Tim Berners-Lee, the world-renowned inventor of the World Wide Web, is promoting “The Contract for the Web,” which he...
Tim Haight
Hackers in Charge
Clients often ask us how to advise their employees about cyber security on the road. We have a list of things to...
Making a Federal Case of the Capital One Hack
On October 24, Senators Elizabeth Warren and Ron Wyden wrote the Federal Trade Commission asking that the FTC...
Include Security in Appropriate Use Policies
Now that we’ve realized that the weakest part of our cyber security defense is the end user, what to do? Phishing...
Can We Evaluate Grants Yet?
Is it possible to say anything actionable about appropriate IT for measuring the social impact of a foundation’s...
How to Hire an IT Support Company
Sometimes, clients ask us to help them hire an IT services company. For example, a foundation recently asked us to...
An Undisclosed Number of Tips for IT Strategic Assessments
Anybody can do an IT strategic assessment and make recommendations. The trick is to get your recommendations accepted....
Get Your Security Systems under Controls
The latest version (7.1) of the CIS Controls can make planning your overall IT security effort much easier. The...
How Secure Is Your Attack Surface?
Recently, CGNET has begun to offer attack surface assessments in addition to internal and external penetration...
Reconsidering Website Email Addresses
Deciding whether and how to post email addresses on websites is an old problem. In internet time, that means several...
Comparing Cloud Services, or Not
Now that everybody is moving to the cloud, quick or slow, I thought I’d spend a little time complaining about the...
Keeping Up on Your Cybersecurity Reading
Like so much of our lives, the world of cybersecurity is in information overload. Computer security has become big...
Advice from the Security Incident Responders
Another of those neat annual reports describing IT security threats has just come out. It's the Secureworks 2019...
IT Support for the Small Foundation
If your foundation, or other organization, has less than about 30 staff, you probably don’t have a full-time IT...
TAG to Publish Risk Assessment Checklist
Later this month, TAG, the international group for foundation IT managers and grant managers, will publish an article...
TAG Members Share Security Information
The Technology Affinity Group (TAG) has put together an impressive set of materials about cybersecurity. If you have...
Email Encryption Made Simple
Most of us are familiar with the virtues of email encryption. We don’t adopt it, however, because it will make things...
Phishing in Your Users’ Pockets
You may be confident that you’ve conquered phishing in your users’ office email, but how are they doing on their...