by Brandon Aydt, Ari Baranoff and Tim Desrochers | Nov 19, 2025 | CyberSec
According to a recent study[1] as much as 32% of US employees have shared customer data and 27% have inputted internal company documents into unapproved AI tools at work. With the exponential increase in the use of AI models in the workplace, having the right policy...
by Tate Jarrow | Jun 13, 2025 | CyberSec
To protect your organization’s sensitive data and reduce the risk of account takeover, the most effective step is to follow best practices for user management and authentication. This guide clarifies the essential Google Workspace user security settings every business...
by Tate Jarrow | Apr 3, 2025 | CyberSec
Millions of people are leveraging AI tools like ChatGPT to become more efficient at home and at work. As a result, your employees are almost certainly using ChatGPT and other AI tools, even without official approval, which puts AI safety in the workplace at risk. At...
by Taylor Hying, Julie Mirman and Ari Baranoff | Aug 20, 2024 | Internal Fraud, Internal Wrongdoing
Last year, we wrote about the use of AI for generating fake social media accounts and in proliferating social engineering attacks. We cited the use of captured voice recordings to clone voices for use in fraud, kidnapping scams and other illicit activity. The...
by Timothy Desrochers and Ari Baranoff | Mar 26, 2024 | CyberSec
A little history of the Cybersecurity Framework. The National Institute of Standards and Technology (NIST) recently released the much-anticipated version 2.0 of the Cybersecurity Framework (CSF). Originally published in 2014, the CSF was developed in response to...
by Timothy Desrochers | Apr 17, 2023 | CyberSec
It’s hard to read any technology blog or article today without seeing a reference to some Large Language Model (LLM) like GPT4 or Google Bard. But what do these LLMs mean for an enterprise and cybersecurity implications? Are they practical for everyday use cases...
by Antonio Piraino and Ari Baranoff | Sep 30, 2022 | Business Continuity, CISO
Hurricane Ian and the path of its destruction highlight the importance of Business Continuity and Disaster Recovery Planning (BCPDR). For many, the thought of creating such a plan can seem like a daunting task. For others who have already established BCPDR plans,...
by Erik Rasmussen and Ari Baranoff | Jan 14, 2022 | CISO, CyberSec
As a business owner, your growing concerns regarding the likelihood of a cybersecurity event were certainly validated over the course of this past year. According to security researchers, the average ransomware payment in 2021 increased to a record $570,000 and the...
by Ari Baranoff | Dec 6, 2021 | CyberSec
CISA – How Does Multi-Factor Authentication Work?