Cyber security Archives - Cyberlock Defense

A Playbook for Cyber Business Interruption

If the technology your business depends on goes down, how do you respond? The effects of an extended cyber business interruption can be far-reaching. An immediate financial impact is often felt, but long-term business viability and competitiveness are also at risk. With such high stakes, It’s important to have a plan. Here’s what to know, [...]

By | March 24th, 2026|Cyber insurance, Cyber security, Cyber threats, Risk management|Comments Off on A Playbook for Cyber Business Interruption

Increasing Cyber Attacks against Small Businesses

Originally published January 25th, 2021. Last updated January 12, 2026. Cyber attacks against small businesses are increasing each year. Whether you are answering email, storing data files or running a website, your small business faces risks from doing business online. Most recently, hackers have been focused on stealing money directly from small businesses. Some cyber [...]

AI Risk Management for Small Business

Artificial intelligence has taken off over the last several years, with a promise to potentially reshape the way people live and work. With the AI revolution, comes opportunities for businesses and others to benefit from cost savings and streamline their key processes. But AI also carries risks, many of which are still unknown or evolving, [...]

By | December 12th, 2025|Cyber insurance, Cyber security, Cyber threats, Industry news, Risk management|Comments Off on AI Risk Management for Small Business

What Is Pen Testing and Why Might You Need It?

Pen testing is a common type of cybersecurity exercise companies can use to help find and fix vulnerabilities and even train their workers. Think of it like a “pop quiz” for your business, testing out whether you are as ready for a cybersecurity incident as you think you are. It lets you put your company, [...]

By | May 28th, 2025|Cyber insurance, Cyber security, Risk management|Comments Off on What Is Pen Testing and Why Might You Need It?

Emerging Threats: Cybercrime as a Service

While the dollar doesn’t go as far as it used to, cybercrime mayhem is surprisingly cheap — as little as $5 a hack. This sort of attack has been dubbed "cybercrime as a service." It’s an emerging cybersecurity threat that involves a hacker being hired on the dark web by a third party to hack [...]

By | March 28th, 2025|Cyber insurance, Cyber security, Cyber threats, Cybercrime|Comments Off on Emerging Threats: Cybercrime as a Service

Cybersecurity 101: What Is Ransomware?

Ransomware is a top threat for business, accounting for a high percentage of cyber attacks. Yet more than half of organizations may be underprepared. For non-technical professionals, questions abound. Since incidents vary so much from one attack to the next, many aren’t sure of their risks or what to do about them. Here’s what you [...]

By | January 17th, 2025|Cyber insurance, Cyber security, Cyber threats|Comments Off on Cybersecurity 101: What Is Ransomware?

Mobile Device Security Guide

At CyberLock Defense, we maintain a vast network of relationships in the cybersecurity space to help businesses like yours minimize the risk of a cybersecurity incident. Recently, 360 Privacy, a partner of our Lockton Cyber and Technology Practice, released a series of mobile device security guides to help business leaders on the go minimize their [...]

By | March 29th, 2024|Cyber security|0 Comments

A Look at Passwordless Authentication

Studies show many people can be tricked into revealing their password, but a new technology called passwordless authentication may make accounts safer and passwords obsolete. If you’ve ever unlocked your phone with your face, logged into your laptop with your fingerprint or hopped on a work terminal with a key fob, you’ve used passwordless authentication. [...]

By | February 8th, 2023|Cyber security, Industry news|0 Comments

All About Social Engineering in Cyber Crime

Whenever the topic of cyber crime comes up, leaders at organizations everywhere often have one question: How do fraudsters and hackers convince so many people to hand over their passwords? The simple answer is social engineering. People are social by nature, with a decision-making process that’s highly responsive to the people around them. Some cyber [...]

By | December 8th, 2022|Cyber security, Industry news|0 Comments

Ransomware Manufacturing Threat: How Cybercrime Is Targeting the Manufacturing Industry

The manufacturing industry isn’t known for having lots of rich clients or daily high-dollar transactions, so it may seem odd that criminals would be targeting plants and factories across the country. But increasingly, that’s what’s happening. The rate at which cybercriminals are targeting the manufacturing industry now tops the rates for industries like finance, business, [...]

By | October 12th, 2022|Cyber security, Industry news|0 Comments