Top Five Risks of Shadow IT

What is “Shadow IT?” It may sound sinister, but it’s simply the practice of using software and other systems outside of—and without the knowledge of—your organization’s IT department. As the use of Software as a Service continues to grow exponentially, so does Shadow IT. Employees now have the ...
Learn More

Five Ways Your Nonprofit Can Be Cyber Smart

Our favorite October tradition is back: National Cybersecurity Awareness Month. We are 100 percent onboard with an entire month dedicated to raising awareness about the importance of cybersecurity.
Learn More

Five Ways Every Nonprofit Can Protect Sensitive Employee Information

Cyber criminals see nonprofits as prime targets for malicious attacks and they’re great at accessing data—including sensitive employee information. Nonprofits spend much of their time, energy, and resources addressing the needs of the communities they serve—but they must also make sure they are ...
Learn More

Strategies for Securing Remote Workspaces

Your organization may have strong security defenses for in-house data and files, but do your staff and their devices remain protected when they leave the office? Since nonprofits commonly work with sensitive data, it’s imperative to protect that information from cyber criminals, no matter where ...
Learn More

Nonprofit Cyber Attack Case Studies and Solutions

Nonprofits are appealing targets for cyber criminals. The criminal world has zeroed in on us for four main reasons: 1) they don’t believe we have the resources to hire security teams, 2) we are thought to have aging technology infrastructure that’s easy to penetrate, 3) we’re more susceptible to ...
Learn More

How Nonprofit Cyber Attacks Really Happen

We live in a digital world, and the reality is that no one is entirely safe from a cyber-attack. Nonprofit organizations develop with an interest in doing good work for the community, in serving others and providing for the greater good, but even nonprofit organizations can fall victim to ...
Learn More

Password Stuffing and What You Can Do

Nonprofits need to worry about more than just phishing attacks. One of the most common ways organizations can be compromised is a sneaky attack called "Password Stuffing." In this scenario attackers buy or download lists of usernames and passwords stolen from various insecure websites. This ranges ...
Learn More

Hunting the Phishers - How to Report a Scammer to the Authorities

More and more often nowadays, phishers are using malicious links and faulty e-mails to scam and phish people online. These attacks rely on the same basic strategy: To trick you into providing your financial or personal information — often by masquerading as a trusted source such as your bank, ...
Learn More