsAndValues\":true,\"useOtherOption\":false,\"useRandomOption\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"98916932\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"Has anyone at your organization been the target of online impersonation or a fake account that spreads misleading or discrediting information?\",\"language\":\"en\",\"options\":[{\"label\":\"Yes, one or more staff members have been impersonated online.\",\"value\":\"20\",\"imageUrl\":null},{\"label\":\"No, none has been impersonated online.\",\"value\":\"0\",\"imageUrl\":null},{\"label\":\"I don\'t know.\",\"value\":\"15\",\"imageUrl\":null}],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":true,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"98916729\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"radio\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":{\"calculationAllowNegatives\":\"\",\"calculationCategory\":\"text\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"fieldOneCalculation\":\"\",\"fieldTwoCalculation\":\"\",\"rules\":[]},\"defaultValue\":{\"dtoType\":\"DefaultValueRadioDto\",\"otherValue\":\"\",\"value\":\"\"},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesRadioDto\",\"defaultValue\":\"\",\"hideRadioButtons\":false,\"imageDimensions\":\"customDimensions\",\"imageHeight\":100,\"imageLabelAlignment\":\"bottom\",\"imageWidth\":100,\"lockImageRatio\":true,\"lockImageRatioOption\":\"fitProportionally\",\"optionLayout\":\"vertical\",\"optionPartToStore\":\"value\",\"useImages\":false,\"useLabelsAndValues\":true,\"useOtherOption\":false,\"useRandomOption\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"98916880\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"Has anyone ever hacked or defaced your website in recent memory (the past five years)?\",\"language\":\"en\",\"options\":[{\"label\":\"Yes\",\"value\":\"20\",\"imageUrl\":null},{\"label\":\"No\",\"value\":\"0\",\"imageUrl\":null},{\"label\":\"I don\'t know.\",\"value\":\"15\",\"imageUrl\":null},{\"label\":\"We don\'t have a website.\",\"value\":\"0.0\",\"imageUrl\":\"\"}],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":true,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"98916729\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"radio\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":{\"calculationAllowNegatives\":\"\",\"calculationCategory\":\"text\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"fieldOneCalculation\":\"\",\"fieldTwoCalculation\":\"\",\"rules\":[]},\"defaultValue\":{\"dtoType\":\"DefaultValueRadioDto\",\"otherValue\":\"\",\"value\":\"\"},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesRadioDto\",\"defaultValue\":\"\",\"hideRadioButtons\":false,\"imageDimensions\":\"customDimensions\",\"imageHeight\":100,\"imageLabelAlignment\":\"bottom\",\"imageWidth\":100,\"lockImageRatio\":true,\"lockImageRatioOption\":\"fitProportionally\",\"optionLayout\":\"vertical\",\"optionPartToStore\":\"value\",\"useImages\":false,\"useLabelsAndValues\":true,\"useOtherOption\":false,\"useRandomOption\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"98917078\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"Has your organization had a major hacking incident in recent memory (the past five years)?\",\"language\":\"en\",\"options\":[{\"label\":\"Yes\",\"value\":\"20\",\"imageUrl\":null},{\"label\":\"No\",\"value\":\"0\",\"imageUrl\":null},{\"label\":\"I don\'t know.\",\"value\":\"15\",\"imageUrl\":null},{\"label\":\"We don\'t have a website.\",\"value\":\"0.0\",\"imageUrl\":\"\"}],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":true,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"98916729\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"radio\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":{\"calculationAllowNegatives\":\"\",\"calculationCategory\":\"text\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"fieldOneCalculation\":\"\",\"fieldTwoCalculation\":\"\",\"rules\":[]},\"defaultValue\":{\"dtoType\":\"DefaultValueRadioDto\",\"otherValue\":\"\",\"value\":\"\"},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesRadioDto\",\"defaultValue\":\"\",\"hideRadioButtons\":false,\"imageDimensions\":\"customDimensions\",\"imageHeight\":100,\"imageLabelAlignment\":\"bottom\",\"imageWidth\":100,\"lockImageRatio\":true,\"lockImageRatioOption\":\"fitProportionally\",\"optionLayout\":\"vertical\",\"optionPartToStore\":\"value\",\"useImages\":false,\"useLabelsAndValues\":true,\"useOtherOption\":false,\"useRandomOption\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"98895242\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"Has anyone at your organization experienced online harassment, or any abusive language or behavior directed at a member of your team?\",\"language\":\"en\",\"options\":[{\"label\":\"Yes, one or more staff members have been harassed online.\",\"value\":\"20\",\"imageUrl\":\"\"},{\"label\":\"No, none has been harassed online.\",\"value\":\"0\",\"imageUrl\":\"\"},{\"label\":\"I don\'t know.\",\"value\":\"15\",\"imageUrl\":\"\"}],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":true,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"98916729\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"radio\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":{\"calculationAllowNegatives\":null,\"calculationCategory\":\"number\",\"calculationOperator\":null,\"calculationUnits\":null,\"fieldOneCalculation\":null,\"fieldTwoCalculation\":null,\"rules\":[{\"fieldId\":\"98895244\",\"value\":null},{\"fieldId\":null,\"value\":\"+\"},{\"fieldId\":\"98895243\",\"value\":null},{\"fieldId\":null,\"value\":\"+\"},{\"fieldId\":\"98916932\",\"value\":null},{\"fieldId\":null,\"value\":\"+\"},{\"fieldId\":\"98916880\",\"value\":null},{\"fieldId\":null,\"value\":\"+\"},{\"fieldId\":\"98917078\",\"value\":null},{\"fieldId\":null,\"value\":\"+\"},{\"fieldId\":\"98895242\",\"value\":null}]},\"defaultValue\":{\"dtoType\":\"DefaultValueStringDto\",\"value\":\"\"},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesNumberDto\",\"calculationAllowNegatives\":0,\"calculationCategory\":\"number\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"charactersWide\":5,\"currency\":null,\"currencyFormat\":\"\",\"defaultValue\":\"\",\"fieldOneCalculation\":0,\"fieldTwoCalculation\":0,\"maxValue\":null,\"minValue\":null,\"numberOfDecimals\":0,\"placeholderText\":\"\",\"useSlider\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":true,\"hideLabel\":false,\"id\":\"101945165\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"ASSOCIATED_RISK SCORE\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":true,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"98916729\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"number\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null}],\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"98916729\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"section\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesSectionDto\",\"content\":\"\",\"heading\":\"\",\"labelPosition\":\"\",\"languageFormat\":\"default\",\"numColumns\":\"0\",\"usePageBreak\":true},\"fields\":[{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<p>You have completed the Associated Risks portion of this survey.<\\/p><p><br><strong>Operational Security<\\/strong><br><strong>Device Security<\\/strong><br><strong><strong>Account Security<\\/strong><\\/strong><br><strong>Associated Risks<\\/strong><br><br><\\/p>\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101835853\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"98895259\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"richtext\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":{\"calculationAllowNegatives\":0,\"calculationCategory\":\"text\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"fieldOneCalculation\":0,\"fieldTwoCalculation\":0,\"rules\":[]},\"defaultValue\":{\"dtoType\":\"DefaultValueStringDto\",\"value\":\"\"},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesTextDto\",\"autocompleteOptions\":null,\"calculationAllowNegatives\":0,\"calculationCategory\":\"text\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"charactersWide\":50,\"confirmationText\":\"\",\"defaultValue\":\"\",\"fieldOneCalculation\":0,\"fieldTwoCalculation\":0,\"maxLength\":0,\"minLength\":0,\"placeholderText\":\"\"},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"98895264\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"Would you be interested in taking part in a feedback and interview session?\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"98895259\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"text\",\"unique\":false,\"useCallout\":false},\"logic\":{\"action\":\"Show\",\"fields\":[{\"comparisonOperator\":\"==\",\"fieldId\":\"98895271\",\"value\":\"FocusGroup\"}],\"operator\":\"AND\",\"workflowSteps\":[]},\"secureSettings\":{\"hideInputCharacters\":false,\"removeDataFromEmailNotifications\":false,\"requireConfirmation\":false,\"restrictDataAccess\":false}},{\"calculation\":{\"calculationAllowNegatives\":0,\"calculationCategory\":\"text\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"fieldOneCalculation\":0,\"fieldTwoCalculation\":0,\"rules\":[]},\"defaultValue\":{\"dtoType\":\"DefaultValueStringDto\",\"value\":\"\"},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesTextDto\",\"autocompleteOptions\":null,\"calculationAllowNegatives\":0,\"calculationCategory\":\"text\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"charactersWide\":50,\"confirmationText\":\"\",\"defaultValue\":\"\",\"fieldOneCalculation\":0,\"fieldTwoCalculation\":0,\"maxLength\":0,\"minLength\":0,\"placeholderText\":\"\"},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"98895265\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"Would you be interested in joining the BUILD cybersecurity focus group?\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"98895259\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"text\",\"unique\":false,\"useCallout\":false},\"logic\":{\"action\":\"Show\",\"fields\":[{\"comparisonOperator\":\"==\",\"fieldId\":\"98895271\",\"value\":\"BuildNewsletter\"}],\"operator\":\"AND\",\"workflowSteps\":[]},\"secureSettings\":{\"hideInputCharacters\":false,\"removeDataFromEmailNotifications\":false,\"requireConfirmation\":false,\"restrictDataAccess\":false}},{\"calculation\":{\"calculationAllowNegatives\":0,\"calculationCategory\":\"text\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"fieldOneCalculation\":0,\"fieldTwoCalculation\":0,\"rules\":[]},\"defaultValue\":{\"dtoType\":\"DefaultValueStringDto\",\"value\":\"\"},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesTextDto\",\"autocompleteOptions\":null,\"calculationAllowNegatives\":0,\"calculationCategory\":\"text\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"charactersWide\":50,\"confirmationText\":\"\",\"defaultValue\":\"\",\"fieldOneCalculation\":0,\"fieldTwoCalculation\":0,\"maxLength\":0,\"minLength\":0,\"placeholderText\":\"\"},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"98895266\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"Which part of Ford Foundation do you work?\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"98895259\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"text\",\"unique\":false,\"useCallout\":false},\"logic\":{\"action\":\"Show\",\"fields\":[{\"comparisonOperator\":\"==\",\"fieldId\":\"98895271\",\"value\":\"FordInternal\"}],\"operator\":\"AND\",\"workflowSteps\":[]},\"secureSettings\":{\"hideInputCharacters\":false,\"removeDataFromEmailNotifications\":false,\"requireConfirmation\":false,\"restrictDataAccess\":false}},{\"calculation\":{\"calculationAllowNegatives\":0,\"calculationCategory\":\"text\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"fieldOneCalculation\":0,\"fieldTwoCalculation\":0,\"rules\":[]},\"defaultValue\":{\"dtoType\":\"DefaultValueStringDto\",\"value\":\"\"},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesTextDto\",\"autocompleteOptions\":null,\"calculationAllowNegatives\":0,\"calculationCategory\":\"text\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"charactersWide\":50,\"confirmationText\":\"\",\"defaultValue\":\"\",\"fieldOneCalculation\":0,\"fieldTwoCalculation\":0,\"maxLength\":0,\"minLength\":0,\"placeholderText\":\"\"},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"98895267\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"Which cybersecurity\\/digital security providers have you come across in your work at Ford Foundation?\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"98895259\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"text\",\"unique\":false,\"useCallout\":false},\"logic\":{\"action\":\"Show\",\"fields\":[{\"comparisonOperator\":\"==\",\"fieldId\":\"98895271\",\"value\":\"FordInternal\"}],\"operator\":\"AND\",\"workflowSteps\":[]},\"secureSettings\":{\"hideInputCharacters\":false,\"removeDataFromEmailNotifications\":false,\"requireConfirmation\":false,\"restrictDataAccess\":false}},{\"calculation\":{\"calculationAllowNegatives\":0,\"calculationCategory\":\"text\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"fieldOneCalculation\":0,\"fieldTwoCalculation\":0,\"rules\":[]},\"defaultValue\":{\"dtoType\":\"DefaultValueStringDto\",\"value\":\"\"},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesTextDto\",\"autocompleteOptions\":null,\"calculationAllowNegatives\":0,\"calculationCategory\":\"text\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"charactersWide\":50,\"confirmationText\":\"\",\"defaultValue\":\"\",\"fieldOneCalculation\":0,\"fieldTwoCalculation\":0,\"maxLength\":0,\"minLength\":0,\"placeholderText\":\"\"},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"98895268\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"How did you hear about this survey?\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"98895259\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"text\",\"unique\":false,\"useCallout\":false},\"logic\":{\"action\":\"Show\",\"fields\":[{\"comparisonOperator\":\"==\",\"fieldId\":\"98895271\",\"value\":\"RecommendedOther\"}],\"operator\":\"AND\",\"workflowSteps\":[]},\"secureSettings\":{\"hideInputCharacters\":false,\"removeDataFromEmailNotifications\":false,\"requireConfirmation\":false,\"restrictDataAccess\":false}},{\"calculation\":{\"calculationAllowNegatives\":\"\",\"calculationCategory\":\"text\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"fieldOneCalculation\":\"\",\"fieldTwoCalculation\":\"\",\"rules\":[]},\"defaultValue\":{\"dtoType\":\"DefaultValueCheckboxDto\",\"otherValue\":null,\"useOtherValue\":false,\"value\":[]},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesCheckboxDto\",\"hideOptionButton\":true,\"imageDimensions\":\"customDimensions\",\"imageHeight\":100,\"imageLabelAlignment\":\"bottom\",\"imageWidth\":100,\"lockImageRatio\":true,\"lockImageRatioOption\":\"fitProportionally\",\"optionLayout\":\"vertical\",\"optionPartToStore\":\"value\",\"useCheckAll\":false,\"useImages\":false,\"useLabelsAndValues\":false,\"useOtherOption\":false,\"useRandomOption\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"98895269\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"Which advisor recommended you take the survey?\",\"language\":\"en\",\"options\":[{\"label\":\"Laura\",\"value\":\"Laura\",\"imageUrl\":\"\"},{\"label\":\"Martjin\",\"value\":\"Martjin\",\"imageUrl\":\"\"},{\"label\":\"Matt H\",\"value\":\"Matt H\",\"imageUrl\":null},{\"label\":\"Matt M\",\"value\":\"Matt M\",\"imageUrl\":\"\"},{\"label\":\"Runa\",\"value\":\"Runa\",\"imageUrl\":null},{\"label\":\"Trinh\",\"value\":\"Trinh\",\"imageUrl\":null}],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"98895259\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"checkbox\",\"unique\":false,\"useCallout\":false},\"logic\":{\"action\":\"Show\",\"fields\":[{\"comparisonOperator\":\"==\",\"fieldId\":\"98895271\",\"value\":\"RecommendedAdvisory\"}],\"operator\":\"AND\",\"workflowSteps\":[]},\"secureSettings\":null},{\"calculation\":{\"calculationAllowNegatives\":0,\"calculationCategory\":\"text\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"fieldOneCalculation\":0,\"fieldTwoCalculation\":0,\"rules\":[]},\"defaultValue\":{\"dtoType\":\"DefaultValueStringDto\",\"value\":\"\"},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesTextDto\",\"autocompleteOptions\":null,\"calculationAllowNegatives\":0,\"calculationCategory\":\"text\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"charactersWide\":50,\"confirmationText\":\"\",\"defaultValue\":\"\",\"fieldOneCalculation\":0,\"fieldTwoCalculation\":0,\"maxLength\":0,\"minLength\":0,\"placeholderText\":\"\"},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"98895270\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"THIS IS TO LET YOU KNOW THIS SUBMISSION WILL BE MARKED AS: TEST so it can be deleted\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":true,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"98895259\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"text\",\"unique\":false,\"useCallout\":false},\"logic\":{\"action\":\"Show\",\"fields\":[{\"comparisonOperator\":\"==\",\"fieldId\":\"98895271\",\"value\":\"Test\"}],\"operator\":\"AND\",\"workflowSteps\":[]},\"secureSettings\":{\"hideInputCharacters\":false,\"removeDataFromEmailNotifications\":false,\"requireConfirmation\":false,\"restrictDataAccess\":false}},{\"calculation\":{\"calculationAllowNegatives\":\"\",\"calculationCategory\":\"text\",\"calculationOperator\":\"\",\"calculationUnits\":\"\",\"fieldOneCalculation\":\"\",\"fieldTwoCalculation\":\"\",\"rules\":[]},\"defaultValue\":{\"dtoType\":\"DefaultValueRadioDto\",\"otherValue\":\"\",\"value\":\"\"},\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesRadioDto\",\"defaultValue\":\"\",\"hideRadioButtons\":false,\"imageDimensions\":\"customDimensions\",\"imageHeight\":100,\"imageLabelAlignment\":\"bottom\",\"imageWidth\":100,\"lockImageRatio\":true,\"lockImageRatioOption\":\"fitProportionally\",\"optionLayout\":\"vertical\",\"optionPartToStore\":\"value\",\"useImages\":false,\"useLabelsAndValues\":false,\"useOtherOption\":false,\"useRandomOption\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":true,\"hideLabel\":false,\"id\":\"98895271\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"Survey_Option\",\"language\":\"en\",\"options\":[{\"label\":\"FocusGroup\",\"value\":\"FocusGroup\",\"imageUrl\":null},{\"label\":\"RecommendedOther\",\"value\":\"RecommendedOther\",\"imageUrl\":null},{\"label\":\"RecommendedAdvisory\",\"value\":\"RecommendedAdvisory\",\"imageUrl\":null},{\"label\":\"FordInternal\",\"value\":\"FordInternal\",\"imageUrl\":\"\"},{\"label\":\"BuildNewsletter\",\"value\":\"BuildNewsletter\",\"imageUrl\":\"\"},{\"label\":\"Test\",\"value\":\"Test\",\"imageUrl\":\"\"}],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"98895259\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"radio\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null}],\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"98895259\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"section\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesSectionDto\",\"content\":\"<h4 dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Risk Analysis and Threat Assessment <\\/strong><\\/span><\\/h4>\",\"heading\":\"\",\"labelPosition\":\"\",\"languageFormat\":\"default\",\"numColumns\":\"0\",\"usePageBreak\":true},\"fields\":[{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<p dir=\\\"ltr\\\"><span style=\\\"font-size: 24px;\\\">Your organization has scored <u><strong>below<\\/strong><\\/u> our recommended security level for civil society organizations\\\" in the risk analysis and threat assessment category. Don\\u2019t worry! We\\u2019ve put together some recommendations to improve your organization\\u2019s cybersecurity.<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>What We Recommend:&nbsp;<\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Determine your threat model.&nbsp;<\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">When thinking about the risks that face your organization in the digital world, it\\u2019s helpful to think about all the risks that your staff &nbsp;faces outside of cybersecurity, including physical, legal, and organizational challenges. After all, many digital threats begin in the \\u201creal\\u201d world, such as risks posed by governments, law enforcement, criminal groups, and lawsuits.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Documenting and analyzing your risk is a process known in cybersecurity as \\u201cthreat modeling.\\u201d If you\\u2019re just getting started with cybersecurity for your organization\\u2014or refreshing your approach after an attack\\u2014start with your threat model. This process will not only identify cybersecurity risks but also help you find vulnerabilities across your organization. The Electronic Frontier Foundation provides<a href=\\\"https:\\/\\/sec.eff.org\\/topics\\/threat-modeling\\\">&nbsp;a step-by-step guide on threat modeling here<\\/a>. Access Now Helpdesk offers<a href=\\\"https:\\/\\/www.accessnow.org\\/first-look-at-digital-security\\/\\\">&nbsp;an easy guide to threat models with examples here<\\/a>.<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Create a risk matrix.<\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Every organization\\u2019s risks are unique, and the context in which you work will help you better map out which risks are both most likely and most dangerous for your staff . It\\u2019s helpful to think about risks to your organization\\u2019s security based on the likelihood and the impact of particular threats. Just because an event is likely doesn\\u2019t mean it deserves your full attention. There may be less frequent threats that could have significantly more of an impact on your organization. For example, some threats\\u2014such as physical damage to your phone\\u2014may be highly likely but not very effective or dangerous. Other threats, such as a corporate-sponsored cyberattack, may be much less likely but very dangerous.<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">You can map these risks using a tool called a \\u201crisk matrix,\\u201d which represents your different threats on a chart with likelihood on one axis and impact on the other.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Here\\u2019s an example.<\\/strong><\\/span><\\/p><p><span style=\\\"font-size: 18px;\\\"><img src=\\\"https:\\/\\/s3.amazonaws.com\\/files.formstack.com\\/public\\/906765\\/image_ScreenShot20201116at10.32.33AM.png\\\" style=\\\"width: 300px;\\\" class=\\\"fr-fic fr-dib\\\"><\\/span><\\/p><table class=\\\"fr-dashed-borders\\\"><tbody><tr><td><span style=\\\"font-size: 18px;\\\"><br><strong><br><\\/strong><\\/span><\\/td><td><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Low Likelihood<\\/strong><\\/span><\\/p><\\/td><td><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>High Likelihood<\\/strong><\\/span><\\/p><\\/td><\\/tr><tr><td><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Low Consequence<\\/strong><\\/span><\\/p><\\/td><td><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Printer is stolen from your office<\\/span><\\/p><\\/td><td><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Physical damage to your phone<\\/span><\\/p><\\/td><\\/tr><tr><td><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>High Consequence<\\/strong><\\/span><\\/p><\\/td><td><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Corporate-sponsored cyberattack<\\/span><\\/p><\\/td><td><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Phishing attack on your email account<\\/span><\\/p><\\/td><\\/tr><\\/tbody><\\/table><p><span style=\\\"font-size: 18px;\\\"><br><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">This is very helpful for members of your organization to quickly see which risks are both most likely and most dangerous. The Electronic Frontier Foundation has<a href=\\\"https:\\/\\/sec.eff.org\\/materials\\/threat-modeling-activity-handout-for-learners\\\">&nbsp;a good model for a risk matrix in its threat modeling guide, which you can access here<\\/a>. Tactical Tech\\u2019s Holistic Security<a href=\\\"https:\\/\\/holistic-security.tacticaltech.org\\/chapters\\/explore\\/2-8-identifying-and-analysing-threats.html\\\">&nbsp;offers additional reading on these matrices<\\/a>.<\\/span><\\/p>\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"100823081\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"101786964\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"richtext\",\"unique\":false,\"useCallout\":false},\"logic\":{\"action\":\"Show\",\"fields\":[{\"comparisonOperator\":\"gt\",\"fieldId\":\"101930228\",\"value\":34}],\"operator\":\"AND\",\"workflowSteps\":[]},\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<p dir=\\\"ltr\\\"><span style=\\\"font-size: 24px;\\\">Your organization has scored as <strong><u>reasonable<\\/u><\\/strong> level of security in the risk analysis and threat assessment category. Good job! There are still areas for improvement, so we\\u2019ve put together some recommendations to improve your organization\\u2019s cybersecurity even more.<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>What We Recommend<\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Develop an incident response plan.<\\/strong><\\/span><\\/p><p><span style=\\\"font-size: 18px;\\\">Working with your staff , develop a basic incident response plan. To do this, ask yourself what steps you would take if a particular threat occurred. Cybersecurity professionals often use risk frameworks, such as SANS Incident Response, <a href=\\\"https:\\/\\/www.nist.gov\\/cyberframework\\\">NIST Cybersecurity<\\/a>, ISO 27001, and the <a href=\\\"https:\\/\\/attack.mitre.org\\/\\\">MITRE ATT&amp;CK Matrix<\\/a>, to identify common threats and determine the best way to respond. These frameworks are probably more advanced than you need at this point. Your organization can use a framework such as the one below to start to answer that question.<\\/span><\\/p><p><span style=\\\"font-size: 18px;\\\"><br><\\/span><\\/p><table><tbody><tr><td><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>If an attacker...<\\/strong><\\/span><\\/p><\\/td><td><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>How would you respond...<\\/strong><\\/span><\\/p><\\/td><\\/tr><tr><td><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Our staff clicked on a strange link.<\\/span><\\/p><\\/td><td><span style=\\\"font-size: 18px;\\\"><br><br><\\/span><\\/td><\\/tr><tr><td><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Our social media was hacked.<\\/span><\\/p><\\/td><td><span style=\\\"font-size: 18px;\\\"><br><br><\\/span><\\/td><\\/tr><tr><td><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Our email account was hacked.<\\/span><\\/p><\\/td><td><span style=\\\"font-size: 18px;\\\"><br><br><\\/span><\\/td><\\/tr><tr><td><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Our laptops\\/phones were hacked.<\\/span><\\/p><\\/td><td><span style=\\\"font-size: 18px;\\\"><br><br><\\/span><\\/td><\\/tr><tr><td><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Our website was hacked or defaced.<\\/span><\\/p><\\/td><td><span style=\\\"font-size: 18px;\\\"><br><br><\\/span><\\/td><\\/tr><tr><td><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Our organization was tricked by impersonated donors\\/funders.<\\/span><\\/p><\\/td><td><span style=\\\"font-size: 18px;\\\"><br><br><\\/span><\\/td><\\/tr><tr><td><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Our data were found\\/discovered.&nbsp;<\\/span><\\/p><\\/td><td><span style=\\\"font-size: 18px;\\\"><br><br><\\/span><\\/td><\\/tr><tr><td><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">A member of our staff was harassed online.<\\/span><\\/p><\\/td><td><span style=\\\"font-size: 18px;\\\"><br><br><\\/span><\\/td><\\/tr><tr><td><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Our internal communications were disrupted.<\\/span><\\/p><\\/td><td><span style=\\\"font-size: 18px;\\\"><br><br><\\/span><\\/td><\\/tr><tr><td><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Our laptops or devices may have been stolen.<\\/span><\\/p><\\/td><td><span style=\\\"font-size: 18px;\\\"><br><br><br><\\/span><\\/td><\\/tr><\\/tbody><\\/table><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Don\\u2019t worry if you don\\u2019t have all the answers. Fill in as much information as you can. This step will be very useful when working with a security provider who can help develop solutions to these threats.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Understand how incident response phases work together.<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">In cybersecurity, you can think of four stages to respond to an incident: prepare, detect, contain\\/eradicate\\/recover, and then process\\/learn.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Prepare:<\\/strong> The quote \\u201cChance favors the prepared mind\\u201d is credited to Louis Pasteur. There are steps your staff &nbsp;can take before an incident to improve your organization\\u2019s resiliency. One of them is to ask yourself the following questions:<\\/span><\\/p><ul><li dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">How many devices do we have?<\\/span><\\/li><li dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Which are the most important?<\\/span><\\/li><li dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">How do we keep those devices safe?<\\/span><\\/li><li dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Do we have internal policies from our departments that are easy to follow in a digital crisis?<\\/span><\\/li><li dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Can we come up with a master checklist to follow during a crisis? During an incident, panic often clouds our best thinking and a checklist will help.<\\/span><\\/li><\\/ul><p><span style=\\\"font-size: 18px;\\\"><br><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Detect:<\\/strong> This phase occurs when your organization identifies what is happening and plans a path forward. To do this, consider the following steps:<\\/span><\\/p><ul><li dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Collect everything you can from the \\u201cdigital crime scene\\u201d for processing and investigating later.<br><br><\\/span><ul><li dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Log dates and times, capture screenshots, record suspicious websites and links, stop using the device, and disconnect the device from the Internet (but don\\u2019t turn it off).<\\/span><\\/li><\\/ul><\\/li><\\/ul><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">C<strong>ontain\\/Eradicate\\/Recover:<\\/strong> This stage is actually made up of three steps.<\\/span><\\/p><ul><li dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">In the first \\u201ccontainment\\u201d step, your staff can identify the cause and scope of the incident and take steps to stop or block immediate harm.<\\/span><\\/li><li dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">In the second \\u201ceradicate\\u201d step, your staff can fully stop the incident and remove any discovered threats from your system.&nbsp;<\\/span><\\/li><li dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">In the third \\u201crecovery\\u201d step, your staff can bring operations back online to their pre-incident state and address any remaining damage.&nbsp;<\\/span><\\/li><\\/ul><p><span style=\\\"font-size: 18px;\\\"><br><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Process\\/Learn:<\\/strong> This phase isn\\u2019t about blaming others, but rather reviewing how each phase unfolded and evaluating how your organization can improve the process and your future response.<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Find a security provider.<\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Now that you have an understanding of the risks and threats facing your organization, you can begin to think about how to respond to those threats. This is when many people feel uncertain, especially if they don\\u2019t have a background in technology or security. Luckily, there are security providers who can help. When vetting a security provider, we recommend asking a series of questions to determine whether they are a good fit for your organization. We feel the most important ones are:<\\/span><\\/p><ul><li dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Why do you do this work?&nbsp;<\\/span><\\/li><li dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Are you familiar with our region, culture, or language?<\\/span><\\/li><li dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Do you work with CSOs\\/NGOs? If so, what is the difference between your approach to this work and the work of your other clients?&nbsp;<\\/span><\\/li><li dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Have you worked with a group of my size before? Can you tell me more about this work?<\\/span><\\/li><li dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Have you worked on incidents or issues that are similar to ours in the past? Please provide a case study.<\\/span><\\/li><li dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">How many clients are you currently working with? What percentage of your time will go to me?&nbsp;<\\/span><\\/li><li dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">What is your understanding of the risks we face?