Next month is National Cybersecurity Awareness Month. And in today's digital age, cybersecurity awareness is more...
Phishing Attacks Are on the Rise! Tips to Keep Your Staff Safe
In today's digital age, phishing attacks have become a prevalent threat to organizations of all sizes. Just this week...
Ensure Data Security Before Deploying Copilot for Microsoft 365
In the era of digital transformation, businesses are increasingly turning to AI-powered tools like Microsoft Copilot...
Simulated Phishing: A Critical Part of Cybersecurity Training
Simulated phishing tests are critical to a well-rounded cybersecurity awareness program. By sending fake phishing...
QR Code Phishing: From Scan to Scam
You may have heard of QR code phishing – cutely nicknamed “quishing” to fit right in with its other phishing...
Budget-Friendly Security Essentials: A Bird’s-Eye View
I find it mindboggling to think about how many aspects need to be considered for solid security. And I wonder how many...
Decoding Endpoint Security: A Guide to Choosing the Right EDR Solution
Running a few hundred security operations centers isn’t easy. While debates about how to build the perfect SOC change...
AI Generated Phishing Is Here. What Now?
It was something we’d already been speculating on and expecting to happen soon: criminals using AI to generate nearly...
AI and Cybersecurity: Trends for 2024
AI is expected to play a dominant role in cybersecurity in 2024. It is emerging as a powerful ally in the fight...
Observations on Managed Detection and Response (MDR)
Over the decades, we have used dozens of security systems and products. However, a new gold standard in security...
Advice From a Hacker: Don’t Wait to Protect Your Organization!
Many of us have doorbell cameras or even complete security systems that monitor the access points of our homes. We...
Social Media: Protecting Yourself and Your Organization
More than half the people in the world are on social media – that’s nearly 5 billion – and it’s not going anywhere....
Cyber Hygiene is Key to Cybersecurity
Cyber hygiene refers to the steps we take to keep our network and computers healthy and safe from external threat....
Take Steps to Protect Your Organization from Social Engineering
Two things happened this week that got me thinking about social engineering. First, I bought a new iPhone for my son...
Browser Extensions: It’s Time to Mitigate the Risks
Let's talk about extensions, the apps for your browser that enhance your experience. There are shopping...
Put Microsoft Entra on Your Radar
Today I want to talk about Microsoft Entra. What is it? What problem does it solve? Will it make your life easier or...
Work With Your Secure Score and Improve Your Security
Microsoft Secure Score. “That again?” you say. Yes, that. We have written about Secure Score before. I recently worked...
Frequent Cybersecurity Training a Must!
According to a new report from cybersecurity company Fortinet, nearly 60% of organizational leadership thinks that...