4 min read
The Texas Cybersecurity Framework, a Must for Nonprofits
Are you a nonprofit organization that accepts funding from Texas?
4 min read
Are you a nonprofit organization that accepts funding from Texas?
3 min read
If you’re a nonprofit leader, you know that getting the most out of limited resources can make or break an organization. With more and more services delivered online, harnessing technology to propel your organization forward is becoming increasingly...
3 min read
As of December 22, 2022, LastPass announced a recent cybersecurity incident and many RoundTable customers have asked what this means for them.
3 min read
When it comes to cybersecurity, there are a lot of dangers that organizations need to be aware of. For nonprofits, bring-your-own-device (BYOD) can be especially risky.
2 min read
Cybersecurity is critical to the success of any organization and can mean the difference between a secure organization that protects data or one that unwittingly leaves a door open for malicious actors.
2 min read
RoundTable Technology is proud to announce that we’ve received a clean SOC 2 Type 2 attestation report. This rigorous, independent assessment of our internal security controls serves as validation of our dedication and adherence to the highest standards...
3 min read
Nonprofit organizations have a responsibility to protect their donors' information, as well as their own. This means that cybersecurity awareness training is essential for all employees. However, getting buy-in from staff can be difficult. In this blog...
3 min read
In a world where data breaches are becoming increasingly common, cybersecurity insurance is a must for any organization that stores or processes sensitive information. Also known as cyber liability insurance, this type of coverage can help to protect...
4 min read
With the pandemic also came a resurgence of QR codes. Once thought dead, at least in the United States, they are now more widespread than ever. From restaurant menus to Super Bowl advertisements (good one CoinBase!), they are ever-present in our lives...
4 min read
Pretexting is a type of social engineering attack that is often used to gain access to confidential information. In a pretexting attack, the attacker creates a scenario in which they can extract personal data from the victim. For example, the attacker...