Nonprofit

Tech Trends

A blog for the techie in you

Stay up to date

cyberattack (2)

cybersecurity 5 common types of social engineering attack

4 min read

5 Common Types of Social Engineering Attacks

Social engineering is one of the foremost ways that hackers and other bad actors will try and penetrate an organization's cybersecurity defenses....

Read More

4 min read

log4j and the ER Cybersecurity Challenge for Nonprofits

As we head into 2022 with Delta and Omicron on our minds and cautious hopes that this will be the year we finally put this disruptive pandemic in our...

Read More

3 min read

Incidence Response Notification: log4j

Update from 12/21 The team at RoundTable has continued to scan and enumerate (e.g. discover) any presence of the log4j vulnerability across our...

Read More

3 min read

What are the goals of ethical hacking?

"Ethical hacking" sometimes known as "white hat hacking" is similar in process to malicious hacking, but is 100% legal. People who engage in ethical...

Read More

3 min read

Types of Penetration Testing

To start off we need to define penetration testing. What is it?

Read More
risk of cyberattack blog image

2 min read

3 Ways Your Organization May Be At Risk Of CyberAttack

Your staff are instrumental when it comes to protecting your organization from cyberthreats. But they can also become targets for hackers and...

Read More

1 min read

What do Cybersecurity and Swiss Cheese have in common?

Watch this video to learn what pieces of Swiss cheese can teach us about cybersecurity protection.

Read More

4 min read

What About Cyber Liability Insurance?

One of the questions we get often at RoundTable is from organizations asking whether they should get cyber liability coverage and, if so, what they...

Read More