The following is adapted from Fire Doesn’t Innovate. Ransomware is one of the nastiest types of cyberattacks. When ransomware infects your computer, its first directive is to encrypt all of…
The following is adapted from Fire Doesn’t Innovate. We all know people whose definition of password security is writing their password on a Post-It Note and slapping it on the…

The following is adapted from Fire Doesn’t Innovate. Two-factor authentication has become more important as the level of cyberattacks continues to rise. Every time a company you do business with…

The following is adapted from Fire Doesn’t Innovate. For as long as people have had possessions, other people have tried to steal them. Up until recently, if someone wanted to…
The following is adapted from Fire Doesn’t Innovate. The Internet is becoming increasingly dangerous for all Americans due to the activities of organized crime and foreign nation-states. The US government…
The following is adapted from Fire Doesn’t Innovate. It seems like every day we hear news of a well-known company experiencing a data breach. Companies like Yahoo, Target, and Marriott…

Question: Last week, you pointed out that not using local admin accounts for routine computing tasks (e.g., web browsing and emails) was a powerful cyber hygiene practice. I’ve heard that’s…

We’re taking the next few weeks to address some important questions we receive at Cyber Risk Opportunities. If you have questions that you would like answered, please leave them in…

Over the last several weeks, I’ve been talking with a lot of middle market executives in the greater Seattle-area. These folks fit the profile of our potential customers: They’re senior…
2 minute, 30 second read. Welcome back to the CRO blog. Last week we continued our three-part discussion of Federal Trade Commission lawsuits and complaints. This week we’re diving into…