In recent months, the Cybersecurity and Infrastructure Security Agency (CISA) has faced significant workforce...
Cybersecurity Meets the Art of War: Why Sun Tzu Still Wins in the Digital Age
Ever since I wrote Zen and the Art of Cybersecurity, I’ve kept an eye out for other Eastern philosophies that could...
AI Scams Are Getting Smarter – Is Your Nonprofit Ready?
At CGNET, we’ve seen a spike in calls lately - nonprofits reporting scams that actually worked. In several cases, the...
Zen and the Art of Cybersecurity Maintenance
When Zen and the Art of Motorcycle Maintenance came out in 1974, it felt like every grad student at Stanford had a...
Multi-Factor Authentication (MFA): Ignore at Your Own Risk
I know I’m preaching to the choir here -- everyone understands that MFA is crucial. But here’s the thing: there’s...
Test Your Cyber IQ – What’s Your Grade?
Cybersecurity is evolving fast, and understanding the key concepts is crucial for anyone working with technology. But...
Microsoft Purview: Safeguarding Your Data in the Age of AI
If employees are the lifeblood of a company, its data is the nervous system that drives decision-making and...
The Top 10 Microsoft Copilot Security Risks (And How to Fix Them)
AI tools are everywhere right now, promising to make your workday smoother, faster, and to be honest, a bit more...
Microsoft Teams’ Security Tops its Collaboration Competitors
'In today's digital age, keeping your collaboration tools secure is super important. Microsoft Teams isn't just...
GenAI Prompts at Work: Risky Business
Generative AI (GenAI) tools are becoming increasingly popular in the workplace, but they come with significant risks....
Mobile Phone Security: CISA’s Recommendations
When you really think about it, today our mobile phones are much more than just communication devices. We use them as...
Insider Cybersecurity Threats: The Danger Within
According to CISA, insider cybersecurity threats—stemming from employees, contractors, or trusted individuals—are a...
Facebook Copyright Infringement Phishing Scam
A new phishing campaign targets Facebook users with business account pages by sending fake threats of copyright...
Cybersecurity Training is the Key to Data Protection
I feel like we’ve got just about every cybersecurity defense in place, and they’re all working great! But even this...
Stay Safe on Public Wi-Fi
Who doesn’t love the convenience of free Wi-Fi—whether it's at your neighborhood Starbucks, the grocery store, or the...
The Rise of Sophisticated Voice Phishing Scams
If you want a good scare put into you, take the time to read the article "A Day in the Life of a Prolific Voice...
AI-Powered Phishing Scams: Smarter and More Dangerous
I remember when phishing emails (like the infamous Nigerian Prince scams) were easy to spot due to poor grammar, bad...
The Rise of Phishing Attacks on New Generic Domains
In the ever-evolving landscape of cybersecurity, phishing remains one of the most prevalent and dangerous threats. As...