May Cybersecurity Tip: Going Beyond the Firewall

A firewall protects against unauthorized access by scanning traffic and controlling what information can pass through the network. Since firewalls work by filtering traffic based on source and type, they won’t catch threats that come from a “legitimate" origin, such as:

Social engineering, including phishing attacks
Malicious websites disguised by an SSL certificate
Human error and the insider threat

Phishing emails, for example, often make it through a firewall, as email is considered normal traffic.

Should I Care #4 – Microsoft Windows 10

In the “Should I Care?” series we present topics that seem to be on the minds of many folks at the nonprofits with whom we work. In these blog posts, we’ll try to answer the basic question of whether it’s something you should care about or not and, if so, what you might want to do about it.

The Best Free One-Hour Cybersecurity Awareness Training Ever – January 30thJoin us!