VPAT - GRAVYTY LOGO - MAIN LOGO
Ë

    This article identifies examples of vulnerable employees, what makes them targets, and what tactics hackers use to cause a data breach.

    Read More

    Exploring different methods and motives will better equip nonprofit leaders (and their employees) to spot Insider Threats before a data breach happens.

    Read More

    Cybercriminals are smarter than ever. Know the difference between phishing and spear-phishing to keep your nonprofit safe from both.

    Read More

    Email spoofing is a common way for cybercriminals to launch phishing attacks — and just one successful phishing attack can devastate your nonprofit.

    Read More

    Autocomplete is a handy feature in a workplace. However, it is prone to making mistakes and can cause you to send emails to the wrong person accidentally.

    Read More

    Jargon is a hallmark of all industries. Cybersecurity is no different, but using the correct security terminology has a real impact.

    Read More

    Those who fail to learn from the past are doomed to repeat it. Here's what we can learn from data breaches so far this year to help ourselves safe.

    Read More

    Making sure donor data and organization records stay safe requires everyone to take data security seriously - and that includes your donors.

    Read More

    We've rounded up this list of 9 real-world (recent) examples of data breaches caused by misdirected emails.

    Read More

    What are the consequences of firing off an email to the wrong person, and what can you do to prevent it from happening? 

    Read More

    Posts by Topic

    see all