Gen AI Prompt Engineering

Whitepaper | Source: Google — You don’t need to be a data scientist or a machine learning engineer – everyone can write effective gen AI prompts. This 60+ whitepaper goes beyond “prompting 101” and dives deep into advanced prompt engineering with Gemini AI and for large language models (LMMs) in general.

AI in Google Workspace – Gmail

AI in Workspace: GmailGoogle Workspace is a comprehensive and secure platform that empowers organizations to be more productive, collaborative, and creative. This series explores the power of AI built within Google Workspace across each of the workspace apps. In this post, we cover AI in Gmail.

AI in Gmail

AI in Gmail lives in the Gemini Side Panel.  Gemini in Gmail is your productivity partner that can help draft, reply, sift through, and summarize your emails to save you time at your desk or on the go.

Features you should know when using the Gemini Side Panel in Gmail

The Gemini Side Panel is available when you are looking at your inbox and when you have opened an email or email thread. From the inbox, or at any time, you can:

  • Find specific messages or information in your inbox
  • Identify trends and topics
Draft Emails and Respond
  • Summarize an email thread. You can ask for a more or less detailed summary than the initial response
  • Draft an email based on keywords and the context of your inbox
  • Edit emails to polish your tone or change the length of your message
  • Ask Gemini to suggest a response to the email
Access Calendars and Events
  • Create events using your natural language requests
  • Search for calendar events by dates, participants, or subject
  • Request details about specific upcoming events
Access Files and Drive
  • Search Drive for documents related to the topic of an email thread
  • Use the “@” prompt to search for and add specific documents to your query

The “One-Click” features you should know when working in an email message

  • When viewing, the “Summarize this email” link gets you an instant summary of the message and thread
  • When composing a new email message, the “Write an email for me” link prompts you for information and drafts your message

We Will Help

At Cumulus Global, our priority is ensuring that you have productive, secure, and affordable managed cloud services. We work to ensure that you get the most value from the IT and cloud services you need and want, without overspending, to best support your business objectives.

Unsure of where to start? Check out our IT Assessment or schedule a meeting with a Cloud Advisor.

We will help you adapt while keeping your IT services secure and cost-effective.

About the Author

Allen Falcon is the co-founder and CEO of Cumulus Global.  Allen co-founded Cumulus Global in 2006 to offer small businesses enterprise-grade email security and compliance using emerging cloud solutions. He has led the company’s growth into a managed cloud service provider with over 1,000 customers throughout North America.

AI in Google Workspace – Gemini App

AI in Google Workspace - Gemini AppGoogle Workspace is a comprehensive and secure platform that empowers organizations to be more productive, collaborative, and creative. This series explores the power of AI built within Google Workspace across each of the workspace apps. We begin with the Gemini App in Google Workspace.

The Gemini App

The Gemini App is a Large Language Model (LMM) service built to help you get more done in less time. It’s great for brainstorming ideas, researching topics, and improving your writing. Use Gemini to pressure-test your work against target personas, with enterprise-grade data protections. 

Choose from multiple versions specifically designed for advanced reasoning, complex tasks, deep research, and everyday queries.

Three features you should know

Deep Research

Explore complex topics and get findings from different sources across the web in a comprehensive, easy-to-read report that brings hours of research to your fingertips in mere minutes. The reports can also be exported into Google Docs to easily share with your teams, allowing you to dive into industry trends, understand the competitive landscape, or even research customers ahead of a sales meeting.

Gems

Gems are customizable versions of Gemini that help with specialized or repetitive tasks. It’s like having an expert to help craft compelling marketing copy, prepare for job interviews, brainstorm new ideas, and so much more. You can even feed Gems your documents and other information, making them smarter and more tailored to your needs.

Integrations

Gemini seamlessly connects to other Google Workspace apps. Pull schedules from Gmail, PDFs from Drive, and content from Docs into the Gemini app without switching tabs or windows, so you can stay focused and get quality work done faster.

We Will Help

At Cumulus Global, our priority is ensuring that you have productive, secure, and affordable managed cloud services. We work to ensure that you get the most value from the IT and cloud services you need and want, without overspending, to best support your business objectives.

Unsure of where to start? Check out our IT Assessment or schedule a meeting with a Cloud Advisor.

We will help you adapt while keeping your IT services secure and cost-effective.

About the Author

Allen Falcon is the co-founder and CEO of Cumulus Global.  Allen co-founded Cumulus Global in 2006 to offer small businesses enterprise-grade email security and compliance using emerging cloud solutions. He has led the company’s growth into a managed cloud service provider with over 1,000 customers throughout North America.

Initial Use Cases for AI

Artificial Intelligence, AI, is here. Ready or not, your team is probably using AI tools on their own. If not planned and managed, AI creates risks and potential liabilities for you and your business.

Your initial steps into AI can be useful and secure. Picking the right use case is key.

In this Coffee & Clouds online event, Cumulus Global CEO Allen Falcon looks at three use cases that can help you step into AI safely and effectively.

Invest 15 minutes to understand how to ensure that your use of AI maintains privacy while helping your team do their jobs. Join us live or view the recording on-demand, and the Dunkin’ or Starbucks is on us.

