{"id":5269,"date":"2024-05-08T11:36:48","date_gmt":"2024-05-08T10:36:48","guid":{"rendered":"https:\/\/www.calligo.io\/?page_id=5269"},"modified":"2024-05-22T11:12:58","modified_gmt":"2024-05-22T10:12:58","slug":"cyber-security-assessment","status":"publish","type":"page","link":"https:\/\/www.calligo.io\/cyber-security-assessment\/","title":{"rendered":"Calligo Cybersecurity Risk Assessment"},"content":{"rendered":"\n<iframe style=\"border:0;width:100%;height:100%;min-height:100vh;margin-top:-0.5em;\" src=\"https:\/\/s.pointerpro.com\/calligosecurityrisk\"><\/iframe>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":26,"featured_media":5278,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-5269","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Calligo Cybersecurity Risk Assessment | Calligo<\/title>\n<meta name=\"description\" content=\"The Calligo free online Cybersecurity Assessment tool delivers a personalized risk report upon completion. Following the NIST 2.0 cybersecurity framework, this report identifies gaps in organizational data security, enabling businesses to identify areas of risk, improve security and ultimately protect the business from threats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.calligo.io\/cyber-security-assessment\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Calligo Cybersecurity Risk Assessment | Calligo\" \/>\n<meta property=\"og:description\" content=\"The Calligo free online Cybersecurity Assessment tool delivers a personalized risk report upon completion. Following the NIST 2.0 cybersecurity framework, this report identifies gaps in organizational data security, enabling businesses to identify areas of risk, improve security and ultimately protect the business from threats.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.calligo.io\/cyber-security-assessment\/\" \/>\n<meta property=\"og:site_name\" content=\"Calligo\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-22T10:12:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.calligo.io\/wp-content\/uploads\/2024\/05\/iStock-802190368.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1183\" \/>\n\t<meta property=\"og:image:height\" content=\"887\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@calligocloud\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.calligo.io\/cyber-security-assessment\/\",\"url\":\"https:\/\/www.calligo.io\/cyber-security-assessment\/\",\"name\":\"Calligo Cybersecurity Risk Assessment | Calligo\",\"isPartOf\":{\"@id\":\"https:\/\/www.calligo.io\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.calligo.io\/cyber-security-assessment\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.calligo.io\/cyber-security-assessment\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.calligo.io\/wp-content\/uploads\/2024\/05\/iStock-802190368.jpg\",\"datePublished\":\"2024-05-08T10:36:48+00:00\",\"dateModified\":\"2024-05-22T10:12:58+00:00\",\"description\":\"The Calligo free online Cybersecurity Assessment tool delivers a personalized risk report upon completion. Following the NIST 2.0 cybersecurity framework, this report identifies gaps in organizational data security, enabling businesses to identify areas of risk, improve security and ultimately protect the business from threats.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.calligo.io\/cyber-security-assessment\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.calligo.io\/cyber-security-assessment\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.calligo.io\/cyber-security-assessment\/#primaryimage\",\"url\":\"https:\/\/www.calligo.io\/wp-content\/uploads\/2024\/05\/iStock-802190368.jpg\",\"contentUrl\":\"https:\/\/www.calligo.io\/wp-content\/uploads\/2024\/05\/iStock-802190368.jpg\",\"width\":1183,\"height\":887,\"caption\":\"Digital security concept 3d\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.calligo.io\/cyber-security-assessment\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.calligo.io\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Calligo Cybersecurity Risk Assessment\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.calligo.io\/#website\",\"url\":\"https:\/\/www.calligo.io\/\",\"name\":\"Calligo\",\"description\":\"Building value through data\",\"publisher\":{\"@id\":\"https:\/\/www.calligo.io\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.calligo.io\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.calligo.io\/#organization\",\"name\":\"Calligo\",\"url\":\"https:\/\/www.calligo.io\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.calligo.io\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.calligo.io\/wp-content\/uploads\/2023\/04\/calligo-og.jpg\",\"contentUrl\":\"https:\/\/www.calligo.io\/wp-content\/uploads\/2023\/04\/calligo-og.jpg\",\"width\":1200,\"height\":630,\"caption\":\"Calligo\"},\"image\":{\"@id\":\"https:\/\/www.calligo.io\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/calligocloud\",\"https:\/\/www.linkedin.com\/company\/calligo-limited\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Calligo