Skip to content
temp logo
Search
  • Home
  • Blog
  • About Cloak & Cyber

Posts by cloakncyber

link to Do I Need a Virtual CISO (vCISO)?

Do I Need a Virtual CISO (vCISO)?

The virtual chief information officer (vCISO) is a new term for an old offering within the cyber security consulting field: executive level cyber security expertise and advise. Do you need that level...

Continue Reading
link to How Much of a Cybersecurity Threat are Employees?

How Much of a Cybersecurity Threat are Employees?

Having concern about an insider threat doesn't mean there is one, and not having concern doesn't mean there isn't. The question, like any question about risk prior to taking informed action, is "how...

Continue Reading
link to How to Choose a Cybersecurity Consultant?

How to Choose a Cybersecurity Consultant?

Choosing a consultant can seem like an overwhelming task. Throw in the "cybersecurity" concept and then it can get downright mystical. This article aims to help the reader select a good consultant...

Continue Reading
link to What to do When Employees Violate Security Policies?

What to do When Employees Violate Security Policies?

Handling a cybersecurity policy violator is often one of the more difficult decisions in security. Go too easy and it sends a message of lax security. Go too hard and it can create resentment and an...

Continue Reading
link to How to Check if an Email is Phishing?

How to Check if an Email is Phishing?

Most people and small business have little along the way of phishing countermeasures. They must rely on wit and whatever meager technology their ISP or email hosting provider provides. What separates...

Continue Reading
link to Does Cyber Compliance Mean Cyber Security?

Does Cyber Compliance Mean Cyber Security?

Compliance is important given the potential financial weight resulting from incompliance, however it is important to understand the difference between security compliant and being secure. Cyber...

Continue Reading
Page 1 Page 2 Page 3 NEXT »

About the Author

Recent Posts

  • Do I Need a Virtual CISO (vCISO)?
  • How Much of a Cybersecurity Threat are Employees?
  • How to Choose a Cybersecurity Consultant?
  • What to do When Employees Violate Security Policies?
  • How to Check if an Email is Phishing?

Article Categories

  • Cyber Consultation
  • Cyber Risk
  • Cyber Strategy
  • General Info
  • Guide
  • Hacker Methods
  • MSSP
  • Phishing
  • Security Assessment

Article Tags

attack surface analysis Blue Team Breach Sim budget compliance consultant data value hackers insider threat MSSP OSINT Penetration Test penetration testing phishing Purple Team Red Team risk matrix Security Assessment security policy vCISO Vulnerability vulnerability scanning

© 2025 Copyright Cloak & Cyber