<\\/span><\\/li><\\/ul><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">A security provider can\\u2019t fix all your organization\\u2019s challenges on their own. Understand that you will need a designated person on your staff &nbsp;who will manage this work and act as a liaison between your organization and the security provider. <\\/span><\\/p>\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101807563\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"101786964\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"richtext\",\"unique\":false,\"useCallout\":false},\"logic\":{\"action\":\"Show\",\"fields\":[{\"comparisonOperator\":\"gt\",\"fieldId\":\"101930228\",\"value\":19},{\"comparisonOperator\":\"lt\",\"fieldId\":\"101930228\",\"value\":35}],\"operator\":\"AND\",\"workflowSteps\":[]},\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<p dir=\\\"ltr\\\"><span style=\\\"font-size: 24px;\\\">Your organization has scored a <strong><u>high<\\/u>&nbsp;<\\/strong>level of security&nbsp;in the risk analysis and threat assessment category. Good work! There are still areas for improvement, so we\\u2019ve put together some recommendations to improve your organization\\u2019s cybersecurity even more.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>What We Recommend:<\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Run a tabletop exercise.<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">It\\u2019s important to test your thinking about security by putting your organization through a simulated test. In the cybersecurity world, we call one of these tests a \\u201ctabletop exercise,\\u201d although your staff &nbsp;doesn\\u2019t need to be physically gathered around a table to complete one. During an exercise, you can discuss how your organization would handle a hypothetical threat, step by step, and what areas still need to be improved. One idea is to write out scenarios of different incidents on index cards, drop them all in a box, and then schedule a few hours on your organization\\u2019s calendar to pull a few cards out to start the exercise.<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">When you\\u2019re ready for your first tabletop exercise, here are key steps to get started. Some cybersecurity providers incorporate the &nbsp;<a href=\\\"https:\\/\\/www.mitre.org\\/sites\\/default\\/files\\/publications\\/pr_14-3929-cyber-exercise-playbook.pdf\\\">MITRE Corp.\\u2019s guidelines on tabletop exercises<\\/a>.&nbsp;<\\/span><\\/p><ul><li dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Determine what you would like to test (usually by choosing one of your top identified threats).<\\/span><\\/li><li dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Designate a group leader to run the exercise.<\\/span><\\/li><li dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Create a plausible storyline that includes the threat you want to test.<\\/span><\\/li><li dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Gather the staff &nbsp;that would be responsible for managing this threat.<\\/span><\\/li><li dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Walk the staff &nbsp;through the scenario and ask for their responses, step by step.<\\/span><\\/li><li dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Document gaps, concerns, and weak points in the threat response.&nbsp;<\\/span><\\/li><\\/ul><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">You can use the knowledge gained from a tabletop exercise to identify areas of concern and begin to develop strategies to reduce those risks. <\\/span><\\/p>\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101809045\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"101786964\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"richtext\",\"unique\":false,\"useCallout\":false},\"logic\":{\"action\":\"Show\",\"fields\":[{\"comparisonOperator\":\"lt\",\"fieldId\":\"101930228\",\"value\":20}],\"operator\":\"AND\",\"workflowSteps\":[]},\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<h4 dir=\\\"ltr\\\"><strong><span style=\\\"font-size: 18px;\\\"><u>Why We Recommend This:<\\/u><\\/span><\\/strong><\\/h4><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Understanding your risk is critical to keeping your organization safe. All good safety and security planning begins with a thorough understanding of the possible threats we face. Investing time and effort into better understanding your threat model will make reducing your risk much easier in the future. Remember also that threats evolve, so you may need to update your threat model as your organization and the landscape around you change.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Once you have developed policies, plans, and documentation, consider a tabletop exercise. Just remember to encourage an open, nonjudgmental space; learning about security vulnerabilities doesn\\u2019t require individual finger-pointing or blame.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">When\\u2014not if\\u2014a real incident occurs, it can be scary, stressful, and chaotic. Following these best practices increases the likelihood of best possible outcomes. And don\\u2019t forget that you will need to assign at least one member of your staff &nbsp;to oversee the cybersecurity effort within your organization.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong><u>A Real-World Example:<\\/u><\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">ADE Worldwide is a civil society organization that helps train farmers and agricultural workers around the world to use water sustainably while advocating for better global environmental policy. The group\\u2019s advocacy for water rights has upset powerful landowners in several nations.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">ADE sees itself as a nonpartisan, nonpolitical agricultural advisor. After its website is hacked and defaced, however, ADE realizes it needs to conduct a threat model analysis to better understand the risks the group faces around the world.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">This process helps it realize that the likelihood of these digital attacks is high for groups working on similar issues. While ADE staff members don\\u2019t see their mission as controversial, they realize their own organization\\u2019s risk profile is high due to the effectiveness and publicity of their work. As a result, they develop an incident response plan and checklist for physical or cybersecurity incidents.<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">The ADE staff decides to proactively lead a series of tabletop exercises talking through how they would respond in the event of a security incident. As a result, when the field staff receive some verbal threats from regional landowners, they are prepared with a plan to manage any potential risk. <\\/span><\\/p>\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101809137\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"101786964\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"richtext\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null}],\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101786964\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"section\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesSectionDto\",\"content\":\"<h4><strong><span style=\\\"font-size: 18px;\\\">Documentation and Policy<\\/span><\\/strong><\\/h4>\",\"heading\":\"\",\"labelPosition\":\"\",\"languageFormat\":\"default\",\"numColumns\":\"0\",\"usePageBreak\":false},\"fields\":[{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<p dir=\\\"ltr\\\"><span style=\\\"font-size: 24px;\\\">Your organization has scored <strong><u>below<\\/u><\\/strong> our recommended security level for civil society organizations in the documentation and policy category. Don\\u2019t worry! We\\u2019ve put together some recommendations to improve your organization\\u2019s cybersecurity.<\\/span><br><br><\\/p><p dir=\\\"ltr\\\"><strong><u><span style=\\\"font-size: 18px;\\\">What We Recommend:<\\/span><\\/u><\\/strong><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Document your security policy and your future road map.<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">As an established civil society organization, you probably have strategic documents, policies, and plans to help you reach your key goals. Now that you\\u2019re focusing on strengthening your cybersecurity, it\\u2019s time to develop a security policy and road map, too.<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">A security policy explains your day-to-day cybersecurity operations currently. A security road map, on the other hand, is a more aspirational document that states your medium- and long-term goals for your cybersecurity policy.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Luckily, this doesn\\u2019t have to be too daunting. While some organizations may have a series of complex security policies and plans, you can get started with something much simpler. The key steps to a successfully documenting a security policy are:<\\/span><\\/p><ul><li dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Document whatever steps more than 80 percent of your staff currently take to face cybersecurity threats.&nbsp;<\\/span><\\/li><li dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Conduct an honest assessment of your current approach toward cybersecurity threats.&nbsp;<\\/span><\\/li><\\/ul><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">The more honest your policy, the more your organization can improve. If you are fully honest, you should be able to find room for improvement within your organization. For example, you may find that only some of your staff members use a cybersecurity tool you\\u2019ve purchased. Once you\\u2019ve taken a look at your policy and identified gaps, you can start to put together a security road map.<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">The key steps to developing a security road map are:&nbsp;<\\/span><\\/p><ul><li dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Understand and define your key threats and risks (see Risk Analysis and Threat Assessment).<\\/span><\\/li><li dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Compare your existing policy against the key threats to identify what is missing in your security approach<\\/span><\\/li><li dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Document what you would like to implement in the future to improve your security approach.<\\/span><\\/li><\\/ul><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">When you\\u2019re ready to create your first security policy, you can use the highly useful<a href=\\\"https:\\/\\/usesoap.app\\/\\\">&nbsp;SOAP tool<\\/a> to generate a policy through a series of step-by-step questions. <\\/span><\\/p>\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101874096\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"101873397\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"richtext\",\"unique\":false,\"useCallout\":false},\"logic\":{\"action\":\"Show\",\"fields\":[{\"comparisonOperator\":\"gt\",\"fieldId\":\"101932231\",\"value\":24}],\"operator\":\"AND\",\"workflowSteps\":[]},\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<p dir=\\\"ltr\\\"><span style=\\\"font-size: 24px;\\\">Your organization has reached a <strong><u>reasonable<\\/u><\\/strong>level of security in the documentation and policy category. Good job! There are still areas for improvement, so we\\u2019ve put together some recommendations to improve your organization\\u2019s cybersecurity even more.<\\/span><\\/p><p dir=\\\"ltr\\\"><strong><u><span style=\\\"font-size: 18px;\\\">What We Recommend:<\\/span><\\/u><\\/strong><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Gently enforce the rules.<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">You\\u2019ve invested time and resources into creating a security policy and road map for your organization. But despite your best efforts, you notice that some staff members aren\\u2019t always following the rules. This is common, especially in organizations where security isn\\u2019t a key component of staff &nbsp;culture.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Don\\u2019t worry; integrating \\u201csecurity thinking\\u201d into an organization is possible, if time-consuming. One of the most effective ways to get the staff &nbsp;thinking about security is to gradually introduce security concepts into your everyday workflow until they become part of your staff\\u2019s routine.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Here is one strategy to help your staff incorporate your security policies into their operations.<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">1. Determine an effective way to measure staff compliance in the areas that you want to improve.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">2. Gather your executive team and ask them to identify the weakest links in your organization (individuals who aren\\u2019t complying with much of your security policy).<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">3. Deputize those weakest links for simple tasks, such as ensuring that their colleagues are following a basic requirement of your security policy.<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">4. Reward positive behavior change, especially among staff members who previously were not compliant, with praise and other motivators. Be empathetic.<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">5. Don\\u2019t punish slow or lax compliance. Technology can be intimidating to many people and may have a steep learning curve. After a certain publicly announced date or time, cut off services (such as emails, logins, etc.) for users who don\\u2019t comply. Other services, such as two-factor authentication, can simply be made mandatory. Be prepared to provide additional support when this happens.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">6. Run a tabletop exercise with your staff so they can better understand the risks of not following policy.<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">7. Share news and updates on other organizations that have been targets of cybersecurity attacks as teachable moments for your staff . This may require you to emphasize how similar threats could face your organization.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">8. Begin again with the measurement phase.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">If results are slow, don\\u2019t worry. Organizational change can sometimes take a year or more to fully take place. Keep working at this process steadily over time.<\\/span><\\/p>\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101874376\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"101873397\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"richtext\",\"unique\":false,\"useCallout\":false},\"logic\":{\"action\":\"Show\",\"fields\":[{\"comparisonOperator\":\"gt\",\"fieldId\":\"101932231\",\"value\":14},{\"comparisonOperator\":\"lt\",\"fieldId\":\"101932231\",\"value\":25}],\"operator\":\"AND\",\"workflowSteps\":[]},\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<p dir=\\\"ltr\\\"><span style=\\\"font-size: 24px;\\\">Your organization has scored a <strong><u>high<\\/u><\\/strong> level of security in the documentation and policy category. Good work! There are still areas for improvement, so we\\u2019ve put together some recommendations to improve your organization\\u2019s cybersecurity even more. &nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><u><strong><span style=\\\"font-size: 18px;\\\">What We Recommend:<\\/span><\\/strong><\\/u><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Keep your policy and road map updated.<\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Your organization has strong security policies and procedures, and your staff members understand the importance of security in their everyday work. It\\u2019s important to remember, though, that even the strongest security policy and road map will become outdated and obsolete as technology and threats evolve.<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">To help, we recommend you think of your security policy and road map as \\u2018living\\u201d documents that need to be updated regularly to meet new risks and threats. Keeping these documents updated doesn\\u2019t require an extensive commitment, but it does require regular check-ins.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Here is one strategy to keep policies and road maps up to date by creating a governance structure for cybersecurity within your organization.<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">1. Create a working group to investigate new threats, risks, and tools as they appear. This group may want to meet as frequently as monthly or quarterly or as infrequently as once or twice a year.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">2. Develop criteria for including new software and systems into your workflow. Before adding a new piece of software or online tool, the working group should consider whether that decision fits with your existing security policy or road map.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">3. Designate a staff member to be responsible for updating the policy based on feedback from your working group.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Remember that outside forces should cause your security policy to change, just as your organizational goals and approaches change, to meet new challenges. <\\/span><\\/p>\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101874618\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"101873397\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"richtext\",\"unique\":false,\"useCallout\":false},\"logic\":{\"action\":\"Show\",\"fields\":[{\"comparisonOperator\":\"lt\",\"fieldId\":\"101932231\",\"value\":15}],\"operator\":\"AND\",\"workflowSteps\":[]},\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<h4 dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><u>Why We Recommend This:<\\/u><\\/span><\\/h4><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Before you can upgrade your security, you need to have the fundamentals in place. Putting together a security policy and road map for your organization can help you be proactive about your security while also preparing for worst-case scenarios.<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Even the most well-intentioned organizations sometimes struggle to put security policies into practice on an everyday basis. That\\u2019s why it\\u2019s important to adopt a nonjudgmental, empathetic approach to helping staff become compliant. Reward the successes and manage the failures, and remember that changing behavior takes time.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Once you have a policy in place within your organization, you might be hesitant to make any changes and upset the status quo. Remember, though, that policies and road maps must adapt to changing threats to be effective. Designating certain staff members to keep these documents updated can help reduce unexpected risks in the future.<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong><u>A Real-World Example:<\\/u><\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">ADE Worldwide is growing quickly. What started as an organization with headquarters in Washington, DC, and a single field office in Latin America has quickly expanded to other locations around the world. Now that the organization is growing, more ADE staff members are reporting possible security challenges. Luckily, no security challenge has escalated into an incident, but management is growing concerned with the organization\\u2019s existing security policy.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">To help close this gap, the executive management team conducts a policy review session. They find that their current security policy has notable gaps but accurately reflects how the majority of staff handles cybersecurity. They realize they need to do more to make security a key part of the organization\\u2019s workflow. In response, they patch the gaps by moving security goals from their road map to their policy, making these steps a reality.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Then, they take steps to ensure that more of the staff complies with the newly revised policy. These include starting every staff meeting with a recognition of staff members who have demonstrated good security practices, while asking those falling behind to take part in a tabletop exercise that will demonstrate firsthand the risks of ignoring the new policy.<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">When they add a new field office in Thailand, they realize their policies need to be updated to reflect this new region. The CEO of ADE creates a working group to make changes to the policy, monitor threats across the offices and update policies at least once a year. <\\/span><\\/p>\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101874780\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"101873397\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"richtext\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null}],\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101873397\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"section\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesSectionDto\",\"content\":\"<h4 skip=\\\"true\\\"><strong><span style=\\\"font-size: 18px;\\\">Internal Risks (Intentional or Unintentional)<\\/span><\\/strong><\\/h4>\",\"heading\":\"\",\"labelPosition\":\"\",\"languageFormat\":\"default\",\"numColumns\":\"0\",\"usePageBreak\":false},\"fields\":[{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<p dir=\\\"ltr\\\"><span style=\\\"font-size: 24px;\\\">Your organization has scored <strong><u>below<\\/u><\\/strong> our recommended security level for civil society organizations. Don\\u2019t worry! We\\u2019ve put together some recommendations to improve your organization\\u2019s cybersecurity.<\\/span><\\/p><p dir=\\\"ltr\\\"><strong><u><span style=\\\"font-size: 18px;\\\">What We Recommend:<\\/span><\\/u><\\/strong><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Do a check-up on your organization\\u2019s cybersecurity.<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Your staff members are vital to the mission of your organization. But sometimes, intentionally or unintentionally, their decisions and actions can put your organization at risk. This is especially true in today\\u2019s digital world, where a wrong click or a missed security setting can leave the entire staff vulnerable.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">One of the easiest ways of checking up on your cybersecurity is to assemble a basic checklist of security settings that your staff members can follow. Here are <a href=\\\"https:\\/\\/www.securicy.com\\/blog\\/security-best-practices-hardening-windows-10\\/\\\">suggestions for Windows devices<\\/a>, and here are <a href=\\\"https:\\/\\/www.securicy.com\\/blog\\/our-best-practices-for-securing-your-macbook\\/\\\">suggestions for Mac devices<\\/a>. Once they have completed the checklist, they can sign a certificate of completion that indicates they have taken basic steps toward compliance. Their supervisor can then also sign off that they have completed the checklist. These documents can then be stored in their employee file. <\\/span><\\/p>\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101875162\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"101875125\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"richtext\",\"unique\":false,\"useCallout\":false},\"logic\":{\"action\":\"Show\",\"fields\":[{\"comparisonOperator\":\"gt\",\"fieldId\":\"101932656\",\"value\":34}],\"operator\":\"AND\",\"workflowSteps\":[]},\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<p dir=\\\"ltr\\\"><span style=\\\"font-size: 24px;\\\">Your organization has scored at a <strong><u>reasonable&nbsp;<\\/u><\\/strong>level of security in the category of internal risks. Good job! There are still areas for improvement, so we\\u2019ve put together some recommendations to improve your organization\\u2019s cybersecurity even more.<\\/span><\\/p><p dir=\\\"ltr\\\"><strong><u><span style=\\\"font-size: 18px;\\\">What We Recommend:<\\/span><\\/u><\\/strong><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Add clear language to employment agreements.<\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Your staff members are proactive about monitoring their cybersecurity and understand the importance of complying with your organization\\u2019s security policy. They may periodically meet with supervisors to discuss their cybersecurity and complete required security checklists.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">You can start to incorporate cybersecurity into their job description. This helps emphasize that security is not just a part of their workflow but also a core responsibility as a member of your organization.One effective way to do this is to ensure that employment agreements have language about privacy and security that is clear, truthful, and easy to understand. We recommend including language about:<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Data:<\\/strong> what responsibilities do staff members have with your organization\\u2019s data, and vice versa?&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Terms of use:<\\/strong> what legal arrangements govern your staff members\\u2019 use of technology, particularly any software, hardware, or systems that your organization owns?<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Acceptable use policy:<\\/strong> when staff members access your organization\\u2019s internal systems, what policies and guidelines must they follow?<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Onboarding policy:<\\/strong> how are staff members expected to learn about and use your organization\\u2019s technology when they join the organization?<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Offboarding policy:<\\/strong> what steps need to take place when a staff member leaves your organization?<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">You may want to enlist a lawyer to help you draft this language. There may also be other sections that apply directly to your situation. Just remember: the goal here is to be clear and informative, not to overwhelm your staff with legalese. Try to keep employment agreements to one page if possible, including a checklist, and make sure they are signed by the staff members and supervisors.<\\/span><\\/p>\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101877311\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"101875125\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"richtext\",\"unique\":false,\"useCallout\":false},\"logic\":{\"action\":\"Show\",\"fields\":[{\"comparisonOperator\":\"lt\",\"fieldId\":\"101932656\",\"value\":35},{\"comparisonOperator\":\"gt\",\"fieldId\":\"101932656\",\"value\":14}],\"operator\":\"AND\",\"workflowSteps\":[]},\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<p dir=\\\"ltr\\\"><span style=\\\"font-size: 24px;\\\">Your organization has scored as having a <strong><u>high&nbsp;<\\/u><\\/strong>level of security in the category of internal risks. Good work! There are still areas for improvement, so we\\u2019ve put together some recommendations to improve your organization\\u2019s cybersecurity even more. <\\/span><\\/p><p dir=\\\"ltr\\\"><strong><u><span style=\\\"font-size: 18px;\\\">What We Recommend:<\\/span><\\/u><\\/strong><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Consider device management systems.<\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Your staff regularly checks in with management about cybersecurity risks and has read and reviewed the cybersecurity requirements in their employment agreements.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Even the most informed and engaged staff members can still make mistakes, however.That\\u2019s why we recommend finding a method for managing devices that is consistent with your organization\\u2019s values and goals. For example, software known as \\u201cdevice management\\u201d platforms can allow organizations to manage work devices remotely. While the convenience and increased security of device management tools is an advantage, remember that you must always balance security with a level of privacy for your staff.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Device management software includes tools such as G Suite\\u2019s Google Devices, Apple\\u2019s Mobile Device Management, and <a href=\\\"https:\\/\\/preyproject.com\\/\\\">Prey<\\/a>, which allow tracking and remote data erasure on devices, and solutions from companies including IBM, Citrix, and VMWare.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">A technical provider can also help you use these tools to force organization-owned devices to \\u201ccomply\\u201d with security policies or restrict the ability for your staff to install their own software or change settings.<\\/span><\\/p>\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101877544\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"101875125\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"richtext\",\"unique\":false,\"useCallout\":false},\"logic\":{\"action\":\"Show\",\"fields\":[{\"comparisonOperator\":\"lt\",\"fieldId\":\"101932656\",\"value\":15}],\"operator\":\"AND\",\"workflowSteps\":[]},\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<h4 dir=\\\"ltr\\\"><strong><span style=\\\"font-size: 18px;\\\"><u>Why We Recommend This:<\\/u><\\/span><\\/strong><\\/h4><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Knowledge is power. By equipping your staff members with a checklist that allows them to identify cybersecurity risks, you\\u2019re empowering them to take action and increase their awareness. This step also provides you with a useful record of your staff\\u2019s overall level of cybersecurity.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Once you\\u2019ve implemented a \\u201cdo it yourself\\u201d checklist, remember that even the most dedicated staff member can make a mistake. Having a technical solution that allows your organization to access work devices can create a safety net for unpredictable moments or staff accidents, but you must balance this against your staff\\u2019s right to privacy.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong><u>A Real-World Example:<\\/u><\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Whenever a new person started at ADE Worldwide, managers sent them lots of information in an employee handbook. Included in it were guidelines on how to maintain their work devices for maximum cybersecurity.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Upon closer inspection, managers found about half of the staff followed the guidelines. Busy schedules, impending deadlines, and the pressures of the work were keeping staff from taking the necessary steps to keep their devices safe.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Rather than impose penalties on their staff, ADE managers asked all staff members to conduct a check-up on their devices and discuss their results with their supervisors. This allows staff &nbsp;members to tighten their security without feeling judged or censured by leadership.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Not long after adopting the checklist, ADE was able to partner with Papua Water Rights, a two-person advocacy group in Papua New Guinea. This was a major breakthrough for ADE as it has never been able to have a presence in Oceania before. While extremely effective, Papua Water Rights has fewer resources than ADE and must balance security needs with limited time and capacity. To help, they put together a detailed and mandatory checklist focused on keeping their devices safe. This is particularly important because they can\\u2019t afford to replace devices that may be compromised. &nbsp;<\\/span><\\/p>\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101877603\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"101875125\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"richtext\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null}],\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101875125\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"section\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesSectionDto\",\"content\":\"<h4><span style=\\\"font-size: 18px;\\\"><strong>Staff Training and Support<\\/strong><\\/span><\\/h4>\",\"heading\":\"\",\"labelPosition\":\"\",\"languageFormat\":\"default\",\"numColumns\":\"0\",\"usePageBreak\":false},\"fields\":[{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<p dir=\\\"ltr\\\"><span style=\\\"font-size: 24px;\\\">Your organization has scored <strong><u>below<\\/u><\\/strong> our recommended security level for civil society organizations in the staff training and support category. Don\\u2019t worry! We\\u2019ve put together some recommendations to improve your organization\\u2019s cybersecurity.<\\/span><\\/p><p dir=\\\"ltr\\\"><strong><u><span style=\\\"font-size: 18px;\\\">What We Recommend:<\\/span><\\/u><\\/strong><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Set expectations for security knowledge.