Just this past week, according to an article at Forbes.com, Cisco was hacked by a ransomware group who claims to now...
Jackie Bilodeau
Introducing Microsoft Viva Engage
A couple of weeks ago I wrote about the new hybrid workplace tools announced at Microsoft’s annual Inspire event in...
Microsoft’s New Tools for the Hybrid Workplace
At this year’s Inspire event happening this week, Microsoft announced a variety of new tools to enhance the hybrid...
Command the Conversation in Teams
Whether during a general discussion within a channel or in a private group chat, there are numerous ways to take...
Passwordless Future Almost Here: Major Milestone Announced
Last month, Microsoft, Google and Apple all announced that they will expand their support for the passwordless...
How Secure are Password Managers?
We’ve recommended using password managers many times in past posts. But the usual worry still comes up: How safe and...
Password Policy Advice from the Pros
After several months of research, our partners at the cybersecurity firm KnowBe4 released their official...
Smishing Attacks Sharply on the Rise
Smishing attacks, the text-based (SMS) form of phishing, have become a big problem. In fact, in 2021 they were a...
Microsoft Introduces Bookings in Outlook
Bookings in Outlook is coming to help you reduce the back and forth in scheduling, while helping you maintain control...
Try Experiential Cybersecurity Awareness Training and Reap the Rewards
Over the past few years, I’ve written a couple of posts on using games to make cybersecurity training more fun for...
Top Phishing Subject Lines Revealed
Each quarter, our partners at KnowBe4 report on the top phishing subject lines clicked on in the cybersecurity...
Build a Strong and Sustainable Security Culture
A security culture is the foundation to an organization’s entire security program. But what is it? A formal definition...
10 Cyber Hygiene Tips for Your Staff
If the pandemic did anything positive for the world over the past couple of years, it served as a reminder for good...
Password Security: The Double-Blind Password Hack
I stumbled upon a great idea this week while reading through some articles on password security. There are a multitude...
Mobile Cyberattacks Steep Rise: What You Need to Know
Last week cybersecurity firm Zimperium published its annual mobile cyberattack threat report, and the news was not...
How to Create an IT Strategy Roadmap for your Organization
When it comes time to set your IT budget, obviously it’s easiest to fall back on the attitude of, “Let’s just do the...
CGNET Welcomes New Security Pro to the Team
In recent months, CGNET has seen an increase in demand for our managed cyber security services. For that reason, we...
Information Risk Assessments: 7 Steps to Data Safety
In today’s world, looking for cracks in the security of your organization’s data is critical. After all, cyber-attacks...

















