Blog

Office 365 hacking: What you need to know

There really is an app for almost everything — including one that cybercriminals use to hack into businesses’ systems. Cyberattacks have become so advanced that they are now aided by an app, like this one that poses serious threats to Office 365 users. If you’re using Office 365, here’s what you need to know. A […]

How phishers harvest Office 365 credentials

With over 150 million active subscribers, Office 365 is, unsurprisingly, on top of hackers’ minds. And now, hackers are using a technique that doesn’t even require users to give up their credentials. Learn how they do it and get protected. A phishing scam that harvests users’ credentials The latest cyberattack on Microsoft Office 365 involves […]

The Best Free One-Hour Cybersecurity Awareness Training Ever – 2020 Edition – Jan 30

The BAD news is that for many people and organizations, cybersecurity seems scary and overwhelming.

The GOOD news is that there are some basic things you can do to make yourself and your organization much more secure.

The GREAT news is that, for the fourth year in a row, RoundTable Technology is offering a free webinar to teach you and your staff exactly what you can do.

Online Training—Nonprofit New York Workshop—Logging in on January 23rd

Are you the Accidental Data Nerd at your organization? Do you feel like you’ve been thrown into a cauldron of silo’d systems, mismatched spreadsheets and dirty data? This workshop will introduce attendees to the Data Maturity Model (DMM), which was developed through years of direct work with nonprofits. The DMM serves as the basis of providing Accidental Data Nerds with a roadmap for building organizational data capacity. This workshop will show the pathway to transform the Accidental Data Nerd into the role of Organizational Data Leader. The good news is that through hands-on exercises, attendees will see that they already have many of the essential skills needed for moving forward.

Identity and access management 101

Whether it be cloud, mobile, or on-premises, every technology you use stores confidential data that are accessed by your employees. So how do you guarantee the safety of said data from cyberthreats like identity theft, phishing attacks, and more? Identity and access management (IAM) is the answer, and here’s why. What is IAM? Identity and […]

Online Training—Nonprofit New York Workshop—Tame Your Inbox on March 5

Are you the Accidental Data Nerd at your organization? Do you feel like you’ve been thrown into a cauldron of silo’d systems, mismatched spreadsheets and dirty data? This workshop will introduce attendees to the Data Maturity Model (DMM), which was developed through years of direct work with nonprofits. The DMM serves as the basis of providing Accidental Data Nerds with a roadmap for building organizational data capacity. This workshop will show the pathway to transform the Accidental Data Nerd into the role of Organizational Data Leader. The good news is that through hands-on exercises, attendees will see that they already have many of the essential skills needed for moving forward.

Cybersecurity: How to defend against insider threats

In the cybersecurity world, an insider threat is an individual or business partner who uses company data inappropriately. Today’s companies must take proactive steps to prevent insider threats, which is why we put together some tips and tricks. #1 Educate You must teach your team to recognize personally identifiable information (PII) and understand the financial […]

Business continuity in the cloud

Are you weighing the pros and cons of the cloud for business continuity? Let’s take a closer look at why the cloud is best for this strategy. Better uptime Backing up to an internal drive or an external hard drive won’t completely secure data. If someone steals your device, you instantly lose the backup it […]

Don’t skip security audits for your business

One step in the network security cycle you should never skip is security audit — doing so puts your business at risk of cyberattacks and data loss. Read on to understand how security audits can make or break your system integrity. Auditing and the security strategy Audits are necessary to maintain system integrity and uphold […]

Should you replace your Mac?

If you’ve owned a Mac for quite some time, it’s probable that you’ve gone through a few issues while using it. And after a while, using it can be more of a hassle than a convenience. If you’re already experiencing some major issues, it may be time to replace your Mac. Here are some telltale […]

The Best Free One-Hour Cybersecurity Awareness Training Ever – January 30thJoin us!