Cybersecurity isn’t just something big companies have to worry about anymore—small organizations are increasingly on...
Today’s Password Managers: A Review
Now that Cybersecurity Awareness Month is in full swing, I thought I'd explore one of the best methods for keeping...
Cybersecurity Training Shortfalls Exposed
Yubico, a manufacturer of security keys headquartered in Silicon Valley, recently released the findings of a...
AI Chatbot Citations: Can They Be Trusted?
I was hosting some training earlier today on how to use generative AI chatbots (in this case, Microsoft’s Bing...
The Power of Play: Use Games to Teach Cybersecurity Awareness
Next month is National Cybersecurity Awareness Month. And in today's digital age, cybersecurity awareness is more...
Phishing Attacks Are on the Rise! Tips to Keep Your Staff Safe
In today's digital age, phishing attacks have become a prevalent threat to organizations of all sizes. Just this week...
Ensure Data Security Before Deploying Copilot for Microsoft 365
In the era of digital transformation, businesses are increasingly turning to AI-powered tools like Microsoft Copilot...
Simulated Phishing: A Critical Part of Cybersecurity Training
Simulated phishing tests are critical to a well-rounded cybersecurity awareness program. By sending fake phishing...
QR Code Phishing: From Scan to Scam
You may have heard of QR code phishing – cutely nicknamed “quishing” to fit right in with its other phishing...
Budget-Friendly Security Essentials: A Bird’s-Eye View
I find it mindboggling to think about how many aspects need to be considered for solid security. And I wonder how many...
Decoding Endpoint Security: A Guide to Choosing the Right EDR Solution
Running a few hundred security operations centers isn’t easy. While debates about how to build the perfect SOC change...
AI Generated Phishing Is Here. What Now?
It was something we’d already been speculating on and expecting to happen soon: criminals using AI to generate nearly...
AI and Cybersecurity: Trends for 2024
AI is expected to play a dominant role in cybersecurity in 2024. It is emerging as a powerful ally in the fight...
Observations on Managed Detection and Response (MDR)
Over the decades, we have used dozens of security systems and products. However, a new gold standard in security...
Advice From a Hacker: Don’t Wait to Protect Your Organization!
Many of us have doorbell cameras or even complete security systems that monitor the access points of our homes. We...
Social Media: Protecting Yourself and Your Organization
More than half the people in the world are on social media – that’s nearly 5 billion – and it’s not going anywhere....
Cyber Hygiene is Key to Cybersecurity
Cyber hygiene refers to the steps we take to keep our network and computers healthy and safe from external threat....
Take Steps to Protect Your Organization from Social Engineering
Two things happened this week that got me thinking about social engineering. First, I bought a new iPhone for my son...