How to Protect Donor Data from Prying Eyes

An IT professional is examining servers is a warehouse and taking notes on his clip board.

Donors trust your nonprofit not only with their money, but with their personal information as well. One way your organization can honor that trust is to ensure you protect donor data from cybercriminals.   Nonprofits are no less immune to cyber-attacks than other organizations. Just like businesses, nonprofits harbor something criminals want – valuable information.…

Read More

Should Your Business Accept Bitcoin Payments?

A customer is purchasing a cup of coffee with bitcoin using their sell phone. The cell phone is shown pointing toward the vendor and has the bitcoion logo on the phone screen.

The payments ecosystem is complicated enough as it is. Throw in the growing prevalence of Bitcoin and other cryptocurrencies and you can’t fault business owners for feeling anxious. Nevertheless, businesses are considering getting into the Cryptocurrency payment ecosystem. Wider adoption of cryptocurrency and a growing number of Bitcoin payment gateways make accepting payments far easier,…

Read More

Can Hackers Get Through Your Customer Service Chatbots?

A person is holding a mobile phone, but only the phone and the person's hands are visible in the image. There is a chatbot shown on the phone screen. The background is blurred and shows a table, chairs, and a cup of coffee.

Chatbots are some of the best AI-infused applications businesses can utilize. Depending on the size of your operation, you could save tens of thousands of dollars per year in customer service expenses by leveraging this emerging technology. However, you should understand the multiple security risks associated with this technology before connecting chatbots to your digital…

Read More

New Florida Law Requires Tougher Government Cybersecurity Standards

A business worker is getting instructions from another businessman, in a computer lab while standing over his shoulder. The man giving instructions is sitting and pointing at the computer screen while instructing.

A new Florida law prohibits state agencies and local governments from paying ransomware demands. It also requires annual employee cybersecurity training and other protective measures to secure their technology. House Bill 7055, also known as the Local Government Cybersecurity Act, was signed into state law on June 24, 2022. An enhancement of existing law, it…

Read More

5 Tips to Maximize the Benefits of Cyber Liability Insurance

Changes in costs and consumer demands in the past decade have accelerated the adoption of cloud-based infrastructure. Over 80% of small businesses  now declare cloud computing important to their business, alongside an even larger share of medium-sized and enterprise companies. Unfortunately, a larger web presence leads to increased risk from cybersecurity threats that have grown…

Read More

3 Growing Trends for Disaster Recovery and Business Continuity Plans

Disaster recovery plan button

Murphy’s Law may not be scientific, but the spirit of the concept is more than a meme. Disruptive events like the COVID-19 pandemic and the 2007-2009 Great Recession prove every business needs to prepare for the unexpected. Times are changing, though, and so are the most critical business areas that require risk mitigation strategies. Protect…

Read More

CyberSecurity Primer for the Small to Mid-Sized Business

Small and midsize businesses face an increasingly complex digital landscape. On the one hand, cloud-based operations are almost unavoidable. Considering 40% of consumers start their search online, operating without a web presence is often a losing prospect, especially within highly competitive industries. Still, even those 36% of small businesses in the U.S. without a website…

Read More

Microsoft Hack: What You Need to Do Right Now

A recent cyberattack on Microsoft Exchange Server is believed to have impacted as many as 250,000 email servers covering nearly all business segments and sizes. If you have Microsoft Exchange connected to the internet, you are likely impacted. The hackers, who were linked to a Chinese cyberespionage group, initially exploited flaws in Microsoft’s Exchange software…

Read More