Nonprofit

Tech Trends

A blog for the techie in you

Stay up to date

data privacy

2 min read

Safeguarding Sensitive Data: Essentials Every Nonprofit Should Know

Data breaches are more than just a tech snag—they can be downright disastrous, especially for nonprofits. If you work in this sector, you're likely...

Read More

4 min read

Why Building Digital Trust Matters for Nonprofits

The digital world can be a scary place. We are constantly bombarded with news stories about cyber breaches and data leaks. It's easy to feel like our...

Read More

2 min read

Ready, Set, Respect: Navigating the Era of Data Privacy and Access Requests

In today's digital era, digital trust is fast-becoming a vital component in building relationships with constituents. The General Data Protection...

Read More
compliance checklist featured image

2 min read

NY SHIELD Act Compliance Checklist for Nonprofits

The New York SHIELD Act (“SHIELD”), which went into effect in 2020, provides needed clarity around what constitutes reasonable data security. The use...

Read More
cybersecurity and data privacy featured image

3 min read

A Crucial First Step in any Data Privacy Program

It’s not an exaggeration to say that the relationship between data privacy and cybersecurity is a symbiotic one. Data privacy depends upon...

Read More

2 min read

The 2022 Verizon Data Breach Investigations Report (DBIR)

What Nonprofits Need to Know The Verizon Data Breach Investigation Report (DBIR) is one of the most comprehensive studies on data breaches in the...

Read More

4 min read

Building Data Ethics into Data Management - The Bright Side of Scary

This article was written co-operatively by RoundTable Technology's Kim Snyder and LA Tech4Good's Rachel Whaley. Yes, there are a few looming, scary...

Read More

2 min read

NY SHIELD Act Compliance for Nonprofits

Let’s start with the good news. States within the USA are starting to implement privacy regulations to protect our individual data. As individuals,...

Read More

3 min read

Types of Penetration Testing

To start off we need to define penetration testing. What is it?

Read More

1 min read

Don’t be Lulled into a False Sense of Insecurity

Ransomware attacks on critical infrastructure have been all over the headlines. The Colonial Pipeline attack stopped gas transport and caused...

Read More