Anatomy of a Phishing Attack
August 9, 2017 8:30 am Leave your thoughtsPhishing is one of the most common cybersecurity threats. Understanding how a basic phishing attack works will help you protect your organization.
Allison Davis Ward is a Partner at CapinTech. Throughout her time as an information systems auditor and senior manager, Allison has provided information security assessment and consulting services primarily for nonprofit organizations, financial institutions, and health facilities. In addition to these services, she has provided clients with consulting services in risk assessment and policy development engagements.
Phishing is one of the most common cybersecurity threats. Understanding how a basic phishing attack works will help you protect your organization.
While cyber breaches can take many different forms, they typically occur when hackers target common technical weaknesses. Here are three of the most prevalent cybersecurity threats all nonprofits face.
Given the high stakes, it’s vital to ensure that your organization has sufficient cybersecurity protection. These four steps go beyond the basic cybersecurity practices you should follow to help you further strengthen your organization’s cybersecurity defenses.
As recent headlines illustrate, cyberattacks are a real and growing risk for all organizations. Fortunately, there are steps you can take to strengthen your organization’s defenses and respond quickly and effectively when an attack occurs.
All nonprofits are at risk of a cyber breach. These five steps will help you understand the key issues and risks and how your organization can strengthen its cybersecurity defenses.
Hacking has been receiving a great deal of attention lately in the political arena, but many higher education leaders may not realize the severity and scope of the threat to their own institution.
The number of cyber breaches and incidents is skyrocketing, and that pattern will continue. So what should nonprofits be doing? This article examines two prevalent cybersecurity myths and the steps you can take to help protect your organization.