Blog Library
Perplexity AI: The New Kid on the Block
On March 14, I published a blog post providing some of my personal impressions of five AI chatbots: ChatGPT, Bing...
Microsoft Unbundles Teams from Office 365
Last October, in an effort to avoid an antitrust fine from the European Commission, Microsoft was forced to separate...
IT Services for Nonprofits: Choosing the Right Pricing Model
Nonprofit organizations often operate within tight budgets and face unique challenges when it comes to managing their...
Simulated Phishing: A Critical Part of Cybersecurity Training
Simulated phishing tests are critical to a well-rounded cybersecurity awareness program. By sending fake phishing...
Navigating the AI Landscape: A Personal Review
The AI landscape is a vast new playground, and experimenting with ChatGPT and other Generative Pre-trained...
QR Code Phishing: From Scan to Scam
You may have heard of QR code phishing – cutely nicknamed “quishing” to fit right in with its other phishing...
Cool New Teams Features for 2024
Over the past couple of months, Microsoft has introduced a handful of new Teams features. Some are specifically for...
Budget-Friendly Security Essentials: A Bird’s-Eye View
I find it mindboggling to think about how many aspects need to be considered for solid security. And I wonder how many...
Microsoft 365 Checkup: Save Money and Increase Productivity
Every year, we conduct dozens of security checkups, including Vulnerability Testing, Azure Site Recovery, AD Checkups,...
Ask These Questions When Selecting an MSP
You’ve decided it’s time for your organization to select a managed service provider (MSP) to work with you on all...
Decoding Endpoint Security: A Guide to Choosing the Right EDR Solution
Running a few hundred security operations centers isn’t easy. While debates about how to build the perfect SOC change...
Microsoft License Changes: The Impact on Nonprofits
Having resold Microsoft software and licenses for several decades, we’ve seen zillions of changes in how their...
AI Generated Phishing Is Here. What Now?
It was something we’d already been speculating on and expecting to happen soon: criminals using AI to generate nearly...
AI and Cybersecurity: Trends for 2024
AI is expected to play a dominant role in cybersecurity in 2024. It is emerging as a powerful ally in the fight...
Observations on Managed Detection and Response (MDR)
Over the decades, we have used dozens of security systems and products. However, a new gold standard in security...
‘Twas the Night Before Christmas (with a CGNET Twist)
Our former VP of Technology, Tim Haight wrote this some years ago. It still gives me a chuckle. ‘Twas the night...
Nonprofits Should Consider Using AI to Further Their Goals
Artificial intelligence seems to be everywhere these days. And according to one study by unite.ai, 89% of nonprofits...
Pros and Cons of the MSP Model for Smaller Organizations
For most of CGNET’s 40 years, we have worked on a time and materials basis. In recent years, however, many customers...
Teams Premium: Is it Time to Upgrade?
Back in February I discussed the new Teams Premium and whether it was worth the price. Benefits I talked about then...
Is Google Dead?
Once I got into ChatGPT, Bing Chat, and Bard, I wondered if I would ever just do a plain old Google search again....
Be Advised: New Rules for Bulk Email Senders
Last month, Google and Yahoo announced that in early 2024, both companies will start cracking down on bulk email...
7 Habits of Highly Effective IT Support Staff
Many years ago, I read Steven Covey’s “7 Habits of Highly Effective People.” After much yellow highlighting and...
Three Low-Cost Ways to Keep Your IT Infrastructure Safe
It goes without saying that the security of your IT infrastructure is of paramount importance. Unfortunately,...
Advice From a Hacker: Don’t Wait to Protect Your Organization!
Many of us have doorbell cameras or even complete security systems that monitor the access points of our homes. We...
Social Media: Protecting Yourself and Your Organization
More than half the people in the world are on social media – that’s nearly 5 billion – and it’s not going anywhere....
Farewell for Now
Farewell. Wait, what? Why am I thinking of Doug Adams and So Long, and Thanks for All the Fish. Or (even more obscure)...
Cyber Hygiene is Key to Cybersecurity
Cyber hygiene refers to the steps we take to keep our network and computers healthy and safe from external threat....
Take Steps to Protect Your Organization from Social Engineering
Two things happened this week that got me thinking about social engineering. First, I bought a new iPhone for my son...
Microsoft Edge for Business: Your New Work Focused Browser
Have you been using Microsoft Edge as your browser for work and recently noticed a little briefcase over the Edge icon...
What is Change Management Consulting and When Do You Need It?
I was talking with a customer today, and she was describing the launch of a project to replace the organization’s...