Nonprofit

Tech Trends

A blog for the techie in you

Stay up to date

cybersecurity awareness training

3 min read

Cybersecurity Awareness Training: 4 Ways to Get Staff Buy-In

Nonprofit organizations have a responsibility to protect their donors' information, as well as their own. This means that cybersecurity awareness training is essential for all employees. However, getting buy-in from staff can be difficult. In this...

Read More

Benefit vs. Complexity Prioritization - What to do first?

There are always more things to do than we have time for. How do we decide which tasks to focus on? One tool that can be helpful is the benefit vs...

Read More
cryptocurrency bear market

3 min read

Crypto Fundraising: What Nonprofits Need to Know About Bear Markets

The rise of cryptocurrency fundraising has excited (and even surprised) many in the nonprofit community. But even with hundreds of millions of...

Read More
cybersecurity insurance featured image

3 min read

Cybersecurity Insurance: What is it?

In a world where data breaches are becoming increasingly common, cybersecurity insurance is a must for any organization that stores or processes...

Read More
compliance checklist featured image

2 min read

NY SHIELD Act Compliance Checklist for Nonprofits

The New York SHIELD Act (“SHIELD”), which went into effect in 2020, provides needed clarity around what constitutes reasonable data security. The use...

Read More
fake qr codes featured image

4 min read

Protect Yourself from Fake QR Codes

With the pandemic also came a resurgence of QR codes. Once thought dead, at least in the United States, they are now more widespread than ever. From...

Read More
pretexting featured image

4 min read

What is Pretexting? How to Avoid Being Victimized

Pretexting is a type of social engineering attack that is often used to gain access to confidential information. In a pretexting attack, the attacker...

Read More
cybersecurity and data privacy featured image

3 min read

A Crucial First Step in any Data Privacy Program

It’s not an exaggeration to say that the relationship between data privacy and cybersecurity is a symbiotic one. Data privacy depends upon...

Read More
computer won't turn on featured image

3 min read

How to Fix a Computer That Won't Turn On: 5 Easy Steps

Your computer won't turn on. This is a problem that can have a lot of different causes, but don't worry, we are here to help! In this blog post, we...

Read More
fake job postings featured image

3 min read

How to Spot Fake Job Postings on Indeed

Job seekers beware! Cybercriminals are now posting fake job postings on Indeed and other job boards in an attempt to steal your personal information....

Read More