Skip to content
temp logo
Search
  • Home
  • Blog
  • About Cloak & Cyber

Category: Cyber Risk

link to How Much of a Cybersecurity Threat are Employees?

How Much of a Cybersecurity Threat are Employees?

Having concern about an insider threat doesn't mean there is one, and not having concern doesn't mean there isn't. The question, like any question about risk prior to taking informed action, is "how...

Continue Reading
link to Does Cyber Compliance Mean Cyber Security?

Does Cyber Compliance Mean Cyber Security?

Compliance is important given the potential financial weight resulting from incompliance, however it is important to understand the difference between security compliant and being secure. Cyber...

Continue Reading

Does a Small Business Need Cyber Security?

Cyber security is not the first thing a small business thinks about. But all too often, it's the last thing a small business thinks about. Any business with any level of information technology...

Continue Reading
link to How to Protect a Small Business from Hackers

How to Protect a Small Business from Hackers

The Spartan warrior is known for a no-nonsense approach to life: luxury is a waste. A small business (SMB) should take the same Spartan approach to protect itself from attackers. The...

Continue Reading
link to Why is the Cyber Risk Matrix Bad?

Why is the Cyber Risk Matrix Bad?

Cyber risk matrices are ubiquitous in the cyber security world. They are simple to understand but mask and confound the thing they seek to communicate. The cyber risk matrix forces flawed risk...

Continue Reading

About Cloak & Cyber

Targeting information

Recent Posts

  • Do I Need a Virtual CISO (vCISO)?
  • How Much of a Cybersecurity Threat are Employees?
  • How to Choose a Cybersecurity Consultant?
  • What to do When Employees Violate Security Policies?
  • How to Check if an Email is Phishing?

Article Categories

  • Cyber Consultation
  • Cyber Risk
  • Cyber Strategy
  • General Info
  • Guide
  • Hacker Methods
  • MSSP
  • Phishing
  • Security Assessment

Article Tags

attack surface analysis Blue Team Breach Sim budget compliance consultant data value hackers insider threat MSSP OSINT Penetration Test penetration testing phishing Purple Team Red Team risk matrix Security Assessment security policy vCISO Vulnerability vulnerability scanning

© 2025 Copyright Cloak & Cyber