I was on a Slack Ask Me Anything (AMA) this week with Phil Stupak, a cybersecurity consultant who knows his stuff. One...
Search Results
TAG White Paper: CyberSecurity for Philanthropy
If you work in philanthropy and are not already a member, you’re still probably familiar with the Technology Affinity...
Keeping Up on Your Cybersecurity Reading
Like so much of our lives, the world of cybersecurity is in information overload. Computer security has become big...
Make Cybersecurity Training a Game
I’ve been conducting some cybersecurity training this week. It’s brought home an important lesson: make security...
Some Cybersecurity Safety Tips
I've been knee-deep in cybersecurity of late. I've been working on some handy cybersecurity safety tips, and thought...
The Twelve Days of Cybersecurity Christmas
The Twelve Days of Cybersecurity Christmas On the first day of Christmas some hackers sent to me A phishing...
Ask These Questions When Selecting an MSP
You’ve decided it’s time for your organization to select a managed service provider (MSP) to work with you on all...
Decoding Endpoint Security: A Guide to Choosing the Right EDR Solution
Running a few hundred security operations centers isn’t easy. While debates about how to build the perfect SOC change...
AI Generated Phishing Is Here. What Now?
It was something we’d already been speculating on and expecting to happen soon: criminals using AI to generate nearly...
Three Low-Cost Ways to Keep Your IT Infrastructure Safe
It goes without saying that the security of your IT infrastructure is of paramount importance. Unfortunately,...
Advice From a Hacker: Don’t Wait to Protect Your Organization!
Many of us have doorbell cameras or even complete security systems that monitor the access points of our homes. We...
Social Media: Protecting Yourself and Your Organization
More than half the people in the world are on social media – that’s nearly 5 billion – and it’s not going anywhere....
Farewell for Now
Farewell. Wait, what? Why am I thinking of Doug Adams and So Long, and Thanks for All the Fish. Or (even more obscure)...
Take Steps to Protect Your Organization from Social Engineering
Two things happened this week that got me thinking about social engineering. First, I bought a new iPhone for my son...
Tips for Creating Generative AI Policies
Generative AI is suddenly everywhere. Students are using it in to help with schoolwork. Teachers are using it to draw...
Work With Your Secure Score and Improve Your Security
Microsoft Secure Score. “That again?” you say. Yes, that. We have written about Secure Score before. I recently worked...
Top Phishing Subject Lines So Far in 2023
Every quarter, our partners at KnowBe4 report on the most-clicked phishing email subject lines. They look at what they...
Remember to Check Your Email Security
Sometimes we marvel at the amazing discoveries from the James Webb Space Telescope. Other times, we turn a pair of...