At this year’s Inspire event happening this week, Microsoft announced a variety of new tools to enhance the hybrid...
Jackie Bilodeau
Command the Conversation in Teams
Whether during a general discussion within a channel or in a private group chat, there are numerous ways to take...
Passwordless Future Almost Here: Major Milestone Announced
Last month, Microsoft, Google and Apple all announced that they will expand their support for the passwordless...
How Secure are Password Managers?
We’ve recommended using password managers many times in past posts. (See here and here). But the usual worry still...
Password Policy Advice from the Pros
After several months of research, our partners at the cybersecurity firm KnowBe4 released their official...
Smishing Attacks Sharply on the Rise
Smishing attacks, the text-based (SMS) form of phishing, have become a big problem. In fact, in 2021 they were a...
Microsoft Introduces Bookings in Outlook
Bookings in Outlook is coming to help you reduce the back and forth in scheduling, while helping you maintain control...
Try Experiential Cybersecurity Awareness Training and Reap the Rewards
Over the past few years, I’ve written a couple of posts on using games to make cybersecurity training more fun for...
Top Phishing Subject Lines Revealed
Each quarter, our partners at KnowBe4 report on the top phishing subject lines clicked on in the cybersecurity...
Build a Strong and Sustainable Security Culture
A security culture is the foundation to an organization’s entire security program. But what is it? A formal definition...
10 Cyber Hygiene Tips for Your Staff
If the pandemic did anything positive for the world over the past couple of years, it served as a reminder for good...
Password Security: The Double-Blind Password Hack
I stumbled upon a great idea this week while reading through some articles on password security. There are a multitude...
Mobile Cyberattacks Steep Rise: What You Need to Know
Last week cybersecurity firm Zimperium published its annual mobile cyberattack threat report, and the news was not...
How to Create an IT Strategy Roadmap for your Organization
When it comes time to set your IT budget, obviously it’s easiest to fall back on the attitude of, “Let’s just do the...
CGNET Welcomes New Security Pro to the Team
In recent months, CGNET has seen an increase in demand for our managed cyber security services. For that reason, we...
Information Risk Assessments: 7 Steps to Data Safety
In today’s world, looking for cracks in the security of your organization’s data is critical. After all, cyber-attacks...
Cyber security training: How often is enough?
Google the question “How often should we do cyber security training”. You are sure to find multiple sites that...
Phishing Awareness 101: Keep Your Information Safe in 2022
Happy New Year to everyone! Here’s to a year that (eventually) brings us some semblance of normalcy after these crazy...