Cyber Risk Guy

Cookie Policy

Our Cookie Policy explains what cookies are, how our website uses them, and your rights to control our use of them.

Author
Cyber Risk Guy
Read Time
-
Published
December 29, 2024
Updated
August 16, 2025
POLICY

This Cookie Policy explains how this website (“I”, “we”, “us”, or “our”) uses cookies and similar technologies to recognize you when you visit our website. It explains what these technologies are and why we use them, as well as your rights to control our use of them. By using our website, you agree to the use of cookies as described in this policy.

What Are Cookies?

Cookies are small data files that are placed on your computer or mobile device when you visit a website. Cookies are widely used by website owners to make their websites work, or to work more efficiently, as well as to provide information to us about how visitors use our website.

Cookies set by the website owner (in this case, us) are called “first-party cookies”. Cookies set by parties other than the website owner are called “third-party cookies”. Third-party cookies enable third-party features or functionality to be provided on or through the website (e.g., advertising, interactive content, and analytics).

How We Use Cookies

We use cookies for the following purposes:

Essential Cookies

We may use essentail cookies to provide a better user experience. For instance, session cookies may be used to remember your login status or preferences. Local storage cookies may be used to remember your preferences or settings, like or dark mode.

Analytics Cookies

We use Google Analytics to collect and analyze information about how you use our website. These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site.

Google Analytics sets the following cookies:

  • _ga: Used to distinguish users. Expires after 2 years.
  • _gid: Used to distinguish users. Expires after 24 hours.
  • _gat: Used to throttle request rate. Expires after 1 minute.

The information collected by Google Analytics will be transmitted to and stored by Google on servers in the United States and other countries. Google may also transfer this information to third parties where required to do so by law, or where such third parties process the information on Google’s behalf.

Third-Party Content Cookies

Our website may include embedded content (e.g., videos, images, articles, etc.) from other websites. Pages with this embedded content may present cookies from these websites. We do not control the dissemination of these cookies and you should check the relevant third party’s website for more information about these cookies.

Examples of third-party content that may be embedded on our website include:

  • YouTube videos
  • Social media feeds (Twitter, Instagram, etc.)
  • Comment and feedback systems
  • Messaging and support systems

Your Choices Regarding Cookies

You can prevent the setting of cookies by adjusting the settings on your browser. Be aware that disabling cookies will affect the functionality of our website and many other websites that you visit.

Most browsers allow you to refuse to accept cookies and to delete cookies. The methods for doing so vary from browser to browser, and from version to version. You can however obtain up-to-date information about blocking and deleting cookies on your browser via these links.

Changes to the Cookie Policy

We may update the Cookie Policy periodically. Updates will be posted on this page with an updated revision date. If we make significant changes to this policy, we may also provide a more prominent notice.

Contact us

If you have any questions about the Cookie Policy, please contact us.

#Policy #Cookie #Privacy

Did you enjoy this article?

Your feedback helps me create better content for the cybersecurity community

Share This Article

Found this helpful? Share it with your network to help others learn about cybersecurity.

Link copied to clipboard!

Share Feedback

Help improve this content by sharing constructive feedback on what worked and what didn't.

Thank you for your feedback!

Hire Me

Need help implementing your cybersecurity program? Let's work together.

Support Me

Help keep great cybersecurity content coming by supporting me on Patreon.

David McDonald

I'm David McDonald, the Cyber Risk Guy. I'm a cybersecurity consultant helping organizations build resilient, automated, cost effective security programs.

Reader Feedback

See what others are saying about this article

Table of Contents

;