Nonprofit

Tech Trends

A blog for the techie in you

Stay up to date

cybersecurity

4 min read

Phishing: Protect Yourself from a Social Engineering Attack

Phishing is one of the most common and well-known social engineering techniques. It's the process of sending emails (or texts, which is known as smishing) appearing to be from reputable sources in an attempt to get someone to reveal personal information.

Read More

2 min read

The 2022 Verizon Data Breach Investigations Report (DBIR)

What Nonprofits Need to Know

The Verizon Data Breach Investigation Report (DBIR) is one of the most comprehensive studies on data breaches in the world. Every year, Verizon releases a report that analyzes data from thousands of breaches across dozens of...

Read More

1 min read

Why New Employees Need Cybersecurity Awareness Training

As soon as a new employee starts at an organization, they become a target for cybercriminals. 

Read More

3 min read

Multi-Factor Authentication Is Critical for Nonprofits

Multi-factor authentication is a critical security measure that all nonprofit personnel should be using. This type of authentication requires more than one method of identification in order to log in to a system or account.

For example, you may be...

Read More

2 min read

Cryptocurrency Donations - Opportunities & Concerns for Nonprofits

Crypto, crypto, crypto, blah, blah, blah. 

Read More

1 min read

Update on Cybersecurity Concerns Related to Russia-Ukraine Conflict

Approximately two weeks ago we provided guidance for organizations concerned about cyber threats stemming from the Russia-Ukraine conflict. 

Read More

1 min read

Cybersecurity Concerns Related to Russia-Ukraine Conflict

As the Russia-Ukraine conflict continues, many people and organizations have expressed concerns about the potential for cyber-warfare and potential impact on their organizations and/or people. If you answer yes to any of the following questions, then...

Read More

2 min read

Choosing a VPN for Your Nonprofit

Today, just installing anti-malware software and a firewall on your computer isn’t enough to keep you safe as you use the internet. Nowadays, a hacker can intercept messages sent to and from your computer and steal the data they contain. This is why you...

Read More

2 min read

Russia-Ukraine Cybersecurity Crisis - A Nonprofit's Guide

As the tensions mount between Ukraine and Russia the expectations of cyber attacks against the United States are increasing rapidly, and nonprofit cybersecurity has never been more important. Keep up to date with the latest developments in the situation...

Read More

4 min read

5 Common Types of Social Engineering Attacks

Social engineering is one of the foremost ways that hackers and other bad actors will try and penetrate an organization's cybersecurity defenses. Reason being? People. People can be one of your weakest lines of defense if not properly trained and...

Read More