Page 1 of 3

PGPKS QUESTIONNAIRES

Instructions to SME:

  1. This questionnaire should be answered by:
    • PART I – preferably by owner or company’s HR or administrator
    • PART II – preferably by owner or company’s administrator with the assistance of company’s IT technical or IT administrator who oversees the company’s IT facilities and infrastructure.
  2. Kindly answer all the questions as precise as possible and finish all the questions.
  3. In case of any inquiry to the questions, kindly contact us at 03-80087183 / +6010-8674399 or email at pgpks@cybersecurity.my
  4. Thank you very much for your kind cooperation.

 

PART I(A): SME DEMOGRAPHIC


Please type your full company name.
Please type your company address
Please Specify
Please Specify
Invalid Input
Please type your full name
Not a valid phone number
Invalid email address
Invalid Input
Where did you hear about us?*
Where did you hear about us?
Invalid Input
Please Specify

PART I(B): SME DEFINITION


1. How many of employees (inc. Full-time, Part-time & Freelancers) in your company*
1. How many of employees (inc. Full-time, Part-time & Freelancers) in your company
Invalid Input

Note:

  • ‘Full time’ describes the permanent and contract employee, work at least 8 hours a day for 5 days a week.
  • ‘Non full-time’ means those who work part-time,or on hourly basis or freelancer.

 

2. What is your yearly turnover average, in the last 3 years? (RM) *
2. What is your yearly turnover average, in the last 3 years? (RM)
Invalid Input
3. How much does the company spent and invest in ICT for the past 5 years?*
3. How much does the company spent and invest in ICT for the past 5 years?
Invalid Input
4. In relation to question above, in which area does your company spent and invest in ICT for the past 3 years? *
4. In relation to question above, in which area does your company spent and invest in ICT for the past 3 years?
Invalid Input
5. In what aspect do you know the importance of the cybersecurity the most? *
5. In what aspect do you know the importance of the cybersecurity the most?
Invalid Input
6. Do you have physical infra? Could you list down the main components used in your company?*
6. Do you have physical infra? Could you list down the main components used in your company?
Invalid Input
Please Specify
7. Would your organization be amenable to disclosing its internal IPs and network infrastructure to CYBERSECURITY MALAYSIA or its affiliates as part of the requirements for joining PGPKS and participating in VAPT/CMERP evaluations?*
7. Would your organization be amenable to disclosing its internal IPs and network infrastructure to CYBERSECURITY MALAYSIA or its affiliates as part of the requirements for joining PGPKS and participating in VAPT/CMERP evaluations?
Invalid Input

Note:

CYBERSECURITY MALAYSIA will have a very tight policy / NDA hence do not worry on the information leakage.

 

Please Specify

 

PART II: UNDERSTANDING OF CYBERSECURITY MEASURES


9. Have your company encountered any cyber threat before such as wire transfer fraud or ransomware?*
9. Have your company encountered any cyber threat before such as wire transfer fraud or ransomware?
Invalid Input
10. Are you aware on the importance of cyber security in your business?*
10. Are you aware on the importance of cyber security in your business?
Invalid Input
11. Do you feel that it is important to have cybersecurity in your business?*
11. Do you feel that it is important to have cybersecurity in your business?
Invalid Input
12. Investing in cyber security for your company is expensive but crucial to the company*
12. Investing in cyber security for your company is expensive but crucial to the company
Invalid Input
13. Investing in cybersecurity for your company is a waste of time and money*
13. Investing in cybersecurity for your company is a waste of time and money
Invalid Input
14. From 1 to 5, how would you rate your company's cyber security, including processes, infrastructure/software, and human readiness?*
14. From 1 to 5, how would you rate your company's cyber security, including processes, infrastructure/software, and human readiness?
Invalid Input

Note:

5 would be the highest and 1 would be the lowest

15. How important do you believe cyber security in your company’s day-to-day operations?*
15. How important do you believe cyber security in your company’s day-to-day operations?
Invalid Input

Note:

5 would be the highest and 1 would be the lowest

16. Do you have a dedicated IT officer or someone who acts as an IT officer in your organisation? Is he/she easily accessible?*
16. Do you have a dedicated IT officer or someone who acts as an IT officer in your organisation? Is he/she easily accessible?
Invalid Input
17. Do you rely on the IT vendor for ICT services in your company's day-to-day operations? For instance, to backup, shut down the server, configure the system, and so on*
17. Do you rely on the IT vendor for ICT services in your company's day-to-day operations? For instance, to backup, shut down the server, configure the system, and so on
Invalid Input
Invalid Input
Please Specify
19. Does anyone in the company has professional certification in any field of cybersecurity?*
19. Does anyone in the company has professional certification in any field of cybersecurity?
Invalid Input
20. Are you equipped to identify any potential or realized cyber security incidents, brute force attacks, or data breaches targeting your company?*
20. Are you equipped to identify any potential or realized cyber security incidents, brute force attacks, or data breaches targeting your company?
Invalid Input