<\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Your staff members are passionate, driven, motivated, and hard-working. They may be experts in fields such as human rights law and voting advocacy. Most likely, however, they are not cybersecurity experts. And while it\\u2019s easy to assume that most people have a basic level of experience with technology, that\\u2019s not always the case.<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Instead of assuming that your staff understands the basics of cybersecurity, assume that you are starting with a blank slate. From here, you can take a series of effective steps:<\\/span><\\/p><ul><li dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Familiarize yourself with cybersecurity basics.&nbsp;<\\/strong>Excellent resources to get started include the Electronic Frontier Foundation\\u2019s<a href=\\\"https:\\/\\/ssd.eff.org\\/en\\/taxonomy\\/term\\/362\\/\\\">&nbsp;Surveillance Self-Defense curriculum<\\/a> and the<a href=\\\"https:\\/\\/datadetoxkit.org\\/en\\/home\\\">&nbsp;Data Detox Kit<\\/a> from Tactical Tech.<\\/span><\\/li><li dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Begin training.&nbsp;<\\/strong>Work with a cybersecurity provider, as needed, to conduct introductory \\u201cdigital best practices\\u201d training for your staff.&nbsp;<\\/span><\\/li><li dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Share your organization\\u2019s security history with staff<\\/strong>. In fast-paced organizations, it\\u2019s easy for generational knowledge about security incidents to disappear, leaving newer staff unaware of risk. Document this history as much as possible so your staff members are fully informed.&nbsp;<\\/span><\\/li><\\/ul><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Starting with introductory knowledge can ensure that all staff members are on an equal footing.<\\/span><\\/p>\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101922901\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"101922892\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"richtext\",\"unique\":false,\"useCallout\":false},\"logic\":{\"action\":\"Show\",\"fields\":[{\"comparisonOperator\":\"gt\",\"fieldId\":\"101933095\",\"value\":29}],\"operator\":\"AND\",\"workflowSteps\":[]},\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<p dir=\\\"ltr\\\"><span style=\\\"font-size: 24px;\\\">Your organization has scored at <strong><u>reasonable<\\/u><\\/strong> level of security in the staff training and support category. Good job! There are still areas for improvement, so we\\u2019ve put together some recommendations to improve your organization\\u2019s cybersecurity even more.<\\/span><\\/p><p dir=\\\"ltr\\\"><strong><u><span style=\\\"font-size: 18px;\\\">What We Recommend:<\\/span><\\/u><\\/strong><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Introduce training in small bites.<\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Your staff members are busy professionals. It\\u2019s important to remember that they will forget most of the content that they hear, read, or watch during training.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">That\\u2019s why repetition of key points in \\u201csmall bites\\u201d is one of the most effective learning strategies for hard-working staffs. Begin by identifying the most critical behaviors, actions, and tools you need your staff to understand and implement.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Then gradually introduce training sessions into your organization\\u2019s workflow. Perhaps an hour once a month is dedicated to reviewing cybersecurity basics, or maybe a weekly lunch break is converted into a practice session. Day-long training will disrupt workflow and lead to tired, overwhelmed staff members. Use smaller, bite-sized training sessions instead to keep material fresh and approachable. <\\/span><\\/p>\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101922949\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"101922892\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"richtext\",\"unique\":false,\"useCallout\":false},\"logic\":{\"action\":\"Show\",\"fields\":[{\"comparisonOperator\":\"lt\",\"fieldId\":\"101933095\",\"value\":30},{\"comparisonOperator\":\"gt\",\"fieldId\":\"101933095\",\"value\":19}],\"operator\":\"AND\",\"workflowSteps\":[]},\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<p dir=\\\"ltr\\\"><span style=\\\"font-size: 24px;\\\">Your organization has scored a <u><strong>high<\\/strong><\\/u> level of security in the staff training and support category. Good work! There are still areas for improvement, so we\\u2019ve put together some recommendations to improve your organization\\u2019s cybersecurity even more.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><strong><u><span style=\\\"font-size: 18px;\\\">What We Recommend:<\\/span><\\/u><\\/strong><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Create a knowledge base.&nbsp;<\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">While live instruction, either in-person or online, is helpful for teaching big concepts, your organization can\\u2019t rely on training alone to enhance cybersecurity. Instead, you must create an institutionalized version of this knowledge that can be accessed by any staff member at any time.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">A good interim solution can be a basic online quiz accompanied by a 2- to 3-minute recap video to test the staff\\u2019s knowledge and refresh their memories.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Alternatively, digital tools for learning\\u2014sometimes known as learning management systems, or LMS\\u2014are widely available. We like open-source options such as<a href=\\\"https:\\/\\/moodle.org\\/\\\">&nbsp;Moodle<\\/a> and<a href=\\\"https:\\/\\/www.ilias.de\\/en\\/\\\">&nbsp;ILIAS<\\/a> or commercial versions such as<a href=\\\"https:\\/\\/www.learndash.com\\/\\\">&nbsp;LearnDash<\\/a> (built for the content management system WordPress) or<a href=\\\"https:\\/\\/www.docebo.com\\/\\\">&nbsp;Docebo<\\/a>.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">You may need to work with a technical assistance provider to implement this tool, but the effort can pay dividends. A well-designed LMS can help you capture not only cybersecurity lessons but also help your staff answer time-sensitive questions without having to track down an instructor. Most LMS platforms provide a scoring mechanism, too, so you can map your staff\\u2019s progress. <\\/span><\\/p>\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101922974\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"101922892\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"richtext\",\"unique\":false,\"useCallout\":false},\"logic\":{\"action\":\"Show\",\"fields\":[{\"comparisonOperator\":\"lt\",\"fieldId\":\"101933095\",\"value\":20}],\"operator\":\"AND\",\"workflowSteps\":[]},\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<p dir=\\\"ltr\\\"><strong><u><span style=\\\"font-size: 18px;\\\">Why We Recommend This:<\\/span><\\/u><\\/strong><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Your staff &nbsp;may find cybersecurity intimidating or technology daunting. Alternatively, some staff &nbsp;members may be advanced technology users while others may be embarrassed to admit their shortcomings. Assuming all staff members have basic cybersecurity knowledge allows your entire staff &nbsp;to establish a baseline level of security knowledge before moving on to more advanced topics.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Remember that whether we are learning a new language or technical skill, we learn best with repetition, practice, and time. Incorporating these strategies into our cybersecurity training can help break complex topics down into digestible details.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">While in-person training can help establish a baseline level of knowledge, your staff also needs access to information and lessons on their own schedule. Setting up a learning management system or other tool can bridge this gap while also documenting key security lessons that your organization has incorporated into your workflow.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong><u>A Real-World Example:<\\/u><\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Staff members at ADE Worldwide pride themselves on a \\u201ccan-do\\u201d approach. If they don\\u2019t know the answer to a problem, they will seek out the resources necessary to solve it on their own.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">As a result, they &nbsp;hesitate to admit when they lack sufficient knowledge to fix a problem, including improving their security footprint. ADE managers realize the only way to ensure that everyone moves forward with needed security updates is to require all staff to meet the same level of cybersecurity training, giving them permission to ask for help as needed without embarrassment.<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Once the initial training is over, there\\u2019s little time to invest on refreshers. That\\u2019s why ADE managers then start \\u201cLearning Lunches\\u201d every two weeks, when each office holds a refresher training over the lunch hour on Wednesdays. This provides staff with an interactive opportunity to practice their skills in an open, conversational setting with little pressure, but also reminds them of the importance of keeping their skills sharp. &nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Even with these initiatives, though, managers notice that staff are still struggling to implement some of the lessons. Since ADE has a global staff working across different time zones, it isn\\u2019t feasible to have a single point of contact to answer questions and troubleshoot. To help, ADE\\u2019s management institute a learning management system with all the content from earlier training sessions so staff can look up resources and lessons at any time of day on any device. <\\/span><\\/p>\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101923003\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"101922892\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"richtext\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null}],\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101922892\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"section\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesSectionDto\",\"content\":\"<h4><strong><span style=\\\"font-size: 18px;\\\">Travel Security<\\/span><\\/strong><\\/h4>\",\"heading\":\"\",\"labelPosition\":\"\",\"languageFormat\":\"default\",\"numColumns\":\"0\",\"usePageBreak\":false},\"fields\":[{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<p dir=\\\"ltr\\\"><span style=\\\"font-size: 24px;\\\">Your organization has scored <strong><u>below<\\/u><\\/strong> our recommended security level for civil society organizations in the travel security category. Don\\u2019t worry! We\\u2019ve put together some recommendations to improve your organization\\u2019s cybersecurity.<\\/span><\\/p><p dir=\\\"ltr\\\"><strong><u><span style=\\\"font-size: 18px;\\\">What We Recommend:<\\/span><\\/u><\\/strong><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Understand the risks.<\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Travel is an exciting opportunity for staff to advance your organization\\u2019s mission. When your staff members travel, however, they are temporarily removed from the regular security habits they use at home or the office. This poses risks when they are carrying work devices or accessing sensitive information. Even losing their personal devices can cause a threat to your organization\\u2019s work.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Develop travel security policies.<\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">While most staff members are probably aware of the risks posed during travel, it\\u2019s important to emphasize just how vulnerable they really are when they are working away from home. Have a candid discussion about the repercussions of losing a work device while traveling, for example. Other topics you will want to cover include:<\\/span><\\/p><ul><li dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">How should staff members and your organization handle the loss or theft of a work device?&nbsp;<\\/span><\\/li><li dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Does your organization have a device insurance policy for staff travel?<\\/span><\\/li><li dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">How can staff members back up data from their device and restore it, as needed?<\\/span><\\/li><li dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">What is the process for border crossings with work devices or data?<\\/span><\\/li><li dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">How will you handle travel to areas with low or no Internet connectivity?<\\/span><\\/li><\\/ul><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">While every organization is different and risks vary greatly between countries and regions, you may want to consider establishing policies around the use of work devices when traveling. Some organizations choose to \\u201cpre-flight\\u201d a device by removing sensitive information, deleting certain apps, and using only essential services while on the road. Other organizations prohibit staff from bringing their work or personal devices while traveling at all, instead issuing them travel-specific devices.<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">You may want to consult with a security provider to determine the best solution for your organization. <\\/span><\\/p>\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101926563\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"101923540\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"richtext\",\"unique\":false,\"useCallout\":false},\"logic\":{\"action\":\"Show\",\"fields\":[{\"comparisonOperator\":\"gt\",\"fieldId\":\"101933324\",\"value\":14}],\"operator\":\"AND\",\"workflowSteps\":[]},\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<p dir=\\\"ltr\\\"><span style=\\\"font-size: 24px;\\\">Your organization has scored a <strong><u>reasonable<\\/u><\\/strong> level of security in the travel security category. Good job! There are still areas for improvement, so we\\u2019ve put together some recommendations to improve your organization\\u2019s cybersecurity even more.<\\/span><\\/p><p dir=\\\"ltr\\\"><u><strong><span style=\\\"font-size: 18px;\\\">What We Recommend:<\\/span><\\/strong><\\/u><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Incorporate cloud storage.<\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Your staff members understand the risks posed by travel, and you\\u2019ve briefed them on your organization\\u2019s policies governing work travel. You may have even chosen to use dedicated travel-specific devices for your staff.<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Now, you can enhance the precautions that your staff members take when they travel. One of the most effective ways to protect against device theft or damage while traveling is to store data in the cloud. While there are many cloud storage services to consider, we recommend using encrypted ones when traveling. These services include<a href=\\\"https:\\/\\/spideroak.com\\/one\\/\\\">&nbsp;SpiderOak One<\\/a>, a US-based provider, and<a href=\\\"https:\\/\\/tresorit.com\\/\\\">&nbsp;Tresorit<\\/a>, a Swiss provider. Self-hosted solutions include<a href=\\\"https:\\/\\/nextcloud.com\\/\\\">&nbsp;NextCloud<\\/a> and<a href=\\\"https:\\/\\/owncloud.com\\/\\\">&nbsp;OwnCloud<\\/a>. Alternatively, you may use a tool such as<a href=\\\"https:\\/\\/cryptomator.org\\/\\\">&nbsp;Cryptomator<\\/a> to encrypt your files locally and store them in your nonencrypted cloud storage service, such as Dropbox or Google Drive. (Files on Google Drive and other popular services are encrypted but can be accessed by the cloud storage provider in response to legal requests.)&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">You may need a security provider to help with this process and to select the right cloud service for you. <\\/span><\\/p>\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101926580\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"101923540\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"richtext\",\"unique\":false,\"useCallout\":false},\"logic\":{\"action\":\"Show\",\"fields\":[{\"comparisonOperator\":\"lt\",\"fieldId\":\"101933324\",\"value\":15},{\"comparisonOperator\":\"gt\",\"fieldId\":\"101933324\",\"value\":5}],\"operator\":\"AND\",\"workflowSteps\":[]},\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<p dir=\\\"ltr\\\"><span style=\\\"font-size: 24px;\\\">Your organization has scored a <strong><u>high<\\/u><\\/strong> level of security in the travel security category. &nbsp;Good work! There are still areas for improvement, so we\\u2019ve put together some recommendations to improve your organization\\u2019s cybersecurity even more. <\\/span><\\/p><p dir=\\\"ltr\\\"><strong><u><span style=\\\"font-size: 18px;\\\">What We Recommend:<\\/span><\\/u><\\/strong><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">You\\u2019ve made good progress on keeping your staff and your data safe during work-related travel. To further improve your travel security, you should consider using dedicated travel-specific devices. This will require both an investment of time and money, as well as the creation of new policies around the safe use of these devices. Used effectively, however, travel devices can greatly reduce risk, even if they fall into the wrong hands.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Source travel devices and develop a policy for their use.&nbsp;<\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">To start, you will want to identify the types of devices that your staff members use in the field. If they typically need a laptop while traveling, consider a reliable but inexpensive alternative like a<a href=\\\"https:\\/\\/www.google.com\\/chromebook\\/\\\">&nbsp;Chromebook<\\/a>. For smartphones, consider a model with only the features they need for work.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Once you\\u2019ve identified the types of devices appropriate for your organization, you will need to develop a clear policy and process for handling travel devices before, during, and after their use. This will likely include a \\u201cpre-flight\\u201d process to prepare the device and a return check-in with the staff &nbsp;member who used the device to learn about any challenges they may have had in the field. You will also need to wipe the device clean before and after travel.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Each of these device management phases can be time-consuming, so they should be spelled out in detail and written down. You may want to work with a security provider to implement this process smoothly.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Alternatively, you can ask a security provider to help you set up a \\u201cvirtual machine.\\u201d This allows you to use your work computer to access another separate device through a web browser and software such as<a href=\\\"https:\\/\\/www.vmware.com\\/products\\/workstation-player.html\\\">&nbsp;VMWare Work Station Player<\\/a> (Linux\\/PC), &nbsp;Fusion (Mac), or<a href=\\\"https:\\/\\/www.virtualbox.org\\/\\\">&nbsp;VirtualBox<\\/a>. This will require an Internet connection, so it may not be suitable for every type of field travel. Ask a provider whether this is a good option for you. <\\/span><\\/p>\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101926601\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"101923540\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"richtext\",\"unique\":false,\"useCallout\":false},\"logic\":{\"action\":\"Show\",\"fields\":[{\"comparisonOperator\":\"lt\",\"fieldId\":\"101933324\",\"value\":6}],\"operator\":\"AND\",\"workflowSteps\":[]},\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<p dir=\\\"ltr\\\"><strong><span style=\\\"font-size: 18px;\\\"><u>Why We Recommend This:<\\/u><\\/span><\\/strong><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Organizations that don\\u2019t plan for risks in the field leave themselves vulnerable to surprises. Having an open conversation with your staff about travel security can encourage an important dialogue about risk within your organization and may even highlight some vulnerabilities you hadn\\u2019t noticed previously. You can then use those findings to help create policies to mitigate travel risks.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong><u>A Real-World Example:<\\/u><\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">ADE Worldwide now has offices in nearly every region of the world. Staff often travel to meet colleagues overseas, attend large conferences, or oversee fieldwork. While staff have a basic understanding of how to stay safe while traveling, ADE realizes it hasn\\u2019t done its due diligence regarding travel security as an organization. As a result, it institutes a series of organizational open meetings to collect feedback about travel risks, then begins the process of drafting a formal travel security policy.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">One part of the new policy governs the use of work devices outside the office. Field staff at ADE Worldwide work in rural areas with farmers and agricultural workers, often in tough conditions. When headquarters staff travel into the field, they bring their work devices to take photographs, notes, and record data. After a series of devices were lost on a recent field visit, ADE management now requires all travelers to upload their data to an encrypted cloud storage provider, accessing only the files they absolutely need while on the road.<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">When the majority of ADE\\u2019s staff needs to work remotely full-time due to the global pandemic, they use these travel policies to govern their work devices. <\\/span><\\/p>\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101926608\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"101923540\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"richtext\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null}],\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101923540\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"section\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesSectionDto\",\"content\":\"<h4><strong><span style=\\\"font-size: 18px;\\\">Data Security<\\/span><\\/strong><\\/h4>\",\"heading\":\"\",\"labelPosition\":\"\",\"languageFormat\":\"default\",\"numColumns\":\"0\",\"usePageBreak\":false},\"fields\":[{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<p dir=\\\"ltr\\\"><span style=\\\"font-size: 24px;\\\">Your organization has scored <strong><u>below<\\/u><\\/strong> our recommended security level for civil society organizations points in the data security category. This puts it below our recommended security level for civil society organizations. Don\\u2019t worry! We\\u2019ve put together some recommendations to improve your organization\\u2019s cybersecurity.<\\/span><\\/p><p dir=\\\"ltr\\\"><strong><u><span style=\\\"font-size: 18px;\\\">What We Recommend:<\\/span><\\/u><\\/strong><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Consider what\\u2019s valuable and how to protect it.<\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Data are the lifeblood of our digital systems. Your organization\\u2019s data contain incredible amounts of information\\u2014some trivial (such as your lunchtime calendar reminder) and some vital (such as the names and home addresses of your staff).&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Many people across organizations have access to tremendous amounts of data, often more than they realistically need to do their jobs properly. An attacker, however, can do significant damage when they gain such access. One effective way to reduce your digital risk is to also reduce access to unnecessary data within your organization.<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">If you\\u2019re just getting started managing your data, it\\u2019s helpful to take two steps upfront:<\\/span><\\/p><p dir=\\\"ltr\\\" style=\\\"margin-left: 20px;\\\"><span style=\\\"font-size: 18px;\\\"><strong>Understand the connection between retention and protection.<\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\" style=\\\"margin-left: 20px;\\\"><span style=\\\"font-size: 18px;\\\">Remember this rule of thumb when it comes to managing your data: \\u201cif it\\u2019s not there, they can\\u2019t steal it.\\\" For example, if your colleague doesn\\u2019t need 10 years\\u2019 worth of tax data on their laptop, find a safer place to store that information. Consider whether everyone in your organization needs access to a decade\\u2019s worth of emails or the entire staff &nbsp;directory. Determining which data is valuable and requires additional protection will help you take appropriate next steps.<\\/span><\\/p><p dir=\\\"ltr\\\" style=\\\"margin-left: 20px;\\\"><span style=\\\"font-size: 18px;\\\"><strong>Conduct a data categorization exercise.<\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\" style=\\\"margin-left: 20px;\\\"><span style=\\\"font-size: 18px;\\\">If you are working with a technical assistance provider, you may be able to conduct this exercise on your internal system. If not, you can also conduct a tabletop version of this exercise with your staff. Consider a blunt but effective measure: list the key data sources within your organization and determine who actually needs access to them. These could include email archives, staff directories, financial records, and project details. To access this data moving forward, staff &nbsp;members need to specifically request the data they need. You can then determine whether they should be granted access permanently, for a 30-day window, or even for a supervised 24-hour block of time.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">While these steps may seem challenging, changing the status quo around data access within your organization can greatly reduce the risk that a genuine mistake can lead to a data breach.<\\/span><\\/p>\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101926617\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"101926613\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"richtext\",\"unique\":false,\"useCallout\":false},\"logic\":{\"action\":\"Show\",\"fields\":[{\"comparisonOperator\":\"gt\",\"fieldId\":\"101934232\",\"value\":24}],\"operator\":\"AND\",\"workflowSteps\":[]},\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<p dir=\\\"ltr\\\"><span style=\\\"font-size: 24px;\\\">Your organization has scored a <strong><u>reasonable<\\/u><\\/strong> level of security in the data security category. Good job! There are still areas for improvement, so we\\u2019ve put together some recommendations to improve your organization\'s cybersecurity even more.<\\/span><\\/p><p dir=\\\"ltr\\\"><strong><u><span style=\\\"font-size: 18px;\\\">What We Recommend:<\\/span><\\/u><\\/strong><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Reduce the amount of data you keep and for how long.&nbsp;<\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Email is one major area in which organizations tend to neglect good data management practices. Inboxes often overflow with unread messages while sent mail folders date back years.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">As a way of improving your data management policies, consider instituting a limit on the amount of email that is stored in your staff\\u2019s mailboxes. Archiving email is a relatively easy practice that does not delete or remove the email itself. Instead, this practice removes a set of emails from the active mailbox to be stored somewhere more secure. A technical assistance provider can help you with this process.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">To start, consider archiving all email more than five years old in your staff &nbsp;inboxes. After your staff has adjusted to this change, try changing the limit to any emails more than three years old. Some organizations may have a legal requirement to keep emails in an accessible format, so consult with a lawyer before determining the right policy for your organization.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Though this process can be time-consuming, having a limited number of emails in your organization\\u2019s accounts greatly reduces your risk if you fall victim to a data breach.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Additionally, work with a technical provider to determine how best to categorize your organization\\u2019s remaining data by sensitivity. Some data\\u2014such as financial or tax records\\u2014should be considered highly sensitive and stored in encrypted storage. Others may not require such a high level of protection.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Wherever you store your data, make sure you institute a backup policy, ensuring that a copy of your information is stored securely on a regular basis. Again, a technical assistance provider can advise you on the best backup process for your needs, although we recommend no less than every business quarter. <\\/span><\\/p>\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101926631\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"101926613\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"richtext\",\"unique\":false,\"useCallout\":false},\"logic\":{\"action\":\"Show\",\"fields\":[{\"comparisonOperator\":\"gt\",\"fieldId\":\"101934232\",\"value\":10},{\"comparisonOperator\":\"lt\",\"fieldId\":\"101934232\",\"value\":25}],\"operator\":\"AND\",\"workflowSteps\":[]},\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<p dir=\\\"ltr\\\"><span style=\\\"font-size: 24px;\\\">Your organization has scored a <strong><u>high<\\/u><\\/strong> level of security in the data security category. Good work! There are still areas for improvement, so we\\u2019ve put together some recommendations to improve your organization\\u2019s cybersecurity even more.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><u><strong><span style=\\\"font-size: 18px;\\\">What We Recommend:<\\/span><\\/strong><\\/u><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Plan to keep your organization running.&nbsp;<\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">While none of us wants to experience a crisis that disrupts our organization\\u2019s work, we need a plan to maintain our operations should a challenge occur. This is a process known as \\u201cbusiness continuity planning\\u201d and differs for every organization. For example, an investigative journalism network may have different continuity procedures than an organization that works with foreign policy.<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">A key element of business continuity is the ability to access your data and continue your work even when you aren\\u2019t physically in your office or on your work device. This means that your current backup policy must be robust enough to allow you to maintain your operations using your most recent backup. Ask yourself how long you could use your most recent backup to keep your operations running until you could no longer continue. If the answer is sooner than you expected, consider increasing the frequency of data backups within your organization.<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">If you increase the frequency of backups, you should also increase the amount of time you spend practicing restoring your backups. We recommend testing your backups at least once a year and ideally every six months. You don\\u2019t want to rely on a backup process that you have not tested.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Backups are also essential protections against ransomware threats. Ransomware is a form of malicious software that encrypts your device until you pay a fee. If you have a previous backup of your device stored separately from the device (on an external hard drive or cloud storage, for example), you can \\u201cturn back the clock\\u201d on your data prior to the ransomware attack. This allows you to regain access to the data you stored before the attack took place.<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Finally, you can work with a security provider to continue the data categorization process. Now that you\\u2019ve determined which staff members need access to which data and for how long, you can go a step further and hyper-categorize access. For example, your accounting staff may need access to sensitive financial records, but only the manager of that group will be granted access to personnel records. This categorization of data by tiers can further tighten your organization\\u2019s data security. <\\/span><\\/p>\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101926665\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"101926613\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"richtext\",\"unique\":false,\"useCallout\":false},\"logic\":{\"action\":\"Show\",\"fields\":[{\"comparisonOperator\":\"lt\",\"fieldId\":\"101934232\",\"value\":11}],\"operator\":\"AND\",\"workflowSteps\":[]},\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<p dir=\\\"ltr\\\"><strong><u><span style=\\\"font-size: 18px;\\\">Why We Recommend This:<\\/span><\\/u><\\/strong><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Like physical mail, important pieces of data can pile up in a digital corner if we don\\u2019t stay organized. This makes it much easier for an attacker to seize sensitive data simply by accessing your accounts. Undertaking a data categorization exercise helps your staff identify what information they need to access frequently and what can be stored away securely.