According to the World Economic Forum’s 2022 Global Risks Report, 95% of cybersecurity issues can be linked to human error. Google says that 9 out of 10 cyber incidents begin with a phishing...
Cyber Risk
Operational Technology – everything you need to know
The core role of operational technology is the use of hardware and software to monitor, control and manage industrial operations, including the equipment and the processes they use. The term...
Best practices for securing used and unused ports (II/II)
In this second blog post on port security, we’ll jump directly into best practices. If you need to go back to the basics, please read: Port Security and Why It Is Important (I/II). A network...
Port Security and Why It Is Important (I/II)
In this first blog about port security, we will go over the basics of what are ports and why it’s important to secure them. If you’re already well-versed in the concept of port, jump to our second...
Your information is on the dark web, now what?
The dark web has become known as a place where cybercriminals resell stolen sensitive information, including emails, usernames, passwords, financial information, etc. If you find your information on...
How to secure your web browser (Google Chrome, Microsoft Edge, Firefox)
There are several great reasons to consistently update your web browser to the most recent version, such as having faster running browsers and additional features. However, the most important reason...
Thoughts on Cyber Threats in Light of Ukraine-Russia Situation
U.S. intelligence is anticipating cyber attacks against U.S.-based organizations due to sanctions resulting from the Ukraine-Russia conflict. The CISA advisory believes organizations of all sizes...
Ransomware Best Practices for 2022
The ransomware epidemic last year was one for the ages, and it’s not over yet. This cybersecurity attack vector took no prisoners and targeted a wide range of victims from individuals, governments,...
Log4j vulnerability: How to use the Crowdstrike Active Scan Tool (CAST)
The recently discovered Log4j vulnerabilities have serious potential to expose organizations across the globe to a new wave of cybersecurity risks. Bad actors can exploit this vulnerability by...
Why did Log4j cause the Internet’s fire alarm to go off?
Understanding the Log4j Vulnerability Over the last week IT administrators, security professionals, C-Suites, and government entities have been scrambling to respond to a cybersecurity vulnerability...
Cowbell Blog
Grow your cyber IQ with our insights into cyber insurance, cyber risk, and cyber security.