Provided by Traina & Associates, a CapinCrouse Company
National Cybersecurity Awareness Month: Protect IT
October 18, 2019 - How to protect your email, facilities, and data by tightening up your processes and controls.
National Cybersecurity Awareness Month: Secure IT
October 11, 2019 - Resources and tips to help your organization “Secure IT” by adding security features and layered controls to better protect against cyber threats.
National Cybersecurity Awareness Month: Own IT
October 4, 2019 - Tips to help your organization and employees “Own IT” to reduce your risk and better protect your organization and its data, employees, and donors.
Application and Software Inventory: The Good, the Bad, the Process!
As your organization uses more software and applications, you need an effective inventory system to manage and secure what you’re using. These three steps will help you get started.
Developing a Strategy for IT Asset Management Success
IT asset management can seem like a mountainous task, but strategic planning will make the task manageable and save you headaches and sleepless nights. These steps will help you get started.
Planning Ahead for Cloud Computing Challenges
What happens when the cloud goes down or your cloud vendor is hacked? Planning ahead can help your organization stay productive during an outage.
How to Protect Your Organization from Phishing Email
The risk of employees falling victim to phishing email is rising. Here’s how to reduce your organization's risk from phishing email and respond quickly if a breach occurs.
Remote Desktop Protocol (RDP): Balancing Convenience with Security
Remote desktop protocol (RDP) is often used for working remotely and providing IT support. But while RDP provides convenience and efficiency, it also has many security implications. Take these steps to help secure it.
3 Steps to Improved Email Security
Email is a business necessity, but it also is a significant cybersecurity risk. These steps will help your organization increase email security and protect your data, employees, and constituents.
How to Develop an Effective IT Audit Program
An IT audit is an important cybersecurity tool for organizations of all sizes. These four steps will help you implement an effective IT audit program.