
The following is adapted from Fire Doesn’t Innovate. Two-factor authentication has become more important as the level of cyberattacks continues to rise. Every time a company you do business with…
The following is adapted from Fire Doesn’t Innovate. Two-factor authentication has become more important as the level of cyberattacks continues to rise. Every time a company you do business with…
The following is adapted from Fire Doesn’t Innovate. For all the ways it’s made our lives better, the Internet has a dark side inhabited by people like the Russian cybercriminal…
The following is adapted from Fire Doesn’t Innovate. It seems like every day we hear news of a well-known company experiencing a data breach. Companies like Yahoo, Target, and Marriott…
Question: Last week, you pointed out that not using local admin accounts for routine computing tasks (e.g., web browsing and emails) was a powerful cyber hygiene practice. I’ve heard that’s…
We’re taking the next few weeks to address some important questions we receive at Cyber Risk Opportunities. If you have questions that you would like answered, please leave them in…
Over the last several weeks, I’ve been talking with a lot of middle market executives in the greater Seattle-area. These folks fit the profile of our potential customers: They’re senior…
Fire, Flood, and Cybersecurity In some respects, cybersecurity is not that different than protecting your building against fire or flood. For instance, if you choose to construct a building on…
An essential function of a cybersecurity program is the management of cyber risk. You’ll manage it on a daily basis as part of the operational functions and projects your team…
Over the next several posts on this blog, I’ll describe how to measure, understand, and manage cyber risks at an executive level. We’ll build on everything that we’ve covered so…
In last week’s blog, we introduced the idea of designing and building your cybersecurity program for risk management and compliance. Let’s continue with some examples. A Data Security Example To…