Blog Library
What Are Some Encryption Best Practices?
In working with a customer on their security program, they asked us about encryption best practices. We determined...
Have You Tried the Buddy System?
No doubt you have heard of the buddy system. You probably have experience with it. When I learned scuba diving the...
CGNET Welcomes New Security Pro to the Team
In recent months, CGNET has seen an increase in demand for our managed cyber security services. For that reason, we...
Make Small Changes to Be a Better Manager
I am in the middle of a week-long security training (Microsoft 365 Compliance Center; expect a post soon) but decided...
Information Risk Assessments: 7 Steps to Data Safety
In today’s world, looking for cracks in the security of your organization’s data is critical. After all, cyber-attacks...
Hot Desking Challenges and How to Manage Them
We have all had to cope with the changes caused by COVID-19, no? Last spring and summer we were talking about “return...
Cyber security training: How often is enough?
Google the question “How often should we do cyber security training”. You are sure to find multiple sites that...
Get Creative to Manage Employee Turnover
Employee turnover is a big topic these days. It even has a fancy name, which tells you it is a thing: The Great...
Start the New Year With These Recent Teams Features
Another day, another round of Teams updates. With the flood of recent Teams features coming out, it is easy to lose...
Phishing Awareness 101: Keep Your Information Safe in 2022
Happy New Year to everyone! Here’s to a year that (eventually) brings us some semblance of normalcy after these crazy...
Create an Organizational Dashboard and Change the World
If you look at John Mohr’s LinkedIn profile, you will see he says, “Let’s solve hard problems and change the world.”...
What You Need to Know About the Log4j Vulnerability
Oops. As if an actual virus was not bad enough, now IT Managers find out about the log4j vulnerability. I am going to...
The Twelve Tech Tunes of Christmas
Well friends, it is that time of year again. Christmas time! (With a shout out to Hanukkah, Kwanzaa, and your winter...
Loop Components: Next-Level Collaboration in Microsoft Teams
Microsoft Loop is the latest collaboration app for Teams. The Loop app makes it easier for colleagues to work together...
Fortify Your Security With MDR
The IT universe is filled with acronyms, and the world of managed security is no exception: MDR, MSSP, SIEM, EDR....
How and Why to Create Chat Retention Policies
We know that anything left unattended will quickly become messy. Just ask the parents of any toddler. We all have been...
Black Friday Phishing Scams: It’s Primetime for Cybercrime
Email security company Tessian is warning people to be alert for Black Friday phishing scams this year. (Understand...
Nonprofit Options for Endpoint Security
I had a reader of our email update (thank you!) get in touch after reading my post about Microsoft 365 licensing...
New Ignite Teams Features are Coming Your Way
Microsoft held its Ignite conference last week. If you haven’t heard of Ignite, it is Microsoft's vehicle for making...
The Impact of a Ransomware Attack
My colleague Dan Callahan and I have written many, many posts on the scourge of ransomware. We’ve covered everything...
Microsoft Announces a Security Program for Nonprofits
Microsoft Ignite is going on this week. That means they are making a flood of product announcements. I will cover some...
How to Sort Out Your Microsoft Nonprofit Cloud Subscriptions
What is Happening with Microsoft Nonprofit Cloud Subscriptions? Welcome to another “nuts and bolts” post. (It could be...
Cybercrime and the Holidays: Tips to Stay Safe
As October winds down, so too is it time to wind down Cybersecurity Awareness Month. So, taking a cue from the...
Cybersecurity Awareness Trends: Easy Phishing in Troubled Waters
Lately I’ve seen the results of lots of annual data security studies popping up. I talked about the results of...
You Are on the Hook for Governing No-Code Development
One of the things that I admired about MIT’s introductory computer science class is that it focused on the structure...
Updates to Microsoft’s Cloud-first Grant Program
Hey there! Or should I say “Aye, laddies and lassies!” I am back from a fantastic two weeks in Scotland. Great people,...
Ransomware in 2021: The Other Pandemic
The results are out from cybersecurity guru Fortinet’s 2021 Global Threat Landscape Report. And they are shocking: The...
Cybersecurity Training Games: Yes, They DO Work
Fall is here again; my favorite time of year. Which means it’s almost time for that annual autumn tradition we all...
When Chicken1 Should Not Be Your Password
The Chickens are Coming Home to Roost Sorry, not sorry. Look, ransomware and supply chain disruptions are...
How to Add a 3rd Party to a Call in Teams (Video Tutorial)
Have you ever been in a Teams call with a colleague when you realized you needed input from someone else not on the...