Article Archives: Steve Vasconcellos

Foundations have experienced exponential growth in their philanthropy efforts and grant sophistication over the last 10 years. And while this expansion is exciting, many are discovering it comes with growing pains.

 » Read more

During a recent meeting we had with an organization, we asked their director if they had assessed the cybersecurity of the personally identifiable information they obtained from donors and employees.

 » Read more

Introduction

The Information Security Policy (IS Policy) is the most important security document of an organization. Ideally, it should serve as the guiding principle of an organization’s information security, providing structure and vision to ensure the organization can achieve its mission,

 » Read more

As the pace of technology advancement increases, the information systems we rely on to record and store accounting information are growing in complexity and sophistication. Financial data can be dispersed over multiple systems or “sources of truth,” leading to inconsistencies or inaccuracies that may impact business decisions.

 » Read more

Is your software provider following best practices in keeping their data, and by extension your data, safe? A System and Organization Controls (SOC) report can help you determine how closely a third-party organization is adhering to federal guidelines on cybersecurity.

 » Read more

The primary objective when building a Business Continuity Plan (BCP) is to increase the likelihood that your organization will survive a disaster, such as a massive cybersecurity breach or a global pandemic.

 » Read more

The coronavirus pandemic has brought an unprecedented rise in the number of employees working from home. Unfortunately, with employees operating outside of their company’s usual cybersecurity set-ups, the situation offers plenty of opportunities for hackers to exploit poor digital habits and weak at-home security protocols.

 » Read more

What is Cybersecurity?

The perception of cybersecurity is one filled with mysterious hackers in their jeans and hoodies, sitting in a dark room, combating one another in digital cyberspace. While this perception may not be entirely untrue,

 » Read more

Media Contact

Lindsay Rose
Marketing Senior Manager
Clark Nuber
Contact Lindsay