Justin Brown

4 min read

The Texas Cybersecurity Framework, a Must for Nonprofits

Are you a nonprofit organization that accepts funding from Texas?

Read More
harnessing the power of nonprofit technology - dall e generated

3 min read

Harnessing the Power of Nonprofit Technology

If you’re a nonprofit leader, you know that getting the most out of limited resources can make or break an organization. With more and more services delivered online, harnessing technology to propel your organization forward is becoming increasingly...

Read More

3 min read

3 Dangers of BYOD Use for Nonprofits

When it comes to cybersecurity, there are a lot of dangers that organizations need to be aware of. For nonprofits, bring-your-own-device (BYOD) can be especially risky.

Read More

2 min read

RoundTable Technology Announces New Giving Initiative

RoundTable Technology has announced a new initiative to support women and underrepresented minorities in the technology industry. The company plans to provide scholarships, mentorship opportunities, and other resources to help these groups succeed in the...

Read More
cybersecurity awareness training

3 min read

Cybersecurity Awareness Training: 4 Ways to Get Staff Buy-In

Nonprofit organizations have a responsibility to protect their donors' information, as well as their own. This means that cybersecurity awareness training is essential for all employees. However, getting buy-in from staff can be difficult. In this blog...

Read More
cybersecurity insurance featured image

3 min read

Cybersecurity Insurance: What is it?

In a world where data breaches are becoming increasingly common, cybersecurity insurance is a must for any organization that stores or processes sensitive information. Also known as cyber liability insurance, this type of coverage can help to protect...

Read More
fake qr codes featured image

4 min read

Protect Yourself from Fake QR Codes

With the pandemic also came a resurgence of QR codes. Once thought dead, at least in the United States, they are now more widespread than ever. From restaurant menus to Super Bowl advertisements (good one CoinBase!), they are ever-present in our lives...

Read More
pretexting featured image

4 min read

What is Pretexting? How to Avoid Being Victimized

Pretexting is a type of social engineering attack that is often used to gain access to confidential information. In a pretexting attack, the attacker creates a scenario in which they can extract personal data from the victim. For example, the attacker...

Read More
computer won't turn on featured image

3 min read

How to Fix a Computer That Won't Turn On: 5 Easy Steps

Your computer won't turn on. This is a problem that can have a lot of different causes, but don't worry, we are here to help! In this blog post, we will walk you through a few easy steps to fixing your computer. So don't stress out - just follow our...

Read More
fake job postings featured image

3 min read

How to Spot Fake Job Postings on Indeed

Job seekers beware! Cyber criminals are now posting fake job postings on Indeed and other job boards in an attempt to steal your personal information. They may even ask you to send them your resume and other personal information, which they will then use...

Read More