Blog Library
Plan to Secure Your Data with Zero Trust
This week we return to the topic of a Zero Trust security implementation. So far, I have covered how to secure your...
Top Cybersecurity Challenges and Priorities for 2021
Yes, 2020 was a real doozy. Because of the pandemic, organizations worldwide were caught off-guard by mandatory...
Is it Time for a Teams Tune-up?
Has the time come for your organization to conduct a Teams tune-up? It could be. There has been a joke going around...
Cybersecurity Drills: 6 Reasons They’re Worth It
We all know from recent headlines that not even the largest of organizations is immune to a cyber-attack. But we also...
The Twelve Days of Remote Work
Careful readers will recall that last year I posted on the Twelve Days of Cybersecurity. If you missed it, you can...
Secure Your Apps with Zero Trust in Mind
I have been writing about the Zero Trust security model and how to apply it in your organization. We tackled the first...
The COVID-19 Vaccine is Here. And So Are the Phishing Scams
It was pretty predictable: With all of the hoopla around the COVID-19 vaccine, there would most certainly be the...
Enhance Training With a Security by Design Approach
Recently the experts at Information Security Forum (ISF) offered new guidance on how to move beyond half-hearted...
Check Out These New Teams Features
As the COVID-19 pandemic continues, we continue to participate in the greatest real-time remote work experiment...
Secure Your Devices to Extend Zero Trust
In my most recent blog post we started down the path of Zero Trust and how to enable it in your organization. It was a...
How to Do Polling in Teams: A Step-by-Step Guide
Polling in Teams is not only a quick way to collect information, but it can also be a great way to keep team members...
Create a Zero Trust Action Plan
Zero Trust. No, I’m not talking about the U.S. Presidential election. I am talking about cybersecurity. If you have...
6 Bad Password Habits It’s Time to Break
A few weeks ago, the team at security.org put together a report titled “America’s Password Habits 2020”. They asked...
Secure Your Virtual Machines in Azure
What are you doing to secure your Virtual Machines in Azure? Or in any public cloud for that matter? "What’s that?"...
Protect Against Credential Stuffing Attacks
Stuffing. Such a timely word now. There’s stuffing that goes in the Thanksgiving turkey. There’s Santa stuffing the...
Train Your Workers About Mobile Phishing Attacks. NOW.
They already feel like overused, clichéd expressions: “These are uncertain times.” “We need to prepare for the new...
Training for Microsoft Teams Admins: New and Improved
Are you an accidental Teams administrator? Hey, it happens. Now help is here. Microsoft Teams admin training has...
The SSPR Solution: A Quick Fix for Routine Requests
Since the start of the pandemic, IT staff has had to adapt to new challenges. Supporting end-users is no longer as...
Know the Signs of a Future Ransomware Attack
Ransomware attacks are like earthquakes. They are no fun, and they can cause a lot of damage. As with...
Game on! Make Cybersecurity Training Stick by Making it Fun
Ahhh, autumn. The leaves are changing colors; sweaters are making their annual reappearance. The scent of pumpkin pie...
Looking to 2021: One Trend to Rule Them All
Halloween and Christmas have been growing together for some time. We’ve had Halloween trees and lights for years....
2020 Cyber Threat Report: True Crime with European Charm
On October 5, EUROPOL released IOCTA 2020, the latest annual edition of the Internet Organised Crime Threat...
Priority Account Protection Helps You Focus Your Security Efforts
Your best cybersecurity posture is one where you can be proactive about managing security. Your next best posture is...
Answer These Ten Questions for Better Security
Our crack Communications Director Jackie recently came across this infographic from Microsoft. It’s a ten-question...
My Identity Was Stolen: Here’s What I Learned
I’d been away from my desk and phone for about an hour. When I came back, emails told me that I had purchased a phone...
The USPS Smishing Scam: The package is NOT in the mail
You’ve likely heard of phishing by now. (We've written many articles about phishing, including this recent one by Dan...
How Will You Manage Personal Device Access?
There was a time—not too long ago—when IT Managers thought about managing personal device access in either/or terms....
Zoom and 2FA: The Security Boost You Need Now
As many of us continue to work and collaborate from home, there has been a steady uptick in the number of security...
Leverage the Cloud for Security
We had it all wrong. When Salesforce and other SaaS (software as a service) services hit the market, we pundits talked...
Critical Cyber Security Questions & The Answers You Need Now
I gave a talk today at the Council of New Jersey Grantmakers’ virtual conference. I spoke about risk assessments—what...