Running a few hundred security operations centers isn’t easy. While debates about how to build the perfect SOC change...
Tip It
Microsoft License Changes: The Impact on Nonprofits
Having resold Microsoft software and licenses for several decades, we’ve seen zillions of changes in how their...
AI Generated Phishing Is Here. What Now?
It was something we’d already been speculating on and expecting to happen soon: criminals using AI to generate nearly...
AI and Cybersecurity: Trends for 2024
AI is expected to play a dominant role in cybersecurity in 2024. It is emerging as a powerful ally in the fight...
Observations on Managed Detection and Response (MDR)
Over the decades, we have used dozens of security systems and products. However, a new gold standard in security...
‘Twas the Night Before Christmas (with a CGNET Twist)
Our former VP of Technology, Tim Haight wrote this some years ago. It still gives me a chuckle. ‘Twas the night...
Nonprofits Should Consider Using AI to Further Their Goals
Artificial intelligence seems to be everywhere these days. And according to one study by unite.ai, 89% of nonprofits...
Pros and Cons of the MSP Model for Smaller Organizations
For most of CGNET’s 40 years, we have worked on a time and materials basis. In recent years, however, many customers...
Teams Premium: Is it Time to Upgrade?
Back in February I discussed the new Teams Premium and whether it was worth the price. Benefits I talked about then...
Is Google Dead?
Once I got into ChatGPT, Bing Chat, and Bard, I wondered if I would ever just do a plain old Google search again....
Be Advised: New Rules for Bulk Email Senders
Last month, Google and Yahoo announced that in early 2024, both companies will start cracking down on bulk email...
7 Habits of Highly Effective IT Support Staff
Many years ago, I read Steven Covey’s “7 Habits of Highly Effective People.” After much yellow highlighting and...
Three Low-Cost Ways to Keep Your IT Infrastructure Safe
It goes without saying that the security of your IT infrastructure is of paramount importance. Unfortunately,...
Advice From a Hacker: Don’t Wait to Protect Your Organization!
Many of us have doorbell cameras or even complete security systems that monitor the access points of our homes. We...
Social Media: Protecting Yourself and Your Organization
More than half the people in the world are on social media – that’s nearly 5 billion – and it’s not going anywhere....
Farewell for Now
Farewell. Wait, what? Why am I thinking of Doug Adams and So Long, and Thanks for All the Fish. Or (even more obscure)...
Cyber Hygiene is Key to Cybersecurity
Cyber hygiene refers to the steps we take to keep our network and computers healthy and safe from external threat....
Take Steps to Protect Your Organization from Social Engineering
Two things happened this week that got me thinking about social engineering. First, I bought a new iPhone for my son...