How Fortify5 Works
Get a complete picture of your cybersecurity posture with our privacy-first, zone-based assessment system that creates personalized action plans tailored to your specific threat profile.
Risk Profile
Start with a quick 5-question threat assessment to determine your recommended security zone (1-4) based on your specific risk factors.
Security Assessment
Complete Phase 1 (30 questions) for quick results or continue to Phase 2 (45 more) for comprehensive analysis across five security categories.
Zone Alignment
See how your current security zone compares to your recommended zone, with clear indicators if you're below, aligned, or exceeding recommendations.
Action Plan
Receive prioritized recommendations organized by criticality (Critical/High/Medium/Low) with specific tools and implementation timelines.
Zone-Based Security Framework
🎯 Four Security Zones
Zone 1: Essential (50-65%)
Basic security for simple digital lives with low exposure
Zone 2: Balanced (65-75%)
Standard protection for moderate complexity and assets
Zone 3: Enhanced (75-85%)
Advanced security for elevated risks and visibility
Zone 4: Maximum (85-100%)
Comprehensive protection for critical assets
📊 Zone Alignment
Your assessment compares your current security zone with your recommended zone based on your risk profile:
- ✅ Aligned: Your security matches your risk level
- ⚠️ Below Target: You need to improve security
- 🔝 Above Target: You exceed recommendations
Note: Being above target is fine if sustainable, but consider if the added complexity is worth the extra protection for your specific situation.
Five Security Categories
Personal Security
Individual-focused security practices including passwords, devices, and personal data protection.
Financial Security
Banking security, transaction verification, fraud prevention, and financial account protection.
Professional Security
Work-related security, business data protection, and professional communication security.
Family Security
Household network security, family member education, and shared resource protection.
Physical Security
Device physical protection, secure disposal, travel security, and environmental safeguards.
Privacy-First Design
🔒 Your Data Stays Private
- All processing happens in your browser
- No answers sent to external servers
- Results stored only on your device
- PDF generated locally in your browser
🎯 Personalized Recommendations
- Action items based on your specific gaps
- Prioritized by impact and effort level
- Specific tools and resources included
- Progressive 30-60-90 day timeline
Export & Import Your Assessment
📥 Import Assessment
Save time by importing a previous assessment or share assessments between devices securely.
- Upload JSON files from previous assessments
- Resume incomplete assessments
- Compare progress over time
📤 Export Options
Multiple export formats for different use cases, all processed locally in your browser.
- JSON: Complete assessment data for backup or import
- Markdown: Enhanced AI-optimized report with question IDs, full text, and answers
- PDF: Detailed report with Q&A analysis for documentation
Note: All export and import operations are performed locally. Your assessment data never leaves your device.
Reassessment Options
🔄 Update Your Assessment
When you're ready to reassess your security posture, you have three flexible options to choose from:
Reassess Risk Profile
Update only your threat assessment to adjust your target security zone.
- • Keeps assessment answers
- • Updates target zone
- • 5 questions only
Redo Security Assessment
Start the assessment fresh while keeping your current risk profile.
- • Keeps risk profile
- • Clears all answers
- • 30-75 questions
Start Completely Fresh
Begin from the beginning with both risk profile and assessment.
- • Clears everything
- • New risk profile
- • Full reassessment
Tip: Click the "Reassess Profile" button on your results page to access these options through a convenient modal dialog.
Using AI Assistants with Your Results
🤖 Get Personalized Security Advice
Export your assessment as Markdown to get personalized cybersecurity guidance from AI assistants like ChatGPT, Claude, or Gemini.
Quick How-To:
- 1. Complete the assessment and view your results
- 2. Click "Export to Markdown" or "Copy Markdown with Q&A"
- 3. Paste the markdown into your favorite AI assistant
- 4. Ask for specific guidance based on your weak areas
Enhanced Markdown Features:
- • Question IDs: Traceable references (e.g., [q4], [q16]) for precise follow-ups
- • Full Context: Complete question text and your selected answers
- • Zone Analysis: Current vs. target zone with gap assessment
- • Threat Profile: Your complete risk assessment included
- • ISO Timestamps: Precise assessment date and time tracking
- • Score Coherence: Clear explanation of scoring methodology
Sample AI Prompts:
- • "What are my top 3 security priorities?"
- • "Create a 30-day implementation plan"
- • "Recommend specific tools for my gaps"
- • "Explain the risks I'm currently facing"
AI Will Ask About:
- • Your devices and operating systems
- • Budget preferences (free vs. paid tools)
- • Time availability for implementation
- • Technical skill level and support needs
Privacy Tip: When sharing with AI assistants, use reputable services with strong privacy policies. The markdown export includes question IDs for reference but avoids exposing sensitive personal details.
Professional Print Reports
📄 Comprehensive PDF Documentation
Generate detailed PDF reports directly from your browser with enhanced analysis and formatting.
Report Sections:
- Executive summary with zone alignment
- Category scores with visual indicators
- Detailed Q&A analysis with your responses
- Prioritized action plans with timelines
New Features:
- Question-by-question breakdown with answers
- Color-coded risk indicators per category
- Zone gap analysis and recommendations
- Print-optimized formatting and layout
Note: PDF generation happens entirely in your browser using print functionality. No external services or data transmission required.
Ready to Fortify Your Security?
Take the assessment now and get your personalized cybersecurity action plan in just 5 minutes.