Cybersecurity Risk Assessment | Calligo","description":"The Calligo free online Cybersecurity Assessment tool delivers a personalized risk report upon completion. Following the NIST 2.0 cybersecurity framework, this report identifies gaps in organizational data security, enabling businesses to identify areas of risk, improve security and ultimately protect the business from threats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.calligo.io\/cyber-security-assessment\/","og_locale":"en_GB","og_type":"article","og_title":"Calligo Cybersecurity Risk Assessment | Calligo","og_description":"The Calligo free online Cybersecurity Assessment tool delivers a personalized risk report upon completion. Following the NIST 2.0 cybersecurity framework, this report identifies gaps in organizational data security, enabling businesses to identify areas of risk, improve security and ultimately protect the business from threats.","og_url":"https:\/\/www.calligo.io\/cyber-security-assessment\/","og_site_name":"Calligo","article_modified_time":"2024-05-22T10:12:58+00:00","og_image":[{"width":1183,"height":887,"url":"https:\/\/www.calligo.io\/wp-content\/uploads\/2024\/05\/iStock-802190368.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@calligocloud","twitter_misc":{"Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.calligo.io\/cyber-security-assessment\/","url":"https:\/\/www.calligo.io\/cyber-security-assessment\/","name":"Calligo Cybersecurity Risk Assessment | Calligo","isPartOf":{"@id":"https:\/\/www.calligo.io\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.calligo.io\/cyber-security-assessment\/#primaryimage"},"image":{"@id":"https:\/\/www.calligo.io\/cyber-security-assessment\/#primaryimage"},"thumbnailUrl":"https:\/\/www.calligo.io\/wp-content\/uploads\/2024\/05\/iStock-802190368.jpg","datePublished":"2024-05-08T10:36:48+00:00","dateModified":"2024-05-22T10:12:58+00:00","description":"The Calligo free online Cybersecurity Assessment tool delivers a personalized risk report upon completion. Following the NIST 2.0 cybersecurity framework, this report identifies gaps in organizational data security, enabling businesses to identify areas of risk, improve security and ultimately protect the business from threats.","breadcrumb":{"@id":"https:\/\/www.calligo.io\/cyber-security-assessment\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.calligo.io\/cyber-security-assessment\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.calligo.io\/cyber-security-assessment\/#primaryimage","url":"https:\/\/www.calligo.io\/wp-content\/uploads\/2024\/05\/iStock-802190368.jpg","contentUrl":"https:\/\/www.calligo.io\/wp-content\/uploads\/2024\/05\/iStock-802190368.jpg","width":1183,"height":887,"caption":"Digital security concept 3d"},{"@type":"BreadcrumbList","@id":"https:\/\/www.calligo.io\/cyber-security-assessment\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.calligo.io\/"},{"@type":"ListItem","position":2,"name":"Calligo Cybersecurity Risk Assessment"}]},{"@type":"WebSite","@id":"https:\/\/www.calligo.io\/#website","url":"https:\/\/www.calligo.io\/","name":"Calligo","description":"Building value through data","publisher":{"@id":"https:\/\/www.calligo.io\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.calligo.io\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.calligo.io\/#organization","name":"Calligo","url":"https:\/\/www.calligo.io\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.calligo.io\/#\/schema\/logo\/image\/","url":"https:\/\/www.calligo.io\/wp-content\/uploads\/2023\/04\/calligo-og.jpg","contentUrl":"https:\/\/www.calligo.io\/wp-content\/uploads\/2023\/04\/calligo-og.jpg","width":1200,"height":630,"caption":"Calligo"},"image":{"@id":"https:\/\/www.calligo.io\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/calligocloud","https:\/\/www.linkedin.com\/company\/calligo-limited\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.calligo.io\/wp-json\/wp\/v2\/pages\/5269","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.calligo.io\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.calligo.io\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.calligo.io\/wp-json\/wp\/v2\/users\/26"}],"replies":[{"embeddable":true,"href":"https:\/\/www.calligo.io\/wp-json\/wp\/v2\/comments?post=5269"}],"version-history":[{"count":0,"href":"https:\/\/www.calligo.io\/wp-json\/wp\/v2\/pages\/5269\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.calligo.io\/wp-json\/wp\/v2\/media\/5278"}],"wp:attachment":[{"href":"https:\/\/www.calligo.io\/wp-json\/wp\/v2\/media?parent=5269"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}