4 min read
What is Pretexting? How to Avoid Being Victimized
Pretexting is a type of social engineering attack that is often used to gain access to confidential information. In a pretexting attack, the attacker...
4 min read
Pretexting is a type of social engineering attack that is often used to gain access to confidential information. In a pretexting attack, the attacker...
3 min read
It’s not an exaggeration to say that the relationship between data privacy and cybersecurity is a symbiotic one. Data privacy depends upon...
3 min read
Job seekers beware! Cybercriminals are now posting fake job postings on Indeed and other job boards in an attempt to steal your personal information....
4 min read
Phishing is one of the most common and well-known social engineering techniques. It's the process of sending emails (or texts, which is known as...
2 min read
What Nonprofits Need to Know The Verizon Data Breach Investigation Report (DBIR) is one of the most comprehensive studies on data breaches in the...
1 min read
As soon as a new employee starts at an organization, they become a target for cybercriminals.
3 min read
Multi-factor authentication is a critical security measure that all nonprofit personnel should be using. This type of authentication requires more...
2 min read
Crypto, crypto, crypto, blah, blah, blah.
1 min read
Approximately two weeks ago we provided guidance for organizations concerned about cyber threats stemming from the Russia-Ukraine conflict.
1 min read
As the Russia-Ukraine conflict continues, many people and organizations have expressed concerns about the potential for cyber-warfare and its...