Categories: Data Privacy, Tech Risk, Cybersecurity
December 2, 2016
Resource Type: Articles
Personal Devices at Work
Employee-owned versus organization-owned… the battle wages on. As employees, many of us prefer to use personal phones and laptops for work because they are convenient, commonsense, and a lot cooler than what the IT department provides. Nonprofits know there is...
December 2, 2016
Resource Type: Webinars
Risk in the Cloud: Keep Your Assets Protected When Flying High
Are you leery of cloud computing? Many nonprofit leaders are considering the upsides of cloud computing, but remain concerned about data security in the cloud. This webinar will explore security risks in a cloud computing environment and offer actionable tips...
December 2, 2016
Resource Type: Articles
Risk in the Cloud
Remember the craze over beanie babies in the 1990s? I was just a kid during the 90s, so I innocently endorsed that craze. My parents suffered through my childhood, spending heaps of money when I demanded to have the next...
December 2, 2016
Resource Type: Articles
Data Privacy and Cyber Liability: What You Don’t Know Puts Your Mission at Risk
If you were a long-time donor to a nonprofit, and just learned that your credit card details provided to the nonprofit to make a donation are now in the hands of a hacker, would you ever trust that organization again?...
December 2, 2016
Resource Type: Articles
Tame Junk E-Mail
Take Me Off Your Spam List! If you’re being lambasted with junk e-mail known as spam, you need to solve the problem. Not only does it expose staff to unsavory/unwanted messages, it steals time from productive assignments, it’s a security...
December 2, 2016
Resource Type: Articles
Tech Risk Q & A
Q: What questions should we ask the references of a prospective new tech vendor? A: Checking references for any new vendor is a good idea and sound risk management practice. When checking references for a new technology vendor, try to ask questions...
December 2, 2016
Resource Type: Articles
Technology: Boon or Bust?
During a recent weekend I spent 24 precious hours with two close friends who live in distant cities—hours that made us feel giddy, as if we had stolen them from our otherwise work and family-filled days. In order to spend...
Topics: Data Privacy, Tech Risk, Cybersecurity, HR Risk and Employment Practices
December 2, 2016
Resource Type: Risk eNews
5 Steps to Effectively Managing Social Media Risk
Is your organization among the 97% of nonprofits in the US that use Facebook, Twitter, LinkedIn and other social media as a key part of your communications and development efforts? If so, you should be thinking about how best to...
December 2, 2016
Resource Type: Risk eNews
3 Benefits and 2 Risks for Nonprofits Leaders Using LinkedIn
First, the good news. LinkedIn is a valuable social media channel where nonprofit leaders can network with one another, recruit volunteers and communicate with donors and other key audience members. But there are risks of using LinkedIn that you should...
December 2, 2016
Resource Type: Webinars
BYOD: Managing the Risk of Personal Devices at Work
Many nonprofit employees are asking to use personal devices for business purposes, including devices containing apps, music collections, photos and more. This webinar will explore the risks and rewards of the “BYOD” movement — Bring Your Own Device. Tune in...