Nonprofit Cyber Attack Case Studies and Solutions

Nonprofits are appealing targets for cyber criminals. The criminal world has zeroed in on us for four main reasons: 1) they don’t believe we have the resources to hire security teams, 2) we are thought to have aging technology infrastructure that’s easy to penetrate, 3) we’re more susceptible to ...
Learn More

Locking Down Your Email With Encryption

I met Matt Eshleman, Chief Technology Officer at Community IT, at NTC 2018 in New Orleans. After sitting through his session, I asked if he'd be willing to answer a few questions for our blog, and he graciously agreed. Thanks for taking the time to respond to our questions, Matt!
Learn More

Turn Your Nonprofit's Social Media “Big Data” into "Big Impact"

If you’ve read an article about big data in the last year or two, and thought “That’s too big to effect my nonprofit...” you’re missing out on a great opportunity to create positive impact. Big data is the name given to the millions of digital interactions corporations and nonprofits experience ...
Learn More

Like Phish in a Barrel

Yesterday afternoon I received two strange emails within a few minutes of each other. They both said that someone had shared a Google Doc with me. That by itself wasn't suspicious. Nonprofit technology people love Google Docs and the fact that someone would share a doc without first giving me a ...
Learn More

Best of the Web: February 2017

The End of Neutrality? In the 1990s, there was no shortage of internet evangelists. From Silicon Valley pioneers to Vice President Al Gore, everyone seemed to be promoting a particular kind of utopian dream—a frictionless economy where information is abundantly free and anyone you meet online might ...
Learn More

Best of the Web: December 2016

Searching for Security in an Insecure World For a lot of people, the world feels a little less secure today than it did five weeks ago. We’ll see if many of our “horrible imaginings” come to pass, but one incident that should make everyone uncomfortable is the recent CIA revelations that Russia was ...
Learn More

Five Must-Have Security Policies

You’ve put firewalls in place and installed antivirus software on every computer in your office, but none of it matters if your staffers are engaging in risky habits—your organization is not protected. Written policies and regular training are critical for every nonprofit because they empower ...
Learn More

Microsoft Announces New Mobile & Cloud Security Innovations

Introducing Enterprise Mobility + Security Securing productivity, collaboration and enterprise data is critically important as organizations digitally transform. Today’s cloud and mobile technology is enabling companies to reshape their business and capitalize on the digital transformation ...
Learn More

The Challenges of Bringing Your Own Devices to Work

Does your organization allow employees to use their personal electronic devices for work? As a virtual organization with all staff working from home, Idealware not only allows BYOD (Bring Your Own Device), but in many cases requires it. Employees provide their own computers and a way to make and ...
Learn More

Find out if your TeamViewer account has been hacked and what to do

Remote login software TeamViewer has had a significant number of user accounts hacked, and the organization is scrambling to find the root cause of the problem. A spokesman for the organization, Alex Schmidt, confirmed the community's suspiciton over the weekend, but is blaming poor external ...
Learn More

Search