Make Me Cyber Safe

What the CISA Incident Teaches Us About AI Safety

Introduction You may have heard about the recent, surprising story that emerged from the heart of U.S. cyber-defense: The acting director of the Cybersecurity and Infrastructure ...

Work From Anywhere, Secure Everywhere

Introduction Remote and hybrid work schedules are now as common as having a fully in-office role. We chat with colleagues across the country, and even across ...

What Happens After a Breach?

Introduction When a data breach makes the news, the story usually follows a familiar pattern: What happened? How many records were exposed? Has the affected company ...

Reddit Fights AI Over Data Privacy

Introduction In October 2025, social news platform Reddit filed a federal lawsuit against AI company Perplexity AI and three data-scraping firms in New York. The ...

The Quiet Risk of “Just Helping Out” at Work

Introduction Many times, security incidents don’t start with malicious intent. They start with someone trying to be helpful. Has something similar happened to you? A ...

What Are Insider Threats?

Introduction When people hear the term insider threat, they often imagine a disgruntled employee deliberately trying to harm their company. Usually, we assume it’s for greed or ...

How the European Space Agency Was Breached

Introduction Did you hear about the recent data breach at the European Space Agency? Many people assume that a major organization like that can’t be ...

The Downsides of Smart Devices

Introduction Smart devices are everywhere. From voice assistants and smart TVs to connected printers, doorbells, and conference room displays, our homes and workplaces are filled with technology ...

What Will Cybersecurity Look Like in 2026?

Introduction Cyber threats don’t stand still. Every year, attackers adjust to new technologies, new work habits, and new defenses. As we move toward 2026, cybersecurity isn’t becoming ...

Why Your Click Matters More Than Any Software

Introduction Firewalls, antivirus software, and monitoring tools are essential parts of modern cybersecurity. Google alone blocks over 15B spam emails every single day. Despite ...

Contact

Managed IT SolutionsManaged IT Solutions Logo $$$