Suspicious Domain Checker

Check a link

Paste a full URL (https://...). Works on links from email, SMS, WhatsApp, social media — anything you've been asked to click.

We never store the URL you submit.

URL Reputation Scanner

Check a link

Paste a full URL (https://...). Works on links from email, SMS, WhatsApp, social media — anything you've been asked to click.

We never store the URL you submit.

Smart Camera Risk Checker

Smart Camera Risk Checker

12-question audit for home cameras: cloud storage, default creds, firmware, access.

Privacy: answers stay in your browser. We do not record your responses.
Cameras with default creds are the #1 IoT botnet recruitment target.
Check monthly. Old firmware = public CVEs.
Ring, Nest, Wyze all support it.
Isolate IoT so a compromised camera can't pivot to your laptop.
Reused password + breach = someone watching your living room.
Reduce attack surface to what you actually need.
Indoor cameras near doors are a physical tamper target.
Ex-partners, old roommates — remove their access.
Abandoned no-name cameras from Amazon often never update. Swap them.
Cameras pointed at keyboards, whiteboards, or locks are a data exposure.
For legal and privacy reasons, know your vendor's data residency.
Smart plugs or accessible outlets give you a physical off-switch.
Score
Answer the questions above to see your score.

Identity Theft Risk Score

Identity Theft Risk Score

15-question identity-theft posture score.

Privacy: answers stay in your browser. We do not record your responses.
Credit freeze is free, takes 10 minutes, and is the single highest-impact ID theft defense.
annualcreditreport.com is free and official.
Email is the reset path to almost everything.
Even SMS MFA beats none.
Dumpster-diving still happens for valuable targets.
Inbound callers asking for SSN = assume scam.
optoutprescreen.com — stops physical mail offers that can be intercepted.
Create accounts at ssa.gov and irs.gov now — blocks thieves from opening them in your name.
One leak shouldn't cascade. Password manager + unique passwords.
If your mailbox is on the street, consider a PO box for sensitive mail.
Data brokers aggregate public records, making identity theft easier.
Early detection = easier dispute. Automate alerts for transactions above $1.
Password manager "Secure Note" is the right place.
IdentityTheft.gov walks you through it — bookmark it now.
Score
Answer the questions above to see your score.

AI Security Readiness Score

AI Security Readiness Score

12-question org-level AI security maturity check.

Privacy: answers stay in your browser. We do not record your responses.
One-page doc: what employees can use, what data is off-limits.
Customer PII, trade secrets, unreleased roadmap — never.
Shadow AI (unsanctioned tools) is how data leaks. Name the sanctioned few.
Anthropic, OpenAI enterprise, Azure OpenAI — check the DPA clause.
Hallucinations are real; never ship AI-generated text as authoritative without review.
Even just visibility — what AI tools are employees using?
If your agent reads user content, treat that content as untrusted.
Replace emails, phone numbers, SSNs with placeholders before LLM calls.
An AI agent shouldn't be able to delete your database. Scope keys.
OpenAI budget caps; Anthropic spend alerts. Don't find out at invoice time.
Regulators (and your lawyers) want to reconstruct what the AI saw and replied.
Healthcare, finance, hiring = high-risk under EU AI Act. Understand your category.
Score
Answer the questions above to see your score.

Data Breach Cost Calculator

Estimate your breach cost

Ballpark estimate only. Real cost depends on specifics; use this for planning, not as a forecast.
Estimated total cost
Detection & escalation
Notification & comms
Post-breach response
Lost business / churn
Regulatory fines (est)

Compliance Gap Checker

Compliance Gap Checker

SOC 2 / ISO27001 / HIPAA / PCI gap snapshot — find what you're missing.

Privacy: answers stay in your browser. We do not record your responses.
Required by every framework. Start with a 5-page doc — refine later.
Covers what's OK / not-OK with company data and devices.
Review who has access to what. Remove stale accounts. SOC 2 mandate.
Required under SOC 2, HIPAA BAA agreements.
Git history + PR reviews satisfy most auditor requirements.
SOC 2 questionnaires for all critical vendors.
Even a 1-page classification doc meets the baseline.
TLS in transit, AES-256 at rest, key rotation policies.
Auditors want evidence you've actually walked through a scenario.
RTO/RPO documented + a restore you actually did.
At minimum: auth logs, admin actions, data access.
Required by SOC 2, HIPAA, GDPR. Track completion.
Badge access, visitor log, equipment inventory.
Score
Answer the questions above to see your score.

Cyber Insurance Readiness Tool

Cyber Insurance Readiness Tool

Pre-application self-audit for the controls underwriters ask about.

Privacy: answers stay in your browser. We do not record your responses.
Non-negotiable — expect underwriting decline without it.
Defender for Business, SentinelOne, CrowdStrike, Sophos all qualify.
3 copies, 2 different media, 1 offsite. Test quarterly.
Even one-pager covering detection, containment, comms, recovery.
KnowBe4, Hoxhunt, even free phishing simulations.
Proofpoint, Mimecast, or even Microsoft Defender for 365.
Document "we patch within 30 days of release." Implement it.
Admin accounts separate from daily-use accounts.
Even something as simple as centralized syslog counts.
SOC 2 + DPA in hand for critical SaaS vendors.
HR, finance, customer PII — documented access controls.
RTO/RPO documented. Tested at least yearly.
Most cloud services have this. Document it for your policy.
Score
Answer the questions above to see your score.