Cyber Risk Guy

Treating Risk

Learn the 4 ways to handle any risk: Avoid it, Reduce it, Transfer it, or Accept it. It's like deciding what to do about rain - bring an umbrella, stay inside, buy insurance, or get wet!

Author
David McDonald
Read Time
8 min
Published
August 9, 2025
Updated
August 9, 2025
COURSES AND TUTORIALS

It’s Going to Rain Tomorrow ☔

Scenario: The weather forecast says it’s going to rain tomorrow, and you have to walk to work. What are your options?

Option 1: Avoid the Rain 🏠

  • What you do: Work from home, don’t go outside at all
  • Result: Zero chance of getting wet, but you miss the office meeting

Option 2: Reduce the Rain Risk ☂️

  • What you do: Bring an umbrella, wear a raincoat, take covered routes
  • Result: You might get a little wet, but mostly protected

Option 3: Transfer the Rain Risk 🚗

  • What you do: Call an Uber, ask a friend for a ride, take the bus
  • Result: Someone else deals with the rain problem for you

Option 4: Accept the Rain Risk 🤷

  • What you do: Walk normally, get soaked, deal with it
  • Result: You get completely wet, but it’s free and you’re tough

Here’s the amazing thing: These are the EXACT SAME four options organizations have for dealing with ANY cybersecurity risk!

The Universal 4-Step Framework for Any Problem 🎯

Every risk in life (and business) can be handled in one of these four ways:

1. 🚫 AVOID - “Don’t Do the Risky Thing”

What it means: Completely eliminate the activity that creates the risk.

Rain Example: Stay home to avoid getting wet
Cybersecurity Example: Don’t use email to avoid phishing attacks

When Organizations Choose Avoid:

🏦 Bank Example:

  • Risk: Customers getting phished through email links
  • Avoid Solution: Remove all links from customer emails, only send text
  • Trade-off: Less convenient for customers, but zero phishing risk from email links

🏥 Hospital Example:

  • Risk: Patient data being stolen from internet-connected systems
  • Avoid Solution: Keep patient records on computers with no internet access
  • Trade-off: Doctors can’t access records remotely, but data can’t be hacked online

2. 🛡️ REDUCE - “Make the Bad Thing Less Likely or Less Painful”

What it means: Implement protections to lower the chance of something bad happening OR reduce the damage if it does happen.

Rain Example: Bring umbrella and raincoat
Cybersecurity Example: Install antivirus and train employees

When Organizations Choose Reduce:

🏪 Small Business Example:

  • Risk: Ransomware encrypting all company files
  • Reduce Solution: Daily backups + employee training + updated software
  • Trade-off: Some cost and effort, but if ransomware hits, they can recover quickly

🎓 University Example:

  • Risk: Students’ personal data being stolen
  • Reduce Solution: Encrypt all databases + require strong passwords + limit data access
  • Trade-off: Some complexity and cost, but data is much harder to steal

3. 🤝 TRANSFER - “Make It Someone Else’s Problem”

What it means: Pay someone else to either handle the risk for you or pay for the damage if something goes wrong.

Rain Example: Take an Uber instead of walking
Cybersecurity Example: Buy cyber insurance or hire a security company

When Organizations Choose Transfer:

🏭 Manufacturing Company Example:

  • Risk: Their email servers getting hacked and customer data stolen
  • Transfer Solution: Use Gmail for Business instead of running their own email servers
  • Trade-off: Pay Google monthly, but Google handles all the email security

🏪 Retail Store Example:

  • Risk: Credit card payment systems getting breached
  • Transfer Solution: Buy cyber insurance that pays for legal fees and customer notifications
  • Trade-off: Pay insurance premiums, but if breach happens, insurance pays most costs

4. ✅ ACCEPT - “Deal with It If It Happens”

What it means: Acknowledge the risk exists, but decide not to spend money or effort reducing it right now.

Rain Example: Walk normally and get wet if it rains
Cybersecurity Example: Know that low-value systems might get attacked, but don’t protect them

When Organizations Choose Accept:

🚀 Startup Example:

  • Risk: Company website might get defaced by hackers
  • Accept Solution: No special website security, just fix it if it happens
  • Trade-off: Website might be down for a few hours if attacked, but saves money for more important things

🎪 Local Event Company Example:

  • Risk: Event registration system might be unavailable during high traffic
  • Accept Solution: Manual backup registration process with paper forms
  • Trade-off: Some events might have registration delays, but acceptable for their business

Why the Same Risk Gets Different Treatments 🤔

Here’s what’s fascinating: Different organizations will treat the SAME risk in completely different ways!

