Tutorial
Learn how to use CyberCaution™ assessments, the website reviews, and threat intelligence with this step-by-step guide. CyberCaution™ offers the Risk Intelligence Workspace (assessments, reports, threat intel), the website reviews (standalone tools), and client-hosted deployment when data must stay in your environment—no forced cloud. The FAQ describes the same journey in three stages (Discover → Assess → Close); here we start with an assessment in the Workspace so you see results quickly, then use reports and the workspace to track remediation and Threat Radar to stay aware.
Welcome To CyberCaution™: Step-by-Step Guide
Start With An Assessment
Open the CyberCaution™ Risk Intelligence Workspace and go to the Risk Review. Select the relevant assessment for your organization (e.g. Ransomware Readiness, Incident Response, Zero Trust, etc.).
- Completing an assessment provides a personalized security readiness score and actionable advice.
- Most assessments take 5–15 minutes. You can pause and continue at any time.
- Your answers are processed locally for privacy-first security; no forced cloud—client-hosted deployment is available.
Review Reports & Recommendations
After completing an assessment, your results will be summarized in the Workspace with scores across industry frameworks (CISA, NIST, Zero Trust, etc.). Use the Reports area in the Risk Intelligence Workspace for executive and audit-ready outputs.
- Use actionable recommendations to fix weaknesses.
- You can download a PDF report for compliance or team review.
Close Gaps With the website reviews
Open the Continue in Workspace to put recommendations into action. Standalone tools include:
- Asset Register: Track assets and risks (for insurance, compliance, or business continuity).
- Incident Response Manager: Create, test, and maintain a response plan.
- Data Breach Simulator: Prepare with practice scenarios and checklist-driven action plans.
- User Training Resources: Access awareness training modules and templates.
Use Threat Radar For Raw Signal Awareness
Access Threat Radar for raw threat signals and feed exploration by sector—current threats, attack patterns, and industry intelligence. In the Workspace, Threat Weather gives a synthesized threat level and industry threat intel (profiles, actors, attack patterns).
- See what your industry faces; filter by sector for tailored intelligence.
- Use insights to prioritize controls and defenses.
Track Progress & Get Help
Repeat assessments regularly or after policy/technology changes. Track your readiness trend over time.
- Check the How It Works page for feature walkthroughs.
- Need troubleshooting or connectivity help? Start with FAQ or Contact Us.
Getting Started is Easy: Begin with a quick assessment in the Risk Intelligence Workspace or start with website reviews; review your results in the Workspace; then use the website reviews and Threat Radar to close gaps and stay aware. Need data to stay in your environment? Request client-hosted deployment. See the FAQ and How It Works for the full journey.