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Staying safe always requires a balance between convenience and security. Instituting an email archive policy, for example, can remove sensitive emails from inboxes while still making them accessible in an archive. This is also a good first step as you move your organization toward routinely categorizing and storing data based on its sensitivity.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Data security isn\\u2019t only focused on preventing attacks from outside the organization. When handled properly, secure data are also a resource to keep an organization running during crises when they may be unable to access their offices or work devices.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong><u>A Real-World Example:<\\/u><\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">In its early years as a young organization, ADE Worldwide worked with a lean technology setup and a shoestring budget. Now, as an established player in the agricultural development space, ADE is slowly moving beyond its old technology. This means that the staff is now moving much of the data in inboxes and online accounts into secure cloud and physical storage instead.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">This is useful when ADE\\u2019s office in Puerto Rico is rattled by a sudden, unexpected earthquake. Since this office is near the epicenter, staff members aren\\u2019t able to return to it for weeks. Luckily, the central office on the mainland has access to critical data in encrypted cloud storage and is therefore able to grant the staff temporary access so they can continue operating in the aftermath of the earthquake.<\\/span><\\/p>\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101926727\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"101926613\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"richtext\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null}],\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101926613\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"section\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesSectionDto\",\"content\":\"<h4><strong><span style=\\\"font-size: 18px;\\\">Website Security<\\/span><\\/strong><\\/h4>\",\"heading\":\"\",\"labelPosition\":\"\",\"languageFormat\":\"default\",\"numColumns\":\"0\",\"usePageBreak\":false},\"fields\":[{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<p dir=\\\"ltr\\\"><span style=\\\"font-size: 24px;\\\">Your organization has scored <strong><u>below<\\/u><\\/strong> our recommended security level for civil society organizations in the website security category. Don\\u2019t worry! We\\u2019ve put together some recommendations to improve your organization\\u2019s cybersecurity.<\\/span><\\/p><p dir=\\\"ltr\\\"><strong><u><span style=\\\"font-size: 18px;\\\">What We Recommend:<\\/span><\\/u><\\/strong><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">For many organizations, your website is both your front door and your face to the world. As a result, people who want to harm your work may target your website for defacement, hacking, or other types of attacks. Luckily, there are some basic steps you can take to strengthen your web presence. Here are three measures you can take, with assistance from a technical assistance provider, to improve your website security.<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Understand and implement HTTPS.<\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">When you visit a website, you may see the letters \\u201chttp\\u201d in front of the web address. This allows the site to communicate and provide directions to your web browser. In the early years of the Internet, HTTP was the default form of communication between websites and browsers. Now, a more secure form of communication, known as HTTPS, provides greater protection for users visiting your website. This means that if they search for sensitive information or submit information to you via a form, their data are encrypted from outside eyes.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Increasingly, popular search engines such as Google are flagging sites that do not use HTTPS as insecure, which also reduces the number of people who are comfortable visiting your site. You can read more about HTTPS in<a href=\\\"https:\\/\\/www.cloudflare.com\\/learning\\/ssl\\/what-is-https\\/\\\">&nbsp;this article by CloudFlare<\\/a>.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Reduce your risk of DDOS attacks.<\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">If someone dislikes your organization\\u2019s work or wants to harm your efforts, one strategy they may use is to temporarily force your website offline. This is often accomplished through a distributed denial of service (DDOS) attack, in which attackers overwhelm your website with visits to temporarily shut it down. A qualified technical assistance provider can help you reduce your vulnerability to these attacks by installing a content delivery network (CDN). A CDN delivers the content of your website from several different locations across the web, reducing your dependence on a single point of failure that can be crippled by a DDOS attack. You can read more about these attacks in<a href=\\\"https:\\/\\/www.cloudflare.com\\/learning\\/ddos\\/what-is-a-ddos-attack\\/\\\">&nbsp;this article by CloudFlare<\\/a>.<a href=\\\"https:\\/\\/www.cloudflare.com\\/galileo\\/\\\">&nbsp;CloudFlare\\u2019s free Galileo<\\/a> and Google\\u2019s free <a href=\\\"https:\\/\\/projectshield.withgoogle.com\\/landing\\\">Project Shield<\\/a> are both ideal CDNs for civil society organizations, as is<a href=\\\"https:\\/\\/equalit.ie\\/portfolio\\/deflect\\/\\\">&nbsp;Equalite\\u2019s Deflect<\\/a>.<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Understand how Google \\u201cdorking\\u201d can harm your organization.<\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Despite the silly name, Google \\u201cdorking\\u201d is a serious threat to civil society organizations. The practice involves using a popular search engine, such as Google, to search for vulnerabilities within particular websites. For example, if your website includes a particular snippet of code from an outdated application, searchers can use Google to locate and attack insecure pages. You can work with a technical assistance provider to identify areas of your site that need to be updated to protect against this practice.<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Keep your website updated.<\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Many websites run on content management systems (CMS) that allow nontechnical users to easily maintain the site. As with all software, you must update your CMS when new features and security updates become available. Any plug-ins or themes (the code that provides the look and feel of your site) should also be updated to plug any vulnerabilities. A technical assistance provider can help you keep your CMS updated on a regular basis.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">If you don\\u2019t have the resources to keep your site updated, consider switching to a hosted provider such as Wix or Squarespace. For a monthly fee, these services update automatically and require less maintenance than a self-hosted site. <\\/span><\\/p>\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101926969\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"101926783\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"richtext\",\"unique\":false,\"useCallout\":false},\"logic\":{\"action\":\"Show\",\"fields\":[{\"comparisonOperator\":\"gt\",\"fieldId\":\"101934667\",\"value\":29}],\"operator\":\"AND\",\"workflowSteps\":[]},\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<p dir=\\\"ltr\\\"><span style=\\\"font-size: 24px;\\\">Your organization has scored a <strong><u>reasonable<\\/u><\\/strong> level of security in the website security category. Good job! There are still areas for improvement, so we\\u2019ve put together some recommendations to improve your organization\\u2019s cybersecurity even more.<\\/span><\\/p><p dir=\\\"ltr\\\"><strong><u><span style=\\\"font-size: 18px;\\\">What We Recommend:<\\/span><\\/u><\\/strong><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">You\\u2019ve taken a series of concrete steps to help reduce vulnerabilities on your website. Now, you can turn your attention to the information you include on it. In addition to finding technical loopholes in your website, dedicated attackers will also comb the website itself, looking for valuable information. This information can include details about your organization, location, and staff that they can use for more attacks. Here are two steps to consider to reduce your risk.<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Understand the connection between online and physical harassment.<\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Though cyberbullying and doxxing (the release of private information online) may seem like digital risks, they may also be warning signs for physical harassment. Leaked information such as home addresses can put staff members at risk of physical harm, and attacks by trolls on social media can indicate increased risk of real-life harassment. Don\\u2019t assume that online attacks only stay online and consider increasing your physical security.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Comb your website and social media profiles for unnecessary information.<\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">People who want to harm your organization will use any available information to make their attacks more effective. This includes using seemingly innocent details on your website or social media profiles. For example, sharing full names, staff photos, and biographical details on your website can allow an attacker to identify a target more easily.<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Consider using a first name and last initial policy for your website and social media sites such as LinkedIn, and being careful with sharing details about work assignments and location. Document your requirements in an official organizational policy so your staff members follow the appropriate guidelines, too. <\\/span><\\/p>\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101926992\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"101926783\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"richtext\",\"unique\":false,\"useCallout\":false},\"logic\":{\"action\":\"Show\",\"fields\":[{\"comparisonOperator\":\"gt\",\"fieldId\":\"101934667\",\"value\":20},{\"comparisonOperator\":\"lt\",\"fieldId\":\"101934667\",\"value\":30}],\"operator\":\"AND\",\"workflowSteps\":[]},\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<p dir=\\\"ltr\\\"><span style=\\\"font-size: 24px;\\\">Your organization has scored a <strong><u>high<\\/u><\\/strong> level of security in the website security category. Good work! There are still areas for improvement, so we\\u2019ve put together some recommendations to improve your organization\\u2019s cybersecurity even more. <\\/span><\\/p><p dir=\\\"ltr\\\"><strong><u><span style=\\\"font-size: 18px;\\\">What We Recommend:<\\/span><\\/u><\\/strong><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Now that you have HTTPS and a CDN enabled, consider working with a technical assistance provider to more closely monitor how your website is being used. Here are three key steps you can take to remain watchful.<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Enable rate limits.<\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">People who want to do harm to your organization will use any available channels to slow down or hamper your operations. This can include useful features on your website, such as online contact forms or other tools, which they can overwhelm with automated requests. To help lessen this risk, you can work with a technical assistance provider to enable rate limits, which can reduce the number of attempts an individual user can make on a particular part of your website. You can read more about how rate limits can be used in<a href=\\\"https:\\/\\/cloud.google.com\\/solutions\\/rate-limiting-strategies-techniques\\\">&nbsp;this article from Google<\\/a>.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Consider who can log in to your site.<\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Using a content management system (CMS) can save you time and effort when updating your website. But these systems require users to log into the website from a live login page. Unless you take proactive steps, an attacker can access this login page, determine which CMS you are using, and attempt to force their way inside.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">There are steps you can take to mitigate this risk with varying degrees of technical complexity. One of the easiest steps is to enable<a href=\\\"http:\\/\\/twofactorauth.org\\\">&nbsp;two-factor authentication<\\/a> on your website CMS, which requires an additional step to log in. You can also work with a technical provider to enable a single-sign-on (SSO) system that allows your staff &nbsp;members to use one master login across the organization. This improves both usability and security, although it can be complicated to set up. Last, you can work with a provider to limit access to the login page to only a pre-approved list of users, which would require the use of a virtual private network (VPN).&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Monitor your analytics and traffic.<\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">If you\\u2019re concerned about attacks from a particular region or country, you can use analytics, the data that your website collects, to track sources of traffic. A spike in usage from a particular country may be a red flag, as well as sudden changes in the source of traffic or the sites that are referring traffic to yours.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Additionally, you should monitor search terms that bring users to your site. Negative or threatening search terms that drive traffic to your site can be an indicator of an ongoing campaign against your organization\\u2019s work or reputation. Working with a security provider, you may be able to use these search terms to identify the source of these attacks, as well. A reputable provider can also show you how to monitor particular users of your site that are linked to regions, countries, or Internet connections that you have identified as risky. <\\/span><\\/p>\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101927003\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"101926783\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"richtext\",\"unique\":false,\"useCallout\":false},\"logic\":{\"action\":\"Show\",\"fields\":[{\"comparisonOperator\":\"lt\",\"fieldId\":\"101934667\",\"value\":19}],\"operator\":\"AND\",\"workflowSteps\":[]},\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong><u>Why We Recommend This:<\\/u><\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Securing your website can prevent everything from embarrassing defacement to harmful intrusions. Luckily, there are basic steps you can take to \\u201charden\\u201d your site using widely available services. While these won\\u2019t prevent highly sophisticated attacks, they will make your site a more difficult target, discouraging some low-level threats.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Many organizations believe the primary threat to their website is a cyberattack. In reality, attackers can use the publicly available information on a website for social engineering and other threats. Social engineering occurs when an attacker targets the weakest part of an organization\\u2014the human beings who work there. An example of a social engineering attack would be an attacker impersonating a staff member to gain access to information about computer systems from a customer service department. Another example would be an attacker waiting outside a locked door with a fake delivery package until someone lets them inside.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Removing unnecessary information about your staff and projects can help limit the amount of usable details an attacker can find on your site. This, of course, asks for a difficult balance between informing the public about your mission and not sharing overly sensitive details that could put your staff or work at risk. A good way to find the appropriate balance is to assess your organization\\u2019s work alongside your risk climate. There is no right or wrong answer here; do what is best for your organization at this moment in time. &nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong><u>A Real-World Example:<\\/u><\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">As an agricultural advocacy organization focused on responsible water usage, ADE Worldwide management didn\\u2019t believe they needed much security for their website. When they noticed some unusual traffic spikes from nations where they don\\u2019t have offices, however, they became concerned that they might be targeted for a cyberattack. To help, they implemented a few basic recommendations, including enabling HTTPs and installing a CDN, to lessen their risk of attacks.<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Another threat arises when they hired a new head of their office in Indonesia. The new hire, a well-known environmental activist, &nbsp;attracted some controversy for his outspoken advocacy of rural farmers. Not long after he was hired, he received a threatening note while volunteering at a local charity. ADE staff realized that the new hire had mentioned his work at the charity in his biography on the website, making it easy for an adversary to track him there. In response, the organization removed overly specific information from several staff biographies on the site. <\\/span><\\/p>\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101927036\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"101926783\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"richtext\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null}],\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101926783\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"section\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesSectionDto\",\"content\":\"<h4><strong><span style=\\\"font-size: 18px;\\\">Office Security<\\/span><\\/strong><\\/h4>\",\"heading\":\"\",\"labelPosition\":\"\",\"languageFormat\":\"default\",\"numColumns\":\"0\",\"usePageBreak\":false},\"fields\":[{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<p dir=\\\"ltr\\\"><span style=\\\"font-size: 24px;\\\">Your organization has scored <strong><u>below<\\/u><\\/strong> our recommended security level for civil society organizations in the office security category. Don\\u2019t worry! We\\u2019ve put together some recommendations to improve your organization\\u2019s cybersecurity.<\\/span><\\/p><p dir=\\\"ltr\\\"><strong><u><span style=\\\"font-size: 18px;\\\">What We Recommend:<\\/span><\\/u><\\/strong><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">We don\\u2019t always make the connection between our physical security and our cybersecurity. But with our digital devices becoming more portable and our data becoming more valuable, the risk of device theft, seizure, damage, and loss is greater than ever. Here are two steps you can take to help reduce your organization\\u2019s immediate physical security risks.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Establish an entrance policy.<\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Whether your organization has offices in secure buildings, co-working spaces, or staff members\\u2019 homes, you can implement a \\u201clast line of defense\\u201d entrance policy to control access to your office space. Implementing a mandatory identification policy can add an extra hurdle to your schedule but allows you to keep a clear record of who enters your space. While requiring proper identification won\\u2019t stop a dedicated attacker, it may deter low-level opportunistic threats or people who are testing your defenses. If your staff works outside of the office and holds in-person meetings, consider extending this policy so individuals must show an ID before a face-to-face meeting (which ideally should not take place in an employee\\u2019s home office, but rather a public space).<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Establish a \\u201cclean desk\\u201d policy.<\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">At the end of a busy work day, it is tempting to leave devices, paperwork, and files on our desks for the next day. While convenient, this leaves an easy target for attackers who gain entry during off-hours. Institute a clean desk policy that requires staff members to secure their devices and paperwork in a locked space before leaving for the day. This same policy should apply across offices, even if staff members work from home. It may be useful to print a reminder checklist for staff members to leave on their desk as a visual cue. <\\/span><\\/p>\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101927039\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"101927002\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"richtext\",\"unique\":false,\"useCallout\":false},\"logic\":{\"action\":\"Show\",\"fields\":[{\"comparisonOperator\":\"gt\",\"fieldId\":\"101934492\",\"value\":25}],\"operator\":\"AND\",\"workflowSteps\":[]},\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<p dir=\\\"ltr\\\"><span style=\\\"font-size: 24px;\\\">Your organization has scored a <strong><u>reasonable<\\/u><\\/strong> level of security in the office security category. Good job! There are still areas for improvement, so we\\u2019ve put together some recommendations to improve your organization\\u2019s cybersecurity even more.<\\/span><\\/p><p dir=\\\"ltr\\\"><strong><u><span style=\\\"font-size: 18px;\\\">What We Recommend:<\\/span><\\/u><\\/strong><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">You\\u2019ve taken some important incremental steps toward increasing your organization\\u2019s physical safety. As with all aspects of security, though, physical security requires a flexible approach that adjusts as threats change. One of the most effective ways to determine whether your current policy meets your current threats is to conduct an inter-office exercise.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Conduct a \\u201clast person out\\u201d exercise.<\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">To measure whether your organization\\u2019s clean desk policy is as effective as it could be, conduct a \\u201clast person out\\u201d exercise. If you have multiple offices, you may need to ask staff members across your different regions to help. If they work from home, they can conduct this test themselves. When the last person in the office leaves for the day, designate a staff member to enter the office shortly afterward and note what\\u2019s been left in the open and what\\u2019s been properly secured.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">This exercise is not designed to \\u201cname and shame\\u201d anyone who might be neglecting the rules. Rather, it\\u2019s intended to note any missed opportunities that need to be incorporated into your clean desk policy. For example, you may need to develop special rules for the last person who leaves the office and post them prominently in a public place. For staff working remotely, they can use &nbsp;printouts to remind them of any necessary steps.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Create a minimum viable security system.<\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Physical security systems can be highly complex, involving video and audio monitoring, entry cards, and visitor registration. If you don\\u2019t currently have a security system, however, you don\\u2019t need to start with the most advanced option. Instead, you can work with a security provider to implement a low-cost solution using basic equipment such as a dedicated smartphone or streaming camera. As your threat level increases or you increase your budget, you can work with a provider to install or implement a more elaborate solution.<\\/span><\\/p>\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101927051\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"101927002\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"richtext\",\"unique\":false,\"useCallout\":false},\"logic\":{\"action\":\"Show\",\"fields\":[{\"comparisonOperator\":\"gt\",\"fieldId\":\"101934492\",\"value\":19},{\"comparisonOperator\":\"lt\",\"fieldId\":\"101934492\",\"value\":26}],\"operator\":\"AND\",\"workflowSteps\":[]},\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<p dir=\\\"ltr\\\"><span style=\\\"font-size: 24px;\\\">Your organization has scored a <u><strong>high<\\/strong><\\/u> level of security in the office security category. Good work! There are still areas for improvement, so we\\u2019ve put together some recommendations to improve your organization\\u2019s cybersecurity even more. <\\/span><\\/p><p dir=\\\"ltr\\\"><strong><u><span style=\\\"font-size: 18px;\\\">What We Recommend:<\\/span><\\/u><\\/strong><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Now that you have a tested office security policy and a basic security system, you can go a step further and make sure you have more control over the information that leaves your office. One of the most common vulnerabilities for many offices is the use of printed documents. If you\\u2019ve already secured who can enter your office and what they can access, you also need to control the printed material that leaves your office in trash or recycling containers.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Make sure your staff shreds all physical documents.<\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Implementing an inter-office document shredding policy reduces the amount of printed material that an outsider can access from your operations. And while it may feel unnecessary to shred printed material that doesn\\u2019t contain sensitive information, using a mandatory shredding policy will help your staff incorporate the practice into their workflow. Buy individual shredding machines for each desk and station them closer to staff than trash cans. If staff members work remotely or from home, make sure they have a shredder and are complying with the policy as well.<\\/span><\\/p>\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101927057\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"101927002\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"richtext\",\"unique\":false,\"useCallout\":false},\"logic\":{\"action\":\"Show\",\"fields\":[{\"comparisonOperator\":\"lt\",\"fieldId\":\"101934492\",\"value\":20}],\"operator\":\"AND\",\"workflowSteps\":[]},\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong><u>Why We Recommend This:<\\/u><\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">It\\u2019s easy to overlook office security risks because, as humans, we naturally fall into patterns of behavior. If we routinely leave our laptop on our desk at the end of the day, for example, we may see this action as normal and not risky. Taking another look at our daily patterns of behavior can help us see which of these actions are actually leaving us at risk. And installing a basic security system can provide an added level of protection for moments we didn\\u2019t anticipate in our policies.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Without formal policies, busy professionals are likely to forget an important step, particularly at the end of the day. Instituting clear guidelines and posting them in public spaces (or asking staff to display them at home) can help tired staff members follow best practices.<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Though digital threats are critical, it\\u2019s important not to overlook other sources of sensitive information. These can often come from unpredictable places, such as the trash your office discards or the printed documents your staff bring home. Implementing a shredding policy within your office can reduce the chance that printed materials will inadvertently leave your possession.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong><u>A Real-World Example:<\\/u><\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">ADE Worldwide\\u2019s headquarters is in a busy office building in Washington, DC. Though the building requires individuals to sign a logbook for entry, there is little oversight once someone enters the offices themselves. After a report that an office is burglarized on a lower floor, ADE management institutes a clean desk policy for staff to secure valuable items at the end of the day. Anyone entering the office during the work day will also need to show ID and verify their identity with the office administrator who sits by the entrance. &nbsp;&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Meanwhile, the ADE Worldwide offices in Kolkata, India, move to a new location near a high-traffic intersection. One weekday evening, a man on a motorbike threatens an ADE employee for their work on water rights, then speeds away. In response, ADE managers in Kolkata conduct a last person out exercise to make sure their staff is better protected when leaving the office at the end of the day. Ultimately, they put together a series of steps, including requiring staff members to exit the office in pairs.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">At ADE Worldwide\\u2019s European headquarters in Berlin, the company that manages the offices promised that all documents placed in a secure lockbox would be shredded. Later, the company reports that it accidentally threw several lockboxes\\u2019 worth of material into the building\\u2019s recycling bins. To ensure more control over sensitive documents, ADE management institutes a shredding policy for the Berlin office, with the hope that they can eventually institute this policy throughout the organization.<\\/span><\\/p>\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101927095\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"101927002\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"richtext\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null}],\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101927002\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"section\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesSectionDto\",\"content\":\"<h4><strong><span style=\\\"font-size: 18px;\\\">Messaging and Collaboration<\\/span><\\/strong><\\/h4>\",\"heading\":\"\",\"labelPosition\":\"\",\"languageFormat\":\"default\",\"numColumns\":\"0\",\"usePageBreak\":false},\"fields\":[{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<p dir=\\\"ltr\\\"><span style=\\\"font-size: 24px;\\\">Your organization has scored <strong><u>below<\\/u><\\/strong> our recommended security level for civil society organizations. in the messaging and collaboration category. This puts it &nbsp;Don\\u2019t worry! We\\u2019ve put together some recommendations to improve your organization\\u2019s cybersecurity.<\\/span><\\/p><p dir=\\\"ltr\\\"><strong><u><span style=\\\"font-size: 18px;\\\">What We Recommend:<\\/span><\\/u><\\/strong><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Your organization is only effective if your staff &nbsp;members can communicate and work together easily. But in a busy, fast-paced, and sometimes remote work environment, it\\u2019s easy to trade security for convenience. Luckily, there are ways to incorporate safer communication and collaboration tools without slowing down your workflow.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Understand the risks of unencrypted communication.<\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">If your staff members are unfamiliar with cybersecurity, they may have communicated only using unencrypted technology, such as their standard smartphone or email. As a result, they may not understand the amount of information that can be hacked, uncovered through surveillance, or seized through a legal or government request when using unencrypted communication. This is especially true during moments of crisis, when many governments and other groups may increase their surveillance of regular communication channels.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Educating your staff &nbsp;members on how encryption works is a good first start to introducing this concept. The Electronic Frontier Foundation\\u2019s \\u201c<a href=\\\"https:\\/\\/ssd.eff.org\\/en\\/module\\/communicating-others\\\">Communicating with Others<\\/a>\\u201d in its Surveillance Self-Defense curriculum is useful reading. If you\\u2019re using a dedicated mobile phone number for work, consider switching to a &nbsp;voice-over Internet protocol (VOIP) number that connects via the Internet. You can find such numbers through services such as Google Voice or Skype, allowing you to avoid having to use a country-specific SIM card in your smartphone. Using a VOIP number can also protect you from threats including cell site simulators, also known as <a href=\\\"https:\\/\\/www.aclu.org\\/issues\\/privacy-technology\\/surveillance-technologies\\/stingray-tracking-devices-whos-got-them\\\">Stingrays<\\/a>, and vulnerabilities in cellular technology, such as <a href=\\\"https:\\/\\/www.theguardian.com\\/technology\\/2016\\/apr\\/19\\/ss7-hack-explained-mobile-phone-vulnerability-snooping-texts-calls\\\">SS7 attacks<\\/a>.