by Jackie Bilodeau | Aug 15, 2019 | blog, password, security |
Recently I began assisting our Global Services VP, Dan Callahan, with Security Training at customer sites. (Yes, my job title is Communications Director. But at a small company like ours, we all wear many hats.) While I work for an IT consulting company, I’m still...
by Dan Callahan | Dec 11, 2018 | blog, CGNET, Cyber Security, password, Phishing, spam |
The Twelve Days of Cybersecurity Christmas On the first day of Christmas some hackers sent to me A phishing email sent from me to me On the second day of Christmas some hackers sent to me Two-factor auth and A phishing email sent from me to me On the third day of...
by Dan Callahan | Nov 1, 2018 | Advanced Threat Protection, Azure, blog, BYOD, Cyber Security, Microsoft Azure, Microsoft Intune, Microsoft Office 365, Mobile Device Management, O365, password, security |
I came across this article that I thought our audience would find interesting. You can read it here if you like. It’s a bit salesy, and Microsoft-centric (consider the source!). But the cybersecurity tips are useful to consider in framing your organization’s...
by Tim Haight | Oct 18, 2018 | blog, Enterprise Security, password, security, Uncategorized |
63% of data breaches result from weak or stolen passwords. Moreover, a lot more passwords can be called weak. IBM recently established that any eight-character password can be cracked by brute force with relatively inexpensive technology in nine minutes. The average...
by admin | Jul 29, 2015 | Apps, blog, CGNET, cloud, cloud computing, Cortana, Microsoft, Microsoft Office 365, Microsoft OneDrive, Office 365, OneDrive, password, security, Windows 10, Windows Hello, Windows Phone, Xbox |
Windows 10 Has Arrived In a blog post back in January, CGNET detailed the upcoming release of Microsoft’s newest revision to their flagship operating system: Windows 10. This new version represents Microsoft’s ambitious vision for its future: a family of personal...
by admin | Jul 29, 2015 | blog, Google, online security, password, security, security expert |
How do Security Experts Protect their Systems? The results of a recent pair of surveys conducted by Google will allow everyone to be able to protect their systems just like the pros do. In a new paper entitled “…no one can hack my mind”: Comparing Expert and...