Blog Library
2020 Cyber Threat Report: True Crime with European Charm
On October 5, EUROPOL released IOCTA 2020, the latest annual edition of the Internet Organised Crime Threat...
Priority Account Protection Helps You Focus Your Security Efforts
Your best cybersecurity posture is one where you can be proactive about managing security. Your next best posture is...
Answer These Ten Questions for Better Security
Our crack Communications Director Jackie recently came across this infographic from Microsoft. It’s a ten-question...
My Identity Was Stolen: Here’s What I Learned
I’d been away from my desk and phone for about an hour. When I came back, emails told me that I had purchased a phone...
The USPS Smishing Scam: The package is NOT in the mail
You’ve likely heard of phishing by now. (We've written many articles about phishing, including this recent one by Dan...
How Will You Manage Personal Device Access?
There was a time—not too long ago—when IT Managers thought about managing personal device access in either/or terms....
Zoom and 2FA: The Security Boost You Need Now
As many of us continue to work and collaborate from home, there has been a steady uptick in the number of security...
Leverage the Cloud for Security
We had it all wrong. When Salesforce and other SaaS (software as a service) services hit the market, we pundits talked...
Critical Cyber Security Questions & The Answers You Need Now
I gave a talk today at the Council of New Jersey Grantmakers’ virtual conference. I spoke about risk assessments—what...
Zero Trust Solutions: A Long and Winding Road
Last week I introduced you to Zero Trust technology. The vision of a Zero Trust architecture today is like that of...
Zero Trust Technologies: What They Are and the 5 You Need Now
According to a recent Microsoft study, “94% of companies report that they are in the process of deploying new Zero...
3 Great Guides to Disaster Recovery Planning
How’s your organization’s disaster recovery plan? Do you have one? Has it been updated recently? This post will...
Act Against Ransomware and Data Exfiltration
It’s time to step up your game as you act against ransomware. Here’s why. KnowBe4, in this blog post (shout out to my...
Super Time-Saving Tips! Opening Files in Teams (video)
Back in January, my colleague wrote a post on opening files in Teams. This spring, Microsoft rolled out new ways to...
Do You Have a Right-Sized Business Continuity Plan?
I had a déjà vu moment talking with a customer this week. The customer asked me how we could deliver (what I would...
New Power Platform Features in Teams: Streamlining Our Digital Workplace
Working remotely and having to rely on digital interaction and whatever tools are available to us to do our job is our...
There’s Even More Reason to Leverage the CIS Controls for Security
Here at CGNET we’re big fans of the Center for Internet Security (CIS) and their CIS Controls. Organizations can...
Three Tips to Make Remote Work Work
As the COVID-19 pandemic continues, I’m sensing a change in thinking among our customers. The initial focus was on the...
Use the Art of Teamwork to Achieve Greater Success
We’ve talked a lot about teamwork, especially about the technology of teamwork). Today I want to focus on the art of...
Teams Call Blocking (video)
Some calls are better left unheard. Last year my colleague wrote about his discovery that you can block incoming...
Rethink Your Digital Engagement
Monday, I participated in a session on cybersecurity at a virtual conference hosted by United Philanthropy Forum....
Adding Sound to Shared Videos in Microsoft Teams (video)
“Hidden in plain sight” doesn’t only apply to spy novels. It very aptly describes where Microsoft has put the option...
How to Create a Poll in Teams (video)
Creating and using simple polls in Microsoft Teams is pretty simple, once you get over one stumbling block. Since...
Learn More About Azure Backup
How do you recover from a ransomware attack? You can pay the ransom. That might work but certainly feels like a fail....
Use Conditional Access to Strengthen Your Remote Work Setup
Most customers tell me they don’t see their staff returning to the office anytime soon. This means we will continue to...
So You’ve Been Pwned
If you’re of a certain age, you’ll recall the pamphlets the doctors would hand you at the end of your visit, so you...
How to Pop Out a Chat Window in Teams
With user productivity in mind, Microsoft has recently added the ability to “pop out a chat" in Teams. Users have...
How to Track Attendance in a Teams Meeting
Microsoft has recently made it easy to track attendance in a Teams meeting. (No more trying to do screen captures as...
Start Your Information Protection Journey by Creating Labels
Here are three common activities that require creating labels. Document management: use labels (aka “tags”) to help...
CISA Office 365 Security Recommendations
CISA, the Cybersecurity and Infrastructure Security Agency (we’re from the government and here to help) recently put...