Why measure cybersecurity?
What is not measured cannot be improved. Applied to cyber security, this means that it is not enough to merely invest in tools: we need to check that they are actually doing their job.
Measuring the level of security brings benefits such as:
- Real visibility of the state of the infrastructure.
- Risk prioritisation to invest where it matters most.
- Regulatory compliance, providing evidence of the implemented measures.
- Continuous improvement: metrics allow you to assess progress over time.
- Building trust with customers, partners and regulators.
Key cybersecurity metrics
Multi-factor authentication (MFA) coverage
MFA (Multi-Factor Authentication) is one of the most effective mechanisms against unauthorised access. This metric measures what percentage of users and critical systems are protected by MFA.
The broader the coverage, the smaller the attack surface against credential theft. In line with this, trusted identity management and proper user verification, such as that provided by Logalty with VeryID, becomes essential.
Control of privileged accounts
Accounts with administrator permissions are the most valuable to an attacker. Measuring how many exist, how many are active, and how many have enhanced access control is critical.
It is good practice for these accounts to be linked to verified identities, with traceable records of every action taken.
Mean Time to Detect (MTTD) and Mean Time to Respond (MTTR)
The MTTD (Mean Time To Detect) measures how long it takes the company to detect a threat. The MTTR (Mean Time To Respond) calculates the time from detection to resolution.
The lower these indicators are, the more resilient the organisation is to cyber-attacks.
Percentage of systems updated
Security patches are the first line of defence against known vulnerabilities. Measuring the percentage of servers, devices and applications that are up to date with their patches is critical.
A high level of obsolescence is an open invitation to cyber-incidents.
Incident rate by type of attack
Recording and classifying incidents allows trends to be identified: phishing, ransomware, unauthorised access, data leaks… This metric helps focus investments on the most vulnerable areas.
Number of unauthorised access attempts
Monitoring failed login attempts or suspicious access provides insight into intrusion attempts. Combined with identity verification systems and real-time alerts, they become a powerful metric for preventing attacks before they materialise. In this regard, Logalty enhances security by verifying identity and generating digital evidence for customer access and transactions, thereby reducing the risk of fraud or impersonation attacks.
Compliance with regulations and audits
Many organisations must comply with standards such as ISO 27001, ENS or GDPR. It is not only essential that the company itself complies with the regulations, but also that the suppliers it works with do so. Therefore, collaborating with a trusted third party such as Logalty ensures compliance with the highest security standards and reinforces the reliability of the entire ecosystem. Measuring the degree of compliance and the number of non-conformities detected in internal or external audits is key to ensuring trust and reputation.
Employee awareness
The human factor remains the biggest risk. A useful metric is the percentage of employees who complete cybersecurity training or successfully pass internal simulated phishing tests.
Logalty’s role: trusted identities and traceability with VeryID
Most of these metrics have one element in common: digital identity. Knowing who gains access, how and with what permissions is the basis for effective cybersecurity.
Logalty can help companies to reinforce cybersecurity both internally and externally by verifying the identity of customers and third parties in order to prevent impersonation fraud and unauthorised access in digital transactions.
Externally, VeryID offers an advanced solution for digital identity management and verification in key processes such as opening bank accounts, obtaining car purchase loans at dealerships… Internally, we offer signing with eIDAS-qualified certificates, which is particularly useful, for example, for signing budgets or for authorisations from senior management.
As a fundamental part of our clients’ core processes, at Logalty we understand that trust and security are essential. Therefore, we have ISO certifications that demonstrate our commitment to the highest quality standards. Each and every one of our processes is tailored to safeguard users’ trust and data protection.
- Trusted proof of identity: video identification and electronic certificates to guarantee that each customer is who they say they are.
- Traceability and custody of evidence: the generation of evidence with qualified time-stamping not only protects against legal disputes, but also adds an additional layer of cybersecurity to the process.
- Regulatory compliance: Logalty helps organisations comply with regulatory frameworks such as GDPR, ENS or PSD2, ensuring that digital processes meet the standards required by regulators.
- Digital trust in customer relations: Cybersecurity is also measured in terms of trust: customers expect their data to be protected and their transactions to be secure. Logalty provides that confidence by acting as an impartial guarantor in every interaction.
In this way, Logalty reinforces cybersecurity for customer and third-party relationships, which are often a primary source of risk in regulated sectors such as banking, insurance, telecommunications, etc. Contact Logalty to find out more.
Cybersecurity is also in how you manage your contracts, service registrations, and digital transactions. If you are an SME, self-employed, or a professional firm, with Logalnet, Logalty’s digital platform, you will have the backing of a trusted third party that provides security and legal validity for every shipment and transaction. Register now and we will give you €10 to try the electronic services for free.


