Blog

Benefits of technology business reviews

Most small- to medium-sized businesses (SMBs) don’t possess the resources to run and maintain their IT infrastructure, let alone assess whether it’s still driving value for the company. However, if you want to ensure everything is running smoothly, it’s important to conduct technology business reviews whenever possible. A technology business review reveals the strengths and […]

A smart approach to cybersecurity investment

Cybersecurity is a threat to businesses across industries. Sometimes, organizations invest in security software without realizing the risks that come with it. Here are compelling reasons why identifying threats before buying cybersecurity products is paramount. Uncover threats and vulnerabilities Every business should run a risk assessment to evaluate its current cybersecurity infrastructure. Doing so is […]

Ways virtual reality saves businesses time and money

Virtual reality (VR), the technology that immerses users in digitally created simulated experiences, is experiencing a surge in growth. There are now many more uses of VR than first realized. These include applications in academic research, engineering, design, the arts, and entertainment. It is also helping businesses save time and money. Find out how. Create […]

Office 365 hacking: What you need to know

With over 150 million active subscribers, Office 365 is, unsurprisingly, on top of hackers’ minds. And now, hackers are using a technique that doesn’t even require users to give up their credentials. Learn how they do it and get protected. A phishing scam that harvests users’ credentials The latest cyberattack on Microsoft Office 365 involves […]

Past Event—Online Training—Nonprofit New York Workshop—Tame Your Inbox on March 5

Drowning in email? Feel like dealing your inbox is an endless game of Whack-a-Mole? Wish you could spend more time on important tasks and projects and less time mired in messages? If so, this interactive webinar is for you. We’ll explore why this problem is so pervasive and provide ways both individuals and organizations can make email more manageable. We’ll have multiple quizzes throughout the session with chances to win prizes for attendees.

Past Event—Webinar—Defend & Protect – Your Path to Compliance with New Cybersecurity Laws on February 27th

You may or may not have heard of new privacy laws sweeping the nation.

If you haven’t heard of new laws like CCPA (the California Consumer Privacy Act) NY SHIELD (New York Stop Hacks and Improve Electronic Data Security) and COPRA (Consumer Online Privacy Rights Act) yet, you will.

These new laws are just the beginning of a clear trend toward regulating the privacy and security of information for individuals. What these laws have in common is that they mandate “reasonable cybersecurity” measures for organizations that collect personal information of individuals.

Identity and access management 101

Whether it be cloud, mobile, or on-premises, every technology you use stores confidential data that are accessed by your employees. So how do you guarantee the safety of said data from cyberthreats like identity theft, phishing attacks, and more? Identity and access management (IAM) is the answer, and here’s why. What is IAM? Identity and […]

Past Event—In-person Event at Civic Hall in New York City—The Biggest Cyber Threats —February 19

Between ongoing cybersecurity threats, emerging technology, and new data privacy laws, cybersecurity best practices have moved from nice-to-have to must-have for nonprofit organizations.

This session will break down cybersecurity into common-sense, understandable components that you can use to help your organization move toward greater cybersecurity maturity. We will help you understand how to think about what information is important to protect and how much protection it might need. Then we’ll give you specific tools, practices and templates to help you get started.

Cybersecurity: How to defend against insider threats

In the cybersecurity world, an insider threat is an individual or business partner who uses company data inappropriately. Today’s companies must take proactive steps to prevent insider threats, which is why we put together some tips and tricks. #1 Educate You must teach your team to recognize personally identifiable information (PII) and understand the financial […]

Past Event—The Best Free One-Hour Cybersecurity Awareness Training Ever—2020 Edition—Jan 30

The BAD news is that for many people and organizations, cybersecurity seems scary and overwhelming.

The GOOD news is that there are some basic things you can do to make yourself and your organization much more secure.

The GREAT news is that, for the fourth year in a row, RoundTable Technology is offering a free webinar to teach you and your staff exactly what you can do.

RoundTable is ranked 12th in the MSP 501 Global Ranking of the world's best technology service providers!Learn More