Yesterday, I gave a presentation to a group of insurance producers and marketers. We reviewed technology insurance trends, how to present the need for coverage, and common mistakes on applications. If you’ve ever attended one of my events, then you’ll … Read More
Blog & Articles
The mice will play…
As I write this, the team is cleaning up a ransomware event for a client. The ransom started at 5 bitcoin ($12,760 as of today) and we negotiated down to 3 BTC. The downtime for the client cost much more … Read More
Real Estate Professionals: Tech Security Workshop
You are an Excellent Target SANS recently issued a warning to real estate professionals related to business email hacking. Rocker works with Realtors, brokers, associations, and title companies to reduce risk during day to day business. If you would like … Read More
IDShield: Rocker’s New Service
Identity monitoring is one of the services I’m asked about most. Should you buy it? Do you need it? Is it worth it? Rocker is building a few products and services based on feedback from our clients, friends, and attendees … Read More
Password Managers: A Walk Through
This video will walk you through why many of the common password rules are unnecessary and how to use a password manager to simplify your life.
Employee Off-Boarding Template
When I begin a risk assessment, I ask for a series of documents. One of these is an employee off-boarding document. Most small and mid-size companies do not have one of these in my experience. But, they should. You’ll be … Read More
Dropbox and Google Docs Phishing
Learn how to avoid this phishing scam.
Event: CLE sessions in Lexington KY
On June 21, 2016, Bill Dotson of Rocker Risk will speak at two CLE sessions during the Fayette County Bar Association’s Annual Bench and Bar event. Session one, Keep Your Law Office from Being Hacked, focuses on protection related to … Read More
What is phishing and how can I tell if someone is scamming me?
Recently, we gave a short presentation on phishing and how to detect it. This video gives examples and instructions about how to deal with phishing messages.
Managing Risk with Network Connected Medical Devices
A recent Bloomberg article titled, “It’s Way Too Easy to Hack the Hospital“, by Monte Reel and Jordan Robertson provides a scary glimpse into the ease of a malicious attacker’s ability to gain access to health data, access drugs, and … Read More