4 min read
Protect Yourself from Fake QR Codes
With the pandemic also came a resurgence of QR codes. Once thought dead, at least in the United States, they are now more widespread than ever. From...
4 min read
With the pandemic also came a resurgence of QR codes. Once thought dead, at least in the United States, they are now more widespread than ever. From...
4 min read
Pretexting is a type of social engineering attack that is often used to gain access to confidential information. In a pretexting attack, the attacker...
3 min read
It’s not an exaggeration to say that the relationship between data privacy and cybersecurity is a symbiotic one. Data privacy depends upon...
3 min read
Job seekers beware! Cybercriminals are now posting fake job postings on Indeed and other job boards in an attempt to steal your personal information....
4 min read
Phishing is one of the most common and well-known social engineering techniques. It's the process of sending emails (or texts, which is known as...
2 min read
What Nonprofits Need to Know The Verizon Data Breach Investigation Report (DBIR) is one of the most comprehensive studies on data breaches in the...
1 min read
As soon as a new employee starts at an organization, they become a target for cybercriminals.
3 min read
Multi-factor authentication is a critical security measure that all nonprofit personnel should be using. This type of authentication requires more...
2 min read
Crypto, crypto, crypto, blah, blah, blah.
1 min read
Approximately two weeks ago we provided guidance for organizations concerned about cyber threats stemming from the Russia-Ukraine conflict.