Google Workspace: A Guide for Using AI at Work

eBook | Source: Google — With Google Workspace, powerful AI is included – not bolted on. Gemini AI is the AI that makes everyday work easier. This eBook provides an app by app overview of ways to use AI in Google Workspace

Managed Cloud Services Update

(03/18/25) – Cumulus Global is updating our Managed Cloud Services to expand protections against cyber attacks. Cybersecurity Enhancements Add Value to your Managed Cloud Services. Changes to our traditional Service Plans give you even more options.

Microsoft Digital Defense Report 2024

Whitepaper | Source: Microsoft — In the last year, the cyber threat landscape continued to become more dangerous and complex. Improved defenses will not be enough. However, improved defense will not be enough. The data, insights, and events in this report represent July 2023 through June 2024 (Microsoft fiscal year 2024), unless otherwise noted.

US Cybersecurity Policy Shift Increases Risk of Successful Cyber Attacks

Data Protection & SecurityThe current United States administration continues to issue and execute dramatic changes in US policies and programs. For businesses, tariffs and their potential impact on the economy and various business sectors gets most of the media attention. Getting less attention, US Cybersecurity Policy changes will have an immediate and potentially devastating impact on many businesses and individuals.  

Multiple reputable news and information sources are reporting that on March 2nd, the current administration ordered the Cybersecurity and Infrastructure Security Agency (CISA) to cease tracking and reporting on Russian threats. This is a tectonic shift in policy as Russia is generally understood to be the largest nation-state sponsor of cyber attacks. This change in focus for CISA will dramatically reduce the availability, reliability, and timeliness of cybersecurity threat intelligence. 

Here is what you need to know, what to expect, and what to do.

What to Know

Here are three things to know about cyber threats, CISA, and nation-state cyber attacks.

1Threat Intelligence

Threat intelligence is the invisible backbone of your cybersecurity protections. As the name implies, threat intelligence is the collection of sharing of information about cybersecurity risks, threats, methods, actors, sources, and sponsors. It also encompasses knowledge of how to prevent, block, and stop attacks; fix hardware and software to close exploits.

Every legitimate cybersecurity product or service relies on threat intelligence to build, maintain, and improve their product or service. Larger and better-funded cybersecurity companies conduct their own research and share their findings.

2CISA: Cybersecurity & Infrastructure Security Agency

CISA is the US federal government agency responsible for collecting, evaluating, and sharing threat intelligence across government and private sectors. The agency also partners with core infrastructure companies, such as Internet Service Providers, to actively prevent, block, and respond to potential and active cyber attacks.

3Nation-State Cyber Attacks

Industry experts estimate that over 40% of cyber attacks originate from, or are sponsored by, hostile nation-states. The Microsoft Digital Defense Report Report 2024 notes that in 2024, 58% of nation-state attacks originated in Russia. These attacks account for up to 25% of all cyber attacks globally.

What to Expect

Expect more cyber attacks and greater challenged to your cyber security profile.

1More Cyber Attacks

Expect an increase in cyber attacks and, more importantly, successful cyber attacks.

With CISA no longer tracking Russian-sourced cyber attacks, expect Russia, Russian-sponsored, and Russian organized crime to increase the frequency, intensity, and scope of the cyber attacks. Knowing that CISA is no longer watching signals a huge opportunity to attack US government entities, businesses, and non-profits with fear of early detection or responsiveness.

2More Successful Attacks

Without fast and accurate threat intelligence, cybersecurity systems and services will take longer to identify threats and attacks.Their response to zero-day (new, immediate) and other cyberattacks will take longer.

Unprotected and under-protected systems will be more vulnerable to successful attacks as the frequency and scope of cyber attacks increase.

3More Challenging Recovery

In addition to sharing information to help block and stop cyber attacks, CISA shares information on how to repair and recover. Without this information, obtaining decrypt keys and other help to undo the damage will be more difficult and will take more time.

What to Do

Use our Security CPR® model to guide your next steps:

Communicate and Educate:

Inform your team to expect an increase in cyber attacks and ask for additional vigilance. Have security awareness training in place to reinforce the message and to occasionally test if your team can recognize phishing and other email-based cyber attacks.

Protect and Prevent:

More than 80% of cyber attacks originate, directly or indirectly, by email. Make sure you have next-generation email threat protection services in place. Beyond header validation and basic sandboxing, your solution now should analyze character sets and fonts, images, QR codes, graymail, and email delivery patterns.

Microsoft estimates that more than 90% of cyber attacks on small and midsize businesses can be stopped with multi-factor authentication (MFA). If you do not have MFA in place for critical systems (preferably ALL systems), do so now.

Restore and Recover:

As the risk of successful attacks increases, ensure that you have the ability to restore damaged and lost data and systems. Verify that you can recover – return to operations – quickly, even as you continue to restore systems and data.  Continuity solutions for critical systems and software will save you time and money.

Your Next Steps

Assess your immediate needs and take appropriate action. Our Cloud Advisors can help you assess your cybersecurity needs and priorities, and can offer budget-friendly, effective solutions.