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Begin introducing encrypted alternatives.<\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">To help your staff become accustomed to encrypted communications, you shouldn\\u2019t expect them to use this new technology overnight. Instead, introduce encrypted platforms gradually, perhaps over 8 to 10 months, before making them mandatory. You may want to publicly praise staff members who are early adopters. Those who are resistant can become members of a working group dedicated to adopting the tools, making them more likely to use them.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">At the time of writing, a few encrypted communication tools we recommend are the messenger applications<a href=\\\"http:\\/\\/signal.org\\\">&nbsp;Signal<\\/a> and<a href=\\\"http:\\/\\/wire.com\\\">&nbsp;Wire<\\/a>. You may also want to consider a self-hosted workplace messenger like<a href=\\\"http:\\/\\/mattermost.com\\\">&nbsp;Mattermost<\\/a> or the<a href=\\\"https:\\/\\/element.io\\/communities\\\">&nbsp;collaboration tool Element<\\/a> as an alternative to popular software such as Slack. A technical assistance provider can help you enable any of these tools, or find alternatives.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Understand when to use which platform.<\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">At first, your staff members don\\u2019t need to use the encrypted platforms for every communication. Instead, reserve the use of encrypted tools only for your most sensitive work. This will also help staff &nbsp;members associate encrypted tools with a higher level of security and privacy that isn\\u2019t available with standard tools. <\\/span><\\/p>\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101927053\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"101927040\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"richtext\",\"unique\":false,\"useCallout\":false},\"logic\":{\"action\":\"Show\",\"fields\":[{\"comparisonOperator\":\"gt\",\"fieldId\":\"101935523\",\"value\":15}],\"operator\":\"AND\",\"workflowSteps\":[]},\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<p dir=\\\"ltr\\\"><span style=\\\"font-size: 24px;\\\">Your organization has scored a <strong><u>reasonable<\\/u><\\/strong> level of security in the category of messaging and collaboration. Good job! There are still areas for improvement, so we\\u2019ve put together some recommendations to improve your organization\\u2019s cybersecurity even more.<\\/span><\\/p><p dir=\\\"ltr\\\"><strong><u><span style=\\\"font-size: 18px;\\\">What We Recommend:<\\/span><\\/u><\\/strong><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">You\\u2019ve already adopted an encrypted messenger such as Signal or a collaboration tool such as Element. Your staff members are incorporating these tools into their workflow and understand the distinction between encrypted and unencrypted communication. Here are three additional steps to further enhance your communication security.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Try out more advanced settings.<\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Many encrypted tools, including Signal and Wire, have more advanced settings that allow you to choose how long your messages should exist before they auto-delete, as well as removing and archiving data you no longer need or use. Gradually begin to incorporate these more advanced settings into your everyday operations. For example, members of your staff working on a particularly sensitive topic may choose to set their encrypted messages to auto-delete every 24 hours.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Create a policy for how long to keep messages.<\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Understand that data lingers, even when encrypted. If you don\\u2019t need to store months of messages or years of projects on your tools, both encrypted and unencrypted, consider an archiving policy. Most tools allow you to easily export messages to an archive on an alternate storage device. If you\\u2019re not sure how to do this, your technical assistance provider can help.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Provide clear guidelines on communication.<\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Encrypted tools are only powerful when used appropriately. Not every work-related topic needs to be discussed on an encrypted tool, but some highly sensitive topics shouldn\\u2019t be discussed on unencrypted platforms. To help your staff know which platform to choose for which topic, create clear communications guidelines for your staff . They should understand when to switch from an unecrypted tool such as Mattermost or Slack to an encrypted tool such as Signal. Staff should also understand how to use each of these tools and be able to identify which are encrypted and which are not.<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Additionally, guidelines should incorporate the idea of fragmentation, or spreading your communications across several different platforms. If your organization does all its work on Slack, for example, you risk significant harm if the platform is hacked, breached, or fails. Instead, try to spread your work (and risk) across several different collaboration tools. <\\/span><\\/p>\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101927071\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"101927040\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"richtext\",\"unique\":false,\"useCallout\":false},\"logic\":{\"action\":\"Show\",\"fields\":[{\"comparisonOperator\":\"gt\",\"fieldId\":\"101935523\",\"value\":4},{\"comparisonOperator\":\"lt\",\"fieldId\":\"101935523\",\"value\":16}],\"operator\":\"AND\",\"workflowSteps\":[]},\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<p dir=\\\"ltr\\\"><span style=\\\"font-size: 24px;\\\">Your organization has scored a <strong><u>high level<\\/u><\\/strong> of security in the messaging and collaboration category. Good work! There are still areas for improvement, so we\\u2019ve put together some recommendations to improve your organization\\u2019s cybersecurity even more. <\\/span><\\/p><p dir=\\\"ltr\\\"><strong><u><span style=\\\"font-size: 18px;\\\">What We Recommend:<\\/span><\\/u><\\/strong><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Your staff has widely adopted encrypted communication tools and understand when to use them appropriately. Now, you can take a step further to help improve the way they communicate and collaborate using encrypted tools.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Categorize your use by sensitivity.<\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">You\\u2019ve already worked with your staff to understand when to use encrypted tools instead of unencrypted ones. For added security, begin to categorize their use of encrypted tools by the sensitivity of the information or project. For example, you may designate urgent and highly sensitive communications to stay on Signal, but sensitive project work to be conducted only on an encrypted collaborative platform such as Element. Preventing information from gathering in one place makes it more difficult for an adversary to access all your sensitive information at once.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Try several collaborative tools.<\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Your staff &nbsp;is already familiar with the idea of fragmentation, or spreading out their work across several different tools. When working on a highly sensitive project, they can incorporate the idea of fragmentation with encrypted tools as well. In this case, staff members conduct all work on a sensitive project within encrypted tools, but, rather than relying on a single encrypted platform, they spread their work across several collaboration tools. For example, project planning could take place in Element while project brainstorms could take place in Wire. This decreases the amount of information that an attacker could get if they gained access to your messages. <\\/span><\\/p>\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101927098\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"101927040\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"richtext\",\"unique\":false,\"useCallout\":false},\"logic\":{\"action\":\"Show\",\"fields\":[{\"comparisonOperator\":\"lt\",\"fieldId\":\"101935523\",\"value\":5}],\"operator\":\"AND\",\"workflowSteps\":[]},\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong><u>Why We Recommend This:<\\/u><\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Encrypted communication can help keep your organization\\u2019s messages, data, and activities more secure. Implementing encrypted messaging and collaboration tools also instills the values of compartmentalization, which helps ensure that your organization\\u2019s sensitive data are not in a single system.<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Encrypted communication is most effective when users understand how best to use advanced settings such as disappearing messages and data retention. You may want to consider formally documenting your organization\\u2019s recommendations in your security policy so users can begin using these tools quickly and easily.<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong><u>A Real-World Example:<\\/u><\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">ADE Worldwide staff throughout Chile use unencrypted communications to reach each other in a large network of rural offices. These communications include sensitive information such as project details and login credentials for office accounts. When an influential landowner who has opposed ADE\\u2019s work takes over a national corporation, ADE managers realize they need to take added steps to keep their communication more secure. As a result, they implement an encrypted messaging service throughout the offices in the country.<\\/span><\\/p>\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101927141\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"101927040\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"richtext\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null}],\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101927040\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"section\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesSectionDto\",\"content\":\"<h4><strong><span style=\\\"font-size: 18px;\\\">Legal Risks<\\/span><\\/strong><\\/h4>\",\"heading\":\"\",\"labelPosition\":\"\",\"languageFormat\":\"default\",\"numColumns\":\"0\",\"usePageBreak\":false},\"fields\":[{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<p dir=\\\"ltr\\\"><span style=\\\"font-size: 24px;\\\">Your organization has scored <strong><u>below<\\/u><\\/strong> our recommended security level for civil society organizations in the legal risks category. Don\\u2019t worry! We\\u2019ve put together some recommendations to improve your organization\'s cybersecurity.<\\/span><\\/p><p dir=\\\"ltr\\\"><strong><u><span style=\\\"font-size: 18px;\\\">What We Recommend:<\\/span><\\/u><\\/strong><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Legal risk can be complex. Laws vary from country to country, and even region to region. As a civil society organization, it\\u2019s vital that you have a basic grounding in your legal responsibilities and restrictions, as well as any possible risks you face from lawsuits or other legal action. If you\\u2019ve never met with a lawyer before, here are two tips to get started:<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Educate yourself about civil society law in your country and region.<\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Law can be highly complicated, but your staff &nbsp;can learn the basics. An excellent resource (apart from a lawyer in your area) is the<a href=\\\"https:\\/\\/www.icnl.org\\/resources#resourcecollections\\\">&nbsp;International Center for Not-For-Profit Law<\\/a>, which has an online library with case studies from around the world, as well as reports and resources for nearly every nation.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Meet with a lawyer.<\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">While this may seem like an obvious suggestion, finding a qualified lawyer in your area may be challenging. If you\\u2019re able to meet with a lawyer to discuss your organization, make sure to discuss key areas of concern about legal liability. If you aren\\u2019t able to meet with a lawyer, you may have better luck consulting with a free clinic at a local law school or a legal scholar or researcher. Many lawyers may be willing to work with a civil society organization pro bono, but that may not always be the case.&nbsp;<\\/span><\\/p><p><span style=\\\"font-size: 18px;\\\">A good resource for finding qualified lawyers in your region is the<a href=\\\"https:\\/\\/www.ibanet.org\\/\\\">&nbsp;International Bar Association<\\/a>, which advocates for lawyers worldwide. <\\/span><\\/p>\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101927134\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"101927102\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"richtext\",\"unique\":false,\"useCallout\":false},\"logic\":{\"action\":\"Show\",\"fields\":[{\"comparisonOperator\":\"gt\",\"fieldId\":\"101935877\",\"value\":10}],\"operator\":\"AND\",\"workflowSteps\":[]},\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<p dir=\\\"ltr\\\"><span style=\\\"font-size: 24px;\\\">Your organization has scored a <strong><u>reasonable<\\/u><\\/strong> level of security in the legal risks category. Good job! There are still areas for improvement, so we\\u2019ve put together some recommendations to improve your organization\\u2019s cybersecurity even more.<\\/span><\\/p><p dir=\\\"ltr\\\"><strong><u><span style=\\\"font-size: 18px;\\\">What We Recommend:<\\/span><\\/u><\\/strong><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">You\\u2019ve met with a lawyer to discuss legal risks to your organization, and perhaps you now have a lawyer on retainer for emergencies. Even with these steps, you still face some legal vulnerabilities that you can reduce using cybersecurity principles. Here\\u2019s how.<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Identify and archive data.<\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Though legal systems vary around the world, most lawsuits include a \\u201cdiscovery\\u201d period, in which lawyers may request documents pertaining to their case. While discovery was once mainly focused on paper records, lawyers may now request vast amounts of electronic information that may be useful to their case, including emails, instant messages, and even messages on collaboration platforms such as Slack.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">While some of this information may be used for legitimate legal purposes, so-called \\u201cnuisance\\u201d or frivolous lawsuits can also force organizations to disclose sensitive information as part of discovery. One way to prepare for such lawsuits is to identify concerning keywords within electronic communication that would be targeted in a lawsuit. From there, with your lawyer\\u2019s advice, you can archive or \\u201cquarantine\\u201d this information in a secure location, such as off-line storage devices or encrypted cloud storage.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Establish a data removal policy.<\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Not every organization has the resources\\u2014either financial or technological\\u2014to archive sensitive data. However, most organizations do have the ability to selectively remove or delete emails from staff inboxes. When done properly, this can help &nbsp;manage the flow of information better within your organization. When abused, however, this power can infringe on your staff\\u2019s right to privacy and your ethical responsibility as an employer. For this reason, we recommend that most organizations put into place an easy-to-understand policy around when you will remove data or messages from staff members\\u2019 systems and make sure they are familiar with this policy. <\\/span><\\/p>\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101927139\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"101927102\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"richtext\",\"unique\":false,\"useCallout\":false},\"logic\":{\"action\":\"Show\",\"fields\":[{\"comparisonOperator\":\"gt\",\"fieldId\":\"101935877\",\"value\":5},{\"comparisonOperator\":\"lt\",\"fieldId\":\"101935877\",\"value\":11}],\"operator\":\"AND\",\"workflowSteps\":[]},\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<p dir=\\\"ltr\\\"><span style=\\\"font-size: 24px;\\\">Your organization has scored a <strong><u>high<\\/u><\\/strong> level of security in the legal risks category. Good work! There are still areas for improvement, so we\\u2019ve put together some recommendations to improve your organization\\u2019s cybersecurity even more. <\\/span><\\/p><p dir=\\\"ltr\\\"><strong><u><span style=\\\"font-size: 18px;\\\">What We Recommend:<\\/span><\\/u><\\/strong><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Now that you\\u2019ve begun to identify and archive data, as well as put together policies for ethically removing data, you can take additional steps to safeguard your organization\\u2019s private data from frivolous lawsuits. It\\u2019s important to work alongside a lawyer familiar with your situation whenever you are handling legally sensitive data.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Use an e-discovery platform.<\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">With the legal discovery process now encompassing a vast array of data, many lawyers have begun using e-discovery tools that allow them to search through vast amounts of information using a computer. Your organization can also use these tools, such as<a href=\\\"https:\\/\\/gsuite.google.com\\/products\\/vault\\/\\\">&nbsp;Google\\u2019s G Suite Vault<\\/a>, to search your own data for additional keywords, terms, and documents that should be removed and archived. These may include documents and attachments from volunteers, temporary staff, or vendors who have access to your system. Working with a lawyer, identify sensitive information and store it within the e-discovery platform.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Test your defenses with an annual drill.<\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Just as you have conducted inter-office exercises to test your physical security and your security policies, you can also conduct a drill to test your response to a legal request. In this drill, you would simulate an outside legal request for particular information. You may even want to work with your lawyer on this. Can your staff locate and secure this information? Does this request expose your organization to a particular legal risk? Does the legal request itself temporarily stop your organization from carrying out its work? Understanding the impact of a lawsuit\\u2014even a fictional one\\u2014on your organization can help you better prepare for the real-life risk. <\\/span><\\/p>\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101927146\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"101927102\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"richtext\",\"unique\":false,\"useCallout\":false},\"logic\":{\"action\":\"Show\",\"fields\":[{\"comparisonOperator\":\"lt\",\"fieldId\":\"101935877\",\"value\":6}],\"operator\":\"AND\",\"workflowSteps\":[]},\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<p dir=\\\"ltr\\\"><strong><u><span style=\\\"font-size: 18px;\\\">Why We Recommend This:<\\/span><\\/u><\\/strong><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Security threats facing civil society organizations aren\\u2019t restricted to physical or digital attacks. Legal challenges can force organizations to divulge sensitive information, slow down or stop projects, or simply spend time and money responding to frivolous lawsuits. Consulting with a lawyer familiar with your country\\u2019s law is a good first step in protecting your organization from these challenges.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Proactively managing data before a legal challenge better equips your organization to quarantine data that may be needed in the event of a lawsuit. Before archiving or relocating employee information, however, explain clearly to your staff when and how their data may be accessed and used.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong><u>A Real-World Example:<\\/u><\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">ADE Worldwide runs a one-person office in Guatemala that works with local farmers to better manage their water usage. As an environmental advocacy organization in a region where powerful interests own vast amounts of land, ADE understands that this office may be the target of a legal challenge. To help prepare, ADE management asks the staff member there, alongside the organization\\u2019s legal counsel, to review and archive sensitive data in the system.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">A local landowner threatens to sue the organization for defamation he claims he experienced thanks to its water sustainability campaigns. The attorneys in ADE\\u2019s Mexico City regional headquarters say they believe they can handle the potential lawsuit themselves, but quickly realize they must bring on local representation in Guatemala to better understand and comply with local laws and requirements. <\\/span><\\/p>\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101927172\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"101927102\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"richtext\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null}],\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101927102\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"section\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesSectionDto\",\"content\":\"<h4><strong><span style=\\\"font-size: 18px;\\\">Device Security and Compartmentalization<\\/span><\\/strong><\\/h4>\",\"heading\":\"\",\"labelPosition\":\"\",\"languageFormat\":\"default\",\"numColumns\":\"0\",\"usePageBreak\":false},\"fields\":[{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<p dir=\\\"ltr\\\"><span style=\\\"font-size: 24px;\\\">Your organization has scored <strong><u>below<\\/u><\\/strong> our recommended security level for civil society organizations in the device security and compartmentalization category. Don\\u2019t worry! We\'ve put together some recommendations to improve your organization\\u2019s cybersecurity.<\\/span><\\/p><p dir=\\\"ltr\\\"><strong><u><span style=\\\"font-size: 18px;\\\">What We Recommend:<\\/span><\\/u><\\/strong><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">You may already be familiar with the need for fragmentation, or spreading your data across several different platforms. Another related best practice is compartmentalization, which means using several different devices or services to lessen your risk. If your staff primarily uses the same device at both work and home, or relies entirely on Google\\u2019s G Suite for your work, you should consider compartmentalizing your organization\\u2019s workflow further. Here are a few ways to do so.<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Understand the connection between personal and professional use.<\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Members of your staff wouldn\\u2019t have the same conversations at work that they would at home or over dinner with a romantic partner. The same rule of thumb applies when it comes to their digital lives as well. Using the same device for both personal and professional uses magnifies their risk of being targeted at both work and home.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">For example, a staff member who uses their work laptop to play online games may be targeted by hackers who then have access to sensitive work files. By contrast, a staff member who is targeted for their work may find that hackers now have access to their personal files. Educating your staff on the importance of separating these two data streams is important.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Implement the right solution for your organization.<\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">The right solution to help your staff compartmentalize their data depends on a variety of different factors, including your budget, technical ability, and the availability of computers and smartphones in your region. Possible solutions, sorted by price and complexity, include:<\\/span><\\/p><ul><li dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Purchase dedicated work devices (laptops and\\/or smartphones) for staff members. (Most expensive, least complex)<\\/span><\\/li><li dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Create new work-only accounts on staff computers. (Least expensive, somewhat complex)<\\/span><\\/li><li dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Use a USB or external hard drive to load a separate operating system on staff computers. (Less expensive, most complex)<\\/span><\\/li><\\/ul><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">You will want to work with a technical assistance provider on all of these options to customize these strategies for your organization. <\\/span><\\/p>\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101927154\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"101927147\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"richtext\",\"unique\":false,\"useCallout\":false},\"logic\":{\"action\":\"Show\",\"fields\":[{\"comparisonOperator\":\"gt\",\"fieldId\":\"101936426\",\"value\":14}],\"operator\":\"AND\",\"workflowSteps\":[]},\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<p dir=\\\"ltr\\\"><span style=\\\"font-size: 24px;\\\">Your organization has scored a <strong><u>reasonable<\\/u><\\/strong> level of security in the device security and compartmentalization category. &nbsp;Good job! There are still areas for improvement, so we\\u2019ve put together some recommendations to improve your organization\\u2019s cybersecurity even more.<\\/span><\\/p><p dir=\\\"ltr\\\"><strong><u><span style=\\\"font-size: 18px;\\\">What We Recommend:<\\/span><\\/u><\\/strong><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Your staff is familiar with the concept of compartmentalization, and you\'ve taken some initial steps to keep your organization\\u2019s work and personal data separate. Now, you can implement a few more changes to further strengthen that boundary.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Use a dedicated browser for different types of work.<\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Even within your work device, you can further compartmentalize your online footprint. One easy way to do this is to use a different browser for different types of work. This reduces the chances that an attacker can compromise one single browser and access all your staff\\u2019s search history and other data.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Store less information on work devices.<\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Rather than storing files locally on work devices, implement ways for your staff to store their data on encrypted cloud or external storage. This lessens the risk of an attacker being able to steal a device and access all the data stored within it. We would also recommend you work with your technical assistance provider to set up a remote wipe policy, which allows you to remotely erase work accounts on staff devices if they are lost, stolen, or compromised. <\\/span><\\/p>\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101927178\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"101927147\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"richtext\",\"unique\":false,\"useCallout\":false},\"logic\":{\"action\":\"Show\",\"fields\":[{\"comparisonOperator\":\"gt\",\"fieldId\":\"101936426\",\"value\":4},{\"comparisonOperator\":\"lt\",\"fieldId\":\"101936426\",\"value\":15}],\"operator\":\"AND\",\"workflowSteps\":[]},\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<p dir=\\\"ltr\\\"><span style=\\\"font-size: 24px;\\\">Your organization has scored <strong><u>high<\\/u><\\/strong> level of security in this area points in the device security and compartmentalization category. &nbsp;Good work! There are still areas for improvement, so we\\u2019ve put together some recommendations to improve your organization\\u2019s cybersecurity even more. <\\/span><\\/p><p dir=\\\"ltr\\\"><strong><u><span style=\\\"font-size: 18px;\\\">What We Recommend:<\\/span><\\/u><\\/strong><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">You\\u2019ve made great progress on helping your staff compartmentalize their personal and professional lives. Now, your goal should be full compartmentalization, so there is very little data left for outside adversaries to locate. You will need to work with a technical assistance provider on these next steps.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Use a virtual machine.<\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">If you have access to high-speed Internet, your staff can use software such as VMWare or<a href=\\\"https:\\/\\/docs.microsoft.com\\/en-us\\/virtualization\\/hyper-v-on-windows\\/about\\/\\\">&nbsp;Microsoft Hypervisor<\\/a> to virtually access another machine through their own. This allows them to do their work without leaving much traceable data on their work devices. All their work is instead saved on a shared drive, so if their device is electronically compromised or physically stolen, there is little to no risk of exposing sensitive information. This is a technical solution that requires maintaining and updating your work devices, so it may not be appropriate for every organization.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Implement biometrics, if appropriate.<\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Many organizations rely on passwords as the first line of defense for work devices. This is, in part, because organizations based in the United States have higher legal defenses against disclosing their passwords to government authorities. In other parts of the world, however, biometric solutions (such as scanning a fingerprint) may be more secure and less vulnerable to challenges from law enforcement and governments. If that is the case in your region, a biometric solution may be a good fit for accessing work devices. Many biometric password systems also allow administrators to maintain an active log of devices that are currently connected to their network.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Incorporate end-point security solutions.<\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Organizations of many different sizes frequently have firewalls set up to protect them from outside threats. But what happens when the threat comes from within via a hacked or compromised work device? End-point security solutions, including<a href=\\\"https:\\/\\/www.microsoft.com\\/en-us\\/microsoft-365\\/security\\/endpoint-defender\\\">&nbsp;Microsoft Defender for Endpoint<\\/a> and<a href=\\\"https:\\/\\/www.bitdefender.com\\/business\\/enterprise-products\\/ultra-security.html\\\">&nbsp;Bitdefender GravityZone Ultra Security Suite<\\/a>, monitor the actual devices connected to the network. If these software packages detect abnormal or disruptive behavior from any of these devices, they can &nbsp;disconnect them automatically from the network. <\\/span><\\/p>\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101927201\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"101927147\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"richtext\",\"unique\":false,\"useCallout\":false},\"logic\":{\"action\":\"Show\",\"fields\":[{\"comparisonOperator\":\"lt\",\"fieldId\":\"101936426\",\"value\":5}],\"operator\":\"AND\",\"workflowSteps\":[]},\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<p dir=\\\"ltr\\\"><strong><u><span style=\\\"font-size: 18px;\\\">Why We Recommend This:<\\/span><\\/u><\\/strong><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Just as you wouldn\\u2019t store all your valuables in one desk drawer, you don\\u2019t want to keep all your sensitive data in one location, system, or platform. Implementing the principles of compartmentalization can help you keep your data safe even if your devices are hacked, attacked, or stolen.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Compartmentalization can take many different forms. If your organization is heavily research-based, using a dedicated \\u201cresearch only\\u201d browser can help keep online activities separate. Your staff can also make their work devices\\u2014particularly mobile devices\\u2014safer by storing data outside of the device itself. These easily implemented steps can contribute to a safer organizational culture.