Skip to the main content.

Bloggin’!

Turn and face the strange. We have all sorts of helpful posts here to get you leveled up ASAP. From cutting edge changes to best practices, we've got you covered.

What is Double Extortion Ransomware?

Double extortion is an advanced ransomware tactic where attackers not only encrypt a victim's data to demand a ransom for decryption but also steal the data and threaten to...

2 min read

Cybersecurity and Corporate Wellness: A Critical Overlap

Does cybersecurity have anything to do with corporate wellness? Absolutely. Stress and burnout aren’t just personal challenges—they’re security...

2 min read

Where Cyber and Digital Risk Management Sits: Responsibilities and Accountabilities

In today's interconnected business environment, managing cyber and digital risks requires a holistic approach that unites various departments, from...

2 min read

Trend Report: AI-Driven Phishing and Deepfake Threats

AI isn’t just powering innovation—it’s powering threats. From deepfake scams to AI-generated phishing attacks, cybercriminals are using these...

2 min read

Predictions for 2025: What Matters for Your Human Risk Strategy

We love predictions. They’re equal parts art and science, a kaleidoscope of insight, pattern recognition, and a touch of bold speculation. As we dive...

3 min read

Why Measuring Human Risk Success Is So Hard—and How to Do It Right

Measuring success in human risk management is notoriously tricky. Unlike other areas of cybersecurity, where success is defined by stopping breaches...

2 min read

Cyber Risk Management: It’s Not Just About Technology

For years, the default assumption in cybersecurity has been that managing risk is all about technology: firewalls, encryption, and the latest threat...

2 min read

Humans: The Greatest Asset in Cybersecurity

The myth that humans are the weakest link in cybersecurity has persisted for too long. While it’s true that human errors can lead to vulnerabilities,...

2 min read

a game plan drawn on chalkboard

Incident Response:How to Help Employees When Cyber Threats Strike

Imagine your organization's cyber defenses as a well-trained emergency response team. (Work with us here). Just like a strong immune system in a...

3 min read