Blog Library
ComplyUp and NIST 800-171 are Ruining My Life
Yes, I am exaggerating. Call it artistic license. But ComplyUp and NIST 800-171 are beginning to rewire my brain. This...
The Human Firewall: The MOST Important Part of Cybersecurity
Your organization may be guilty of a common misconception, that cybersecurity and risk management are the sole purview...
There’s Something About INKY
I wrote last week about our adoption of INKY and teased about the INKY logo. To spare you the searching, I have...
We Are Stepping Up Our Phish Protection Game
We have been evaluating a service called INKY, to step up our phish protection for customers. Wait. Phish protection....
DEI Helps You Build a More Robust Team
Let me offer another of those confluence-of-events posts for you. I have been thinking about diversity, equity, and...
Cisco Just Got Phished: Don’t Be Next!
Just this past week, according to an article at Forbes.com, Cisco was hacked by a ransomware group who claims to now...
Microsoft Nonprofit Price Increases are Just Around the Corner
If you are a subscriber to one of Microsoft’s nonprofit cloud subscriptions, let me remind you that nonprofit price...
Introducing Microsoft Viva Engage
A couple of weeks ago I wrote about the new hybrid workplace tools announced at Microsoft’s annual Inspire event in...
Is the Height App Worth Buying?
I got excited the other day (I know, I am a geek) to learn about a new project management app, called Height. It...
Do Your Security Actions Make Sense?
Do your cybersecurity actions make sense? Wait, what? Sometimes we cybersecurity folks can get carried away. More...
Microsoft’s New Tools for the Hybrid Workplace
At this year’s Inspire event happening this week, Microsoft announced a variety of new tools to enhance the hybrid...
Command the Conversation in Teams
Whether during a general discussion within a channel or in a private group chat, there are numerous ways to take...
Have You Tried the New Teams Admin App?
I came across this article the other day that described a new Teams app. Only this time, it is a Teams admin app. As...
Remember to Include IoT Devices in Your Cybersecurity Program
Today I bring you a cautionary tale, courtesy of a customer. The moral of the story is this. Remember to include IoT...
Is This a Magnetometer Moment for Grantee Security?
OK, I admit it. I was watching the US House of Representatives January 6th Committee and geeked out over the word...
Passwordless Future Almost Here: Major Milestone Announced
Last month, Microsoft, Google and Apple all announced that they will expand their support for the passwordless...
Let ComplyUp Take Care of Your Security Compliance Planning
I have written in the past about using a tool to assess your organization’s compliance against a security standard....
How Secure are Password Managers?
We’ve recommended using password managers many times in past posts. But the usual worry still comes up: How safe and...
Trending Cyber Threats Spell No Summer Vacation for You
I want to talk about trending cyber threats. What they are, and why it means there will be no summer vacation for you....
Password Policy Advice from the Pros
After several months of research, our partners at the cybersecurity firm KnowBe4 released their official...
Smishing Attacks Sharply on the Rise
Smishing attacks, the text-based (SMS) form of phishing, have become a big problem. In fact, in 2021 they were a...
Have You Used the “Essential Eight” to Improve Your Security?
I recently proposed a security talk for the Technology Association of Grantmakers (TAG) annual meeting (IRL!). When I...
Microsoft Introduces Bookings in Outlook
Bookings in Outlook is coming to help you reduce the back and forth in scheduling, while helping you maintain control...
Has the Time Come for Password Replacement?
Did you miss World Password Day last Thursday? Me, too. (As it turns out, it was also International Day of the...
These Are the April Teams Features You Will Want to Know About
Time marches on. If you use Microsoft Teams, that is a good thing. Why? Because there are some new April Teams...
Try Experiential Cybersecurity Awareness Training and Reap the Rewards
Over the past few years, I’ve written a couple of posts on using games to make cybersecurity training more fun for...
Use These Tools to Run Better Meetings
Meetings. We all say we hate them. And yet, we all hold them. Can we do better? Is it possible we can run better...
Top Phishing Subject Lines Revealed
Each quarter, our partners at KnowBe4 report on the top phishing subject lines clicked on in the cybersecurity...
Choose Your Security When You Choose Your Apps
Today I will share my experience working with two different organizations on security. One organization is an...
Build a Strong and Sustainable Security Culture
A security culture is the foundation to an organization’s entire security program. But what is it? A formal definition...