Type: Articles

How Verification Protocols Protect Your Organization from Online Scammers

Imagine it’s your newest hire’s second day, and she’s eager to make a good impression. Her phone buzzes with a text message from someone claiming to be the executive director: “I’m stuck in back-to-back donor meetings but need you to pick up some gift cards for our appreciation event. Can you grab $500 worth from […]

Read Article

Fighting Phishing: Why Two-Factor Authentication Is No Longer Enough

Fourteen years ago, Google introduced two-factor authentication (2FA), which became an essential tool for verifying user identity and preventing phishing scams. And, like so many technologies dating back to 2011, it’s time for a 2FA update. While 2FA is widely used across enterprise companies, only 34% of mid-sized organizations currently use 2FA. Those who have […]

Read Article

Cybersecurity and Digital Privacy Tips for International Travel

Picture this: You’re on a cross-country flight, reviewing documents on your laptop. After a moment, you notice the passenger beside you has abandoned their in-flight entertainment. Instead they’re riveted by something far more interesting — the sensitive organizational data glowing on your screen. Who are they? And how much have they read?  While movies may […]

Read Article