Skip to content
temp logo
Search
  • Home
  • Blog
  • About Cloak & Cyber

Posts by cloakncyber

Does a Small Business Need Cyber Security?

Cyber security is not the first thing a small business thinks about. But all too often, it's the last thing a small business thinks about. Any business with any level of information technology...

Continue Reading
link to How to Protect a Small Business from Hackers

How to Protect a Small Business from Hackers

The Spartan warrior is known for a no-nonsense approach to life: luxury is a waste. A small business (SMB) should take the same Spartan approach to protect itself from attackers. The...

Continue Reading

What are the Most Common Ways Hackers Find Information?

Hackers utilize a variety of methods and techniques to gather information before an attack. Knowing some of the more common methods can help a person or organization better prepare. Social...

Continue Reading
link to Do I Need a Purple Team Assessment?

Do I Need a Purple Team Assessment?

Red Teams. Blue Teams. "Mix" them together and it's a Purple Team. If at least Blue Team operations have reached a certain level of maturity, then the company may be ready for a Purple Team...

Continue Reading

What Vulnerabilities Should I Worry About?

Not all vulnerabilities affect a business the same way across the board. Businesses should have a method for determining which vulnerabilities to worry about. Vulnerabilities with the greatest...

Continue Reading

What are Alternatives to a Penetration Test?

Penetration testing costs can get up there, so smaller companies who still want to know something about their security situation might look, and hope, for reasonable alternatives to the penetration...

Continue Reading
« PREV Page 1 Page 2 Page 3 NEXT »

About the Author

Recent Posts

  • Do I Need a Virtual CISO (vCISO)?
  • How Much of a Cybersecurity Threat are Employees?
  • How to Choose a Cybersecurity Consultant?
  • What to do When Employees Violate Security Policies?
  • How to Check if an Email is Phishing?

Article Categories

  • Cyber Consultation
  • Cyber Risk
  • Cyber Strategy
  • General Info
  • Guide
  • Hacker Methods
  • MSSP
  • Phishing
  • Security Assessment

Article Tags

attack surface analysis Blue Team Breach Sim budget compliance consultant data value hackers insider threat MSSP OSINT Penetration Test penetration testing phishing Purple Team Red Team risk matrix Security Assessment security policy vCISO Vulnerability vulnerability scanning

© 2025 Copyright Cloak & Cyber