Blog Library
Open APIs and Crowdsourced Hacking: What Could Go Wrong?
Sometimes inspiration is not a straight-line thing. Today’s post is a case in point. I saw in a TAG Slack thread...
How to Create an IT Strategy Roadmap for your Organization
When it comes time to set your IT budget, obviously it’s easiest to fall back on the attitude of, “Let’s just do the...
Get Started with the NIST Cybersecurity Framework
I was on a call yesterday, where consultants from Accenture were reviewing the cybersecurity implications of the war...
Microsoft is Introducing New Emojis
I write many posts that cover important, weighty subjects. This will not be one of those. As I scrolled through my...
What Are Some Encryption Best Practices?
In working with a customer on their security program, they asked us about encryption best practices. We determined...
Have You Tried the Buddy System?
No doubt you have heard of the buddy system. You probably have experience with it. When I learned scuba diving the...
CGNET Welcomes New Security Pro to the Team
In recent months, CGNET has seen an increase in demand for our managed cyber security services. For that reason, we...
Make Small Changes to Be a Better Manager
I am in the middle of a week-long security training (Microsoft 365 Compliance Center; expect a post soon) but decided...
Information Risk Assessments: 7 Steps to Data Safety
In today’s world, looking for cracks in the security of your organization’s data is critical. After all, cyber-attacks...
Hot Desking Challenges and How to Manage Them
We have all had to cope with the changes caused by COVID-19, no? Last spring and summer we were talking about “return...
Cybersecurity training: How often is enough?
Google the question “How often should we do cybersecurity training”. You are sure to find multiple sites that...
Get Creative to Manage Employee Turnover
Employee turnover is a big topic these days. It even has a fancy name, which tells you it is a thing: The Great...
Start the New Year With These Recent Teams Features
Another day, another round of Teams updates. With the flood of recent Teams features coming out, it is easy to lose...
Phishing Awareness 101: Keep Your Information Safe in 2022
Happy New Year to everyone! Here’s to a year that (eventually) brings us some semblance of normalcy after these crazy...
Create an Organizational Dashboard and Change the World
If you look at John Mohr’s LinkedIn profile, you will see he says, “Let’s solve hard problems and change the world.”...
What You Need to Know About the Log4j Vulnerability
Oops. As if an actual virus was not bad enough, now IT Managers find out about the log4j vulnerability. I am going to...
The Twelve Tech Tunes of Christmas
Well friends, it is that time of year again. Christmas time! (With a shout out to Hanukkah, Kwanzaa, and your winter...
Loop Components: Next-Level Collaboration in Microsoft Teams
Microsoft Loop is the latest collaboration app for Teams. The Loop app makes it easier for colleagues to work together...
Fortify Your Security With MDR
The IT universe is filled with acronyms, and the world of managed security is no exception: MDR, MSSP, SIEM, EDR....
How and Why to Create Chat Retention Policies
We know that anything left unattended will quickly become messy. Just ask the parents of any toddler. We all have been...
Black Friday Phishing Scams: It’s Primetime for Cybercrime
Email security company Tessian is warning people to be alert for Black Friday phishing scams this year. (Understand...
Nonprofit Options for Endpoint Security
I had a reader of our email update (thank you!) get in touch after reading my post about Microsoft 365 licensing...
New Ignite Teams Features are Coming Your Way
Microsoft held its Ignite conference last week. If you haven’t heard of Ignite, it is Microsoft's vehicle for making...
The Impact of a Ransomware Attack
My colleague Dan Callahan and I have written many, many posts on the scourge of ransomware. We’ve covered everything...
Microsoft Announces a Security Program for Nonprofits
Microsoft Ignite is going on this week. That means they are making a flood of product announcements. I will cover some...
How to Sort Out Your Microsoft Nonprofit Cloud Subscriptions
What is Happening with Microsoft Nonprofit Cloud Subscriptions? Welcome to another “nuts and bolts” post. (It could be...
Cybercrime and the Holidays: Tips to Stay Safe
As October winds down, so too is it time to wind down Cybersecurity Awareness Month. So, taking a cue from the...
Cybersecurity Awareness Trends: Easy Phishing in Troubled Waters
Lately I’ve seen the results of lots of annual data security studies popping up. I talked about the results of...
You Are on the Hook for Governing No-Code Development
One of the things that I admired about MIT’s introductory computer science class is that it focused on the structure...
Updates to Microsoft’s Cloud-first Grant Program
Hey there! Or should I say “Aye, laddies and lassies!” I am back from a fantastic two weeks in Scotland. Great people,...