Ransomware demands surged 47% last year. See how businesses fought back.
Skip To Main Content
Cyber Incident? Get Help
Blog homeCyber InsuranceSecurityExecutive RisksBroker EducationLife at Coalition

July Risk Roundup: Cloudy with a chance of outdated equipment

Person > Aaron Kraus
Aaron KrausJuly 16, 2021
Share:
Featured Image for July Risk Roundup: Cloudy with a chance of outdated equipment

Everyone enjoys the opportunity to be creative, and there’s no reason managing your IT environment can’t be as creative as that Tweet you’ve spent all morning crafting. Staying on top of your systems, be it patching, upgrades, or ensuring proper management of your cloud infrastructure (while avoiding shadow IT) should be fun — and a little creative.

1. Hubble, Hubble, toil and trouble

Old, outdated, unsupported equipment is a security risk; availability is a core security concern. Attackers can exploit vulnerabilities, and repairing or replacing old systems may be impossible (though most of us can get to our systems a little easier).

 Hubble, Hubble, toil and trouble

View tweet here

2. Protecting your business against malware in the cloud

Important reminder: cloud computing is not a set-it-and-forget-it solution. Tripwire has shared some excellent advice to get you started. Just remember that security in the cloud follows a shared responsibility model, meaning you still have some work to do. Your cloud provider is not responsible for your security.

Protecting your business against malware in the cloud

View tweet here

3. Infosec limerick contest

First sea shanties and now limericks? Fighting burnout in cybersecurity is a full-time job, so we say have some fun — do haikus next.

Infosec limerick contest

View tweet here

4. Rewards up to $10 million

$10 million for reporting ransomware, and the reporting mechanism is set up on a Tor site to preserve security and anonymity of the reporters? Not a hot take so much as kudos to the State Department in helping fight ransomware.

Rewards up to $10 million

View tweet here If you enjoyed this post be sure to check our blog weekly; the Risk Roundup runs Friday mornings in addition to more enlightening content we post related to the ever-evolving landscape of digital risk. Follow us on Twitter (@SolveCyberRisk) and LinkedIn (Coalition Inc). If you have any suggestions for content that we should be adding to our reading list, let us know!

Related blog posts

See all articles
Security

Blog

Boundary Devices and Plugins Prompt Timely Remediation

Explore Coalition’s Zero-Day Alerts by the numbers to learn which technologies drive high-risk vulnerabilities, how we operate as an early-warning system, and when we decide to alert.
Scott WalshMarch 19, 2026
Security

Blog

How Geopolitical
Tension Can Spotlight
Latent Cyber Risks

Coalition security researchers observed distinct changes in cyber scanning behavior originating from Iranian IP addresses that coincided with military activities in the Middle East.
Scott WalshMarch 13, 2026
Security

Blog

How Infostealers May Have Opened the Door to the Stryker Wipe

Coalition security researchers examine the recent cyber attack on Stryker and how infostealers can be a most dangerous fuse in business environments.
Joe ToomeyMarch 12, 2026