Fall is here again; my favorite time of year. Which means it’s almost time for that annual autumn tradition we all...
Search Results
Manage Cybersecurity for What It Is: A Risk Problem
I read a Forbes article today with an interesting message: manage cybersecurity the way you would manage risk. I could...
Top Cybersecurity Challenges and Priorities for 2021
Yes, 2020 was a real doozy. Because of the pandemic, organizations worldwide were caught off-guard by mandatory...
Cybersecurity Drills: 6 Reasons They’re Worth It
We all know from recent headlines that not even the largest of organizations is immune to a cyber-attack. But we also...
Game on! Make Cybersecurity Training Stick by Making it Fun
Ahhh, autumn. The leaves are changing colors; sweaters are making their annual reappearance. The scent of pumpkin pie...
The Twelve Days of Cybersecurity Christmas
The Twelve Days of Cybersecurity Christmas On the first day of Christmas some hackers sent to me A phishing...
Results of the TAG 2024 State of Philanthropy Tech Survey
Every two years the Technology Association of Grantmakers (TAG), an organization of IT professionals (and others...
Sounding the Alarm on Mobile Hacking
Mobile security company Zimperium recently released their 2024 Global Mobile Threat Report, and their findings should...
INKY: Smarter, Safer Email Security
When I first started using computers, security wasn’t much of a concern. We were all part of one big, happy family....
Today’s Password Managers: A Review
Now that Cybersecurity Awareness Month is in full swing, I thought I'd explore one of the best methods for keeping...
Phishing Attacks Are on the Rise! Tips to Keep Your Staff Safe
In today's digital age, phishing attacks have become a prevalent threat to organizations of all sizes. Just this week...
What is Your IT Disaster Recovery Plan? Lessons from the CrowdStrike Crash
It goes without saying that in today’s digital age, organizations rely heavily on their IT infrastructure to run...
Ensure Data Security Before Deploying Copilot for Microsoft 365
In the era of digital transformation, businesses are increasingly turning to AI-powered tools like Microsoft Copilot...
Gemini: Google’s AI Chatbot Entry
On March 14 I wrote an overview blog on chatbots which focused on five that I use: Perplexity, ChatGPT, Bing Chat,...
Ask These Questions When Selecting an MSP
You’ve decided it’s time for your organization to select a managed service provider (MSP) to work with you on all...
Decoding Endpoint Security: A Guide to Choosing the Right EDR Solution
Running a few hundred security operations centers isn’t easy. While debates about how to build the perfect SOC change...
AI Generated Phishing Is Here. What Now?
It was something we’d already been speculating on and expecting to happen soon: criminals using AI to generate nearly...
Three Low-Cost Ways to Keep Your IT Infrastructure Safe
It goes without saying that the security of your IT infrastructure is of paramount importance. Unfortunately,...