2 min read
RoundTable Technology Announces SOC 2 Type 2 Attestation
RoundTable Technology is proud to announce that we’ve received a clean SOC 2 Type 2 attestation report. This rigorous, independent assessment of our...
2 min read
RoundTable Technology is proud to announce that we’ve received a clean SOC 2 Type 2 attestation report. This rigorous, independent assessment of our...
3 min read
Nonprofit organizations have a responsibility to protect their donors' information, as well as their own. This means that cybersecurity awareness...
3 min read
In a world where data breaches are becoming increasingly common, cybersecurity insurance is a must for any organization that stores or processes...
4 min read
With the pandemic also came a resurgence of QR codes. Once thought dead, at least in the United States, they are now more widespread than ever. From...
4 min read
Pretexting is a type of social engineering attack that is often used to gain access to confidential information. In a pretexting attack, the attacker...
3 min read
It’s not an exaggeration to say that the relationship between data privacy and cybersecurity is a symbiotic one. Data privacy depends upon...
3 min read
Job seekers beware! Cybercriminals are now posting fake job postings on Indeed and other job boards in an attempt to steal your personal information....
4 min read
Phishing is one of the most common and well-known social engineering techniques. It's the process of sending emails (or texts, which is known as...
2 min read
What Nonprofits Need to Know The Verizon Data Breach Investigation Report (DBIR) is one of the most comprehensive studies on data breaches in the...
1 min read
As soon as a new employee starts at an organization, they become a target for cybercriminals.