Blog Library
How Secure are Password Managers?
We’ve recommended using password managers many times in past posts. (See here and here). But the usual worry still...
Trending Cyber Threats Spell No Summer Vacation for You
I want to talk about trending cyber threats. What they are, and why it means there will be no summer vacation for you....
Password Policy Advice from the Pros
After several months of research, our partners at the cybersecurity firm KnowBe4 released their official...
Smishing Attacks Sharply on the Rise
Smishing attacks, the text-based (SMS) form of phishing, have become a big problem. In fact, in 2021 they were a...
Have You Used the “Essential Eight” to Improve Your Security?
I recently proposed a security talk for the Technology Association of Grantmakers (TAG) annual meeting (IRL!). When I...
Microsoft Introduces Bookings in Outlook
Bookings in Outlook is coming to help you reduce the back and forth in scheduling, while helping you maintain control...
Has the Time Come for Password Replacement?
Did you miss World Password Day last Thursday? Me, too. (As it turns out, it was also International Day of the...
These Are the April Teams Features You Will Want to Know About
Time marches on. If you use Microsoft Teams, that is a good thing. Why? Because there are some new April Teams...
Try Experiential Cybersecurity Awareness Training and Reap the Rewards
Over the past few years, I’ve written a couple of posts on using games to make cybersecurity training more fun for...
Use These Tools to Run Better Meetings
Meetings. We all say we hate them. And yet, we all hold them. Can we do better? Is it possible we can run better...
Top Phishing Subject Lines Revealed
Each quarter, our partners at KnowBe4 report on the top phishing subject lines clicked on in the cybersecurity...
Choose Your Security When You Choose Your Apps
Today I will share my experience working with two different organizations on security. One organization is an...
Build a Strong and Sustainable Security Culture
A security culture is the foundation to an organization’s entire security program. But what is it? A formal definition...
How to Frame Your Grants Management System Selection
Is it something about Spring? In just the last couple of days two organizations have asked me about helping them...
Is It Time You Looked at Managed Detection and Response?
Managed Detection and Response (MDR) is a hot space in cybersecurity these days. Gartner, Forrester, and IDC all have...
10 Cyber Hygiene Tips for Your Staff
If the pandemic did anything positive for the world over the past couple of years, it served as a reminder for good...
Password Security: The Double-Blind Password Hack
I stumbled upon a great idea this week while reading through some articles on password security. There are a multitude...
Microsoft 365 Nonprofit Price Increases Are Coming
Microsoft 365 nonprofit price increases are coming. You know this if you read the email Microsoft sent last week. If...
How to Respond to the Okta Breach
Are you freaking out about the Okta breach? Allow me to make some suggestions about actions you can take to ensure the...
Mobile Cyberattacks Steep Rise: What You Need to Know
Last week cybersecurity firm Zimperium published its annual mobile cyberattack threat report, and the news was not...
Open APIs and Crowdsourced Hacking: What Could Go Wrong?
Sometimes inspiration is not a straight-line thing. Today’s post is a case in point. I saw in a TAG Slack thread...
How to Create an IT Strategy Roadmap for your Organization
When it comes time to set your IT budget, obviously it’s easiest to fall back on the attitude of, “Let’s just do the...
Get Started with the NIST Cybersecurity Framework
I was on a call yesterday, where consultants from Accenture were reviewing the cybersecurity implications of the war...
Microsoft is Introducing New Emojis
I write many posts that cover important, weighty subjects. This will not be one of those. As I scrolled through my...
What Are Some Encryption Best Practices?
In working with a customer on their security program, they asked us about encryption best practices. We determined...
Have You Tried the Buddy System?
No doubt you have heard of the buddy system. You probably have experience with it. When I learned scuba diving the...
CGNET Welcomes New Security Pro to the Team
In recent months, CGNET has seen an increase in demand for our managed cyber security services. For that reason, we...
Make Small Changes to Be a Better Manager
I am in the middle of a week-long security training (Microsoft 365 Compliance Center; expect a post soon) but decided...
Information Risk Assessments: 7 Steps to Data Safety
In today’s world, looking for cracks in the security of your organization’s data is critical. After all, cyber-attacks...
Hot Desking Challenges and How to Manage Them
We have all had to cope with the changes caused by COVID-19, no? Last spring and summer we were talking about “return...