The dark web has become known as a place where cybercriminals resell stolen sensitive information, including emails, usernames, passwords, financial information, etc. If you find your information on...
Cyber Risk
How to secure your web browser (Google Chrome, Microsoft Edge, Firefox)
There are several great reasons to consistently update your web browser to the most recent version, such as having faster running browsers and additional features. However, the most important reason...
Thoughts on Cyber Threats in Light of Ukraine-Russia Situation
U.S. intelligence is anticipating cyber attacks against U.S.-based organizations due to sanctions resulting from the Ukraine-Russia conflict. The CISA advisory believes organizations of all sizes...
Ransomware Best Practices for 2022
The ransomware epidemic last year was one for the ages, and it’s not over yet. This cybersecurity attack vector took no prisoners and targeted a wide range of victims from individuals, governments,...
Log4j vulnerability: How to use the Crowdstrike Active Scan Tool (CAST)
The recently discovered Log4j vulnerabilities have serious potential to expose organizations across the globe to a new wave of cybersecurity risks. Bad actors can exploit this vulnerability by...
Why did Log4j cause the Internet’s fire alarm to go off?
Understanding the Log4j Vulnerability Over the last week IT administrators, security professionals, C-Suites, and government entities have been scrambling to respond to a cybersecurity vulnerability...
From the Risk Engineering Team: Wishing for Less Phishing
This holiday season we’re wishing for less phishing. As the holidays approach it is important for organizations to stay sharp and keep their employees alert for phishing attacks. The FBI reports...
Cowbell Blog
Grow your cyber IQ with our insights into cyber insurance, cyber risk, and cyber security.