Blog

Office 365 hacking: What you need to know

With over 150 million active subscribers, Office 365 is, unsurprisingly, on top of hackers’ minds. And now, hackers are using a technique that doesn’t even require users to give up their credentials. Learn how they do it and get protected. A phishing scam that harvests users’ credentials The latest cyberattack on Microsoft Office 365 involves […]

Past Event—Online Training—Nonprofit New York Workshop—Tame Your Inbox on March 5

Drowning in email? Feel like dealing your inbox is an endless game of Whack-a-Mole? Wish you could spend more time on important tasks and projects and less time mired in messages? If so, this interactive webinar is for you. We’ll explore why this problem is so pervasive and provide ways both individuals and organizations can make email more manageable. We’ll have multiple quizzes throughout the session with chances to win prizes for attendees.

Past Event—Webinar—Defend & Protect – Your Path to Compliance with New Cybersecurity Laws on February 27th

You may or may not have heard of new privacy laws sweeping the nation.

If you haven’t heard of new laws like CCPA (the California Consumer Privacy Act) NY SHIELD (New York Stop Hacks and Improve Electronic Data Security) and COPRA (Consumer Online Privacy Rights Act) yet, you will.

These new laws are just the beginning of a clear trend toward regulating the privacy and security of information for individuals. What these laws have in common is that they mandate “reasonable cybersecurity” measures for organizations that collect personal information of individuals.

Identity and access management 101

Whether it be cloud, mobile, or on-premises, every technology you use stores confidential data that are accessed by your employees. So how do you guarantee the safety of said data from cyberthreats like identity theft, phishing attacks, and more? Identity and access management (IAM) is the answer, and here’s why. What is IAM? Identity and […]

Past Event—In-person Event at Civic Hall in New York City—The Biggest Cyber Threats —February 19

Between ongoing cybersecurity threats, emerging technology, and new data privacy laws, cybersecurity best practices have moved from nice-to-have to must-have for nonprofit organizations.

This session will break down cybersecurity into common-sense, understandable components that you can use to help your organization move toward greater cybersecurity maturity. We will help you understand how to think about what information is important to protect and how much protection it might need. Then we’ll give you specific tools, practices and templates to help you get started.

Cybersecurity: How to defend against insider threats

In the cybersecurity world, an insider threat is an individual or business partner who uses company data inappropriately. Today’s companies must take proactive steps to prevent insider threats, which is why we put together some tips and tricks. #1 Educate You must teach your team to recognize personally identifiable information (PII) and understand the financial […]

Past Event—The Best Free One-Hour Cybersecurity Awareness Training Ever—2020 Edition—Jan 30

The BAD news is that for many people and organizations, cybersecurity seems scary and overwhelming.

The GOOD news is that there are some basic things you can do to make yourself and your organization much more secure.

The GREAT news is that, for the fourth year in a row, RoundTable Technology is offering a free webinar to teach you and your staff exactly what you can do.

Business continuity in the cloud

Are you weighing the pros and cons of the cloud for business continuity? Let’s take a closer look at why the cloud is best for this strategy. Better uptime Backing up to an internal drive or an external hard drive won’t completely secure data. If someone steals your device, you instantly lose the backup it […]

Don’t skip security audits for your business

One step in the network security cycle you should never skip is security audit — doing so puts your business at risk of cyberattacks and data loss. Read on to understand how security audits can make or break your system integrity. Auditing and the security strategy Audits are necessary to maintain system integrity and uphold […]

Should you replace your Mac?

If you’ve owned a Mac for quite some time, it’s probable that you’ve gone through a few issues while using it. And after a while, using it can be more of a hassle than a convenience. If you’re already experiencing some major issues, it may be time to replace your Mac. Here are some telltale […]

We are here to help. 24x7 PHONE Support is now available.View Our Latest Resources