Posts

How Verification Protocols Protect Your Organization from Online Scammers

Imagine it’s your newest hire’s second day, and she’s eager to make a good impression. Her phone buzzes with a text message from someone claiming to be the executive director: “I’m stuck in back-to-back donor meetings but need you to pick up some gift cards for our appreciation event. Can you grab $500 worth from […]

Read Article

How to Protect Your Staff from Impersonation Scams

Impersonation scams are on the rise—and nonprofits and mission-driven organizations are prime targets. These attacks don’t rely on system breaches. Instead, they exploit publicly available information to impersonate leadership and trick employees into urgent financial requests. Our guide breaks down: What impersonation scams look like (with real-world tactics) Steps you can take to reduce your […]

Read Article

Fighting Phishing: Why Two-Factor Authentication Is No Longer Enough

Fourteen years ago, Google introduced two-factor authentication (2FA), which became an essential tool for verifying user identity and preventing phishing scams. And, like so many technologies dating back to 2011, it’s time for a 2FA update. While 2FA is widely used across enterprise companies, only 34% of mid-sized organizations currently use 2FA. Those who have […]

Read Article