Provided by Traina & Associates, a CapinCrouse Company
Physical Security: The Old Man in the Young Man’s Game
Don’t overlook physical security in conjunction with your organization’s cybersecurity controls. The most robust cybersecurity measures are useless if a criminal can walk into your office and steal the hardware housing your data.
Beginner’s Guide to Data Privacy Laws
The new data privacy laws are long overdue, and every organization should be aware of what they encompass. Here’s what you need to know, plus five goals to help you reach compliance.
Keeping Data Secure for Remote Workers
Remote work is becoming extremely popular, but it may create new challenges as your network becomes decentralized. These four steps will help you create a remote working environment that supports your organization while maintaining the security of your systems and data.
Managing the Risk from Mobile Devices
Better management and security controls for mobile devices should be part of the cybersecurity strategy at every organization. Consider these five steps to reduce your organization's cyber risk.
The Inherent Risk of Guest Wi-Fi Access at Your Church
Many churches provide Wi-Fi for the convenience of employees and guests. However, this complimentary benefit can come with a heavy price if security is taken for granted. Take these steps to help protect your church.
The Human Element of Cybersecurity and Social Engineering
One human error can be all it takes for an attempted cyber breach to turn into a successful one. Unfortunately, this risk is often overlooked in favor of more tangible cybersecurity efforts. Here are five steps you can take to strengthen your defenses.
Does Your Information Governance Program Look Like an Abandoned Fairground?
An information governance program helps hold organizations and individuals accountable for the proper handling of information assets. Learn how your organization can benefit.
Webcast for Nonprofits: Disaster Recovery Basics: Planning, Testing and Training
January 24, 2019 - Planning your response to and recovery from the next storm, cyber attack, system failure, or other disaster is vital, but it can be challenging and time-consuming. Watch this webcast recording for an overview of Disaster Recovery/Business Continuity Plan objectives.
The Importance of Cybersecurity Training
While your organization needs to have filters, processes, and controls in place, it’s important to not overlook the “doors” that can be left unlocked by employees and other network users.
Helpful Nonprofit Cybersecurity Resources
National Cybersecurity Awareness Month is almost over, but it’s important to make cybersecurity a top priority year-round. Here are some ways you can boost your cybersecurity knowledge and defenses.