Remote Desktop Protocol (RDP): Balancing Convenience with Security
Remote desktop protocol (RDP) is often used for working remotely and providing IT support. But while RDP provides convenience and efficiency, it also has many security implications. Take these steps to help secure it.
3 Steps to Improved Email Security
Email is a business necessity, but it also is a significant cybersecurity risk. These steps will help your organization increase email security and protect your data, employees, and constituents.
2Q 2019 Market Commentary from Cornerstone
The second quarter of 2019 proved to be quite interesting for investors. Learn why and see what might lie ahead in this guest post from Cornerstone Management.
The Importance of ACA Compliance for Churches
July 30, 2019 - The IRS will be contacting some churches about the Affordable Care Act. All church leaders should ensure their churches are compliant.
Top 10 Trends in the Nonprofit Industry
In the nonprofit industry, many outside factors impact daily operations. Here are the top 10 trends currently impacting nonprofit organizations.
How to Develop an Effective IT Audit Program
An IT audit is an important cybersecurity tool for organizations of all sizes. These four steps will help you implement an effective IT audit program.
IT Audits: What, Why, Who, and When
Explore the what, why, who, and when of IT audits so you understand the important role they can play at organizations of all sizes.
Don’t Be a CF-No: How Nonprofit CFOs Can Collaborate with Senior Leadership
A look at four key areas with a divergence in opinions between nonprofit CFOs and other executives in the nonprofit sector, and how they can collaborate.
Audit Committee Self-Assessment
BDO has designed an audit committee self-assessment tool to assist audit committees in evaluating how well they're executing their responsibilities.
Higher Education Cybersecurity Threats on the Rise
Moody’s Investors Service reports that the risk of cyberattacks at higher education institutions is increasing. And emerging threats are creating new challenges. Here are some resources to help.