Nonprofit

Tech Trends

A blog for the techie in you

Stay up to date

cyberattack

4 min read

Protect Yourself from Fake QR Codes

With the pandemic also came a resurgence of QR codes. Once thought dead, at least in the United States, they are now more widespread than ever. From restaurant menus to Super Bowl advertisements (good one CoinBase!), they are ever-present in our lives...

Read More

4 min read

What is Pretexting? How to Avoid Being Victimized

Pretexting is a type of social engineering attack that is often used to gain access to confidential information. In a pretexting attack, the attacker creates a scenario in which they can extract personal data from the victim. For example, the attacker...

Read More

4 min read

Phishing: Protect Yourself from a Social Engineering Attack

Phishing is one of the most common and well-known social engineering techniques. It's the process of sending emails (or texts, which is known as smishing) appearing to be from reputable sources in an attempt to get someone to reveal personal information.

Read More

1 min read

Why New Employees Need Cybersecurity Awareness Training

As soon as a new employee starts at an organization, they become a target for cybercriminals. 

Read More

1 min read

Update on Cybersecurity Concerns Related to Russia-Ukraine Conflict

Approximately two weeks ago we provided guidance for organizations concerned about cyber threats stemming from the Russia-Ukraine conflict. 

Read More

1 min read

Cybersecurity Concerns Related to Russia-Ukraine Conflict

As the Russia-Ukraine conflict continues, many people and organizations have expressed concerns about the potential for cyber-warfare and potential impact on their organizations and/or people. If you answer yes to any of the following questions, then...

Read More

2 min read

Russia-Ukraine Cybersecurity Crisis - A Nonprofit's Guide

As the tensions mount between Ukraine and Russia the expectations of cyber attacks against the United States are increasing rapidly, and nonprofit cybersecurity has never been more important. Keep up to date with the latest developments in the situation...

Read More

4 min read

5 Common Types of Social Engineering Attacks

Social engineering is one of the foremost ways that hackers and other bad actors will try and penetrate an organization's cybersecurity defenses. Reason being? People. People can be one of your weakest lines of defense if not properly trained and...

Read More

4 min read

log4j and the ER Cybersecurity Challenge for Nonprofits

As we head into 2022 with Delta and Omicron on our minds and cautious hopes that this will be the year we finally put this disruptive pandemic in our rearview mirror, the impact of the log4j vulnerability continues to be felt across the technology and...

Read More

3 min read

Incidence Response Notification: log4j

Update from 12/21

The team at RoundTable has continued to scan and enumerate (e.g. discover) any presence of the log4j vulnerability across our customer environments.

We are happy to report that we have NOT found any indications of compromise on any...

Read More