Blog Library
Here Are Some Travel Tips for the COVID Era
Something unusual happened to me last week. What happened? Travel. In-person meetings. A quick stroll down Olvera...
Is the New Microsoft Teams Premium Worth the Upgrade?
According to Microsoft, the new Teams Premium package takes the standard Teams offering to a new level, making “every...
How to Be Smart About Buying Cybersecurity Services
Say it with me: There is no single SKU for security services. (SKU=Stock-Keeping Unit) What does this mean? That there...
Use Azure Migrate to Move Your Applications to the Cloud
Jump in the Wayback Machine with me. We return to 2014. CGNET has just finished rolling out Office 365 for a global...
Steps to Surviving a Ransomware Attack
You’ve just been hit with a ransomware attack. Now what? Obviously, the easiest thing to do (for some) seems to be to...
Is Compliance the Next Cybersecurity Frontier?
I remember shopping for posters to decorate my college dormitory room. One poster proclaimed, “The job is not finished...
What Are You Doing to Manage Your MSP?
MSPs. Managed Service Providers. You have one, right? So, what are you doing to manage your MSP? “But wait!” I can...
Separate Your Regular and Administrative Accounts
I had a call today to answer questions about a security audit we recently finished. The customer had several questions...
You Can Help a Smaller Organization Be CyberSmart
I have been on a mission for a while now, looking for ways to push cybersecurity knowledge out to smaller...
Microsoft Teams: New Features for 2023
As 2022 ended and a new year kicked off, Microsoft began rolling out new Teams features and changes. Read on to...
What You Should Do About the LastPass Breach
Welcome to 2023! What with the holidays (you do remember them, right?) and the end-of-year distractions (hello, bomb...
Top Phishing Trends in 2022
Our partners at cybersecurity firm INKY just came out with their “Email Security Annual Report” for 2022-2023, chock...
Try These 2023 New Year’s Resolutions
I am not a fan of New Year's resolutions. My reasoning is part philosophical, part curmudgeonly. That said, I would...
Some Things to be Grateful for in 2022
2022 has been a weird year. We have returned to some elements of our pre-pandemic lives (such as in-person...
How to Record and Share a Video Clip in Teams Chat
Let’s say you are in the middle of a chat with another person – or group – in Teams, and there is something that you...
What I Learned Working with a Nonprofit
I spend a lot of my time working with foundations. These foundations make grants to local nonprofits, providing the...
If Christmas Movies Were About IT
Alright, time for some fun. We are not at the end of the year, but (to paraphrase a politician) we can see it from...
Clone Phishing: A Scary New Tactic
Oh boy. These guys just don’t stop; they’re coming up with new tricks to steal our data, left, right and center. The...
The Online Holiday Scams You Need to Look Out For
Yes, my friends, it’s that time of year again. Time to start making our lists and checking them twice. Time to start...
TAG Conference Hot Takes
Talk about lightning round! I am here at the TAG Conference, getting on the bus shortly to go to the wrap-up event....
Match the Scale of the IT Provider to the Size of Your Nonprofit Budget
I recently wrote about the challenge facing foundations who want to fund IT and cybersecurity work in the nonprofits...
Phishing Business-Related Messages Still Most Successful
Back in April I gave you the results of a quarterly study by KnowBe4 that looks into which phishing subject lines...
Can We Please Stop Making it So Easy for the Hackers?
Ahhh, passwords. The bane of our collective existence. Yes, we know we need them to protect our private information....
If Security Compliance is Auditable, Get a Compliance Tool
I have written before about a security compliance tool we have been using, ComplyUp. (You can read about it here and...
CGNET and ActZero
Ricardo (our CTO) and I met with ActZero (in real life!) today to further develop our partnership. I have written...
Phishing in Your Own Pond: The Importance of Simulated Phish Tests
Phishing simulations are a key part of any comprehensive security awareness training program. By sending out fake...
What Would It Take to Deliver a Scaled-Down IT Roadmap?
We received an RFP this week from a nonprofit looking for an IT assessment and IT roadmap. At CGNET, we do this work...
Here are Some Cybersecurity Awareness Month Resources for You
Yes, Virginia, it is October and that means it is--wait for it--National Cybersecurity Awareness Month! Not just a...
We Are Here for You with Zero Trust Resources
Zero ____. It is one of this week’s New York Times crossword clues. (Don’t tell me the answer. I have not solved the...
Four Factors for Effective Security Awareness Training
Social engineering remains the top way criminals infiltrate an organization’s data, and the problem gets worse every...