Blog

Benefits of technology business reviews

Most small- to medium-sized businesses (SMBs) don’t possess the resources to run and maintain their IT infrastructure, let alone assess whether it’s still driving value for the company. However, if you want to ensure everything is running smoothly, it’s important to conduct technology business reviews whenever possible. A technology business review reveals the strengths and […]

A smart approach to cybersecurity investment

Cybersecurity is a threat to businesses across industries. Sometimes, organizations invest in security software without realizing the risks that come with it. Here are compelling reasons why identifying threats before buying cybersecurity products is paramount. Uncover threats and vulnerabilities Every business should run a risk assessment to evaluate its current cybersecurity infrastructure. Doing so is […]

Webinar—Defend & Protect – Your Path to Compliance with New Cybersecurity Laws on February 27th

You may or may not have heard of new privacy laws sweeping the nation.

If you haven’t heard of new laws like CCPA (the California Consumer Privacy Act) NY SHIELD (New York Stop Hacks and Improve Electronic Data Security) and COPRA (Consumer Online Privacy Rights Act) yet, you will.

These new laws are just the beginning of a clear trend toward regulating the privacy and security of information for individuals. What these laws have in common is that they mandate “reasonable cybersecurity” measures for organizations that collect personal information of individuals.

Online Training—Nonprofit New York Workshop—Tame Your Inbox on March 5

Drowning in email? Feel like dealing your inbox is an endless game of Whack-a-Mole? Wish you could spend more time on important tasks and projects and less time mired in messages? If so, this interactive webinar is for you. We’ll explore why this problem is so pervasive and provide ways both individuals and organizations can make email more manageable. We’ll have multiple quizzes throughout the session with chances to win prizes for attendees.

Ways virtual reality saves businesses time and money

Virtual reality (VR), the technology that immerses users in digitally created simulated experiences, is experiencing a surge in growth. There are now many more uses of VR than first realized. These include applications in academic research, engineering, design, the arts, and entertainment. It is also helping businesses save time and money. Find out how. Create […]

Office 365 hacking: What you need to know

There really is an app for almost everything — including one that cybercriminals use to hack into businesses’ systems. Cyberattacks have become so advanced that they are now aided by an app, like this one that poses serious threats to Office 365 users. If you’re using Office 365, here’s what you need to know. A […]

Identity and access management 101

Whether it be cloud, mobile, or on-premises, every technology you use stores confidential data that are accessed by your employees. So how do you guarantee the safety of said data from cyberthreats like identity theft, phishing attacks, and more? Identity and access management (IAM) is the answer, and here’s why. What is IAM? Identity and […]

Past Event—In-person Event at Civic Hall in New York City—The Biggest Cyber Threats —February 19

Between ongoing cybersecurity threats, emerging technology, and new data privacy laws, cybersecurity best practices have moved from nice-to-have to must-have for nonprofit organizations.

This session will break down cybersecurity into common-sense, understandable components that you can use to help your organization move toward greater cybersecurity maturity. We will help you understand how to think about what information is important to protect and how much protection it might need. Then we’ll give you specific tools, practices and templates to help you get started.

Cybersecurity: How to defend against insider threats

In the cybersecurity world, an insider threat is an individual or business partner who uses company data inappropriately. Today’s companies must take proactive steps to prevent insider threats, which is why we put together some tips and tricks. #1 Educate You must teach your team to recognize personally identifiable information (PII) and understand the financial […]

Webinar—Defend & Protect—Your Path to Compliance with New Cybersecurity Laws—February 27thJoin Us