Blog Library
Match the Scale of the IT Provider to the Size of Your Nonprofit Budget
I recently wrote about the challenge facing foundations who want to fund IT and cybersecurity work in the nonprofits...
Phishing Business-Related Messages Still Most Successful
Back in April I gave you the results of a quarterly study by KnowBe4 that looks into which phishing subject lines...
Can We Please Stop Making it So Easy for the Hackers?
Ahhh, passwords. The bane of our collective existence. Yes, we know we need them to protect our private information....
If Security Compliance is Auditable, Get a Compliance Tool
I have written before about a security compliance tool we have been using, ComplyUp. (You can read about it here and...
CGNET and ActZero
Ricardo (our CTO) and I met with ActZero (in real life!) today to further develop our partnership. I have written...
Phishing in Your Own Pond: The Importance of Simulated Phish Tests
Phishing simulations are a key part of any comprehensive security awareness training program. By sending out fake...
What Would It Take to Deliver a Scaled-Down IT Roadmap?
We received an RFP this week from a nonprofit looking for an IT assessment and IT roadmap. At CGNET, we do this work...
Here are Some Cybersecurity Awareness Month Resources for You
Yes, Virginia, it is October and that means it is--wait for it--National Cybersecurity Awareness Month! Not just a...
We Are Here for You with Zero Trust Resources
Zero ____. It is one of this week’s New York Times crossword clues. (Don’t tell me the answer. I have not solved the...
Four Factors for Effective Security Awareness Training
Social engineering remains the top way criminals infiltrate an organization’s data, and the problem gets worse every...
Have You Seen These September Teams Features?
Ah, September. People resurrecting Earth, Wind & Fire’s iconic song. Microsoft rolling out a batch of September...
Surveil Can Probably Save You Money
“What if I could save you 25% on your expenses, would that get your attention?” Cough once for each time someone has...
Yes, MFA Can Be Hacked. Now What?
I read a blog post today from our friends and partners at cybersecurity firm KnowBe4 that was a bit unnerving. While...
ComplyUp and NIST 800-171 are Ruining My Life
Yes, I am exaggerating. Call it artistic license. But ComplyUp and NIST 800-171 are beginning to rewire my brain. This...
The Human Firewall: The MOST Important Part of Cybersecurity
Your organization may be guilty of a common misconception, that cybersecurity and risk management are the sole purview...
There’s Something About INKY
I wrote last week about our adoption of INKY and teased about the INKY logo. To spare you the searching, I have...
We Are Stepping Up Our Phish Protection Game
We have been evaluating a service called INKY, to step up our phish protection for customers. Wait. Phish protection....
DEI Helps You Build a More Robust Team
Let me offer another of those confluence-of-events posts for you. I have been thinking about diversity, equity, and...
Cisco Just Got Phished: Don’t Be Next!
Just this past week, according to an article at Forbes.com, Cisco was hacked by a ransomware group who claims to now...
Microsoft Nonprofit Price Increases are Just Around the Corner
If you are a subscriber to one of Microsoft’s nonprofit cloud subscriptions, let me remind you that nonprofit price...
Introducing Microsoft Viva Engage
A couple of weeks ago I wrote about the new hybrid workplace tools announced at Microsoft’s annual Inspire event in...
Is the Height App Worth Buying?
I got excited the other day (I know, I am a geek) to learn about a new project management app, called Height. It...
Do Your Security Actions Make Sense?
Do your cybersecurity actions make sense? Wait, what? Sometimes we cybersecurity folks can get carried away. More...
Microsoft’s New Tools for the Hybrid Workplace
At this year’s Inspire event happening this week, Microsoft announced a variety of new tools to enhance the hybrid...
Command the Conversation in Teams
Whether during a general discussion within a channel or in a private group chat, there are numerous ways to take...
Have You Tried the New Teams Admin App?
I came across this article the other day that described a new Teams app. Only this time, it is a Teams admin app. As...
Remember to Include IoT Devices in Your Cybersecurity Program
Today I bring you a cautionary tale, courtesy of a customer. The moral of the story is this. Remember to include IoT...
Is This a Magnetometer Moment for Grantee Security?
OK, I admit it. I was watching the US House of Representatives January 6th Committee and geeked out over the word...
Passwordless Future Almost Here: Major Milestone Announced
Last month, Microsoft, Google and Apple all announced that they will expand their support for the passwordless...
Let ComplyUp Take Care of Your Security Compliance Planning
I have written in the past about using a tool to assess your organization’s compliance against a security standard....