Two Security & Privacy Choices to Make Today

Yesterday, I gave a presentation to a group of insurance producers and marketers. We reviewed technology insurance trends, how to present the need for coverage, and common mistakes on applications. If you’ve ever attended one of my events, then you’ll … Read More

The mice will play…

As I write this, the team is cleaning up a ransomware event for a client. The ransom started at 5 bitcoin ($12,760 as of today) and we negotiated down to 3 BTC. The downtime for the client cost much more … Read More

Real Estate Professionals: Tech Security Workshop

You are an Excellent Target SANS recently issued a warning to real estate professionals related to business email hacking. Rocker works with Realtors, brokers, associations, and title companies to reduce risk during day to day business. If you would like … Read More

IDShield: Rocker’s New Service

Identity monitoring is one of the services I’m asked about most. Should you buy it? Do you need it? Is it worth it? Rocker is building a few products and services based on feedback from our clients, friends, and attendees … Read More

Password Managers: A Walk Through

This video will walk you through why many of the common password rules are unnecessary and how to use a password manager to simplify your life.

Employee Off-Boarding Template

When I begin a risk assessment, I ask for a series of documents. One of these is an employee off-boarding document. Most small and mid-size companies do not have one of these in my experience. But, they should. You’ll be … Read More

Dropbox and Google Docs Phishing

Learn how to avoid this phishing scam.

Event: CLE sessions in Lexington KY

On June 21, 2016, Bill Dotson of Rocker Risk will speak at two CLE sessions during the Fayette County Bar Association’s Annual Bench and Bar event. Session one, Keep Your Law Office from Being Hacked, focuses on protection related to … Read More

What is phishing and how can I tell if someone is scamming me?

Recently, we gave a short presentation on phishing and how to detect it. This video gives examples and instructions about how to deal with phishing messages.

Managing Risk with Network Connected Medical Devices

A recent Bloomberg article titled, “It’s Way Too Easy to Hack the Hospital“, by Monte Reel and Jordan Robertson provides a scary glimpse into the ease of a malicious attacker’s ability to gain access to health data, access drugs, and … Read More