3 min read
A Crucial First Step in any Data Privacy Program
It’s not an exaggeration to say that the relationship between data privacy and cybersecurity is a symbiotic one. Data privacy depends upon...
3 min read
It’s not an exaggeration to say that the relationship between data privacy and cybersecurity is a symbiotic one. Data privacy depends upon...
3 min read
Job seekers beware! Cybercriminals are now posting fake job postings on Indeed and other job boards in an attempt to steal your personal information....
4 min read
Phishing is one of the most common and well-known social engineering techniques. It's the process of sending emails (or texts, which is known as...
2 min read
What Nonprofits Need to Know The Verizon Data Breach Investigation Report (DBIR) is one of the most comprehensive studies on data breaches in the...
1 min read
As soon as a new employee starts at an organization, they become a target for cybercriminals.
3 min read
Multi-factor authentication is a critical security measure that all nonprofit personnel should be using. This type of authentication requires more...
2 min read
Crypto, crypto, crypto, blah, blah, blah.
1 min read
Approximately two weeks ago we provided guidance for organizations concerned about cyber threats stemming from the Russia-Ukraine conflict.
1 min read
As the Russia-Ukraine conflict continues, many people and organizations have expressed concerns about the potential for cyber-warfare and its...
2 min read
Today, just installing anti-malware software and a firewall on your computer isn’t enough to keep you safe as you use the internet. Nowadays, a...