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">As threats increase, you may want to consider more advanced options such as a virtual machine or end-point protection, both of which a technical assistance provider can set up.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong><u>A Real-World Example:<\\/u><\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">ADE Worldwide has offices around the world. In some regions, up-to-date devices are reasonably priced, but in others, it\\u2019s difficult to buy affordable new technology. To help staff keep their data more secure, ADE management institutes a work-only account policy, instructing regional IT staff to create user accounts that staff should use on work devices. Only IT personnel have the ability to install software and change settings.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">They also require ADE\\u2019s research staff to use a dedicated browser on their computer for work-related research, while highly sensitive information is handled only through a virtual machine. <\\/span><\\/p>\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101927210\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"101927147\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"richtext\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null}],\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101927147\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"section\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesSectionDto\",\"content\":\"<h4><span style=\\\"font-size: 18px;\\\"><strong>Software Security<\\/strong><\\/span><\\/h4>\",\"heading\":\"\",\"labelPosition\":\"\",\"languageFormat\":\"default\",\"numColumns\":\"0\",\"usePageBreak\":false},\"fields\":[{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<p dir=\\\"ltr\\\"><span style=\\\"font-size: 24px;\\\">Your organization has scored <strong><u>below<\\/u><\\/strong> our recommended security level for civil society organizations in the software security category. Don\\u2019t worry! We\\u2019ve put together some recommendations to improve your organization\\u2019s cybersecurity.<\\/span><\\/p><p dir=\\\"ltr\\\"><strong><u><span style=\\\"font-size: 18px;\\\">What We Recommend:<\\/span><\\/u><\\/strong><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">You use software every day\\u2014web browsers, word processors, and numerous other types. Yet if your organization is using unlicensed, illegal, or bootleg software, you could be putting yourself at risk. While licensed software can be costly, illegal or unlicensed versions of that same software, often downloaded from the Internet, can be weaponized with malware and other threats.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Use free, open-source software.<\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Many of the most popular paid programs have free, open- source alternatives. We\\u2019ve listed a few below.<\\/span><\\/p><ul><li dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Microsoft Office can be replaced with<a href=\\\"https:\\/\\/www.openoffice.org\\/\\\">&nbsp;OpenOffice<\\/a> or<a href=\\\"https:\\/\\/www.libreoffice.org\\/\\\">&nbsp;LibreOffice<\\/a><\\/span><\\/li><li dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Adobe Photoshop can be replaced with<a href=\\\"https:\\/\\/www.canva.com\\/\\\">&nbsp;Canva<\\/a> (available with a nonprofit license),<a href=\\\"https:\\/\\/www.sumopaint.com\\/\\\">&nbsp;Sumopaint<\\/a>, and<a href=\\\"https:\\/\\/pixlr.com\\/\\\">&nbsp;Pixlr<\\/a><\\/span><\\/li><li dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Microsoft Outlook can be replaced with<a href=\\\"https:\\/\\/www.thunderbird.net\\/en-US\\/\\\">&nbsp;Mozilla Thunderbird<\\/a>&nbsp;<\\/span><\\/li><li dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Windows 10 can be replaced with<a href=\\\"https:\\/\\/ubuntu.com\\/\\\">&nbsp;Ubuntu<\\/a><\\/span><\\/li><\\/ul><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">While open-source software is often free and convenient, there are some caveats. Be sure to download open-source software only from trusted sources. And because open-source programs are often maintained by a small staff , they may not be as user-friendly as commercial programs and may not be updated as often or at all.<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 14px;\\\"><strong>Apply for discounted licensed software.<\\/strong><\\/span><\\/p><p><span style=\\\"font-size: 14px;\\\">Depending on your nonprofit status in your country, you may qualify for nonprofit discounts on popular commercial programs such as Microsoft Office. For example, the<a href=\\\"https:\\/\\/www.techsoup.org\\/\\\">&nbsp;technology provider TechSoup<\\/a> provides deeply discounted software licenses to registered nonprofit groups. Some major software retailers also provide discounts. Make sure to confirm whether you qualify for such discounts based on your organization\\u2019s current legal status.&nbsp;<\\/span><\\/p>\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101927181\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"101927177\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"richtext\",\"unique\":false,\"useCallout\":false},\"logic\":{\"action\":\"Show\",\"fields\":[{\"comparisonOperator\":\"gt\",\"fieldId\":\"101936568\",\"value\":19}],\"operator\":\"AND\",\"workflowSteps\":[]},\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<p dir=\\\"ltr\\\"><span style=\\\"font-size: 24px;\\\">Your organization has scored a <strong><u>reasonable<\\/u><\\/strong> level of security in the software security category. Good job! There are still areas for improvement, so we\\u2019ve put together some recommendations to improve your organization\\u2019s cybersecurity even more.<\\/span><\\/p><p dir=\\\"ltr\\\"><strong><u><span style=\\\"font-size: 18px;\\\">What We Recommend:<\\/span><\\/u><\\/strong><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">You\\u2019ve cracked down on your organization\\u2019s use of illegal or unlicensed software and found alternatives. Now, you can take steps to protect your work systems from untrusted software, too.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Be strict about who can install software.<\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Working with a technical assistance provider, you can restrict your staff from installing software on their work devices. One of the easiest ways to do this by making sure your staff members are not administrators of their own work devices. Instead, make sure the administrator is a trusted person in the office, preferably with some technical experience. You\\u2019ll also want to designate a backup administrator with access in case your primary administrator isn\\u2019t unavailable and you need to make changes to a work device.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">In consultation with your technical provider, you may want to also consider restricting your organization\\u2019s software to only what is available in official stores from your operating system, such as Microsoft, Apple, and Ubuntu. Any software you do download should be digitally signed, although be aware that this is not a guarantee of safety. <\\/span><\\/p>\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101927184\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"101927177\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"richtext\",\"unique\":false,\"useCallout\":false},\"logic\":{\"action\":\"Show\",\"fields\":[{\"comparisonOperator\":\"gt\",\"fieldId\":\"101936568\",\"value\":13},{\"comparisonOperator\":\"lt\",\"fieldId\":\"101936568\",\"value\":20}],\"operator\":\"AND\",\"workflowSteps\":[]},\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<p dir=\\\"ltr\\\"><span style=\\\"font-size: 24px;\\\">Your organization has scored a <strong><u>high<\\/u><\\/strong> level of security in the software security category. Good work! There are still areas for improvement, so we\\u2019ve put together some recommendations to improve your organization\\u2019s cybersecurity even more. <\\/span><\\/p><p dir=\\\"ltr\\\"><strong><u><span style=\\\"font-size: 18px;\\\">What We Recommend:<\\/span><\\/u><\\/strong><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">You are now regulating the type of software used by your organization and you\\u2019re ready to further strengthen your security posture. There are several steps you can take.<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Establish a strong policy on the use of personal devices.<\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">While convenience is important, allowing staff members to connect their personal devices to work networks quickly transforms your office system into the equivalent of an Internet cafe. Instead, establish a strong policy that explicitly states which devices employees may use and where, including when working from home. This reduces the risk that staff will unwittingly connect a compromised device to your network.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Take steps to tighten your oversight.<\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Working with a technical assistance provider, you may want to consider implementing a \\u201czero trust\\u201d network, which allows an individual to connect to your internal systems only after they go through an authentication process. One way to do this is through single sign-on, which uses a single password across accounts and devices. Alternatively, you can establish a network administrator role to make sure that all staff log in through a central domain that can track and manage who is connected. Last, consider using device management software to remotely install needed software and wipe work devices as needed.<\\/span><\\/p>\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101927208\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"101927177\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"richtext\",\"unique\":false,\"useCallout\":false},\"logic\":{\"action\":\"Show\",\"fields\":[{\"comparisonOperator\":\"lt\",\"fieldId\":\"101936568\",\"value\":15}],\"operator\":\"AND\",\"workflowSteps\":[]},\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<p dir=\\\"ltr\\\"><strong><u><span style=\\\"font-size: 18px;\\\">Why We Recommend This:&nbsp;<\\/span><\\/u><\\/strong><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Software is the backbone of any organization\\u2019s digital work. But using illegal, bootleg, or unlicensed software can open your organization up to unnecessary risk. With free, open-source alternatives, as well as discounted licenses available for nonprofits, don\\u2019t take the risk of inadvertently bringing malware onto your work devices.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">In addition to being vigilant about software, your organization can also be strict about where software comes from, who can install it, and how it works. A technical assistance provider can help you be sure that software comes from legitimate sources and can be changed or altered only by dedicated staff members.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong><u>A Real-World Example:&nbsp;<\\/u><\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">When ADE Worldwide opens an office in Guam, local staff struggle to find software they can afford for their small, two-person operation. To help them avoid having to use bootleg software, ADE negotiates with a regional software vendor for a series of discounted licenses. Then, to help keep key software updated, ADE IT staff install a device management system to push needed updates even from thousands of miles away. <\\/span><\\/p>\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101927211\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"101927177\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"richtext\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null}],\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101927177\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"section\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesSectionDto\",\"content\":\"<h4><strong><span style=\\\"font-size: 18px;\\\">Data Encryption<\\/span><\\/strong><\\/h4>\",\"heading\":\"\",\"labelPosition\":\"\",\"languageFormat\":\"default\",\"numColumns\":\"0\",\"usePageBreak\":false},\"fields\":[{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<p dir=\\\"ltr\\\"><span style=\\\"font-size: 24px;\\\">Your organization has scored <strong><u>below<\\/u><\\/strong> our recommended security level for civil society organizations in the data encryption category. Don\\u2019t worry! We\\u2019ve put together some recommendations to improve your organization\\u2019s cybersecurity.<\\/span><\\/p><p dir=\\\"ltr\\\"><strong><u><span style=\\\"font-size: 18px;\\\">What We Recommend:<\\/span><\\/u><\\/strong><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">If you associate encryption only with code-breaking and financial transactions, you\\u2019re not alone. Most people don\\u2019t encrypt any of the digital information they possess. As a result, their data can be easily accessed by an attacker if their computer is lost or stolen, &nbsp;even if it is secured with a password. Only when a device is fully disk encrypted is your data protected (with some caveats below). Here are two steps to help your organization incorporate encryption into your workflow.<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Turn on full disk encryption on work devices.<\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Work with a technical assistance provider to enable full disk encryption on any computers that your organization uses for work. This may be time-consuming, especially for busy organizations with little downtime, but can be performed during off hours as needed. Windows computers must be upgraded to at least Windows 10 Pro (which typically costs around US $50) to enable<a href=\\\"https:\\/\\/docs.microsoft.com\\/en-us\\/windows\\/security\\/information-protection\\/bitlocker\\/bitlocker-overview\\\">&nbsp;BitLocker<\\/a>, the built-in full disk encryption software. Apple computers have access to built-in<a href=\\\"https:\\/\\/support.apple.com\\/en-us\\/HT204837\\\">&nbsp;FileVault<\\/a> software that can be enabled at any time. Linux computers use<a href=\\\"https:\\/\\/access.redhat.com\\/solutions\\/100463\\\">&nbsp;Luks<\\/a>, which must be enabled when the operating system is being installed.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">It\\u2019s also important to understand how your encryption system works. Much encryption software, including Microsoft\\u2019s BitLocker, encrypts data \\u201cat rest,\\u201d meaning the data are encrypted only when the device is turned off. Some encrypted cloud storage also works this way, only encrypting data when the user is not actively connected to the system. This is important to consider when setting up these systems so there is no misunderstanding about how extensively you have protected your data. &nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Consider more secure hard drive alternatives.<\\/strong><\\/span><\\/p><p><span style=\\\"font-size: 18px;\\\">Currently, you may store some of your data on external hard drives, which are very portable and convenient. By default, however, most of these devices are not encrypted, leaving your data accessible to anyone who has the drive itself. Consider replacing these devices with more secure alternatives. One option would be to replace external hard drives with hard drives that require physical PIN codes. <a href=\\\"https:\\/\\/apricorn.com\\/\\\">Apricorn<\\/a> and<a href=\\\"https:\\/\\/istorage-uk.com\\/\\\">&nbsp;iStorageUK<\\/a> sell these encrypted drives, which have keypads to enter the codes and access the data within.<\\/span><\\/p>\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101927217\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"101927215\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"richtext\",\"unique\":false,\"useCallout\":false},\"logic\":{\"action\":\"Show\",\"fields\":[{\"comparisonOperator\":\"gt\",\"fieldId\":\"101937043\",\"value\":8}],\"operator\":\"AND\",\"workflowSteps\":[]},\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<p dir=\\\"ltr\\\"><span style=\\\"font-size: 24px;\\\">Your organization has scored a <strong><u>reasonable<\\/u><\\/strong> level of security in the data encryption category. Good job! There are still areas for improvement, so we\\u2019ve put together some recommendations to improve your organization\\u2019s cybersecurity even more.<\\/span><\\/p><p dir=\\\"ltr\\\"><strong><u><span style=\\\"font-size: 18px;\\\">What We Recommend:<\\/span><\\/u><\\/strong><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Now that you\\u2019ve enabled full disk encryption on your organization\\u2019s devices, you can use encrypted options for other types of storage as well. One of the most popular types of storage for many organizations is in the cloud, or storing files and information on servers run by popular services such as Dropbox and Google Drive. These are convenient, affordable storage options, but they aren\\u2019t the best choice for storing sensitive information. Here is a safer alternative.<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Use \\u201czero-knowledge\\u201d encrypted cloud storage.<\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">For highly sensitive information, consider using a \\u201czero-knowledge\\u201d cloud storage provider. This term refers to a cloud storage provider that has no \\u201cknowledge\\u201d of the files or data you store. They simply provide storage and the encryption functionality necessary to keep your data safe. This means that your organization alone has access to the files and data you store there.<\\/span><\\/p><p><span style=\\\"font-size: 18px;\\\">While this greatly strengthens your ability to store sensitive information, there is also a downside: if you lose or forget your credentials to the service, you won\\u2019t be able to access your data. And since the provider doesn\\u2019t have access to your data, either, they can\\u2019t retrieve it for you. With this knowledge in mind, be selective about the data you choose to store with a zero-knowledge provider, choosing only sensitive data that you have backed up elsewhere. Popular zero-knowledge encrypted cloud storage providers include<a href=\\\"https:\\/\\/tresorit.com\\/\\\">&nbsp;Tresorit<\\/a>,<a href=\\\"https:\\/\\/spideroak.com\\/one\\/\\\">&nbsp;SpiderOak One<\\/a>, and the open-source alternative<a href=\\\"https:\\/\\/nextcloud.com\\/\\\">&nbsp;NextCloud<\\/a> or<a href=\\\"https:\\/\\/owncloud.com\\/\\\">&nbsp;OwnCloud<\\/a>.<\\/span><\\/p>\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101927276\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"101927215\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"richtext\",\"unique\":false,\"useCallout\":false},\"logic\":{\"action\":\"Show\",\"fields\":[{\"comparisonOperator\":\"gt\",\"fieldId\":\"101937043\",\"value\":4},{\"comparisonOperator\":\"lt\",\"fieldId\":\"101937043\",\"value\":9}],\"operator\":\"AND\",\"workflowSteps\":[]},\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<p dir=\\\"ltr\\\"><span style=\\\"font-size: 24px;\\\">Your organization has scored a <strong><u>high<\\/u><\\/strong> level of security in the data encryption category. Good work! There are still areas for improvement, so we\\u2019ve put together some recommendations to improve your organization\\u2019s cybersecurity even more. <\\/span><\\/p><p dir=\\\"ltr\\\"><strong><u><span style=\\\"font-size: 18px;\\\">What We Recommend:<\\/span><\\/u><\\/strong><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Your organization has made major progress in keeping your sensitive data encrypted and secure. Your staff has enabled full disk encryption on all work devices and uses encrypted cloud storage for additional protection. Now you can take encryption one step further by teaching your staff members to encrypt individual files and data on their work devices. A technical assistance provider can help you incorporate this process into your workflow.<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Encrypt sensitive information on your computer.<\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">While we recommend full disk encryption on all devices, it has its limitations. What happens, for example, if a staff member leaves their work laptop unlocked while they use the restroom and someone clicks on a sensitive file on their desktop? For individual files that could pose a risk if they fell into the wrong hands, consider teaching your staff members how to encrypt files and folders. If files are encrypted, individuals will be prompted for a password to open them. You can accomplish this through the use of file encryption software such as<a href=\\\"https:\\/\\/www.veracrypt.fr\\/en\\/Home.html\\\">&nbsp;VeraCrypt<\\/a> or<a href=\\\"https:\\/\\/cryptomator.org\\/\\\">&nbsp;Cryptomator<\\/a>. A technical assistance provider can help you get started.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">One important note: when using some types of this software, encrypted files may appear to be missing and not present in file folders or on the desktop. These files only appear when a user opens the appropriate software and enters their password. <\\/span><\\/p>\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101927281\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"101927215\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"richtext\",\"unique\":false,\"useCallout\":false},\"logic\":{\"action\":\"Show\",\"fields\":[{\"comparisonOperator\":\"lt\",\"fieldId\":\"101937043\",\"value\":5}],\"operator\":\"AND\",\"workflowSteps\":[]},\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<p dir=\\\"ltr\\\"><strong><u><span style=\\\"font-size: 18px;\\\">Why We Recommend This:&nbsp;<\\/span><\\/u><\\/strong><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Understanding and enabling data encryption on work devices isn\\u2019t as daunting as it may seem. While it\\u2019s critical to understand how encryption works (including when services use at-rest encryption), taking steps toward better safeguarding data is within reach for most organizations.<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">More advanced implementation can include \\u201czero-knowledge\\u201d cloud storage and individual encryption of files and folders on specific devices. These can be implemented with the help of a technical assistance provider.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong><u>A Real-World Example:&nbsp;<\\/u><\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">ADE Worldwide\\u2019s office in Zambia is &nbsp;raided unexpectedly. The intruders seize the office\\u2019s two laptops and one desktop computer. Luckily, before the raid, ADE required all devices be full-disk encrypted. Therefore the staff in Zambia is reassured that their data remain safe while the devices are outside of their control.<\\/span><\\/p>\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101927290\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"101927215\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"richtext\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null}],\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101927215\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"section\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesSectionDto\",\"content\":\"<h4><strong><span style=\\\"font-size: 18px;\\\">Password Management and Authentication<\\/span><\\/strong><\\/h4>\",\"heading\":\"\",\"labelPosition\":\"\",\"languageFormat\":\"default\",\"numColumns\":\"0\",\"usePageBreak\":false},\"fields\":[{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<p dir=\\\"ltr\\\"><span style=\\\"font-size: 24px;\\\">Your organization has scored <strong><u>below<\\/u><\\/strong> our recommended security level for civil society organizations in the password management and authentication category. Don\\u2019t worry! We\\u2019ve put together some recommendations to improve your organization\\u2019s cybersecurity.<\\/span><\\/p><p dir=\\\"ltr\\\"><strong><u><span style=\\\"font-size: 18px;\\\">What We Recommend:<\\/span><\\/u><\\/strong><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Passwords are like your house keys: something you use every day that can be easily stolen. Unlike house keys, however, many people use the same password for many different accounts\\u2014the equivalent of using the same key for your home, office, car, and desk drawer. Luckily, just as you can take steps to secure your locks, you can also take steps to strengthen your passwords and online accounts.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Understand how passwords are compromised online.<\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Passwords are valuable to people interested in accessing your organization\\u2019s information online. They can include attackers looking to compromise your organization or cybercriminals looking to steal or sell data. Most online services\\u2014 such as email and social media platforms\\u2014will eventually be compromised. When this happens, attackers sell and trade passwords until they are gradually released on the public Internet.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Sooner or later, staff members will suffer from a breach that exposes at least one of their passwords. If they use that password across several different accounts, they increase their risk and the risk to your organization.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Establish a password policy across your organization.&nbsp;<\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">When given the option, most people will choose basic or easy-to-remember passwords that are easily cracked. To make your organization\\u2019s passwords stronger, consider establishing a password policy. It should govern what your organization defines as a strong password or passphrase, how staff can generate passwords (we recommend a password manager for this purpose), where passwords should be stored (again, a password manager is our preference), and other rules governing password-related security, such as how to handle security questions on a work account. You should also establish a rule governing how long passwords can be used before they must be changed.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Enable a password manager.<\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Every online service your staff members use needs a unique password. Unfortunately, with many of us managing hundreds of different online services, it\\u2019s virtually impossible to remember so many unique passwords. A password management tool\\u2014also known as a password manager\\u2014can help organize our passwords, store them securely, and allow us to generate random, stronger passwords for our services. Some password managers can even share passwords with your staff for accounts that they all use regularly.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Popular and easy-to-use password managers for staff include<a href=\\\"https:\\/\\/1password.com\\/business\\/\\\">&nbsp;1Password Business<\\/a>,<a href=\\\"https:\\/\\/www.lastpass.com\\/enterprise\\/enterprise-features\\\">&nbsp;LastPass Enterprise<\\/a>,<a href=\\\"https:\\/\\/www.dashlane.com\\/\\\">&nbsp;Dashlane<\\/a>,<a href=\\\"https:\\/\\/keepassxc.org\\/\\\">&nbsp;KeePassxc<\\/a>,<a href=\\\"https:\\/\\/www.keepersecurity.com\\/\\\">&nbsp;Keeper<\\/a>, and<a href=\\\"https:\\/\\/bitwarden.com\\/\\\">&nbsp;Bitwarden<\\/a>. A technical assistance provider can help you determine the right password manager for your organization.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Require two-factor authentication.<\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Just as we can strengthen our home security by adding an alarm system and other measures, we can strengthen our online accounts in the event that someone does gain access to our passwords. This process is known as two-factor or multi-factor authentication and requires something you know (your password) in combination with something you have (an authentication code or tool).&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">We recommend enabling two-factor authentication for every online service that your organization uses. Using a site such as twofactorauth.org, in combination with an outside security provider, can help your staff &nbsp;enable two-factor authentication quickly and efficiently on most services.<\\/span><\\/p>\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101927249\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"101927244\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"richtext\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<p dir=\\\"ltr\\\"><span style=\\\"font-size: 24px;\\\">Your organization has scored <strong><u>reasonable<\\/u><\\/strong> level of security in the password management and authentication category. Good job! There are still areas for improvement, so we\\u2019ve put together some recommendations to improve your organization\\u2019s cybersecurity even more.<\\/span><\\/p><p dir=\\\"ltr\\\"><strong><u><span style=\\\"font-size: 18px;\\\">What We Recommend:<\\/span><\\/u><\\/strong><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Your organization has taken steps to strengthen your password processes. With minimal effort, you can further improve your security footing.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Use an authenticator app or token.<\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">When first enabled, most two-factor authentication services use SMS, or text, messages to send the codes your staff &nbsp;will need to access their accounts. However, because SMS messages are easily intercepted and manipulated, this isn\\u2019t the most secure way to send authentication codes. Instead, we recommend switching from SMS to either an authenticator app that will run on your staff \\u2019s smartphones or, for an even more secure solution, a hardware token that plugs into the physical computer\\u2019s USB port. We recommend <a href=\\\"https:\\/\\/authy.com\\/features\\/\\\">Authy<\\/a>,<a href=\\\"https:\\/\\/support.google.com\\/accounts\\/answer\\/1066447?co=GENIE.Platform%3DAndroid&hl=en\\\">&nbsp;Google Authenticator<\\/a>, and<a href=\\\"https:\\/\\/www.microsoft.com\\/en-us\\/account\\/authenticator\\\">&nbsp;Microsoft Authenticator<\\/a>. Reputable hardware tokens include<a href=\\\"https:\\/\\/www.yubico.com\\/\\\">&nbsp;Yubikey<\\/a>,<a href=\\\"https:\\/\\/solokeys.com\\/\\\">&nbsp;Solo Key<\\/a>, and<a href=\\\"https:\\/\\/store.google.com\\/us\\/product\\/titan_security_key\\\">&nbsp;Titan Key<\\/a>.<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Strengthen your password policies.&nbsp;<\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Even the strongest password policies have to work with your staff \\u2019s workflow. Review your existing policies and determine areas that can be improved and made stronger and clearer. For example, how should staff handle a situation when they are locked out of their account or lack the needed two-factor authentication credentials? Clarifying these steps can help reduce risk, particularly when staff are traveling, of inadvertently allowing an attacker into your system.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">You will also want to take a look at your organization\\u2019s password policies across work devices. For example, local administrators on your work devices should be able to reset passwords themselves at regular intervals, such as every 180 days. A technical assistance provider can help you walk through your existing policies and find areas for improvement. <\\/span><\\/p>\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101927257\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"101927244\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"richtext\",\"unique\":false,\"useCallout\":false},\"logic\":{\"action\":\"Show\",\"fields\":[{\"comparisonOperator\":\"gt\",\"fieldId\":\"101937201\",\"value\":4},{\"comparisonOperator\":\"lt\",\"fieldId\":\"101937201\",\"value\":\"\"}],\"operator\":\"AND\",\"workflowSteps\":[]},\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<p dir=\\\"ltr\\\"><span style=\\\"font-size: 24px;\\\">Your organization has scored <strong><u>high<\\/u><\\/strong> level of security in the password management and authentication category. Good work! There are still areas for improvement, so we\\u2019ve put together some recommendations to improve your organization\\u2019s cybersecurity even more.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><strong><u><span style=\\\"font-size: 18px;\\\">What We Recommend:<\\/span><\\/u><\\/strong><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Instituting password managers and enabling two-factor authentication on individual accounts will greatly improve your organization\\u2019s security. Working with a technical assistance provider, you can take these efforts one step further through an organization-wide setup. Find out more below.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Use single sign-on throughout your organization.