Many of us have doorbell cameras or even complete security systems that monitor the access points of our homes. We...
Search Results
Social Media: Protecting Yourself and Your Organization
More than half the people in the world are on social media – that’s nearly 5 billion – and it’s not going anywhere....
Farewell for Now
Farewell. Wait, what? Why am I thinking of Doug Adams and So Long, and Thanks for All the Fish. Or (even more obscure)...
Take Steps to Protect Your Organization from Social Engineering
Two things happened this week that got me thinking about social engineering. First, I bought a new iPhone for my son...
Tips for Creating Generative AI Policies
Generative AI is suddenly everywhere. Students are using it in to help with schoolwork. Teachers are using it to draw...
Work With Your Secure Score and Improve Your Security
Microsoft Secure Score. “That again?” you say. Yes, that. We have written about Secure Score before. I recently worked...
Top Phishing Subject Lines So Far in 2023
Every quarter, our partners at KnowBe4 report on the most-clicked phishing email subject lines. They look at what they...
Remember to Check Your Email Security
Sometimes we marvel at the amazing discoveries from the James Webb Space Telescope. Other times, we turn a pair of...
Get Ready for Microsoft Security Copilot
It is raining again here in Northern California (but we are not complaining!). And in the technology world, it...
Unmanaged IT Assets: What You Don’t Know CAN Hurt You
When was the last time you took a look at all of your IT assets? And I mean, ALL of them? There are several reasons...
Separate Your Regular and Administrative Accounts
I had a call today to answer questions about a security audit we recently finished. The customer had several questions...
You Can Help a Smaller Organization Be CyberSmart
I have been on a mission for a while now, looking for ways to push cybersecurity knowledge out to smaller...
What You Should Do About the LastPass Breach
Welcome to 2023! What with the holidays (you do remember them, right?) and the end-of-year distractions (hello, bomb...
Top Phishing Trends in 2022
Our partners at cybersecurity firm INKY just came out with their “Email Security Annual Report” for 2022-2023, chock...
Clone Phishing: A Scary New Tactic
Oh boy. These guys just don’t stop; they’re coming up with new tricks to steal our data, left, right and center. The...
The Online Holiday Scams You Need to Look Out For
Yes, my friends, it’s that time of year again. Time to start making our lists and checking them twice. Time to start...
Match the Scale of the IT Provider to the Size of Your Nonprofit Budget
I recently wrote about the challenge facing foundations who want to fund IT and cybersecurity work in the nonprofits...
Can We Please Stop Making it So Easy for the Hackers?
Ahhh, passwords. The bane of our collective existence. Yes, we know we need them to protect our private information....