Protecting Nonprofit Donor Data

October 24th, 2024
As with many other organizations, cybersecurity has become a top priority for nonprofits. However, many nonprofits struggle with cybersecurity, lea...

Ethical Responsibility of Cybersecurity for Law Firms

October 17th, 2024
Law firms are prime targets for cybercriminals for many reasons. Holding a wealth of confidential data, including sensitive financial, personal, an...

Is Cybersecurity Alarm Fatigue Fueling Complacency?

October 10th, 2024
If you are like many of us, the urge to toss aside your smartphone after wading through a deluge of cybersecurity warnings, doomsday articles, and ...

Safeguard Your Organization with Insurance

September 19th, 2024
In today's volatile business environment, having the right insurance coverage is essential for protecting against potential financial losses from v...

Six Steps to Cyber Resiliency

September 6th, 2024
Safeguarding your business and its data is not about products but your organization's culture and mindset about protecting sensitive information, e...

Danger Ahead: AI in Law Firms

July 25th, 2024
The power of automation can be alluring, but for some organizations, the risks of leveraging these powerful tools bring risks. Generative AI, while...

Email Buzz: Quick Primer On DMARC

July 3rd, 2024
If your organization uses any type of mass email distribution system, such as a CRM tool or marketing email tool, you've probably been bombarded wi...

Productive & Protected: BYOD Security Best Practices

June 20th, 2024
While Bring Your Own Device (BYOD) has been widespread for more than a decade, the surge in remote work since 2020 has pushed its popularity to new...

Don't Fall Victim to Vishing

June 13th, 2024
We often discuss cybersecurity tactics such as email phishing, where the bad actor delivers a sneaky ask via email in an attempt to lure an employe...

Does the FTC Safeguards Rule Apply to You?

June 6th, 2024
It's a common misconception that only corporations with more than 5,000 customers are subject to the enhanced cybersecurity demands outlined in the...