I spend a lot of time thinking about cybersecurity, and CGNET conducts multiple studies each month to identify...
Sounding the Alarm on Mobile Hacking
Mobile security company Zimperium recently released their 2024 Global Mobile Threat Report, and their findings should...
INKY: Smarter, Safer Email Security
When I first started using computers, security wasn’t much of a concern. We were all part of one big, happy family....
The Human Firewall: First Line of Defense in Cybersecurity
Your organization might be under the false impression that cybersecurity and risk management are solely the...
Hack-Proof Your Passwords
I recall when passwords could only be eight characters – I remember my favorite Unix password was 4rich*. By the early...
Passkeys: The New-School Data Security Solution
In our tech-savvy world, keeping your data safe is more important than ever. With cyber threats lurking around every...
5 Cybersecurity Mistakes Small Organizations Make
Cybersecurity isn’t just something big companies have to worry about anymore—small organizations are increasingly on...
Today’s Password Managers: A Review
Now that Cybersecurity Awareness Month is in full swing, I thought I'd explore one of the best methods for keeping...
Cybersecurity Training Shortfalls Exposed
Yubico, a manufacturer of security keys headquartered in Silicon Valley, recently released the findings of a...
AI Chatbot Citations: Can They Be Trusted?
I was hosting some training earlier today on how to use generative AI chatbots (in this case, Microsoft’s Bing...
The Power of Play: Use Games to Teach Cybersecurity Awareness
Next month is National Cybersecurity Awareness Month. And in today's digital age, cybersecurity awareness is more...
Phishing Attacks Are on the Rise! Tips to Keep Your Staff Safe
In today's digital age, phishing attacks have become a prevalent threat to organizations of all sizes. Just this week...
Ensure Data Security Before Deploying Copilot for Microsoft 365
In the era of digital transformation, businesses are increasingly turning to AI-powered tools like Microsoft Copilot...
Simulated Phishing: A Critical Part of Cybersecurity Training
Simulated phishing tests are critical to a well-rounded cybersecurity awareness program. By sending fake phishing...
QR Code Phishing: From Scan to Scam
You may have heard of QR code phishing – cutely nicknamed “quishing” to fit right in with its other phishing...
Budget-Friendly Security Essentials: A Bird’s-Eye View
I find it mindboggling to think about how many aspects need to be considered for solid security. And I wonder how many...
Decoding Endpoint Security: A Guide to Choosing the Right EDR Solution
Running a few hundred security operations centers isn’t easy. While debates about how to build the perfect SOC change...
AI Generated Phishing Is Here. What Now?
It was something we’d already been speculating on and expecting to happen soon: criminals using AI to generate nearly...