Smishing attacks, the text-based (SMS) form of phishing, have become a big problem. In fact, in 2021 they were a...
Have You Used the “Essential Eight” to Improve Your Security?
I recently proposed a security talk for the Technology Association of Grantmakers (TAG) annual meeting (IRL!). When I...
Has the Time Come for Password Replacement?
Did you miss World Password Day last Thursday? Me, too. (As it turns out, it was also International Day of the...
Try Experiential Cybersecurity Awareness Training and Reap the Rewards
Over the past few years, I’ve written a couple of posts on using games to make cybersecurity training more fun for...
Top Phishing Subject Lines Revealed
Each quarter, our partners at KnowBe4 report on the top phishing subject lines clicked on in the cybersecurity...
Choose Your Security When You Choose Your Apps
Today I will share my experience working with two different organizations on security. One organization is an...
Build a Strong and Sustainable Security Culture
A security culture is the foundation to an organization’s entire security program. But what is it? A formal definition...
Is It Time You Looked at Managed Detection and Response?
Managed Detection and Response (MDR) is a hot space in cybersecurity these days. Gartner, Forrester, and IDC all have...
10 Cyber Hygiene Tips for Your Staff
If the pandemic did anything positive for the world over the past couple of years, it served as a reminder for good...
Password Security: The Double-Blind Password Hack
I stumbled upon a great idea this week while reading through some articles on password security. There are a multitude...
How to Respond to the Okta Breach
Are you freaking out about the Okta breach? Allow me to make some suggestions about actions you can take to ensure the...
Mobile Cyberattacks Steep Rise: What You Need to Know
Last week cybersecurity firm Zimperium published its annual mobile cyberattack threat report, and the news was not...
Get Started with the NIST Cybersecurity Framework
I was on a call yesterday, where consultants from Accenture were reviewing the cybersecurity implications of the war...
What Are Some Encryption Best Practices?
In working with a customer on their security program, they asked us about encryption best practices. We determined...
CGNET Welcomes New Security Pro to the Team
In recent months, CGNET has seen an increase in demand for our managed cyber security services. For that reason, we...
Information Risk Assessments: 7 Steps to Data Safety
In today’s world, looking for cracks in the security of your organization’s data is critical. After all, cyber-attacks...
Cyber security training: How often is enough?
Google the question “How often should we do cyber security training”. You are sure to find multiple sites that...
Phishing Awareness 101: Keep Your Information Safe in 2022
Happy New Year to everyone! Here’s to a year that (eventually) brings us some semblance of normalcy after these crazy...