When was the last time you took a look at all of your IT assets? And I mean, ALL of them? There are several reasons...
Jackie Bilodeau
Is ChatGPT a Threat to Your Organization’s Data Security?
Unless you’ve been living under a rock for the past few months (and if so, welcome back!), you’ve likely heard about...
Remote Workers and Cybersecurity: Some Important Reminders
Both hybrid and remote work have become extremely common - if not the norm - now that the world has entered a...
Is the New Microsoft Teams Premium Worth the Upgrade?
According to Microsoft, the new Teams Premium package takes the standard Teams offering to a new level, making “every...
Steps to Surviving a Ransomware Attack
You’ve just been hit with a ransomware attack. Now what? Obviously, the easiest thing to do (for some) seems to be to...
Microsoft Teams: New Features for 2023
As 2022 ended and a new year kicked off, Microsoft began rolling out new Teams features and changes. Read on to...
Top Phishing Trends in 2022
Our partners at cybersecurity firm INKY just came out with their “Email Security Annual Report” for 2022-2023, chock...
How to Record and Share a Video Clip in Teams Chat
Let’s say you are in the middle of a chat with another person – or group – in Teams, and there is something that you...
Clone Phishing: A Scary New Tactic
Oh boy. These guys just don’t stop; they’re coming up with new tricks to steal our data, left, right and center. The...
The Online Holiday Scams You Need to Look Out For
Yes, my friends, it’s that time of year again. Time to start making our lists and checking them twice. Time to start...
Phishing Business-Related Messages Still Most Successful
Back in April I gave you the results of a quarterly study by KnowBe4 that looks into which phishing subject lines...
Can We Please Stop Making it So Easy for the Hackers?
Ahhh, passwords. The bane of our collective existence. Yes, we know we need them to protect our private information....
Phishing in Your Own Pond: The Importance of Simulated Phish Tests
Phishing simulations are a key part of any comprehensive security awareness training program. By sending out fake...
Four Factors for Effective Security Awareness Training
Social engineering remains the top way criminals infiltrate an organization’s data, and the problem gets worse every...
Yes, MFA Can Be Hacked. Now What?
I read a blog post today from our friends and partners at cybersecurity firm KnowBe4 that was a bit unnerving. While...
The Human Firewall: The MOST Important Part of Cybersecurity
Your organization may be guilty of a common misconception, that cybersecurity and risk management are the sole purview...
Cisco Just Got Phished: Don’t Be Next!
Just this past week, according to an article at Forbes.com, Cisco was hacked by a ransomware group who claims to now...
Introducing Microsoft Viva Engage
A couple of weeks ago I wrote about the new hybrid workplace tools announced at Microsoft’s annual Inspire event in...