Nonprofit Resources
Top Cybersecurity Myths: Cybersecurity Is Not My Problem
October 14, 2020 - Learn why cybersecurity is the responsibility of every employee, and steps you can take to make it a priority for your entire organization.
Top Cybersecurity Myths: We Have a Great IT Department
October 7, 2020 - IT and InfoSec are two very different functions, and relying on the IT function alone to secure your organization would be a disservice to you, your donors, your constituents, and your mission.
Security in a Cloud Computing Environment
June 29, 2020 - If your organization uses a cloud computing environment, it’s important to understand the inherent security risks and take steps to reduce them.
Keeping Data Secure for Remote Workers
March 18, 2020 - Remote work has become a necessity at many organizations. Follow these five steps to create a remote working environment that supports your organization while maintaining the security of your systems and data.
Application Security: Understanding the Risks
How far does your organization need to go when implementing application security? The first step is understanding common application security risks and the impact they can have.
Application Security: Recommendations and Next Steps
What application security settings should your organization be using to protect against a cyber breach? Here are our recommendations and suggested next steps.
Critical Microsoft Windows 10 Vulnerability Discovered
The U.S. National Security Agency (NSA) has uncovered a critical vulnerability that affects how Windows 10 trusts software and connects to remote computers. All Windows users should make the security update as soon as possible and turn on automatic updates.
The Gramm-Leach-Bliley Act: What Higher Education Institutions Need to Do Now
While GLBA requirements are not new, they are now part of the required audit* procedures in the Compliance Supplement. Learn about the changes, the steps you need to take, and the potential cost of noncompliance.
Application and Software Inventory: The Good, the Bad, the Process!
As your organization uses more software and applications, you need an effective inventory system to manage and secure what you’re using. These three steps will help you get started.
Developing a Strategy for IT Asset Management Success
IT asset management can seem like a mountainous task, but strategic planning will make the task manageable and save you headaches and sleepless nights. These steps will help you get started.