Frequently Asked Questions

Common questions about CyberCaution™, ransomware readiness assessments, threat context, and how we help organizations build readiness before an incident takes control.

CyberCaution™ offers three ways to engage: the Risk Intelligence Workspace (assessments, threat intelligence, reports), the website reviews (standalone tools), and client-hosted deployment when data must stay in your environment.

What is CyberCaution™?

CyberCaution™ is a privacy-first Risk Intelligence Workspace that helps organizations understand, prioritize, and improve their defense against ransomware attacks. You can use the Workspace for assessments, threat intelligence, and reports; the website reviews for fast exposure signals; or client-hosted deployment when data must stay in your environment. Unlike generic compliance checklists, CyberCaution™ focuses on ransomware-relevant conditions, operational readiness, and decision-grade outputs.

How does CyberCaution™ work?

CyberCaution™ follows a three-stage journey to threat readiness:

  1. 1. Discover Threat Exposure: Identify which threats and attack paths pose the greatest risk. Threat Radar provides raw threat signals and feed exploration by sector; Threat Weather (in the Workspace) gives a synthesized threat level and industry threat intel (profiles, actors, attack patterns).
  2. 2. Assess Readiness Gaps: Evaluate ransomware-relevant conditions across identity, access, backups, segmentation, monitoring, and response readiness. Generate a threat-informed gap analysis that prioritizes controls based on your specific exposure.
  3. 3. Close the Gaps: Implement prioritized controls, collect evidence of operational readiness, and generate executive-ready reports. Use the Workspace to sequence remediation, track progress, and maintain evidence over time.

You can start with a free website review or continue into the Workspace when you need full assessment depth, reporting, and tracking.

Do I need to create an account?

No, you don't need to create an account. CyberCaution™ is designed with privacy-first principles, allowing you to start your assessment immediately without any registration. All data is stored locally in your browser and never leaves your device.

Is my data secure and private?

Yes, absolutely. CyberCaution™ is built with privacy-first architecture:

  • All processing happens locally in your browser
  • Your assessment data never leaves your device
  • No data is transmitted to external servers
  • You maintain complete control over your information

Under what conditions are the Workspace and website reviews offered?

The CyberCaution™ Risk Intelligence Workspace and website reviews are offered only under privacy-preserving conditions so that your data stays under your control by design:

  • Local-first by default: Assessment and workflow data stay on your device unless you explicitly opt in to sync or cloud.
  • Same-origin or client-hosted: When website reviews and the Workspace are used together, they can be deployed on a single origin or inside your environment so sensitive assessment data does not need to leave your control.
  • Optional sync only when you choose: Cloud or backend sync is opt-in; with client hosting or local-only, we do not access your assessment or workflow data.

What does the assessment cover?

The CyberCaution™ assessment evaluates ransomware-relevant conditions that influence exposure, blast radius, and recovery blockers:

  • Identity & Access Management: Authentication, authorization, and privilege management
  • Backup & Recovery: Data protection, backup strategies, and recovery capabilities
  • Network Segmentation: Isolation strategies and lateral movement prevention
  • Monitoring & Detection: Security monitoring, threat detection, and alerting
  • Incident Response: Response planning, procedures, and readiness
  • Threat Context: Raw signals via Threat Radar; synthesized threat level and industry intel via Threat Weather (in the Workspace)

Prioritization is based on risk reduction logic and real attack paths — not generic maturity scores or compliance checklists.

Is CyberCaution™ a vulnerability scanner?

No, CyberCaution™ is not a vulnerability scanner. It does not scan your systems or attempt to exploit vulnerabilities. Instead, it is a structured workflow that helps you evaluate ransomware-relevant conditions and understand how attackers would likely operate against your organization. CyberCaution™ focuses on exposure, blast radius, and recovery blockers rather than individual vulnerabilities.

How long does an assessment take?

The website reviews are intentionally fast. RansomScore can be completed in about a minute, while the broader risk posture review takes longer depending on the depth of input. The Workspace supports fuller, more structured assessments when you need deeper analysis and continuity.

What do I get from the assessment?

After completing your assessment, you receive:

  • Exposure Analysis: Detailed evaluation of your ransomware readiness — focused on blast radius, dwell time, and recovery impact
  • Threat Context: Raw signals via Threat Radar; synthesized threat level and industry intel via Threat Weather (in the Workspace)
  • Risk-Driven Remediation Roadmap: Prioritized controls organized by risk reduction logic, not generic maturity scores
  • Executive-Ready Reports: Clear outputs for leadership, boards, and insurers
  • Workspace continuity: Track remediation work, risk posture changes, and reporting over time inside the Risk Intelligence Workspace

Can I export my assessment results?

Website reviews are designed for fast diagnostic value. Full report output and structured export are part of the paid report or the Workspace experience, where reporting and continuity matter more.

What makes CyberCaution™ different from other security assessment tools?

CyberCaution™ is different in several key ways:

  • Privacy-First: All processing happens locally; your data never leaves your device
  • Ransomware-Focused: Specifically designed for ransomware readiness — evaluates exposure, blast radius, and recovery blockers
  • Threat-Informed: Uses Threat Radar (raw signals) and Threat Weather (synthesized level, in the Workspace) to prioritize based on real attack paths, not generic scores
  • Threat-informed assessment model: Website reviews deliver fast visibility, while the Workspace supports deeper NIST-aligned assessment and reporting
  • Website reviews: Fast, free entry points for risk posture, RansomScore, and Threat Radar — designed to lead into the full Risk Intelligence Workspace
  • Risk Posture: Map sector, assets, and third parties in one posture view
  • No Account Required: Start immediately without registration or setup

Is there a cost to use CyberCaution™?

CyberCaution™ offers a free assessment tier — no credit card required. Start your ransomware readiness evaluation immediately at no cost. For organizations needing advanced capabilities, additional license tiers (Starter Kit, Risk Workspace, Workspace Pro, Enterprise) are available. Visit our pricing page for details.

What if I need help or have questions?

We're here to help! If you have questions about CyberCaution™, need assistance with your assessment, or want to learn more about how it can benefit your organization, please don't hesitate to reach out.

Understand your risk posture, before it's tested under pressure.

Build readiness now, before an incident takes control. Start with a free assessment or explore the Threat Radar.

Prefer to run locally? Risk Review or request client-hosted deployment.