Skip to main content
Cyber Claim Defensibility Check

If a cyber or privacy incident happened tomorrow, how defensible would your business actually look?

This is not about whether you mean well.

It is about whether you could show training, ownership, policies, response discipline, and evidence when an insurer, broker, client, regulator, or manager asks for proof.

In a few blunt questions, this check shows whether your business currently looks stronger, patchy, or exposed.

Not a scare quiz It checks what you could actually show today.
Not legal advice It is a practical defensibility check, not a policy review.
Built for action The result tells you what to tighten first.

Where businesses usually fall apart under scrutiny

1
Controls may exist, but nobody can prove them When proof is requested, the business has activity but not a clean evidence trail.
2
Policies sit in folders instead of shaping behaviour Documents are not enough if they are not current, acknowledged, tracked, and reviewed.
3
Ownership becomes obvious only after something goes wrong If responsibility is vague, response quality usually is too.
What this is measuring

Most businesses do not fail on intention. They fail on proof.

The hard question is not whether your business says cyber compliance matters. It is whether that claim stands up when somebody asks what was in place, who was responsible, what staff were told, and what records exist to back it up.

Training may be happening, but completion records are thin or scattered That weakens your position fast when someone asks what staff were expected to know.
Policies may exist, but they are generic, stale, or not clearly acknowledged That makes the business look less disciplined than it thinks it is.
Response plans may sound fine in theory, but rely on improvisation in practice That gap usually becomes obvious at the worst possible time.
Ownership, review cycles, and evidence gathering are often too informal That is what turns a manageable issue into a harder conversation with outsiders.
How it works

A fast pressure test for how defensible your business looks right now.

No fluff. No fake certainty. Just a clearer view of whether your business would look prepared, patchy, or exposed if the wrong incident happened and someone wanted answers.

1
Answer the questions based on proof, not assumptions Respond according to what you could actually show today.
2
See your defensibility score live The score updates as you go and shows the likely strength of your current position.
3
Leave with a tighter next move You will see what to tighten first instead of being told to “do better cyber”.
Run the check

Cyber Claim Defensibility Check

Answer based on what you could actually show today if someone asked for proof.

Question 1 of 10
0 answered
Question 1

Can you show who completed cyber security training and when?

This is about a record you could produce, not a belief that people were probably trained.

Question 2

Do you have current cyber, privacy, or data handling policies that match how the business actually operates?

This is about current, relevant documents rather than generic templates parked in a folder.

Question 3

Can you show that staff were actually taken through those policies or acknowledged them?

A document on its own does not prove expectations were made clear to staff.

Question 4

Is cyber compliance or cyber risk clearly owned by someone inside the business?

If responsibility is vague, the business usually looks reactive rather than controlled.

Question 5

Could you show what sensitive information the business holds and who can access it?

This is about practical visibility over data and access, not broad assumptions.

Question 6

If a phishing email or breach happened, is there a clear response process people would follow?

This is about whether the business has structure before pressure hits.

Question 7

Would the business be able to show an incident register, issue log, or similar evidence trail if asked?

You do not need perfection. You do need something more than memory and inbox searches.

Question 8

Are cyber-related reviews, refreshers, or checks done on a visible cycle?

Drift is one of the biggest problems. A set-and-forget posture rarely looks strong later.

Question 9

Could you pull together a convincing evidence pack without major scrambling?

Think training records, policies, acknowledgements, ownership, logs, review dates, and response steps.

Question 10

If an incident happened today, would your business look prepared or exposed?

This is the blunt summary question underneath everything else.

0 out of 100 risk
Some risk

Your business may have some defensibility gaps.

Your current answers suggest there are areas that may be harder to defend if proof is requested after an incident.

What to tighten first
Indicative self-assessment only. Not legal advice, not insurance advice, and not a full compliance audit.
Score meaning

What the result is really telling you

The score is not predicting an insurance outcome. It is showing how your current position may look when proof is needed.

0–20 | Stronger position You appear to have several meaningful foundations in place. The next job is keeping them current, visible, and easy to produce without a scramble.
21–50 | Patchy position You likely have some good pieces, but enough gaps remain that your business may not look especially controlled if somebody asks hard questions.
51–100 | Exposed position Your business may be relying on assumptions more than structure. That usually stays hidden until it becomes expensive, urgent, or hard to explain.
Next step

Do not wait for a claim, complaint, or incident to find out how hard your business is to defend.

If the score is not where it should be, the answer is tighter structure around training, policy ownership, review cycles, accountability, and evidence of reasonable steps.

© 2026 Cleverer. Human-layer cyber compliance for Australian business.