Download Link Safety Checker

Download Link Safety Checker

Heuristics for malware-hosting URLs and risky file extensions.

Privacy: analysis runs entirely in your browser.
Signals found
Paste text above and click Analyze.

Homograph Domain Detector

Homograph Domain Detector

Spot Cyrillic / Greek look-alike characters used in phishing URLs.

Privacy: analysis runs entirely in your browser.
Signals found
Paste text above and click Analyze.

Cyber Budget Planner

Cyber Budget Planner

What should a business realistically spend on cybersecurity per employee?

Privacy: answers stay in your browser. We do not record your responses.
Regulated = higher base spend.
Adds compliance + breach-cost exposure.
Bigger surface; economies of scale kick in differently.
Insurance often mandates controls, increasing spend.
Reduces overhead of managed services.
Gets you MFA, EDR-lite, email-security bundled.
Remote = more endpoint spend.
Crosses off the biggest line item.
Small cost, big risk reduction.
Free to write; expensive to lack.
Score
Answer the questions above to see your score.

Seller Risk Checker

Seller Risk Checker

eBay / Etsy / Craigslist seller-account risk score.

Privacy: answers stay in your browser. We do not record your responses.
New accounts account for most fraud.
Pattern of successful sales reduces risk.
Reverse-image search suspect listings.
Far-below-market is bait.
Escrow = chargeback protection.
Bad actors push those; good sellers accept cards.
Off-platform = outside review.
Ghosting is a warning sign.
In-person = fewer shipping scams.
Scam sellers avoid committing to returns.
Score
Answer the questions above to see your score.

Employee Phishing Trainer

Employee Phishing Trainer

Pre-built phishing test scenarios with scoring rubric.

Privacy: answers stay in your browser. We do not record your responses.
Baseline measurement required.
Data-driven training outperforms mass-mailed lessons.
Keeps accountability without public shaming.
The highest-loss scenario in practice.
Quishing is now mainstream.
Users need a simple "report" button.
Easy fakes train for easy phish only.
Teaches the follow-on attack.
Whale-phishing targets them first.
Turn near-misses into training.
Score
Answer the questions above to see your score.

AI Privacy Checker

AI Privacy Checker

GDPR/CCPA risks for any LLM use case.

Privacy: answers stay in your browser. We do not record your responses.
GDPR Article 6 requirement.
Transparency requirement.
High-stakes decisions need human review.
Users can ask what AI knows about them.
People need to know.
GDPR storage limitation.
Data Protection Impact Assessment — required for high-risk uses.
CCPA / some-state laws.
If vendor is non-EU.
Opt-in, never opt-out for training.
Score
Answer the questions above to see your score.

AI Vendor Risk Checker

AI Vendor Risk Checker

Vendor-AI questionnaire (data residency, training, retention).

Privacy: answers stay in your browser. We do not record your responses.
Enterprise OpenAI, Anthropic, and Azure OpenAI all have this.
Shorter retention = smaller breach blast radius.
Baseline for enterprise use.
Required for EU / HIPAA / CCPA contexts.
Needed in finance / health / gov.
Jurisdictional compliance.
Detect anomalies / privilege escalation.
For the most-regulated verticals.
< 72 hours is modern standard.
Your data may touch their vendors too.
Signals the financial responsibility.
Avoid vendor lock-in.
Score
Answer the questions above to see your score.

AI Usage Risk Scanner

AI Usage Risk Scanner

Risk score for any AI workflow against common pitfalls.

Privacy: answers stay in your browser. We do not record your responses.
If yes, special care needed.
Replace emails / SSNs with placeholders.
Check the DPA / enterprise terms.
Regulators + lawyers will ask.
Never ship hallucinations unreviewed.
Untrusted content = untrusted input.
Circuit breaker against runaway bills.
Guardrails before side-effects.
Jurisdiction matters for compliance.
You want this the day a bug or incident appears.
Score
Answer the questions above to see your score.

Shadow AI Detector

Shadow AI Detector

Find where unauthorized AI is in use across your org.

Privacy: answers stay in your browser. We do not record your responses.
You can't police what you haven't defined.
SSO visibility = shadow-AI detection.
Browser extensions are the #1 shadow AI vector.
Most data leaks happen via paste.
Training reduces incidents 50%+.
An AI agent shouldn't have DBA access.
Unexpected AI bills = shadow usage.
Network-level signals reveal shadow AI fastest.
People know what they use — ask them.
Prevents hallucinated claims from shipping.
Score
Answer the questions above to see your score.

IoT Device Risk Checker

IoT Device Risk Checker

10-question audit for doorbells, plugs, locks, cameras.

Privacy: answers stay in your browser. We do not record your responses.
#1 IoT botnet recruitment path.
Old firmware = known CVEs.
One compromised doorbell should not see your banking tabs.
Most brands support it — turn it on.
Abandoned no-name brands are a ticking clock.
Many IoT apps grab permissions they do not need.
Reduce attack surface to what's actually needed.
Look up the model number before buying.
For cameras especially — simple off switch.
Data portability matters if the brand dies.
Score
Answer the questions above to see your score.