Your best cybersecurity posture is one where you can be proactive about managing security. Your next best posture is...
Dan Callahan
Answer These Ten Questions for Better Security
Our crack Communications Director Jackie recently came across this infographic from Microsoft. It’s a ten-question...
How Will You Manage Personal Device Access?
There was a time—not too long ago—when IT Managers thought about managing personal device access in either/or terms....
Leverage the Cloud for Security
We had it all wrong. When Salesforce and other SaaS (software as a service) services hit the market, we pundits talked...
Critical Cyber Security Questions & The Answers You Need Now
I gave a talk today at the Council of New Jersey Grantmakers’ virtual conference. I spoke about risk assessments—what...
Act Against Ransomware and Data Exfiltration
It’s time to step up your game as you act against ransomware. Here’s why. KnowBe4, in this blog post (shout out to my...
Do You Have a Right-Sized Business Continuity Plan?
I had a déjà vu moment talking with a customer this week. The customer asked me how we could deliver (what I would...
There’s Even More Reason to Leverage the CIS Controls for Security
Here at CGNET we’re big fans of the Center for Internet Security (CIS) and their CIS Controls. Organizations can...
Three Tips to Make Remote Work Work
As the COVID-19 pandemic continues, I’m sensing a change in thinking among our customers. The initial focus was on the...
Use the Art of Teamwork to Achieve Greater Success
We’ve talked a lot about teamwork, especially about the technology of teamwork). Today I want to focus on the art of...
Rethink Your Digital Engagement
Monday, I participated in a session on cybersecurity at a virtual conference hosted by United Philanthropy Forum....
Learn More About Azure Backup
How do you recover from a ransomware attack? You can pay the ransom. That might work but certainly feels like a fail....
Use Conditional Access to Strengthen Your Remote Work Setup
Most customers tell me they don’t see their staff returning to the office anytime soon. This means we will continue to...
So You’ve Been Pwned
If you’re of a certain age, you’ll recall the pamphlets the doctors would hand you at the end of your visit, so you...
Start Your Information Protection Journey by Creating Labels
Here are three common activities that require creating labels. Document management: use labels (aka “tags”) to help...
CISA Office 365 Security Recommendations
CISA, the Cybersecurity and Infrastructure Security Agency (we’re from the government and here to help) recently put...
It’s Time to Document Your Workflows
Three things happened this week that got me thinking about the need to document your workflows. I’ve been working with...
Remember Some Basic Phishing Protections
The COVID-19 pandemic, like other catastrophes, brings out the best and worst in humanity. I’ll get to the heroes...