Nonprofit Resources
How to Protect Your Organization from Phishing Email
The risk of employees falling victim to phishing email is rising. Here’s how to reduce your organization's risk from phishing email and respond quickly if a breach occurs.
Remote Desktop Protocol (RDP): Balancing Convenience with Security
Remote desktop protocol (RDP) is often used for working remotely and providing IT support. But while RDP provides convenience and efficiency, it also has many security implications. Take these steps to help secure it.
3 Steps to Improved Email Security
Email is a business necessity, but it also is a significant cybersecurity risk. These steps will help your organization increase email security and protect your data, employees, and constituents.
How to Develop an Effective IT Audit Program
An IT audit is an important cybersecurity tool for organizations of all sizes. These four steps will help you implement an effective IT audit program.
IT Audits: What, Why, Who, and When
Explore the what, why, who, and when of IT audits so you understand the important role they can play at organizations of all sizes.
Physical Security: The Old Man in the Young Man’s Game
Don’t overlook physical security in conjunction with your organization’s cybersecurity controls. The most robust cybersecurity measures are useless if a criminal can walk into your office and steal the hardware housing your data.
Beginner’s Guide to Data Privacy Laws
The new data privacy laws are long overdue, and every organization should be aware of what they encompass. Here’s what you need to know, plus five goals to help you reach compliance.
Managing the Risk from Mobile Devices
Better management and security controls for mobile devices should be part of the cybersecurity strategy at every organization. Consider these five steps to reduce your organization's cyber risk.
The Inherent Risk of Guest Wi-Fi Access at Your Church
Many churches provide Wi-Fi for the convenience of employees and guests. However, this complimentary benefit can come with a heavy price if security is taken for granted. Take these steps to help protect your church.
The Human Element of Cybersecurity and Social Engineering
One human error can be all it takes for an attempted cyber breach to turn into a successful one. Unfortunately, this risk is often overlooked in favor of more tangible cybersecurity efforts. Here are five steps you can take to strengthen your defenses.