. We test security policies and controls frequently. (24%). We are fully compliant with cybersecurity-related regulations. (22%). We conduct periodic self-assessments to identify and priorities critical vulnerabilities and risks. (21%). We subscribe to a threat intelligence platform or threat intelligence data feeds to stay on top of adversary movements. (20%)
. We have cyber insurance or sufficient funds set aside in case of a ransomware attack. (19%). WE utilize expert managed security security services to keep us from being breached. (19%). We have developed an incident response playbook. (18%). we implement security controls and policies across our entire infrastructure. (18%)