<\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">By instituting a comprehensive or single sign-on (SSO) system, you\\u2019re improving both your staff\\u2019s workflow and their security. SSO requires your staff to use the same username, password, and two-factor authentication for all accounts they use for work. The system also gives an administrator greater control over security preferences, as well as the ability to more closely monitor staff usage of work accounts.<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">SSO can be complicated to set up, especially for a large organization with established security protocols, but a technical assistance provider can help. We recommend SSO systems <a href=\\\"https:\\/\\/duo.com\\/\\\">DUO<\\/a> and<a href=\\\"https:\\/\\/www.okta.com\\/products\\/single-sign-on\\/\\\">&nbsp;Okta<\\/a>. The<a href=\\\"https:\\/\\/landing.google.com\\/advancedprotection\\/\\\">&nbsp;Advanced Protection Program from Google<\\/a> can help establish a similar system for high-risk users. Just remember that to be effective, all accounts within your organization that require a log-in need to be governed by SSO.<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">The reason that SSO is more secure than using hundreds of different accounts is because it lowers your \\u201cattack surface.\\u201d Rather than having several different accounts and passwords for an attacker to target, SSO puts all your accounts behind a single gate, usually with a high level of protection. Most SSO providers also require two-factor authentication for an added layer of security, as well as oversight by an administrator who can deactivate accounts as needed. &nbsp;<\\/span><\\/p>\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101927261\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"101927244\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"richtext\",\"unique\":false,\"useCallout\":false},\"logic\":{\"action\":\"Show\",\"fields\":[{\"comparisonOperator\":\"lt\",\"fieldId\":\"101937201\",\"value\":5}],\"operator\":\"AND\",\"workflowSteps\":[]},\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong><u>Why We Recommend This:&nbsp;<\\/u><\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Passwords allow us to access the hundreds of services we use online each day. Because we juggle so many passwords, it\\u2019s important that we keep them organized, secure, and easily managed. Implementing a password manager may be logistically complicated depending on your organization\\u2019s size but immediately makes your accounts and staff safer.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Combining a password manager with two-factor authentication is a relatively painless way to greatly improve your security footprint. Adding additional steps, such as a physical security key or even SSO functionality, can take your security one step further.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong><u>A Real-World Example:&nbsp;<\\/u><\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">A few years ago, ADE Worldwide required all staff to enable two-factor authentication across their work devices. However, as more staff members are traveling, however, the IT department is getting frustrated by the number of people who are accidentally locking themselves out of their accounts. To help alleviate the situation without ending the two-factor requirement, ADE management institutes a new password policy that clarifies how staff can manage two-factor authentication when they are out of the office. <\\/span><\\/p>\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101927264\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"101927244\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"richtext\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null}],\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101927244\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"section\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesSectionDto\",\"content\":\"<p><strong><span style=\\\"font-size: 18px;\\\">Updates<\\/span><\\/strong><\\/p>\",\"heading\":\"\",\"labelPosition\":\"\",\"languageFormat\":\"default\",\"numColumns\":\"0\",\"usePageBreak\":false},\"fields\":[{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<p dir=\\\"ltr\\\"><span style=\\\"font-size: 24px;\\\">Your organization has scored <strong><u>below<\\/u><\\/strong> our recommended security level for civil society organizations in the updates category. &nbsp;Don\\u2019t worry! We\\u2019ve put together some recommendations to improve your organization\\u2019s cybersecurity.<\\/span><\\/p><p dir=\\\"ltr\\\"><strong><u><span style=\\\"font-size: 18px;\\\">What We Recommend:<\\/span><\\/u><\\/strong><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">The software that organizations rely on for their work relies on updates to run smoothly and securely. Yet for many office workers, pop-up boxes asking to install updates are an annoyance to be ignored, not a vital part of their workflow. Luckily, you can take steps to make updates a more regular part of your organization\\u2019s technology use.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Make sure that staff enable automatic updates.<\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">One of the most effective and least time-consuming ways to update software is to automate the process. Most software allows users to select an automatic update option, which will force the software to install available updates and restart as needed. We would recommend making sure that all staff members enable this option on all available software and send an email to their supervisors confirming they have done so. <\\/span><\\/p>\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101927274\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"101927271\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"richtext\",\"unique\":false,\"useCallout\":false},\"logic\":{\"action\":\"Show\",\"fields\":[{\"comparisonOperator\":\"gt\",\"fieldId\":\"101942786\",\"value\":15}],\"operator\":\"AND\",\"workflowSteps\":[]},\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<p dir=\\\"ltr\\\"><span style=\\\"font-size: 24px;\\\">Your organization has scored <strong><u>reasonable<\\/u><\\/strong> level of security in the updates category. Good job! There are still areas for improvement, so we\\u2019ve put together some recommendations to improve your organization\\u2019s cybersecurity even more.<\\/span><\\/p><p dir=\\\"ltr\\\"><strong><u><span style=\\\"font-size: 18px;\\\">What We Recommend:<\\/span><\\/u><\\/strong><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Your staff has enabled automatic updates on their software, which is a key step toward a more secure workflow. But what happens if you have many different work devices, all running different versions of different software platforms? It\\u2019s easy for employees to overlook a particular piece of software, leaving the organization vulnerable. Here\\u2019s how to respond.<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Manually install updates as needed.<\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">If you\\u2019re concerned that your staff may be overlooking essential updates on their systems, work with a technical assistance provider to create a master administrator account on all work devices. Then, when the devices are not being used, such as after work hours, manually install all updates as needed using the administrator account. <\\/span><\\/p>\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101927279\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"101927271\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"richtext\",\"unique\":false,\"useCallout\":false},\"logic\":{\"action\":\"Show\",\"fields\":[{\"comparisonOperator\":\"lt\",\"fieldId\":\"101942786\",\"value\":16},{\"comparisonOperator\":\"gt\",\"fieldId\":\"101942786\",\"value\":5}],\"operator\":\"AND\",\"workflowSteps\":[]},\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<p dir=\\\"ltr\\\"><span style=\\\"font-size: 24px;\\\">Your organization has <strong><u>high<\\/u><\\/strong> level of security in the updates category. Good work! There are still areas for improvement, so we\\u2019ve put together some recommendations to improve your organization\\u2019s cybersecurity even more. <\\/span><\\/p><p dir=\\\"ltr\\\"><strong><u><span style=\\\"font-size: 18px;\\\">What We Recommend:<\\/span><\\/u><\\/strong><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">When your organization is growing or spreading across several offices in different regions or countries, it may no longer be feasible for IT staff to manually install updates or to rely on your employees to enable automatic updates. Instead, you may want to consider:<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Pushing updates as needed to work devices.<\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">For large organizations with several offices, using device management software can allow your IT department to \\u201cpush\\u201d updates to work devices without having to be physically present in the office. This can ensure that critical updates reach work devices around the world while giving your organization more hands-on management of software and security. <\\/span><\\/p>\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101927289\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"101927271\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"richtext\",\"unique\":false,\"useCallout\":false},\"logic\":{\"action\":\"Show\",\"fields\":[{\"comparisonOperator\":\"lt\",\"fieldId\":\"101942786\",\"value\":6}],\"operator\":\"AND\",\"workflowSteps\":[]},\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<p dir=\\\"ltr\\\"><strong><u><span style=\\\"font-size: 18px;\\\">Why We Recommend This:&nbsp;<\\/span><\\/u><\\/strong><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">By not updating our software and operating systems, we are leaving ourselves vulnerable to unnecessary risks. Luckily, updates don\\u2019t have to be time-consuming and annoying. Enabling automatic updates, establishing master administrator accounts for manual updates, or even pushing updates to devices can all be done with a little help from a technical assistance provider.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong><u>A Real-World Example:&nbsp;<\\/u><\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">The ADE Worldwide finance staff &nbsp;consists of three members and a manager based in Washington, DC. As busy professionals, they are juggling financial oversight of a major global nonprofit. When they see a pop-up alert on their devices reminding them to update their accounting software, they generally ignore the notification and continue working. Unfortunately, a security flaw in their accounting software poses a risk to their systems unless it is updated, so ADE management requires the staff &nbsp;to enable automatic updates on their software moving forward. &nbsp;<\\/span><\\/p>\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101927297\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"101927271\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"richtext\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null}],\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101927271\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"section\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesSectionDto\",\"content\":\"<h4><span style=\\\"font-size: 18px;\\\"><strong>Operational Continuity<\\/strong><\\/span><\\/h4>\",\"heading\":\"\",\"labelPosition\":\"\",\"languageFormat\":\"default\",\"numColumns\":\"0\",\"usePageBreak\":false},\"fields\":[{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<p dir=\\\"ltr\\\"><span style=\\\"font-size: 24px;\\\">Your organization has scored <strong><u>below<\\/u><\\/strong> our recommended security level for civil society organizations in the operational continuity category. Don\\u2019t worry! We\\u2019ve put together some recommendations to improve your organization\\u2019s cybersecurity.<\\/span><\\/p><p dir=\\\"ltr\\\"><strong><u><span style=\\\"font-size: 18px;\\\">What We Recommend:<\\/span><\\/u><\\/strong><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">None of us want to experience a device theft, fire, flood, natural disaster, or pandemic. But crises do happen, and organizations that prioritize planning and continuity are better prepared when disaster strikes. To get started, we recommend the following step.<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Conduct a drill to plan for worst-case scenarios.<\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">There\'s no better time to plan for a crisis than before it takes place. A drill can help you do so. The level of complexity is up to you, but you should focus on how your organization would respond to a single threat, such as an Internet shutdown, inability to get into the office, or a natural disaster. Working with your managers, assess how your organization would respond to such a threat, making sure to identify any weaknesses or vulnerabilities that come up during the drill.<\\/span><\\/p>\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101927296\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"101927294\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"richtext\",\"unique\":false,\"useCallout\":false},\"logic\":{\"action\":\"Show\",\"fields\":[{\"comparisonOperator\":\"gt\",\"fieldId\":\"101943127\",\"value\":20}],\"operator\":\"AND\",\"workflowSteps\":[]},\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<p dir=\\\"ltr\\\"><span style=\\\"font-size: 24px;\\\">Your organization has scored a <strong><u>reasonable<\\/u><\\/strong> level of security in the operational continuity category. Good job! There are still areas for improvement, so we\\u2019ve put together some recommendations to improve your organization\\u2019s cybersecurity even more.<\\/span><\\/p><p dir=\\\"ltr\\\"><strong><u><span style=\\\"font-size: 18px;\\\">What We Recommend:<\\/span><\\/u><\\/strong><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Once you have a sense of the risks that your organization faces, you can begin to plan for crises and disasters. Ensuring that your plans are documented and accessible to your staff is your top priority, followed by communicating during a difficult moment.<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Create incident response and \\\"rainy day\\\" plans.<\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">In a crisis, individuals tend to perform better when they can follow a clear, step-by-step checklist. Take time now to create incident response plans for particular threats, such as a natural disaster or Internet outage. From there, you can create a \\u201crainy day\\u201d plan that allows you to keep working even in difficult conditions. A security provider can help you with this planning phase.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Set up an alternate communication channel.<\\/strong><\\/span><\\/p><p><span style=\\\"font-size: 18px;\\\">In an emergency, the normal communication channels that your organization relies on, such as Slack and email, may not be available. Consider creating an account with a different service, such as encrypted email provider<a href=\\\"https:\\/\\/protonmail.com\\/\\\">&nbsp;ProtonMail<\\/a> or encrypted messenger<a href=\\\"https:\\/\\/threema.ch\\/en\\\">&nbsp;Threema<\\/a>, to use during a crisis. Make sure to practice logging in and using these accounts to communicate during drills every three to six months.<\\/span><\\/p>\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101927319\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"101927294\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"richtext\",\"unique\":false,\"useCallout\":false},\"logic\":{\"action\":\"Show\",\"fields\":[{\"comparisonOperator\":\"lt\",\"fieldId\":\"101943127\",\"value\":21},{\"comparisonOperator\":\"gt\",\"fieldId\":\"101943127\",\"value\":15}],\"operator\":\"AND\",\"workflowSteps\":[]},\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<p dir=\\\"ltr\\\"><span style=\\\"font-size: 24px;\\\">Your organization has scored a <strong><u>high<\\/u><\\/strong> level of security in the operational continuity category. Good work! There are still areas for improvement, so we\\u2019ve put together some recommendations to improve your organization\\u2019s cybersecurity even more. <\\/span><\\/p><p dir=\\\"ltr\\\"><strong><u><span style=\\\"font-size: 18px;\\\">What We Recommend:<\\/span><\\/u><\\/strong><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Now that you have plans in place for individual crises, spend time focusing on what your staff needs to continue their work during a difficult moment. This can include technical solutions as well as support for their emotional well-being and stress level.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Develop a modified work schedule for crises.<\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">During stressful moments, understand that your staff may not perform at the same level as they would normally. Consider requiring fewer work days each week to avoid burnout and provide resources for their emotional well-being. Investing in your staff demonstrates solidarity during a difficult time, improves organizational security, and encourages staff to take much-needed breaks.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Introduce alternatives to physical meetings.<\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">When staff can\\u2019t meet in person, productivity can sometimes dip. While using popular videoconferencing platforms is ideal for standard meetings, consider a more secure and end-to-end encrypted alternative for sensitive staff &nbsp;meetings, such as<a href=\\\"https:\\/\\/www.webex.com\\/\\\">&nbsp;Cisco Webex<\\/a>.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Try a secure collaborative platform.<\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Slack and other collaboration tools are useful for everyday office communications and nonsensitive information and projects. For more sensitive projects, consider an encrypted collaboration platform such as Element or Semaphor. These platforms sometimes have a slightly steeper learning curve and may require technical assistance to set up, but they provide a much higher degree of security.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Develop remote work guidelines.<\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">When staff are using work devices outside of the office, consider putting together easy-to-follow guidelines on remote work. Consult with a technical assistance provider to determine the level of access a staff member should have to their work device. For example, most organizations will want to restrict staff from installing personal software on their work devices. <\\/span><\\/p>\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101927322\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"101927294\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"richtext\",\"unique\":false,\"useCallout\":false},\"logic\":{\"action\":\"Show\",\"fields\":[{\"comparisonOperator\":\"lt\",\"fieldId\":\"101943127\",\"value\":16}],\"operator\":\"AND\",\"workflowSteps\":[]},\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<p dir=\\\"ltr\\\"><strong><u><span style=\\\"font-size: 18px;\\\">Why We Recommend This:&nbsp;<\\/span><\\/u><\\/strong><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Disasters and crises aren\\u2019t always predictable. That\\u2019s why we recommend that your organization invest time now in creating plans to make sure you can continue operating even when situations drastically change. This type of planning isn\\u2019t limited to natural disasters, either, as illness, conflict, or simply a flooded office can all derail your staff\\u2019s ability to work effectively.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong><u>A Real-World Example:&nbsp;<\\/u><\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">ADE Worldwide works with local farming communities in rural parts of Colorado, Utah, and Wyoming. During wildfire season, it\\u2019s not uncommon for staff to temporarily relocate from their offices to safer locations away from zones that are susceptible to the fires. After a few years of this cycle, ADE management realizes they need to better support these offices during these seasonal crises. They implement an incident response plan and alternate communication channels to be used when fires break out. <\\/span><\\/p>\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101927506\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"101927294\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"richtext\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null}],\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101927294\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"section\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesSectionDto\",\"content\":\"<h4><strong><span style=\\\"font-size: 18px;\\\">Third-Party Services<\\/span><\\/strong><\\/h4>\",\"heading\":\"\",\"labelPosition\":\"\",\"languageFormat\":\"default\",\"numColumns\":\"0\",\"usePageBreak\":false},\"fields\":[{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<p dir=\\\"ltr\\\"><span style=\\\"font-size: 24px;\\\">Your organization has scored <strong><u>below<\\/u><\\/strong> our recommended security level for civil society organizations in the third-party services category. &nbsp;Don\\u2019t worry! We\\u2019ve put together some recommendations to improve your organization\\u2019s cybersecurity.<\\/span><\\/p><p dir=\\\"ltr\\\"><strong><u><span style=\\\"font-size: 18px;\\\">What We Recommend:<\\/span><\\/u><\\/strong><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Every day, organizations rely on third-party services and platforms to get work done, from social media services such as Twitter and Facebook to software-as-a-service (SaaS) tools such as Adobe Creative Suite and Salesforce. Yet third-party services can also be entry points for misinformation, disruption, and cyberattacks. This is a particular risk for social media platforms, which have become frequent targets for manipulation and harassment.<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Create a public and private organizational account on social media platforms.<\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">On social media, verification is essential. An account that claims to represent your organization can sow misinformation, mislead your community, and discredit your efforts. To help prevent this risk, create both a public and private account for your organization. If your public account is compromised or attacked, your private account can issue public statements and clarifications. Most social media platforms allow dual accounts, although Facebook may be more restrictive due to its \\u201creal name\\u201d policy, which requires users to use a verifiable name. Nonetheless, Facebook has extended some special permissions for certain types of accounts, such as<a href=\\\"https:\\/\\/www.facebook.com\\/journalismproject\\/journalist-registration-facebook\\\">&nbsp;accounts belonging to journalists<\\/a>.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">In addition to dual accounts, you will want to make sure that two-factor authentication and other security features are enabled on all third-party accounts, as well as making sure your staff understands privacy settings on social media, such as turning off location data.<\\/span><\\/p>\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101927323\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"101927320\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"richtext\",\"unique\":false,\"useCallout\":false},\"logic\":{\"action\":\"Show\",\"fields\":[{\"comparisonOperator\":\"gt\",\"fieldId\":\"101943348\",\"value\":40}],\"operator\":\"AND\",\"workflowSteps\":[]},\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<p dir=\\\"ltr\\\"><span style=\\\"font-size: 24px;\\\">Your organization has scored <strong><u>reasonable<\\/u><\\/strong> level of security i the third-party services category. Good job! There are still areas for improvement, so we\\u2019ve put together some recommendations to improve your organization\\u2019s cybersecurity even more.<\\/span><\\/p><p dir=\\\"ltr\\\"><strong><u><span style=\\\"font-size: 18px;\\\">What We Recommend:<\\/span><\\/u><\\/strong><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Now that you\\u2019ve taken steps to decrease misinformation risks, you can further lock down your social media accounts to prevent unauthorized access or takeover. Here are two steps to help with that process.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Verify your organization on social media.<\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Apply for the checkmark verification on all official social media accounts used by your organization. This requires an application process with the individual social media platforms, but indicates a level of trust and authenticity to the public.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Make sure you have several administrators.<\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">All official social media accounts should have several staff members as administrators. If one administrator leaves the organization, the remaining ones can reset access to the account and make other changes as needed. Additionally, all administrators should use two-factor authentication on their accounts, which may require a shared authentication setup process. A technical assistance provider can help you do so using the quick response (QR) code the platform provided during setup.<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">If your staff uses social media management tools such as TweetDeck, Hootsuite, or Sprout, make sure they use a work-administered account for all work-related social media profiles. &nbsp;<\\/span><\\/p>\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101927512\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"101927320\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"richtext\",\"unique\":false,\"useCallout\":false},\"logic\":{\"action\":\"Show\",\"fields\":[{\"comparisonOperator\":\"lt\",\"fieldId\":\"101943348\",\"value\":41},{\"comparisonOperator\":\"gt\",\"fieldId\":\"101943348\",\"value\":16}],\"operator\":\"AND\",\"workflowSteps\":[]},\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<p dir=\\\"ltr\\\"><span style=\\\"font-size: 24px;\\\">Your organization has scored <strong><u>high<\\/u><\\/strong> level of security in the third-party services category. Good work! There are still areas for improvement, so we\\u2019ve put together some recommendations to improve your organization\\u2019s cybersecurity even more. <\\/span><\\/p><p dir=\\\"ltr\\\"><strong><u><span style=\\\"font-size: 18px;\\\">What We Recommend:<\\/span><\\/u><\\/strong><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Your organization has made good progress in securing your accounts, including enabling two-factor authentication and establishing multiple administrators. Here are two additional steps to further secure third-party services.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Make sure you can delete or decommission your account.<\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">When a staff member leaves your organization or temporarily becomes unavailable, it\\u2019s important to be able to access and decommission any third-party services they may have used. While this is important for all services, it\\u2019s particularly critical for social media platforms, which can often contain sensitive communications or interoffice messaging. Ensuring that staff members have needed login credentials and other access can help reduce the risks of leaving these accounts unattended.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Use defensive tactics against doxxing.<\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Doxxing, or the practice of releasing personally identifiable information on the Internet, can be personally and professionally challenging. Luckily, there are several anti-doxxing measures your organization can take to lessen this risk. These include proactively searching the names of your staff on popular search engines and removing the names of staff members from data brokerage sites using services such as<a href=\\\"https:\\/\\/joindeleteme.com\\/\\\">&nbsp;Abine DeleteMe<\\/a> and<a href=\\\"https:\\/\\/www.nortonlifelock.com\\/us\\/en\\/\\\">&nbsp;Norton LifeLock<\\/a>.<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Other defensive measures you can take to strengthen staff accounts include establishing trusted backup access to third-party accounts in case of a staff member\\u2019s illness, imprisonment, or death, and claiming similar-sounding social media account names using a service such as<a href=\\\"https:\\/\\/dnstwist.it\\/\\\">&nbsp;DNSTwist<\\/a>. <\\/span><\\/p>\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101927523\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"101927320\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"richtext\",\"unique\":false,\"useCallout\":false},\"logic\":{\"action\":\"Show\",\"fields\":[{\"comparisonOperator\":\"lt\",\"fieldId\":\"101943348\",\"value\":16}],\"operator\":\"AND\",\"workflowSteps\":[]},\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<p dir=\\\"ltr\\\"><strong><u><span style=\\\"font-size: 18px;\\\">Why We Recommend This:&nbsp;<\\/span><\\/u><\\/strong><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Increasingly, we rely on third-party services such as social media platforms and cloud-based software for much of our workflow. And while these tools can be tremendously useful for our work, they also carry significant risks and drawbacks. Understanding how to manage third-party services properly can keep your organization safer and your staff more informed about how they should carry out their work.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong><u>A Real-World Example:&nbsp;<\\/u><\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Staff at the ADE Worldwide office in Honduras are outspoken about the threat facing the small farming communities they represent. This has caught the attention of several vocal landowners, who feel that the organization is biased in its advocacy. As a result, ADE experiences a wave of online harassment to its Honduran-linked social media accounts. To help avoid any further risks to their staff, ADE management in Honduras enables two-factor authentication across their social media channels and removes personal information about staff from the website. <\\/span><\\/p>\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101927533\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"101927320\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"richtext\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null}],\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101927320\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"section\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesSectionDto\",\"content\":\"<h4><span style=\\\"font-size: 18px;\\\"><strong>Virtual Private Network (VPN)<\\/strong><\\/span><\\/h4>\",\"heading\":\"\",\"labelPosition\":\"\",\"languageFormat\":\"default\",\"numColumns\":\"0\",\"usePageBreak\":false},\"fields\":[{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<p dir=\\\"ltr\\\"><span style=\\\"font-size: 24px;\\\">Your organization has scored <strong><u>below<\\/u><\\/strong> our recommended security level for civil society organizations in the Virtual Private Network (VPN) category. Don\\u2019t worry! We\\u2019ve put together some recommendations to improve your organization\\u2019s cybersecurity.<\\/span><\\/p><p dir=\\\"ltr\\\"><strong><u><span style=\\\"font-size: 18px;\\\">What We Recommend:<\\/span><\\/u><\\/strong><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Your organization may have considered a virtual private network (VPN), but was unsure about which to choose. Alternatively, perhaps this is the first time you\\u2019ve ever heard of a VPN. Either way, VPN usage is becoming more popular across the web due to concerns over data privacy and protection. In general, we recommend your organization use a VPN. Here\'s how to get started.<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Understand the advantages and disadvantages of VPN usage.<\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">When you browse the Internet without a VPN, your Internet service provider (ISP) can see all the websites you visit, as well as the date and time you visit them. Increasingly, the websites themselves also track high levels of your data as you browse.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">When you use a VPN, you are blurring some of the information that your ISP can collect, as well as some information websites track. You are giving that information to your VPN provider, who is encrypting your connection to the Internet.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Depending on your VPN provider, this could be safer, riskier, or as risky as giving your data to your ISP. Generally, if you choose a reputable paid VPN provider, your data are more secure than browsing without a VPN. And if you pay for your VPN under your organization\\u2019s name, you will have added privacy\\u2014even more so if you pay for the service using an alias.