Last week I introduced you to Zero Trust technology. The vision of a Zero Trust architecture today is like that of...
Zero Trust Technologies: What They Are and the 5 You Need Now
According to a recent Microsoft study, “94% of companies report that they are in the process of deploying new Zero...
Act Against Ransomware and Data Exfiltration
It’s time to step up your game as you act against ransomware. Here’s why. KnowBe4, in this blog post (shout out to my...
There’s Even More Reason to Leverage the CIS Controls for Security
Here at CGNET we’re big fans of the Center for Internet Security (CIS) and their CIS Controls. Organizations can...
Use Conditional Access to Strengthen Your Remote Work Setup
Most customers tell me they don’t see their staff returning to the office anytime soon. This means we will continue to...
So You’ve Been Pwned
If you’re of a certain age, you’ll recall the pamphlets the doctors would hand you at the end of your visit, so you...
Start Your Information Protection Journey by Creating Labels
Here are three common activities that require creating labels. Document management: use labels (aka “tags”) to help...
Remember Some Basic Phishing Protections
The COVID-19 pandemic, like other catastrophes, brings out the best and worst in humanity. I’ll get to the heroes...
Build Resilience with Azure Site Recovery
The first shoe to drop during the current COVID 19 crisis was remote work. Services like Zoom and Teams saw...
Some Steps to Make Your Meetings Secure
Let’s talk about steps you can take to make your meetings secure. Zoom has been in the news recently, and not in a...
How to Ensure Your Public Wi-Fi Security
I wrote last time about how to make sure your home Wi-Fi network is as secure as possible. Today I’m going to tackle...
Tips for Securing Your Home Wi-Fi Connection
Wi-Fi. It’s seemingly ubiquitous these days. But as we use it, we are also aware that bad actors have found Wi-Fi...
Time to Get Organized about Privacy!
Last week, the National Institute of Standards and Technology (NIST) released the NIST Privacy Framework. As a result,...
Protect Your Organization from Sway-based Phishing and Malware
I use Microsoft's Sway; I really like it for image-heavy content. Unfortunately, the cybercriminals like it too, for a...
The Twelve Days of Cybersecurity Christmas
The Twelve Days of Cybersecurity Christmas On the first day of Christmas some hackers sent to me A phishing...