It seems like every week I see news stories about how cybersecurity threats are evolving at a frightening rate, now...
Cybersecurity Insurance: A Shield or a Sham?
Cybersecurity insurance has become a hot topic in recent years, especially as data breaches, ransomware attacks, and...
Email Spoofing: When the Message in Your Inbox Comes from You
This topic reminds me of that 1979 horror movie with the famous line, “The call is coming from inside the house!” ...
Identity Theft: The Major Cyber Threat to Mid-Sized Organizations
When we think about cybersecurity, we often picture firewalls, antivirus software, and ransomware protection—and yes,...
The Impact of DOGE Cuts to CISA and Organizational Cybersecurity
In recent months, the Cybersecurity and Infrastructure Security Agency (CISA) has faced significant workforce...
Cybersecurity Meets the Art of War: Why Sun Tzu Still Wins in the Digital Age
Ever since I wrote Zen and the Art of Cybersecurity, I’ve kept an eye out for other Eastern philosophies that could...
AI Scams Are Getting Smarter – Is Your Nonprofit Ready?
At CGNET, we’ve seen a spike in calls lately - nonprofits reporting scams that actually worked. In several cases, the...
Zen and the Art of Cybersecurity Maintenance
When Zen and the Art of Motorcycle Maintenance came out in 1974, it felt like every grad student at Stanford had a...
Multi-Factor Authentication (MFA): Ignore at Your Own Risk
I know I’m preaching to the choir here -- everyone understands that MFA is crucial. But here’s the thing: there’s...
Test Your Cyber IQ – What’s Your Grade?
Cybersecurity is evolving fast, and understanding the key concepts is crucial for anyone working with technology. But...
Microsoft Purview: Safeguarding Your Data in the Age of AI
If employees are the lifeblood of a company, its data is the nervous system that drives decision-making and...
The Top 10 Microsoft Copilot Security Risks (And How to Fix Them)
AI tools are everywhere right now, promising to make your workday smoother, faster, and to be honest, a bit more...
Microsoft Teams’ Security Tops its Collaboration Competitors
'In today's digital age, keeping your collaboration tools secure is super important. Microsoft Teams isn't just...
GenAI Prompts at Work: Risky Business
Generative AI (GenAI) tools are becoming increasingly popular in the workplace, but they come with significant risks....
Mobile Phone Security: CISA’s Recommendations
When you really think about it, today our mobile phones are much more than just communication devices. We use them as...
Insider Cybersecurity Threats: The Danger Within
According to CISA, insider cybersecurity threats—stemming from employees, contractors, or trusted individuals—are a...
Facebook Copyright Infringement Phishing Scam
A new phishing campaign targets Facebook users with business account pages by sending fake threats of copyright...
Cybersecurity Training is the Key to Data Protection
I feel like we’ve got just about every cybersecurity defense in place, and they’re all working great! But even this...