4 min read
Phishing: Protect Yourself from a Social Engineering Attack
Phishing is one of the most common and well-known social engineering techniques. It's the process of sending emails (or texts, which is known as...
4 min read
Phishing is one of the most common and well-known social engineering techniques. It's the process of sending emails (or texts, which is known as...
2 min read
What Nonprofits Need to Know The Verizon Data Breach Investigation Report (DBIR) is one of the most comprehensive studies on data breaches in the...
1 min read
As soon as a new employee starts at an organization, they become a target for cybercriminals.
3 min read
Multi-factor authentication is a critical security measure that all nonprofit personnel should be using. This type of authentication requires more...
2 min read
Crypto, crypto, crypto, blah, blah, blah.
1 min read
Approximately two weeks ago we provided guidance for organizations concerned about cyber threats stemming from the Russia-Ukraine conflict.
1 min read
As the Russia-Ukraine conflict continues, many people and organizations have expressed concerns about the potential for cyber-warfare and its...
2 min read
Today, just installing anti-malware software and a firewall on your computer isn’t enough to keep you safe as you use the internet. Nowadays, a...
2 min read
As the tensions mount between Ukraine and Russia the expectations of cyber attacks against the United States are increasing rapidly, and nonprofit...
4 min read
Social engineering is one of the foremost ways that hackers and other bad actors will try and penetrate an organization's cybersecurity defenses....