Nonprofit

Tech Trends

A blog for the techie in you

Stay up to date

cybersecurity

4 min read

Protect Yourself from Fake QR Codes

With the pandemic also came a resurgence of QR codes. Once thought dead, at least in the United States, they are now more widespread than ever. From restaurant menus to Super Bowl advertisements (good one CoinBase!), they are ever-present in our lives...

Read More

4 min read

What is Pretexting? How to Avoid Being Victimized

Pretexting is a type of social engineering attack that is often used to gain access to confidential information. In a pretexting attack, the attacker creates a scenario in which they can extract personal data from the victim. For example, the attacker...

Read More

3 min read

A Crucial First Step in any Data Privacy Program

It’s not an exaggeration to say that the relationship between data privacy and cybersecurity is a symbiotic one. Data privacy depends upon cybersecurity.

Read More

3 min read

How to Spot Fake Job Postings on Indeed

Job seekers beware! Cyber criminals are now posting fake job postings on Indeed and other job boards in an attempt to steal your personal information. They may even ask you to send them your resume and other personal information, which they will then use...

Read More

4 min read

Phishing: Protect Yourself from a Social Engineering Attack

Phishing is one of the most common and well-known social engineering techniques. It's the process of sending emails (or texts, which is known as smishing) appearing to be from reputable sources in an attempt to get someone to reveal personal information.

Read More

2 min read

The 2022 Verizon Data Breach Investigations Report (DBIR)

What Nonprofits Need to Know

The Verizon Data Breach Investigation Report (DBIR) is one of the most comprehensive studies on data breaches in the world. Every year, Verizon releases a report that analyzes data from thousands of breaches across dozens of...

Read More

1 min read

Why New Employees Need Cybersecurity Awareness Training

As soon as a new employee starts at an organization, they become a target for cybercriminals. 

Read More

3 min read

Multi-Factor Authentication Is Critical for Nonprofits

Multi-factor authentication is a critical security measure that all nonprofit personnel should be using. This type of authentication requires more than one method of identification in order to log in to a system or account.

For example, you may be...

Read More

2 min read

Cryptocurrency Donations - Opportunities & Concerns for Nonprofits

Crypto, crypto, crypto, blah, blah, blah. 

Read More

1 min read

Update on Cybersecurity Concerns Related to Russia-Ukraine Conflict

Approximately two weeks ago we provided guidance for organizations concerned about cyber threats stemming from the Russia-Ukraine conflict. 

Read More