Nonprofit

Tech Trends

A blog for the techie in you

Stay up to date

cyberattack (2)

pretexting featured image

4 min read

What is Pretexting? How to Avoid Being Victimized

Pretexting is a type of social engineering attack that is often used to gain access to confidential information. In a pretexting attack, the attacker...

Read More
phishing hacking social engineering

4 min read

Phishing: Protect Yourself from a Social Engineering Attack

Phishing is one of the most common and well-known social engineering techniques. It's the process of sending emails (or texts, which is known as...

Read More
new employee cybersecurity awareness training

1 min read

Why New Employees Need Cybersecurity Awareness Training

As soon as a new employee starts at an organization, they become a target for cybercriminals.

Read More

1 min read

Update on Cybersecurity Concerns Related to Russia-Ukraine Conflict

Approximately two weeks ago we provided guidance for organizations concerned about cyber threats stemming from the Russia-Ukraine conflict.

Read More

1 min read

Cybersecurity Concerns Related to Russia-Ukraine Conflict

As the Russia-Ukraine conflict continues, many people and organizations have expressed concerns about the potential for cyber-warfare and its...

Read More
image of ukraine

2 min read

Russia-Ukraine Cybersecurity Crisis - A Nonprofit's Guide

As the tensions mount between Ukraine and Russia the expectations of cyber attacks against the United States are increasing rapidly, and nonprofit...

Read More
cybersecurity 5 common types of social engineering attack

4 min read

5 Common Types of Social Engineering Attacks

Social engineering is one of the foremost ways that hackers and other bad actors will try and penetrate an organization's cybersecurity defenses....

Read More

4 min read

log4j and the ER Cybersecurity Challenge for Nonprofits

As we head into 2022 with Delta and Omicron on our minds and cautious hopes that this will be the year we finally put this disruptive pandemic in our...

Read More

3 min read

Incidence Response Notification: log4j

Update from 12/21 The team at RoundTable has continued to scan and enumerate (e.g. discover) any presence of the log4j vulnerability across our...

Read More

3 min read

What Are the Goals of Ethical Hacking?

"Ethical hacking" sometimes known as "white hat hacking" is similar in process to malicious hacking, but is 100% legal. People who engage in ethical...

Read More