Skip to the main content.

Bloggin’!

Turn and face the strange. We have all sorts of helpful posts here to get you leveled up ASAP. From cutting edge changes to best practices, we've got you covered.

Cyber Risk Management: It’s Not Just About Technology

For years, the default assumption in cybersecurity has been that managing risk is all about technology: firewalls, encryption, and the latest threat detection tools. The...

2 min read

Humans: The Greatest Asset in Cybersecurity

The myth that humans are the weakest link in cybersecurity has persisted for too long. While it’s true that human errors can lead to vulnerabilities,...

2 min read

a game plan drawn on chalkboard

Incident Response:How to Help Employees When Cyber Threats Strike

Imagine your organization's cyber defenses as a well-trained emergency response team. (Work with us here). Just like a strong immune system in a...

3 min read

Cybersecurity Culture Transformation: Microsoft’s Digital Defense Report

The annual release of Microsoft’s Digital Defense Report is always a milestone moment for the cybersecurity industry. For us, as an organization...

4 min read

INTERPOL Retires Pig Butchering: Rethinking Fear-Based Cybersecurity Language

When INTERPOL recently announced they would stop using the term “pig butchering” in favor of “romance baiting,” it reminds me that we're overdue for...

4 min read

a hand selects from a lineup from emails

Enhanced Phishing Training: Dealing with Today's Threats

If you’ve been involved in a phishing scenario where the attack was successful, it’s pretty hard to gain a sense of trust when plugging in a device...

2 min read

AI Deepfake Take it down Legislation Human Risk Strategy

Understanding the TAKE IT DOWN Act: What It Means for Digital Safety and Cyber Awareness

Discover what the TAKE IT DOWN Act is, why it matters for combating AI deepfakes and non-consensual imagery, and what’s next in the fight to enhance...

4 min read

a computer on a desk, the computer displays a graphic of a visual representation of a digital footprint

Your Digital Footprint: How AI Tracks and Uses Your Online Activity

Whenever you’re surfing the internet, every click, search, and scroll leaves behind a small trace known as a digital footprint. While it might seem...

2 min read

Essential Best Practices for Cyber Awareness Training

“The only rules that really matter are these: what a man can do and what a man can’t do. Savvy?” - Captain Jack Sparrow

3 min read

a laptop keyboard with a sticky note on it that says

Understanding Credential Stuffing

Imagine your personal login details being swiped from one site, then used to break into your accounts elsewhere. Sounds intrusive, right?

2 min read