Next Steps: Get to an A, stay an A
1. Create an account
If you can read this, you’ve already created an account. Well done!
2. Validate your Digital Footprint
Once you have an account, review your company’s Digital Footprint, the assets SecurityScorecard found as potentially attributable to your company that affect the ratings in your Scorecard. Request removal or addition of IPs as needed.
3. Review your issue findings
It is highly recommended to validate your Digital Footprint before reviewing issues. When
you’re ready to review your Scorecard issues, you can investigate the contents of your Scorecard. Invite your teammates as needed to help you review your company Scorecard. It’s a win for your company’s security posture when you identify loose ends of which you weren’t aware.
4. Remediate issues, improve your score
Whether you’ve deployed a fix, found assets that don’t belong to your company, or want to share information about compensating controls, you can let us know by remediating the identified finding(s) and submitting them for resolution approval.
Resolutions are handled by our Support team, which will resolve any outstanding item within three business days. Remediate issues within the platform or email email@example.com.
Related article: Create a score improvement plan with Score Planner
We’re here to help
The SecurityScorecard platform is based on transparency and collaboration. Our Customer Reliability Support team provides remediation and resolution services at no charge and are happy to work with you and your customers to resolve any issues.
If you need assistance at any stage, get in touch by emailing firstname.lastname@example.org.
SecurityScorecard is a security ratings service that rates companies on their overall security using an easy-to-understand A-F grading system. A company with a C, D, or F rating is 5.4 times more likely to suffer a consequential breach versus A or B-rated companies [^1].
Learn more about SecurityScorecard’s rating system here.
[^1] New SecurityScorecard Research Can Help You Detect a Data Breach Before It Happens’ - Source