Blog Library
AI Ethics in Question: OpenAI Caught Cheating at Chess
The scenario I’m about to describe reminds me of youth sports, particularly baseball and basketball: Players are often...
Microsoft Rolls Out Clipchamp Copilot: Create Videos with AI
Creating engaging video content is now more important than ever. Clipchamp, a leading video creation platform, has...
Here’s Why You Should Migrate Your File Storage to Microsoft 365
In today’s fast-paced digital world, businesses are constantly seeking ways to improve efficiency, collaboration, and...
GenAI Prompts at Work: Risky Business
Generative AI (GenAI) tools are becoming increasingly popular in the workplace, but they come with significant risks....
Mobile Phone Security: CISA’s Recommendations
When you really think about it, today our mobile phones are much more than just communication devices. We use them as...
Insider Cybersecurity Threats: The Danger Within
According to CISA, insider cybersecurity threats—stemming from employees, contractors, or trusted individuals—are a...
Facebook Copyright Infringement Phishing Scam
A new phishing campaign targets Facebook users with business account pages by sending fake threats of copyright...
Why Premium Generative AI Tools are Worth the Investment
Full Disclosure: I subscribe to the premium versions of ChatGPT, Perplexity, Gemini Advanced Pro with Deep Research,...
GraphCast: Google DeepMind’s Answer to Weather Forecasting
It seems like there’s a new AI breakthrough every day—today, it’s all about the weather! Google DeepMind has developed...
How to Use Version Control in Microsoft 365
Version control is a crucial feature in Microsoft 365 that helps you manage changes to your documents (including...
Cybersecurity Training is the Key to Data Protection
I feel like we’ve got just about every cybersecurity defense in place, and they’re all working great! But even this...
Stay Safe on Public Wi-Fi
Who doesn’t love the convenience of free Wi-Fi—whether it's at your neighborhood Starbucks, the grocery store, or the...
Supercharge Productivity With Voice-to-Text
For a long time, I have sought ways to increase productivity. (As a CEO, I consider this an essential part of my job.)...
The Rise of Sophisticated Voice Phishing Scams
If you want a good scare put into you, take the time to read the article "A Day in the Life of a Prolific Voice...
Microsoft Nonprofit Pricing: An Overview
Microsoft has a history of supporting nonprofits by providing discounted pricing. Through the Technology for Social...
Google Smashes It with Gemini Advanced Pro
Google has finally stepped up to the plate and knocked it out of the park with its latest offering, Gemini Advanced...
Sustainable Technology Initiatives in 2024
As the world continues to grapple with the impacts of climate change, the tech industry took significant strides in...
AI Trends to Watch in 2025
We have written about artificial intelligence and its impact on the workplace several times over the past year or...
AI-Powered Phishing Scams: Smarter and More Dangerous
I remember when phishing emails (like the infamous Nigerian Prince scams) were easy to spot due to poor grammar, bad...
The Rise of Phishing Attacks on New Generic Domains
In the ever-evolving landscape of cybersecurity, phishing remains one of the most prevalent and dangerous threats. As...
Simple AI Tools to Improve Your Work
Artificial intelligence has become more than just a buzzword—it’s a practical solution for everyday challenges. The...
Demystifying the Dark Web
The Dark Web. A virtual space with an ominous-sounding label. In my mind, it has always been a cryptic, shadowy place...
BUSTED: World’s Largest Botnet (911 S5)
I don’t usually blog about news stories, but with so much negative, depressing, and scary information about cybercrime...
Bah Humbug! 10 Online Holiday Scams to Watch Out for in 2024
Ahh, the holidays are upon us once more! My favorite time of year, from the music to the shopping to the food… Oh, and...
Results of the TAG 2024 State of Philanthropy Tech Survey
Every two years the Technology Association of Grantmakers (TAG), an organization of IT professionals (and others...
Ransomware: The Single Biggest Cybersecurity Risk
I spend a lot of time thinking about cybersecurity, and CGNET conducts multiple studies each month to identify...
Sounding the Alarm on Mobile Hacking
Mobile security company Zimperium recently released their 2024 Global Mobile Threat Report, and their findings should...
INKY: Smarter, Safer Email Security
When I first started using computers, security wasn’t much of a concern. We were all part of one big, happy family....
The Human Firewall: First Line of Defense in Cybersecurity
Your organization might be under the false impression that cybersecurity and risk management are solely the...
Hack-Proof Your Passwords
I recall when passwords could only be eight characters – I remember my favorite Unix password was 4rich*. By the early...