Simulated phishing tests are critical to a well-rounded cybersecurity awareness program. By sending fake phishing...
QR Code Phishing: From Scan to Scam
You may have heard of QR code phishing – cutely nicknamed “quishing” to fit right in with its other phishing...
Budget-Friendly Security Essentials: A Bird’s-Eye View
I find it mindboggling to think about how many aspects need to be considered for solid security. And I wonder how many...
Decoding Endpoint Security: A Guide to Choosing the Right EDR Solution
Running a few hundred security operations centers isn’t easy. While debates about how to build the perfect SOC change...
AI Generated Phishing Is Here. What Now?
It was something we’d already been speculating on and expecting to happen soon: criminals using AI to generate nearly...
AI and Cybersecurity: Trends for 2024
AI is expected to play a dominant role in cybersecurity in 2024. It is emerging as a powerful ally in the fight...
Observations on Managed Detection and Response (MDR)
Over the decades, we have used dozens of security systems and products. However, a new gold standard in security...
Advice From a Hacker: Don’t Wait to Protect Your Organization!
Many of us have doorbell cameras or even complete security systems that monitor the access points of our homes. We...
Social Media: Protecting Yourself and Your Organization
More than half the people in the world are on social media – that’s nearly 5 billion – and it’s not going anywhere....
Cyber Hygiene is Key to Cybersecurity
Cyber hygiene refers to the steps we take to keep our network and computers healthy and safe from external threat....
Take Steps to Protect Your Organization from Social Engineering
Two things happened this week that got me thinking about social engineering. First, I bought a new iPhone for my son...
Browser Extensions: It’s Time to Mitigate the Risks
Let's talk about extensions, the apps for your browser that enhance your experience. There are shopping...
Put Microsoft Entra on Your Radar
Today I want to talk about Microsoft Entra. What is it? What problem does it solve? Will it make your life easier or...
Work With Your Secure Score and Improve Your Security
Microsoft Secure Score. “That again?” you say. Yes, that. We have written about Secure Score before. I recently worked...
Frequent Cybersecurity Training a Must!
According to a new report from cybersecurity company Fortinet, nearly 60% of organizational leadership thinks that...
Check Out These Valuable Extensions to Data Loss Prevention
Microsoft has been busy lately on the data loss prevention front. The bad news: they are forming new information...
Top Phishing Subject Lines So Far in 2023
Every quarter, our partners at KnowBe4 report on the most-clicked phishing email subject lines. They look at what they...
Remember to Check Your Email Security
Sometimes we marvel at the amazing discoveries from the James Webb Space Telescope. Other times, we turn a pair of...