Ransomware attacks are like earthquakes. They are no fun, and they can cause a lot of damage. As with...
2020 Cyber Threat Report: True Crime with European Charm
On October 5, EUROPOL released IOCTA 2020, the latest annual edition of the Internet Organised Crime Threat...
Priority Account Protection Helps You Focus Your Security Efforts
Your best cybersecurity posture is one where you can be proactive about managing security. Your next best posture is...
Answer These Ten Questions for Better Security
Our crack Communications Director Jackie recently came across this infographic from Microsoft. It’s a ten-question...
My Identity Was Stolen: Here’s What I Learned
I’d been away from my desk and phone for about an hour. When I came back, emails told me that I had purchased a phone...
The USPS Smishing Scam: The package is NOT in the mail
You’ve likely heard of phishing by now. (We've written many articles about phishing, including this recent one by Dan...
How Will You Manage Personal Device Access?
There was a time—not too long ago—when IT Managers thought about managing personal device access in either/or terms....
Zoom and 2FA: The Security Boost You Need Now
As many of us continue to work and collaborate from home, there has been a steady uptick in the number of security...
Leverage the Cloud for Security
We had it all wrong. When Salesforce and other SaaS (software as a service) services hit the market, we pundits talked...
Critical Cyber Security Questions & The Answers You Need Now
I gave a talk today at the Council of New Jersey Grantmakers’ virtual conference. I spoke about risk assessments—what...
Zero Trust Solutions: A Long and Winding Road
Last week I introduced you to Zero Trust technology. The vision of a Zero Trust architecture today is like that of...
Zero Trust Technologies: What They Are and the 5 You Need Now
According to a recent Microsoft study, “94% of companies report that they are in the process of deploying new Zero...
Act Against Ransomware and Data Exfiltration
It’s time to step up your game as you act against ransomware. Here’s why. KnowBe4, in this blog post (shout out to my...
There’s Even More Reason to Leverage the CIS Controls for Security
Here at CGNET we’re big fans of the Center for Internet Security (CIS) and their CIS Controls. Organizations can...
Use Conditional Access to Strengthen Your Remote Work Setup
Most customers tell me they don’t see their staff returning to the office anytime soon. This means we will continue to...
So You’ve Been Pwned
If you’re of a certain age, you’ll recall the pamphlets the doctors would hand you at the end of your visit, so you...
Start Your Information Protection Journey by Creating Labels
Here are three common activities that require creating labels. Document management: use labels (aka “tags”) to help...
Remember Some Basic Phishing Protections
The COVID-19 pandemic, like other catastrophes, brings out the best and worst in humanity. I’ll get to the heroes...