How Fortify5 Works

Get a complete picture of your cybersecurity posture with our privacy-first, zone-based assessment system that creates personalized action plans tailored to your specific threat profile.

1

Risk Profile

Start with a quick 5-question threat assessment to determine your recommended security zone (1-4) based on your specific risk factors.

2

Security Assessment

Complete Phase 1 (30 questions) for quick results or continue to Phase 2 (45 more) for comprehensive analysis across five security categories.

3

Zone Alignment

See how your current security zone compares to your recommended zone, with clear indicators if you're below, aligned, or exceeding recommendations.

4

Action Plan

Receive prioritized recommendations organized by criticality (Critical/High/Medium/Low) with specific tools and implementation timelines.

Zone-Based Security Framework

🎯 Four Security Zones

Zone 1: Essential (50-65%)

Basic security for simple digital lives with low exposure

Zone 2: Balanced (65-75%)

Standard protection for moderate complexity and assets

Zone 3: Enhanced (75-85%)

Advanced security for elevated risks and visibility

Zone 4: Maximum (85-100%)

Comprehensive protection for critical assets

📊 Zone Alignment

Your assessment compares your current security zone with your recommended zone based on your risk profile:

  • Aligned: Your security matches your risk level
  • ⚠️ Below Target: You need to improve security
  • 🔝 Above Target: You exceed recommendations

Note: Being above target is fine if sustainable, but consider if the added complexity is worth the extra protection for your specific situation.

Five Security Categories

Personal Security

Individual-focused security practices including passwords, devices, and personal data protection.

Financial Security

Banking security, transaction verification, fraud prevention, and financial account protection.

Professional Security

Work-related security, business data protection, and professional communication security.

Family Security

Household network security, family member education, and shared resource protection.

Physical Security

Device physical protection, secure disposal, travel security, and environmental safeguards.

Privacy-First Design

🔒 Your Data Stays Private

  • All processing happens in your browser
  • No answers sent to external servers
  • Results stored only on your device
  • PDF generated locally in your browser

🎯 Personalized Recommendations

  • Action items based on your specific gaps
  • Prioritized by impact and effort level
  • Specific tools and resources included
  • Progressive 30-60-90 day timeline

Export & Import Your Assessment

📥 Import Assessment

Save time by importing a previous assessment or share assessments between devices securely.

  • Upload JSON files from previous assessments
  • Resume incomplete assessments
  • Compare progress over time

📤 Export Options

Multiple export formats for different use cases, all processed locally in your browser.

  • JSON: Complete assessment data for backup or import
  • Markdown: Enhanced AI-optimized report with question IDs, full text, and answers
  • PDF: Detailed report with Q&A analysis for documentation

Note: All export and import operations are performed locally. Your assessment data never leaves your device.

Reassessment Options

🔄 Update Your Assessment

When you're ready to reassess your security posture, you have three flexible options to choose from:

Reassess Risk Profile

Update only your threat assessment to adjust your target security zone.

  • • Keeps assessment answers
  • • Updates target zone
  • • 5 questions only

Redo Security Assessment

Start the assessment fresh while keeping your current risk profile.

  • • Keeps risk profile
  • • Clears all answers
  • • 30-75 questions

Start Completely Fresh

Begin from the beginning with both risk profile and assessment.

  • • Clears everything
  • • New risk profile
  • • Full reassessment

Tip: Click the "Reassess Profile" button on your results page to access these options through a convenient modal dialog.

Using AI Assistants with Your Results

🤖 Get Personalized Security Advice

Export your assessment as Markdown to get personalized cybersecurity guidance from AI assistants like ChatGPT, Claude, or Gemini.

Quick How-To:

  1. 1. Complete the assessment and view your results
  2. 2. Click "Export to Markdown" or "Copy Markdown with Q&A"
  3. 3. Paste the markdown into your favorite AI assistant
  4. 4. Ask for specific guidance based on your weak areas

Enhanced Markdown Features:

  • Question IDs: Traceable references (e.g., [q4], [q16]) for precise follow-ups
  • Full Context: Complete question text and your selected answers
  • Zone Analysis: Current vs. target zone with gap assessment
  • Threat Profile: Your complete risk assessment included
  • ISO Timestamps: Precise assessment date and time tracking
  • Score Coherence: Clear explanation of scoring methodology

Sample AI Prompts:

  • • "What are my top 3 security priorities?"
  • • "Create a 30-day implementation plan"
  • • "Recommend specific tools for my gaps"
  • • "Explain the risks I'm currently facing"

AI Will Ask About:

  • • Your devices and operating systems
  • • Budget preferences (free vs. paid tools)
  • • Time availability for implementation
  • • Technical skill level and support needs

Privacy Tip: When sharing with AI assistants, use reputable services with strong privacy policies. The markdown export includes question IDs for reference but avoids exposing sensitive personal details.

Professional Print Reports

📄 Comprehensive PDF Documentation

Generate detailed PDF reports directly from your browser with enhanced analysis and formatting.

Report Sections:

  • Executive summary with zone alignment
  • Category scores with visual indicators
  • Detailed Q&A analysis with your responses
  • Prioritized action plans with timelines

New Features:

  • Question-by-question breakdown with answers
  • Color-coded risk indicators per category
  • Zone gap analysis and recommendations
  • Print-optimized formatting and layout

Note: PDF generation happens entirely in your browser using print functionality. No external services or data transmission required.

Ready to Fortify Your Security?

Take the assessment now and get your personalized cybersecurity action plan in just 5 minutes.