Nonprofit

Tech Trends

A blog for the techie in you

Stay up to date

2 min read

Choosing a VPN for Your Nonprofit

Today, just installing anti-malware software and a firewall on your computer isn’t enough to keep you safe as you use the internet. Nowadays, a hacker can intercept messages sent to and from your computer and steal the data they contain. This is why you...

Read More

2 min read

Russia-Ukraine Cybersecurity Crisis - A Nonprofit's Guide

As the tensions mount between Ukraine and Russia the expectations of cyber attacks against the United States are increasing rapidly, and nonprofit cybersecurity has never been more important. Keep up to date with the latest developments in the situation...

Read More

1 min read

Writing User Stories - Explaining Nonprofit Technology

When describing the technology solutions we need, it’s natural to feel like we need to “talk tech”, or describe our needs through the lens of technology.

Instead, we recommend “thinking in stories” -- user stories.

Read More

6 min read

What is a Virtual CIO?

The term virtual Chief Information Officer (vCIO) has been around for well over a decade now, but even today, if you ask ten different people what a vCIO does you may well get ten different answers.

This article does not claim to be the definitive answer...

Read More

4 min read

5 Common Types of Social Engineering Attacks

Social engineering is one of the foremost ways that hackers and other bad actors will try and penetrate an organization's cybersecurity defenses. Reason being? People. People can be one of your weakest lines of defense if not properly trained and...

Read More

4 min read

log4j and the ER Cybersecurity Challenge for Nonprofits

As we head into 2022 with Delta and Omicron on our minds and cautious hopes that this will be the year we finally put this disruptive pandemic in our rearview mirror, the impact of the log4j vulnerability continues to be felt across the technology and...

Read More

What is the Zeigarnik Effect?

A short explainer video created and voiced by RoundTable vCIO, Cybersecurity Expert Joshua Peskay. 

Read More

2 min read

Do Google, Microsoft, and Salesforce Backup My Data Automatically?

Here’s something we hear a lot, "We use Gmail so we don't need to worry about backing up our email".

Read More

1 min read

2-Minute Training – Data Inventory

Listen as VP of Data Strategy, Kim Snyder outlines the questions you need to be asking within your organization to begin conducting a proper data inventory.

{% video_player "embed_player" overrideable=False, type='hsvideo2', hide_playlist=True,...
Read More

3 min read

Incidence Response Notification: log4j

Update from 12/21

The team at RoundTable has continued to scan and enumerate (e.g. discover) any presence of the log4j vulnerability across our customer environments.

We are happy to report that we have NOT found any indications of compromise on any...

Read More