Last month, Microsoft, Google and Apple all announced that they will expand their support for the passwordless...
Let ComplyUp Take Care of Your Security Compliance Planning
I have written in the past about using a tool to assess your organization’s compliance against a security standard....
How Secure are Password Managers?
We’ve recommended using password managers many times in past posts. But the usual worry still comes up: How safe and...
Trending Cyber Threats Spell No Summer Vacation for You
I want to talk about trending cyber threats. What they are, and why it means there will be no summer vacation for you....
Password Policy Advice from the Pros
After several months of research, our partners at the cybersecurity firm KnowBe4 released their official...
Smishing Attacks Sharply on the Rise
Smishing attacks, the text-based (SMS) form of phishing, have become a big problem. In fact, in 2021 they were a...
Have You Used the “Essential Eight” to Improve Your Security?
I recently proposed a security talk for the Technology Association of Grantmakers (TAG) annual meeting (IRL!). When I...
Has the Time Come for Password Replacement?
Did you miss World Password Day last Thursday? Me, too. (As it turns out, it was also International Day of the...
Try Experiential Cybersecurity Awareness Training and Reap the Rewards
Over the past few years, I’ve written a couple of posts on using games to make cybersecurity training more fun for...
Top Phishing Subject Lines Revealed
Each quarter, our partners at KnowBe4 report on the top phishing subject lines clicked on in the cybersecurity...
Choose Your Security When You Choose Your Apps
Today I will share my experience working with two different organizations on security. One organization is an...
Build a Strong and Sustainable Security Culture
A security culture is the foundation to an organization’s entire security program. But what is it? A formal definition...
Is It Time You Looked at Managed Detection and Response?
Managed Detection and Response (MDR) is a hot space in cybersecurity these days. Gartner, Forrester, and IDC all have...
10 Cyber Hygiene Tips for Your Staff
If the pandemic did anything positive for the world over the past couple of years, it served as a reminder for good...
Password Security: The Double-Blind Password Hack
I stumbled upon a great idea this week while reading through some articles on password security. There are a multitude...
How to Respond to the Okta Breach
Are you freaking out about the Okta breach? Allow me to make some suggestions about actions you can take to ensure the...
Mobile Cyberattacks Steep Rise: What You Need to Know
Last week cybersecurity firm Zimperium published its annual mobile cyberattack threat report, and the news was not...
Get Started with the NIST Cybersecurity Framework
I was on a call yesterday, where consultants from Accenture were reviewing the cybersecurity implications of the war...

