Example: Email Phishing Risk

🏦 Bank - AVOID

  • Removes all links from customer emails
  • Why: One successful phishing attack could cost millions and destroy trust

🏥 Hospital - REDUCE

  • Heavy email security training + advanced spam filters + two-factor authentication
  • Why: Need email for patient care, but must protect patient data

🏪 Coffee Shop - TRANSFER

  • Uses Gmail for Business instead of their own email server
  • Why: Don’t have IT expertise, let Google handle email security

🎮 Gaming Startup - ACCEPT

  • Basic email security, focus budget on product development
  • Why: Email breach wouldn’t kill the business, growth is more important right now

How to Choose the Right Treatment 🎲

The decision usually comes down to three questions:

Question 1: How Bad Would This Be? 💥

  • Bank getting hacked: Could end the business → AVOID or REDUCE
  • Coffee shop website going down: Annoying but survivable → ACCEPT or TRANSFER

Question 2: How Much Would Prevention Cost? 💰

  • $100/month for backup software: Most businesses can afford → REDUCE
  • $100,000 for custom security system: Only large companies → AVOID or ACCEPT for smaller businesses

Question 3: What Are We Good At? 🎯

  • Tech company: Good at security → REDUCE
  • Restaurant: Not good at IT → TRANSFER or AVOID
  • New startup: Good at nothing yet → ACCEPT most risks

Real-World Risk Treatment in Action 🌍

Scenario: “Our Customer Database Could Be Hacked”

🏦 Major Bank:

  • Treatment: REDUCE + TRANSFER
  • Actions: Military-grade encryption + 24/7 monitoring + cyber insurance
  • Cost: $10 million/year
  • Reasoning: Customer trust is everything, must protect at all costs

🏪 Local Bakery:

  • Treatment: TRANSFER
  • Actions: Use Square for payments (they handle security) + basic cyber insurance
  • Cost: $200/month
  • Reasoning: Don’t understand cybersecurity, let experts handle it

🚀 Social Media Startup:

  • Treatment: REDUCE
  • Actions: Basic security measures + employee training
  • Cost: $5,000/month
  • Reasoning: Have tech skills but limited budget, do what we can afford

🎪 Seasonal Festival:

  • Treatment: ACCEPT
  • Actions: Paper backup for ticket sales, basic website security
  • Cost: $50/month
  • Reasoning: Only operate 3 months/year, major security spending doesn’t make sense

Key Takeaways ✅

Before you move to the next lesson, make sure you understand:

  1. There are only 4 ways to handle any risk: Avoid, Reduce, Transfer, or Accept
  2. Different organizations treat the same risk differently based on their situation
  3. The right choice depends on: How bad would it be? How much does prevention cost? What are we good at?
  4. You make these same decisions in your personal life all the time
  5. Most organizations use multiple treatments for different risks

Ready for Lesson 9? 🔧

Next up: Implementing Controls

Now that you know the 4 ways to treat risk, you’ll learn how organizations actually implement the security controls when they choose to “Reduce” risk.

Think of it like actually buying and setting up that security system for your house - you know you need it, but how do you pick the right one and make sure it works?

You’re mastering the complete risk management cycle: Identify → Assess → Determine appetite → Choose treatment → Implement controls. One more step to go! 💪

Reader Feedback

See what others are saying about this article

Did you enjoy this article?

Your feedback helps me create better content for the cybersecurity community

Share This Article

Found this helpful? Share it with your network to help others learn about cybersecurity.

Link copied to clipboard!

Share Feedback

Help improve this content by sharing constructive feedback on what worked and what didn't.

Thank you for your feedback!

Hire Me

Need help implementing your cybersecurity program? Let's work together.

Support Me

Help keep great cybersecurity content coming by supporting me on Patreon.

David McDonald

I'm David McDonald, the Cyber Risk Guy. I'm a cybersecurity consultant helping organizations build resilient, automated, cost effective security programs.

;