Contact us or schedule a no-obligation meeting with a Cloud Advisor today.

About the Author

Allen Falcon is the co-founder and CEO of Cumulus Global.  Allen co-founded Cumulus Global in 2006 to offer small businesses enterprise-grade email security and compliance using emerging cloud solutions. He has led the company’s growth into a managed cloud service provider with over 1,000 customers throughout North America. Starting his first business at age 12, Allen is a serial entrepreneur. He has launched strategic IT consulting, software, and service companies. An advocate for small and midsize businesses, Allen served on the board of the former Smaller Business Association of New England, local economic development committees, and industry advisory boards.

Debunking Cyber Insurance Myths

Cyber Insurance Risk Assessment

Your business faces an ever-increasing array of cyber threats. Beyond protections, cyber insurance is an essential component of a robust risk management strategy. Therefore, understanding cyber insurance realities is necessary for you to make sound security and business decisions. In this post, we focus on debunking common cyber insurance myths.

1MYTH: Cyber Insurance Policies Offer the Same Level of Protection

In reality, policies vary significantly with respect to coverages and services. Opting for bundled policies generally results in coverage gaps, as most general liability policies treat cyber coverage as an add-on.These gaps leave your businesses vulnerable to liabilities and losses.

Standalone cyber insurance policies, provided by financially strong carriers, offer comprehensive protection tailored to the specific needs of your business. They address unique risks associated with cyber threats given your industry, business size, and other risk factors. Standalone policies also often include coverage of forensics, temporary resources, and other recovery needs. Dedicated coverage helps you respond more effectively to a cyber incident.

2MYTH: Your IT Security Measures Dictate Your Premiums.

While robust security practices can positively impact premiums, broader industry trends and company-specific factors play a more significant role in determining pricing.

Industry-wide loss ratios have a substantial impact on insurance costs. Peer group averages impact premiums as well. Insurers assess the risk profile of businesses within sectors. As insurers issue more policies and analyze claims, insurers refine actuarial, incorporating additional factors and risks.

3MYTH: Cyber Insurance Policies do Not Pay Out

Many businesses hesitate to buy standalone cyber insurance policies out of fear that their policy will not pay out in the event of a claim. Reputable cyber insurers with strong financials rarely deny claims with a valid cause..

Inaccurate, or fraudulent, applications are the most frequent reasons for claim denials or reductions. 

Your application must accurately reflect your cyber insurance risk profile. The information you provide on your cyber insurance application should reflect a thorough review process. Cybersecurity tools offer verification of your security profile.

4MYTH: Cyber Insurance is All You Need

Many businesses, including yours, may need additional layers of protection for specific cyber risks. These additional coverages may not be available within a traditional cyberinsurance policy.

Cyber warranties offer additional layers of protection by covering these specific elements of cyber risk. Combining cyber warranties with cyber insurance creates a more comprehensive safety net. This approach bolsters your overall security strategy and ensures appropriate coverage.

5MYTH: Robust Cybersecurity Measures Eliminate the Need for Cyber Insurance

Investing in strong cybersecurity defenses provides crucial protection for your business. No security profile or system, however, will stop every cyber attack, data breach, or data loss incident. Cyber threats continually evolve. Even the most secure systems fall victim to sophisticated attacks.

Cyber insurance serves as your financial safety net. Beyond covering direct financial losses, better policies help you recover from incidents that slip through the cracks of your security measures. These resources include forensics, data recovery, customer relations, legal expenses, and more. Cyber insurance protects you financially if and when a cyber attack gets past your defenses.

6MYTH: Obtaining Cyber Insurance is Complicated and Time-Consuming

The thought of obtaining cyber insurance deters many businesses from seeking the coverage they need. Horror stories of complex applications, surveys, and audits create anxiety and fear of the process. 

Unfortunately, this myth can come true. Businesses that apply through general insurance agents and fail to leverage knowledgeable IT resources often run into issues during the underwriting process.

Cumulus Global partners with cyber insurance specialists that offer streamlined application processes and non-committal quotes. Our partners work with more than two dozen carriers, ensuring you have options to choose the policies that meet your business needs and budget. Non-biased policy reviews help you understand your coverages and make informed decisions.

Your Next Step 

Avoid falling prey to cyber insurance myths. Contact us and let us introduce you to our cyber insurance partners.

We can provide you with a Cyber Insurance Risk Assessment and help you assess your cybersecurity profile.

About the Author

Bill Seybolt bio pictureBill is a Senior Cloud Advisor responsible for helping small and midsize organizations with cloud forward solutions that meet their business needs, priorities, and budgets. Bill works with executives, leaders, and team members to understand workflows, identify strategic goals and tactical requirements, and design solutions and implementation phases. Having helped over 200 organizations successfully adopt cloud solutions, his expertise and working style ensure a comfortable experience effective change management.

Data Loss Prevention (DLP) for SMBs

(02/18/25) – If your business must comply with government or industry regulations covering disclosure of protected information, Data Loss Prevention (DLP) can be complex and expensive. This session coves affordable, effective DLP solutions for small and midsize businesses, like yours.