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Your technical assistance provider can help you with this step. It is also important to note that some countries and regions have made VPN usage illegal, so be aware of your local restrictions before selecting a service.<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Evaluate your budget and choose a VPN accordingly.<\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">VPNs come in all varieties and price points. Luckily, most VPNs are reasonably priced. We discourage most organizations from relying on an entirely free VPN because of concerns about your data security and privacy. Many VPN companies, including<a href=\\\"https:\\/\\/www.tunnelbear.com\\/ngo-support-network\\\">&nbsp;Tunnel Bear<\\/a> and<a href=\\\"https:\\/\\/mullvad.net\\/en\\/\\\">&nbsp;Mullvad<\\/a>, provide free annual subscriptions to deserving organizations, but these are best left for groups with little to no financial resources. You can consult with a technical assistance provider for advice on choosing a VPN and read articles like<a href=\\\"https:\\/\\/www.nytimes.com\\/wirecutter\\/reviews\\/best-vpn-service\\/\\\">&nbsp;this New York Times Wirecutter guide<\\/a> for more details.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Understand the difference between \\u201cincognito mode\\u201d and VPN usage.<\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Despite some disclaimers within the browser, incognito or private browsing mode remains confusing to many Internet users. This mode opens a new window in your browser that does not save your web searches or site visits. While this may seem like your browsing history is fully secure, your ISP can still track the sites you visit, although your browser does not save your history. A VPN, by contrast, prevents your ISP from collecting that data but may collect that data itself.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">While incognito or private browsing mode prevents in-browser tracking by websites, using a VPN alone does not. Understanding these distinctions is important for your staff as they choose which steps to take during their everyday work. <\\/span><\\/p>\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101927513\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"101927509\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"richtext\",\"unique\":false,\"useCallout\":false},\"logic\":{\"action\":\"Show\",\"fields\":[{\"comparisonOperator\":\"gt\",\"fieldId\":\"101943957\",\"value\":19}],\"operator\":\"AND\",\"workflowSteps\":[]},\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<p dir=\\\"ltr\\\"><span style=\\\"font-size: 24px;\\\">Your organization has scored a <strong><u>reasonable<\\/u><\\/strong> level of security in the Virtual Private Network (VPN) category. Good job! There are still areas for improvement, so we\\u2019ve put together some recommendations to improve your organization\\u2019s cybersecurity even more.<\\/span><\\/p><p dir=\\\"ltr\\\"><strong><u><span style=\\\"font-size: 18px;\\\">What We Recommend:<\\/span><\\/u><\\/strong><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Your organization understands the advantages and disadvantages of VPN services and has chosen a service that works for your needs. If you\\u2019re using a standard commercial VPN, there may be other, slightly more complex options that could improve your security.<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Consider a more technical alternative.<\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Creating your own VPN can be technically complicated but allows you to better control your own data and privacy. Rather than relying on a commercial provider, a build-your-own VPN allows you to better customize a specific tool to meet your security needs.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Google offers<a href=\\\"https:\\/\\/www.getoutline.org\\/en\\/home\\\">&nbsp;a service called Outline<\\/a> which allows organizations to build their own VPN for approximately US $10 a month. Outline works well for most contexts, including areas where VPN use may be noticed or blocked. (It is not a solution for countries or regions where VPNs are banned.) Alternatively, a slightly more complex option is<a href=\\\"https:\\/\\/blog.trailofbits.com\\/2016\\/12\\/12\\/meet-algo-the-vpn-that-works\\/\\\">&nbsp;Algo by the security firm Trail of Bits<\\/a>, which helps organizations set up their own VPN server.&nbsp;<\\/span><\\/p><p><span style=\\\"font-size: 18px;\\\">While not a VPN, a tool such as<a href=\\\"https:\\/\\/support.mozilla.org\\/en-US\\/kb\\/firefox-dns-over-https\\\">&nbsp;Firefox DoH<\\/a> can also make your web browsing safer and can be used in conjunction with your existing VPN service. You will probably need to work with a technical assistance provider to enable any of these solutions for your organization. <\\/span><\\/p>\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101927517\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"101927509\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"richtext\",\"unique\":false,\"useCallout\":false},\"logic\":{\"action\":\"Show\",\"fields\":[{\"comparisonOperator\":\"gt\",\"fieldId\":\"101943957\",\"value\":9},{\"comparisonOperator\":\"lt\",\"fieldId\":\"101943957\",\"value\":20}],\"operator\":\"AND\",\"workflowSteps\":[]},\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<p dir=\\\"ltr\\\"><span style=\\\"font-size: 24px;\\\">Your organization has scored a <strong><u>high<\\/u><\\/strong> level of security in the Virtual Private Network (VPN) category. Good work! There are still areas for improvement, so we\\u2019ve put together some recommendations to improve your organization\\u2019s cybersecurity even more. <\\/span><\\/p><p dir=\\\"ltr\\\"><strong><u><span style=\\\"font-size: 18px;\\\">What We Recommend:<\\/span><\\/u><\\/strong><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">You\\u2019ve invested time, money, and effort into finding the right VPN solution for your organization. Now, you can extend your use of private networks to safeguard access to your website and your online research.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Create \\u201cacceptable\\u201d and \\u201cblock\\u201d lists.<\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Most VPN services give users the option to generate static Internet protocol (IP) addresses for users. This means that a staff member at your organization can use the same IP address\\u2014the identifying information associated with their Internet connection\\u2014every time they use that VPN. This allows your administrators to create \\u201cacceptable\\u201d lists of users from a range of pre-approved IP addresses that can take certain actions, such as visit the back end of your website or your organization\\u2019s Intranet. All others would be placed on a \\u201cblock\\u201d list that would not grant them access to these sensitive parts of your system. A technical assistance provider can help you set up such lists with your VPN of choice.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Understand when to use Tor.<\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">The<a href=\\\"https:\\/\\/tb-manual.torproject.org\\/about\\/\\\">&nbsp;Tor browser<\\/a> has been a popular choice for journalists, researchers, and advocates who are concerned about their online activities being tracked by ISPs, governments, and other organizations. Tor provides a higher degree of privacy and anonymity than a standard browser or a VPN because it bounces the user\\u2019s traffic through a series of servers, making it much more difficult for an adversary to determine where the traffic originated. You can read more about how Tor works at the Tor Project website.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Many organizations use Tor for sensitive research only, as the browsing experience can be slower than a standard browser and there is a learning curve to use the tool properly. Nonetheless, Tor is a trusted, reputable option for anonymous browsing. Talk to your technical assistance provider about how to incorporate Tor into your workflow.<\\/span><\\/p>\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101927519\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"101927509\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"richtext\",\"unique\":false,\"useCallout\":false},\"logic\":{\"action\":\"Show\",\"fields\":[{\"comparisonOperator\":\"lt\",\"fieldId\":\"101943957\",\"value\":10}],\"operator\":\"AND\",\"workflowSteps\":[]},\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<p dir=\\\"ltr\\\"><strong><u><span style=\\\"font-size: 18px;\\\">Why We Recommend This:&nbsp;<\\/span><\\/u><\\/strong><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">A VPN enables us to have a greater degree of privacy as we do our work online. Yet selecting and implementing the right VPN isn\'t always the easiest decision. Work with a technical assistance provider to determine which VPN service is right for you and to better understand the advantages and disadvantages of using this software.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong><u>A Real-World Example:&nbsp;<\\/u><\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">The ADE Worldwide office in Berlin often conducts sensitive research into land rights and property records around the world. The research department often uses Tor when browsing sensitive topics, while the entire office uses a specific VPN.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Eventually, managers in the Berlin office realize they need even more control over their browsing data and decide to build their own VPN using Google\\u2019s Outline service with the help of a local technical assistance provider. <\\/span><\\/p>\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101927525\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"101927509\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"richtext\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null}],\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101927509\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"section\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesSectionDto\",\"content\":\"<h4><strong><span style=\\\"font-size: 18px;\\\">Associated Risks<\\/span><\\/strong><\\/h4>\",\"heading\":\"\",\"labelPosition\":\"\",\"languageFormat\":\"default\",\"numColumns\":\"0\",\"usePageBreak\":false},\"fields\":[{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<p dir=\\\"ltr\\\"><span style=\\\"font-size: 24px;\\\">Your organization has scored <strong><u>below<\\/u><\\/strong> our recommended security level for civil society organizations in the associated risks category. Don\\u2019t worry! We\\u2019ve put together some recommendations to improve your organization\\u2019s cybersecurity.<\\/span><\\/p><p dir=\\\"ltr\\\"><strong><u><span style=\\\"font-size: 18px;\\\">What We Recommend:<\\/span><\\/u><\\/strong><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Online harassment, cyberbullying, and even website hacking can all escalate into real-world physical threats or high-level cyberattacks. Though it\\u2019s tempting to disregard these events as an upsetting cost of being active online, they can pose a greater threat than you might expect. Here\\u2019s how to begin to mitigate some of those risks:<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Create a threat and harassment policy.<\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Before an online harassment campaign escalates into violence, consider establishing an organization-wide threat and harassment policy. For example, your organization\\u2019s policy could state that any staff member who is harassed online in their personal or work life must report the incident to their supervisors. Even a single report should heighten the state of alert within the office for at least one week and cause a series of carefully documented security measures. At a minimum, organizations should capture the evidence of the harassment through screenshots, log the time and date the harassment occurred, and report the abuse to the platform used by the harassers.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">You may also want to consider reporting harassment to the harasser\\u2019s ISP. Although they aren\\u2019t always obligated to act, ISPs may have the power to temporarily ban or block a customer who is violating their terms of service. Last, while not always possible, consider allowing staff members to keep their work social media profiles private, which can help reduce attacks. <\\/span><\\/p>\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101927532\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"101927529\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"richtext\",\"unique\":false,\"useCallout\":false},\"logic\":{\"action\":\"Show\",\"fields\":[{\"comparisonOperator\":\"gt\",\"fieldId\":\"101945165\",\"value\":45}],\"operator\":\"AND\",\"workflowSteps\":[]},\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<p dir=\\\"ltr\\\"><span style=\\\"font-size: 24px;\\\">Your organization has scored a <strong><u>reasonable<\\/u><\\/strong> level of security in the associated risks category. &nbsp;Good job! There are still areas for improvement, so we\\u2019ve put together some recommendations to improve your organization\\u2019s cybersecurity even more.<\\/span><\\/p><p dir=\\\"ltr\\\"><strong><u><span style=\\\"font-size: 18px;\\\">What We Recommend:<\\/span><\\/u><\\/strong><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">You\\u2019ve taken some important steps to protect your staff from online harassment, abuse, and hacking. But there are additional steps you can take to anticipate and avoid future risks.<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Take steps to reduce emerging threats.<\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Staying ahead of potential adversaries can help your staff avoid distressing and stressful cyberattacks. Google and other search engines offer alerts for sensitive information that appears online, such as the last name of staff members and their home address. Other commercial services, such as<a href=\\\"https:\\/\\/www.talkwalker.com\\/\\\">&nbsp;TalkWalker<\\/a> and<a href=\\\"https:\\/\\/mention.com\\/en\\/\\\">&nbsp;Mention<\\/a>, can search social media for concerning keywords. <a href=\\\"https:\\/\\/changetower.com\\/\\\">ChangeTower<\\/a> allows users to track changes to Wikipedia pages and other sites that can often be a precursor to harassment.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Although we recommend caution with LinkedIn, it can also be used as a research tool to see who is viewing staff member profiles. Within the organization, consider making specific staff information (such as using their first name and last initial) anonymous and removing headshots and other staff images.<\\/span><\\/p>\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101927541\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"101927529\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"richtext\",\"unique\":false,\"useCallout\":false},\"logic\":{\"action\":\"Show\",\"fields\":[{\"comparisonOperator\":\"lt\",\"fieldId\":\"101945165\",\"value\":45},{\"comparisonOperator\":\"gt\",\"fieldId\":\"101945165\",\"value\":15}],\"operator\":\"AND\",\"workflowSteps\":[]},\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<p dir=\\\"ltr\\\"><span style=\\\"font-size: 24px;\\\">Your organization has scored a <strong><u>high<\\/u><\\/strong> level of security in the associated risks category. Good work! There are still areas for improvement, so we\\u2019ve put together some recommendations to improve your organization\\u2019s cybersecurity even more. <\\/span><\\/p><p dir=\\\"ltr\\\"><strong><u><span style=\\\"font-size: 18px;\\\">What We Recommend:<\\/span><\\/u><\\/strong><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">You are being proactive about protecting your staff from online harassment, abuse, and hacking. Here are two additional steps you can take to lessen this risk further:&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Monitor and remove personal information online.<\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">If you are concerned that your staff members have personally identifiable information online, you can work with commercial providers to temporarily remove this information. Services include<a href=\\\"https:\\/\\/joindeleteme.com\\/\\\">&nbsp;Abine DeleteMe<\\/a>,<a href=\\\"https:\\/\\/www.privacyduck.com\\/\\\">&nbsp;PrivacyDuck<\\/a>,<a href=\\\"https:\\/\\/www.reputationdefender.com\\/\\\">&nbsp;Reputation Defender<\\/a>, and<a href=\\\"https:\\/\\/www.nortonlifelock.com\\/us\\/en\\/\\\">&nbsp;Norton LifeLock<\\/a>, although it is important to note that they primarily scrub data from US-based marketing and sales databases.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Staff may also want to consider creating virtual phone numbers for work purposes rather than using their personal phone numbers, including setting up online accounts and using messenger services such as WhatsApp. Google Voice and Skype can both provide virtual phone numbers.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong>Watch for warning signs.<\\/strong><\\/span><\\/p><p><span style=\\\"font-size: 18px;\\\">Staying proactive about online threats can help organizations respond more quickly when their projects or staff are targeted online. Content moderation tools including<a href=\\\"https:\\/\\/www.perspectiveapi.com\\/#\\/home\\\">&nbsp;Perspective API<\\/a> and<a href=\\\"https:\\/\\/coralproject.net\\/\\\">&nbsp;The Coral Project<\\/a> can use artificial intelligence (AI) to track and score comments left on your organization\\u2019s blog or website. Tools such as<a href=\\\"https:\\/\\/www.crowdtangle.com\\/\\\">&nbsp;CrowdTangle<\\/a>,<a href=\\\"https:\\/\\/social-media-analysis-toolkit.herokuapp.com\\/\\\">&nbsp;SMAT (Social Media Analysis Toolkit)<\\/a>, and<a href=\\\"https:\\/\\/www.babelstreet.com\\/\\\">&nbsp;Babel Street<\\/a> can help your organization monitor social media for misinformation campaigns about your work. And you can work with a technical assistance provider to analyze your web traffic for anomalies, such as harassers who are not hiding their real identities or are sending lots of referral traffic to your site from noted troll sites such as 8chan. <\\/span><\\/p>\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101927543\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"101927529\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"richtext\",\"unique\":false,\"useCallout\":false},\"logic\":{\"action\":\"Show\",\"fields\":[{\"comparisonOperator\":\"lt\",\"fieldId\":\"101945165\",\"value\":16}],\"operator\":\"AND\",\"workflowSteps\":[]},\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<p dir=\\\"ltr\\\"><strong><u><span style=\\\"font-size: 18px;\\\">Why We Recommend This:&nbsp;<\\/span><\\/u><\\/strong><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">Digital risks can quickly accelerate into actual physical risks. Understanding how to detect, track, and mitigate these types of risks can help keep your staff safe. This may require a greater degree of vigilance on your part than normal, but implementing a set of policies and incorporating some tools into your workflow can help enormously.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\"><strong><u>A Real-World Example:&nbsp;<\\/u><\\/strong><\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">The ADE Worldwide office in Albania has become the target of a local smear campaign by a billionaire industrialist whose company has been dumping chemicals into agricultural water supplies. The wealthy magnate claims that ADE is a shell company created by British intelligence agents looking to investigate him. As an independent nonprofit, ADE objects, but not before a gang of online trolls begins harassing local ADE workers.&nbsp;<\\/span><\\/p><p dir=\\\"ltr\\\"><span style=\\\"font-size: 18px;\\\">To manage the harassment campaign, ADE institutes a harassment policy, requiring staff to report any personal or professional online abuse. Then, to help predict the spread of the online harassment, ADE implements several tools that allow it to closely track social media campaigns. Finally, the IT staff reviews the site for the Albanian office and removes any personally identifiable information about the staff there. <\\/span><\\/p>\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101927566\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"101927529\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"richtext\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null}],\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101927529\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"section\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesSectionDto\",\"content\":\"<p style=\\\"text-align: center;\\\"><span style=\\\"font-size: 24px;\\\">Share Your Experience, Help Us Make The Cybersecurity Assessment Tool Better:<\\/span><\\/p><p style=\\\"text-align: center;\\\"><span style=\\\"font-size: 24px;\\\">Please send us your<\\/span><a class=\\\"fr-strong\\\" href=\\\"https:\\/\\/fordfoundationtech.formstack.com\\/forms\\/cat_feedback_form\\\" rel=\\\"noopener noreferrer\\\" target=\\\"_blank\\\"><span style=\\\"font-size: 24px;\\\">&nbsp;feedback.&nbsp;<\\/span><\\/a><\\/p>\",\"heading\":\"FEEDBACK\",\"labelPosition\":\"\",\"languageFormat\":\"default\",\"numColumns\":\"0\",\"usePageBreak\":false},\"fields\":[],\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"102710050\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"section\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null},{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesSectionDto\",\"content\":\"\",\"heading\":\"\",\"labelPosition\":\"\",\"languageFormat\":\"default\",\"numColumns\":\"0\",\"usePageBreak\":false},\"fields\":[{\"calculation\":null,\"defaultValue\":null,\"fieldTypeAttributes\":{\"dtoType\":\"FieldAttributesEmbedRichTextDto\",\"content\":\"<script nonce=\\\"eb7e37806613ebed2a3f5cc80285e65ad7e35efb4a2e9caae3c4be49e8a3cad9\\\">\\n   $(\'.saveAndEmail\').closest(\'.fsSaveIncomplete\').addClass(\'saveAndEmail-wrapper\'); \\n  $(\\\".col-sm-10.col-sm-offset-1.col-md-8.col-md-offset-2.col-xlg-6.col-xlg-offset-3 a:contains(\'Powered by Formstack\')\\\" ).closest(\'div\').addClass(\'FSpowered\');\\nfunction printResults()\\n{\\nwindow.print();\\n}\\n<\\/script>\\n\\n<button class=\\\"printResults\\\" onclick=\\\"printResults();return false;\\\" onkeydown=\\\"return false;\\\">\\n    Print\\n<\\/button>\\n\\n<div id=\\\"fsSaveIncomplete4058587\\\" class=\\\"fsSaveIncomplete saveAndEmail\\\">\\n    <a href=\\\"javascript:\\/\\/\\\">Save and Email<\\/a>\\n<\\/div>\\n\\n\\n\\n\\n\",\"shouldProcessSubstitutionTokens\":false},\"fields\":null,\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101882551\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"101882549\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"embed\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null}],\"general\":{\"autofill\":null,\"columnSpan\":\"1\",\"hidden\":false,\"hideLabel\":false,\"id\":\"101882549\",\"internalLabel\":null,\"isRootSection\":false,\"label\":\"\",\"language\":\"en\",\"options\":[],\"parentTableMetadata\":null,\"readOnly\":false,\"required\":false,\"searchConfig\":{\"canSearchOptions\":false,\"useRemoteSearch\":false},\"section\":\"\",\"shouldForceSkipValidation\":false,\"supportingText\":null,\"type\":\"section\",\"unique\":false,\"useCallout\":false},\"logic\":null,\"secureSettings\":null}],\"shouldDisableSubmission\":null,\"submitUrl\":\"https:\\/\\/fordfoundationtech.formstack.com\\/forms\\/index.php\",\"theme\":{\"backgroundImage\":\"\",\"backgroundImageRepeat\":\"repeat\",\"bodyBgColor\":\"#ffffff\",\"buttonBgColor\":\"#ed711e\",\"buttonBorder\":\"0px\",\"buttonBorderColor\":\"transparent\",\"buttonColor\":\"#ffffff\",\"buttonFontSize\":\"14px\",\"buttonFontStyle\":\"normal\",\"buttonFontVariant\":\"\",\"buttonFontWeight\":\"400\",\"buttonPaddingLeftRight\":\"20px\",\"buttonPaddingTopBottom\":\"20px\",\"buttonRoundedCorners\":\"0px\",\"colorMain\":\"#595d64\",\"customCss\":\"div.col-sm-10.col-sm-offset-1.col-md-8.col-md-offset-2.col-xlg-6.col-xlg-offset-3:last-of-type div a[title=\'Powered by Formstack\']{display:none;}\\n\\n.fsBody .fsOptionLabel {font-weight:400!important}\\n.fsBody .fsLabel{ font-weight:800!important}\\n.fsBody .fsForm { background-color:none}\\ndiv.fsSaveIncomplete { background-color:transparent!important}\\ndiv.fsSaveIncomplete a{text-decoration:underline}\\n.fsPreviousButton, .fsSubmitButton, .fsNextButton {\\n    padding: 20px 30px;\\n}\\n.fsForm .fsSubmit {\\n    margin-top: 0px;\\n    padding: 0px;\\n}\\ndiv.fsSaveIncomplete {\\n    margin-bottom: 0px;\\n    padding: 0px 0;\\n}\\n.fsBody .fsLabel .fsLabelVertical{ font-weight:800!important}\\ndiv.fsProgressBar {\\n    background-color: #299CD6;\\n}\\n#fsRow4058587-55 p strong{color:#ED711E}\\n#fsSection100611159 .fsSectionHeader {display:none}\\n\\/* #fsPage4058587-7{} *\\/\\n\\n#fsRow4058587-64 p strong{color:#ED711E}\\n#fsSection100610587 .fsSectionHeader {display:none}\\n\\/* #fsPage4058587-7 {} *\\/\\n\\n#fsRow4058587-79 p strong{color:#ED711E}\\n#fsSection100847454  .fsSectionHeader {display:none}\\n\\/* #fsPage4058587-8 {} *\\/\\n\\n#fsSection98895259 .fsSectionHeader {display:none}\\n#fsRow4058587-87 p strong{color:#ED711E}\\n\\/* fsPage4058587-11 *\\/\\n\\n#fsRow4058587-75 p strong{color:#ED711E}\\n#fsRow4058587-88 p strong{color:#ED711E}\\n#fsRow4058587-90 p strong{color:#ED711E}\\n#fsRow4058587-115 p strong{color:#ED711E}\\n#fsRow4058587-125  p strong{color:#ED711E}\\n#fsPage4058587-12 p, #fsPage4058587-12 .form-basic,#fsPage4058587-12 .form-control,#fsPage4058587-12 .blue-bullet,#fsPage4058587-12 .blue-bullet-compact, #fsPage4058587-12 li {\\n    line-height: 1.25;\\n}\\n\\n.surveySubHeader-wrapper{\\nfont-size:.9rem;\\n}\\n.fsBody .surveySubHeader-wrapper .fsRowBody{\\nmargin:0px!important;     \\npadding:0px!important;\\n}\\n.surveySubHeader-wrapper div{\\nmargin:0px!important;     \\npadding:0px!important;  \\n}\\n\\n.fsBody .fsFieldRow .surveySubHeader-wrapper{\\nmargin:0px!important;     \\npadding:0px!important;  \\n}\\n\\n   .printResults,.saveAndEmail{\\n            padding: 12px 30px!important;\\n            background-color:#ed711e!important;\\n            border: none;\\n            font-size:14px!important;\\n            color:#fff;\\n    }\\n    .saveAndEmail {\\n    width: 156px;\\n    float: right;\\n    color: #fff;\\n    font-size: 14px;\\n    }\\n    a.saveAndEmail{\\n        color:#fff;\\n    }\\n    .fsSubmitButton .fsSubmitMultipage{\\n        display:none!important;\\n    }\\n    .fsSubmit input.fsSubmitMultipage{\\n        display:none!important;\\n    }\\n\\n.fsSaveIncomplete.saveAndEmail {\\n     background-color:#ed711e!important;\\n     color:#fff!important;\\n     display:block;\\n}\\n.fsSaveIncomplete.saveAndEmail a,.fsSaveIncomplete.saveAndEmail a:visited{\\n    text-decoration: none;\\n    color: #fff!important;\\n    display:block;\\n}\\n#fsSaveIncomplete4058587.saveAndEmail a{display:block;}\\n\\n#fsForm4058587,#fsForm4058587 .fieldset-content label{\\n    color:#2c2c2c;\\n}\\n\\n\\/*\\n printing \\n*\\/\\n@media print{ \\n  body * {\\n    visibility: visible;\\n  }\\n  \\n  \\/* remove elements to print *\\/\\n  div.rte.col-sm-10.col-sm-offset-1.col-md-8.col-md-offset-2.col-xlg-6.col-xlg-offset-3{\\n  display:none;\\n  }\\n  .rte.col-sm-10.col-sm-offset-1.col-md-8.col-md-offset-2.col-xlg-6.col-xlg-offset-3{\\n    display:none;\\n  }\\n  .row-padding-bottom{\\n      display:none;\\n  }    \\n  .col-sm-10.col-sm-offset-1.col-md-8.col-md-offset-2.col-xlg-6.col-xlg-offset-3 .article-body{\\n      display:none;\\n  }\\n  .col-sm-10.col-sm-offset-1.col-md-8.col-md-offset-2.col-xlg-6.col-xlg-offset-3 aside{\\n     display:none;\\n  }\\n  .col-sm-10.col-sm-offset-1.col-md-8.col-md-offset-2.col-xlg-6.col-xlg-offset-3.container-fluid{\\n     display:none;\\n}\\n    .secondary-nav{\\n        display:none!important;\\n    }\\n    \\n    .secondary-nav{border:10px solid purple; \\n        display:none!important;\\n    }\\n   .hero-full-inner,.hero-image-medium{\\n    display:none;}\\n    .social-wrapper{\\n        display:none;\\n    }\\n    header{\\n        margin:0px;\\n        padding:0px;\\n        display:none;\\n    }\\n    .col-sm-12.text-center,header.row.event-title{\\n        visibility:visible;\\n        display:block;\\n    }\\n    header div.h6.crumb.padding-topx2.padding-bottomx2 a{\\n        visibility:hidden;\\n        display:none;\\n        margin:10px 0px 0px 0px;\\n        padding:0px;\\n    }\\n    header h1#page-title.text-center{\\n        display:block;\\n        visibility:visible;\\n        margin:0px;\\n        padding:0px;\\n    }\\n    haeder.row.event-title.margin-bottomx3{\\n        margin:0px;\\n        padding:0px;\\n    }\\n    .fsBody .fsSectionHeader,.fsSectionHeader{\\n        display:block;\\n        visibility:visible;\\n        background:#edeff0;\\n    }\\n#fsPage4058587-12{\\n margin-top:0px;\\n}    \\n #fsPage4058587-12, #fsPage4058587-12 *:not(.fsHidden,script,style) {\\n    visibility: visible;\\n    display: block;\\n  }\\n  #fsPage4058587-12 style, #fsPage4058587-12 script{\\n   visibility: hidden;\\n  }\\n \\/*\\n #fsPage4058587-12 {\\n    position: absolute;\\n    left: 0;\\n    top: 0;\\n  }\\n *\\/\\n .col-sm-10.col-sm-offset-1.col-md-8.col-md-offset-2.col-xlg-6.col-xlg-offset-3{\\n    margin:0px;\\n    width:100%;\\n }\\n .container-fluid{\\n     margin:0px;\\n     padding:0px;\\n }\\n \\n  .fsRowBody.fsCell.fsFieldCell.fsFirst.fsLast.fsLabelVertical.fsSpan100,.fsRowBody.fsCell.fsFieldCell.fsFirst.fsLast .fsLabelVertical.fsSpan100 p,.fsRowBody.fsCell.fsFieldCell.fsFirst.fsLast .fsLabelVertical.fsSpan100 p span {\\n    font-size:24px!important;\\n    color:#2c2c2c;\\n        \\n    }\\n    .fsLabel.fsLabelVertical,.fsOptionLabel.vertical{\\n    font-size:18px!important;\\n    color:#2c2c2c;\\n    }\\n    .fsRowBody.fsCell.fsFieldCell.fsFirst.fsLast.fsLabelVertical.fsSpan100,.fsRowBody.fsCell.fsFieldCell.fsFirst.fsLast.fsLabelVertical.fsSpan100 p, .fsRowBody.fsCell.fsFieldCell.fsFirst.fsLast.fsLabelVertical.fsSpan100 p span{\\n    font-size:18px!important;\\n    color:#2c2c2c;\\n    }\\n}\\n\\n\\n\",\"errorBackgroundColor\":\"#fae9e9\",\"errorColorPrimary\":\"#ff3C3C\",\"errorColorSecondary\":\"#15232b\",\"extraneousPrimaryColor\":\"#595d64\",\"extraneousSecondaryColor\":\"#d4d4d4\",\"extraneousTertiaryColor\":\"#eaeaea\",\"fieldBgColor\":\"#ffffff\",\"fieldBorder\":\"1px\",\"fieldBorderColor\":\"#cfd4d8\",\"fieldColor\":\"#595d64\",\"fieldFontStyle\":\"normal\",\"fieldFontVariant\":\"\",\"fieldFontWeight\":\"400\",\"fieldRequiredBgColor\":\"#ffffff\",\"fieldRequiredBorder\":\"1px\",\"fieldRequiredBorderColor\":\"#cfd4d8\",\"fieldRoundedCorners\":\"0px\",\"focusHighlightColor\":\"transparent\",\"focusHighlightOpacity\":0,\"fontService\":\"google\",\"fontWeights\":\"400,700\",\"footerImageAlignment\":\"\",\"footerImageHeight\":\"\",\"footerImageUrl\":\"\",\"footerImageWidth\":\"\",\"formAlignment\":\"center\",\"formBgColor\":\"#ffffff\",\"formBgColorOpacity\":1,\"formBorder\":\"0px\",\"formBorderColor\":\"transparent\",\"formBorderRoundedCorners\":\"0px\",\"globalFont\":\"Lato\",\"globalFontSize\":1,\"globalRoundedCorners\":\"0px\",\"globalSpacing\":2,\"headerImageAlignment\":\"\",\"headerImageHeight\":\"\",\"headerImageUrl\":\"\",\"headerImageWidth\":\"\",\"inputFocusHighlightColor\":\"#0197EC\",\"isNoStyleStrict\":false,\"labelRequiredColor\":\"#595d64\",\"labelRequiredFontSize\":\"16px\",\"matrixLabelColumnPosition\":\"center\",\"matrixLabelRowPosition\":\"right\",\"placeholderTextColor\":\"\",\"productPriceColor\":\"#595d64\",\"ratingIconColor\":\"#595d64\",\"ratingIconSize\":\"25px\",\"readOnlyFieldBgColor\":\"#edeff0\",\"saveAndResumeButtonBackgroundColor\":\"#eaeaea\",\"saveAndResumeButtonTextColor\":\"#595d64\",\"sectionBgColor\":\"#edeff0\",\"sectionColor\":\"#595d64\",\"sectionHeadingAlignment\":\"center\",\"sectionHeadingColor\":\"#595d64\",\"sectionHeadingFontStyle\":\"normal\",\"sectionHeadingFontVariant\":\"\",\"sectionHeadingFontWeight\":\"400\",\"sectionHeadingSize\":\"28px\",\"sectionRoundedCorners\":\"0px\",\"sizeField\":\"14px\",\"sizeLabel\":\"16px\",\"spacing\":\"10px\",\"successBackgroundColor\":\"#eefaf5\",\"successColorPrimary\":\"#21B573\",\"successColorSecondary\":\"#eefaf5\",\"supportingTextColor\":\"#595d64\",\"supportingTextFontSize\":\"12px\",\"supportingTextFontStyle\":\"normal\",\"supportingTextFontVariant\":\"\",\"supportingTextFontWeight\":\"\",\"transitionDuration\":\"0s\",\"transitionSpacingRightLeft\":\"10px\",\"transitionSpacingTopBottom\":\"10px\"},\"url\":\"https:\\/\\/fordfoundationtech.formstack.com\",\"version\":\"4\",\"viewKey\":\"KW2lA3J2A6\",\"workflows\":null},\"isCached\":true,\"success\":true},"+"\n");
document.write("    }"+"\n");
document.write("  );"+"\n");
document.write("    (function(){"+"\n");
document.write("    var link = document.createElement(\'link\');"+"\n");
document.write("    link.rel = \'stylesheet\';"+"\n");
document.write("    link.href = \'https://fonts.googleapis.com/css?family=Lato:400,700\';"+"\n");
document.write("    document.querySelector(\'head\').appendChild(link);"+"\n");
document.write("  })();"+"\n");
document.write("  </script>"+"\n");
document.write(""+"\n");
