Blog Library
Patch Your Exchange Server Now. But Don’t Stop There.
As luck would have it, I was putting together a proposal last week to help a non-profit. The organization was coming...
Check Out These New Tools and Services from CGNET
New Year’s celebrations have come and gone and things are really starting to look up again. (After all, on the Lunar...
Say Goodbye to Passwords With Microsoft’s Zero Trust Strategy
Well, we’ve survived a year in a pandemic and we’ve had to adapt the way we work in significant ways. At the same...
Have You Heard About the Latest Teams Features?
Microsoft this week has been holding Ignite, their annual conference where they focus on product announcements. A lot...
It’s the Little Things That Matter
Sometimes, it’s the little things that matter. Case in point: Microsoft’s Universal Print. We have been actively...
How to Pop out Apps and Tabs in Teams
As those of us who use it every day know, Microsoft Teams is all about collaboration. It’s the digital workspace...
Introducing Microsoft Viva: A Game Changer for Remote Work
Last week Microsoft began the rollout of its new Viva platform, and it may just change the way people work from home...
Skype is Retiring. It’s Time to Move to Teams.
** Quick Update: Thanks to one of our customers for pointing out to us that the Skype retirement is ONLY for Skype for...
Investigate and Remediate Threats with Zero Trust
Congratulations! We have made it to the top of our Zero Trust stack. Today I am going to cover the steps you can take...
New Year, New Teams Features
In early December, my colleague Dan Callahan wrote a great post on all sorts of new features in Teams. Since then --...
Secure Your Network with Zero Trust
We are closing in on the end of our Zero Trust journey. (For some of you, that cannot happen soon enough!) In this...
Use Zero Trust to Secure Your Infrastructure
Secure your infrastructure. If you have been reading my posts on installing a Zero Trust security framework… Thank...
Five Best Practices for Cloud Security
Cybersecurity practices for organizations using the cloud should be implemented differently than for those who do not....
More on Securing Your Phone
We wrote a post back in 2018 (seems like forever ago!) on securing your phone while traveling abroad (remember...
Plan to Secure Your Data with Zero Trust
This week we return to the topic of a Zero Trust security implementation. So far, I have covered how to secure your...
Top Cybersecurity Challenges and Priorities for 2021
Yes, 2020 was a real doozy. Because of the pandemic, organizations worldwide were caught off-guard by mandatory...
Is it Time for a Teams Tune-up?
Has the time come for your organization to conduct a Teams tune-up? It could be. There has been a joke going around...
Cybersecurity Drills: 6 Reasons They’re Worth It
We all know from recent headlines that not even the largest of organizations is immune to a cyber-attack. But we also...
The Twelve Days of Remote Work
Careful readers will recall that last year I posted on the Twelve Days of Cybersecurity. If you missed it, you can...
Secure Your Apps with Zero Trust in Mind
I have been writing about the Zero Trust security model and how to apply it in your organization. We tackled the first...
The COVID-19 Vaccine is Here. And So Are the Phishing Scams
It was pretty predictable: With all of the hoopla around the COVID-19 vaccine, there would most certainly be the...
Enhance Training With a Security by Design Approach
Recently the experts at Information Security Forum (ISF) offered new guidance on how to move beyond half-hearted...
Check Out These New Teams Features
As the COVID-19 pandemic continues, we continue to participate in the greatest real-time remote work experiment...
Secure Your Devices to Extend Zero Trust
In my most recent blog post we started down the path of Zero Trust and how to enable it in your organization. It was a...
How to Do Polling in Teams: A Step-by-Step Guide
Polling in Teams is not only a quick way to collect information, but it can also be a great way to keep team members...
Create a Zero Trust Action Plan
Zero Trust. No, I’m not talking about the U.S. Presidential election. I am talking about cybersecurity. If you have...
6 Bad Password Habits It’s Time to Break
A few weeks ago, the team at security.org put together a report titled “America’s Password Habits 2020”. They asked...
Secure Your Virtual Machines in Azure
What are you doing to secure your Virtual Machines in Azure? Or in any public cloud for that matter? "What’s that?"...
Protect Against Credential Stuffing Attacks
Stuffing. Such a timely word now. There’s stuffing that goes in the Thanksgiving turkey. There’s Santa stuffing the...
Train Your Workers About Mobile Phishing Attacks. NOW.
They already feel like overused, clichéd expressions: “These are uncertain times.” “We need to prepare for the new...