Blog Library
Top Phishing Subject Lines Revealed
Each quarter, our partners at KnowBe4 report on the top phishing subject lines clicked on in the cybersecurity...
Choose Your Security When You Choose Your Apps
Today I will share my experience working with two different organizations on security. One organization is an...
Build a Strong and Sustainable Security Culture
A security culture is the foundation to an organization’s entire security program. But what is it? A formal definition...
How to Frame Your Grants Management System Selection
Is it something about Spring? In just the last couple of days two organizations have asked me about helping them...
Is It Time You Looked at Managed Detection and Response?
Managed Detection and Response (MDR) is a hot space in cybersecurity these days. Gartner, Forrester, and IDC all have...
10 Cyber Hygiene Tips for Your Staff
If the pandemic did anything positive for the world over the past couple of years, it served as a reminder for good...
Password Security: The Double-Blind Password Hack
I stumbled upon a great idea this week while reading through some articles on password security. There are a multitude...
Microsoft 365 Nonprofit Price Increases Are Coming
Microsoft 365 nonprofit price increases are coming. You know this if you read the email Microsoft sent last week. If...
How to Respond to the Okta Breach
Are you freaking out about the Okta breach? Allow me to make some suggestions about actions you can take to ensure the...
Mobile Cyberattacks Steep Rise: What You Need to Know
Last week cybersecurity firm Zimperium published its annual mobile cyberattack threat report, and the news was not...
Open APIs and Crowdsourced Hacking: What Could Go Wrong?
Sometimes inspiration is not a straight-line thing. Today’s post is a case in point. I saw in a TAG Slack thread...
How to Create an IT Strategy Roadmap for your Organization
When it comes time to set your IT budget, obviously it’s easiest to fall back on the attitude of, “Let’s just do the...
Get Started with the NIST Cybersecurity Framework
I was on a call yesterday, where consultants from Accenture were reviewing the cybersecurity implications of the war...
Microsoft is Introducing New Emojis
I write many posts that cover important, weighty subjects. This will not be one of those. As I scrolled through my...
What Are Some Encryption Best Practices?
In working with a customer on their security program, they asked us about encryption best practices. We determined...
Have You Tried the Buddy System?
No doubt you have heard of the buddy system. You probably have experience with it. When I learned scuba diving the...
CGNET Welcomes New Security Pro to the Team
In recent months, CGNET has seen an increase in demand for our managed cyber security services. For that reason, we...
Make Small Changes to Be a Better Manager
I am in the middle of a week-long security training (Microsoft 365 Compliance Center; expect a post soon) but decided...
Information Risk Assessments: 7 Steps to Data Safety
In today’s world, looking for cracks in the security of your organization’s data is critical. After all, cyber-attacks...
Hot Desking Challenges and How to Manage Them
We have all had to cope with the changes caused by COVID-19, no? Last spring and summer we were talking about “return...
Cyber security training: How often is enough?
Google the question “How often should we do cyber security training”. You are sure to find multiple sites that...
Get Creative to Manage Employee Turnover
Employee turnover is a big topic these days. It even has a fancy name, which tells you it is a thing: The Great...
Start the New Year With These Recent Teams Features
Another day, another round of Teams updates. With the flood of recent Teams features coming out, it is easy to lose...
Phishing Awareness 101: Keep Your Information Safe in 2022
Happy New Year to everyone! Here’s to a year that (eventually) brings us some semblance of normalcy after these crazy...
Create an Organizational Dashboard and Change the World
If you look at John Mohr’s LinkedIn profile, you will see he says, “Let’s solve hard problems and change the world.”...
What You Need to Know About the Log4j Vulnerability
Oops. As if an actual virus was not bad enough, now IT Managers find out about the log4j vulnerability. I am going to...
The Twelve Tech Tunes of Christmas
Well friends, it is that time of year again. Christmas time! (With a shout out to Hanukkah, Kwanzaa, and your winter...
Loop Components: Next-Level Collaboration in Microsoft Teams
Microsoft Loop is the latest collaboration app for Teams. The Loop app makes it easier for colleagues to work together...
Fortify Your Security With MDR
The IT universe is filled with acronyms, and the world of managed security is no exception: MDR, MSSP, SIEM, EDR....
How and Why to Create Chat Retention Policies
We know that anything left unattended will quickly become messy. Just ask the parents of any toddler. We all have been...