Provided by Traina & Associates, a CapinCrouse Company
What You Need to Know About the WannaCry Ransomware Program
This was potentially the largest cyber attack the world has ever seen. Here's what you need to know, including steps to protect your organization and what to do if you become a victim.
How to Reduce Your Cybersecurity Risk
As recent headlines illustrate, cyber attacks are a real and growing risk for all organizations. Fortunately, there are steps you can take to strengthen your organization’s defenses and respond quickly and effectively when an attack occurs.
5 Steps to Strengthen Your Organization’s Cybersecurity Defenses
All nonprofits are at risk of a cyber breach. These five steps will help you understand the key issues and risks and how your organization can strengthen its cybersecurity defenses.
5 Steps to Strengthen Your Institution’s Cybersecurity Defenses
Hacking has been receiving a great deal of attention lately in the political arena, but many higher education leaders may not realize the severity and scope of the threat to their own institution.
What Would Happen if Your Organization Was Hacked?
January 13, 2017 - Cyber attacks are a significant and growing risk and nonprofits, regardless of size, are not immune. Do you know what to do if your organization’s information systems or data are compromised?
Top Cybersecurity Myths and How to Overcome Them
The number of cyber breaches and incidents is skyrocketing, and that pattern will continue. So what should nonprofits be doing? This article examines two prevalent cybersecurity myths and the steps you can take to help protect your organization.
Webcast for Nonprofits: Cybersecurity – What Every Nonprofit Needs to Know
February 23, 2017 - Lisa Traina, Partner at Traina & Associates, a CapinCrouse Company, explores common cybersecurity issues and shares recommendations for protecting your IT environment.
New IT Security Threat Targeting Finance Departments On the Rise
A hacked email account. A perpetrator posing as a senior leader and requesting a fraudulent funds transfer. This may sound like a movie plot, but it is a reality we see playing out more and more. Learn more about this type of IT security breach and four recommendations for preventing it.