Help & Support
Frequently Asked Questions (FAQ)
What is CyberSecurityAId?
CyberSecurityAId is a dynamic self-assessment tool powered by Large Language Models, designed to help small businesses improve their cybersecurity practices affordably and effectively.
How do I use the self-assessment tool?
Simply sign up, answer the guided questions, and receive personalized recommendations based on your business's needs.
Is CyberSecurityAId a replacement for Cyber Essentials certification?
No, our tool aligns with Cyber Essentials best practices but does not replace official certification. For formal certification, please visit an accredited Cyber Essentials certification body.
Technical Support
If you experience issues, please reach out to our support team.
- Email: cybersecurityaid@essex.ac.uk
- Availability: Available Mon-Fri, 9 AM - 5 PM (GMT)
Our Tool Flow
Tool Flow Breakdown
1. Register & Log In
Create an account to secure your personalized cybersecurity assessment. Your login credentials ensure only authorized users can access the tool.
2. Answer Self-Assessment according to the five pillars of NCSC's Cyber Essentials
During this step, you will answer a series of questions divided into five key cybersecurity categories. These categories help assess different aspects of your security posture
- Firewalls: How well do you protect your devices and network from outside threats?
- Secure Configuration: Are your devices and software set up securely to reduce risks?
- User Access Control: Do you control who has access to your data and systems?
- Malware Protection: How do you protect your devices from viruses and other harmful software?
- Patch management: Do you keep your software and devices updated to fix security weaknesses?
Each response will contribute to a comprehensive cybersecurity risk assessment tailored to your business.
3. Receive Custom Report
Based on your responses, our tool generates a detailed report highlighting vulnerabilities and strengths in your cybersecurity framework.
4. Follow Recommended Actions
Receive step-by-step guidance on how to address security risks and improve your defenses based on best practices.
5. Improve Cybersecurity Hygiene
Implement the recommended actions to protect sensitive business data, systems, and employees from potential cyber threats.
6. Continuous Monitoring & Updates
Cybersecurity is an ongoing process. Regularly review and update security measures to stay ahead of evolving cyber threats.