Logo.png
Ë

    The best way to illustrate the different types of data exfiltration and the impact these incidents have on nonprofits is with examples.

    Read More

    It has probably been longer than you think since your last data security training. Here are a few things you should consider when it comes to retraining.

    Read More

    Here is our guide for what you can do to strengthen your security program, prepare your workforce, and keep your organization’s information safe.

    Read More

    While every incident is different, there are some tell-tale signs of an Insider Threat. Here are 10 you should be aware of before a potential breach.

    Read More

    For years, ransomware attacks were the encryption of a victim's files and held ransom for a fee. But some attackers also dabbled in another approach.

    Read More

    Ransomware attacks are not only appearing at a higher rate than ever before, criminals are also cashing in on organizations that are not prepared.

    Read More

    Rule-based data loss prevention can be a blunt instrument. Rules simply don’t reflect the limitless nuances of human behavior.

    Read More

    Cybercriminals are getting smarter every day, and are using social engineering to steal data. But what is social engineering and how are hackers using it?

    Read More

    The idea of data breaches being more a question of when rather than if has become mainstream. Here are some ways for nonprofits to reduce security risks.

    Read More

    While phishing awareness training will help employees spot phishing scams, it’s not a silver bullet.

    Read More

    Posts by Topic

    see all