data security

Well-meaning employees may be top threat to data security

Employees accessing company data with a multitude of devices present the largest security threat for organizations today, according to a new report from BetterCloud, an independent software vendor based in New York, NY. So how can your organization mitigate the risk from well-meaning employees? Here are a few of the most crucial steps you can take today to protect your data.

Sinu’s Top Data Security Recommendations for 2019

Data Privacy Day, held this year on Monday, January 28, is the perfect opportunity to take stock in your organization’s data privacy and security policies. There are several ways to create a culture of data security within your organization, even with a modest security budget. Here, you will find a list of data security priorities that most organizations can easily adopt with a little time, good internal communication, and without a large investment.

Use a stylus? Windows file could store passwords and other personal data

A handwriting-recognition feature in Windows collects data and stores it, which could represent a security threat, according to digital forensics experts. Passwords and emails could be among the data stored. One of the first lines of defense remains strong passwords, as well as where you store them.



Webinar featuring Sinu’s Larry Velez: “New Administration, New Risks? How To Protect Your Nonprofit’s Data”

The 2016 election brought digital security and surveillance into tight focus. The webinar, “New Administration, New Risks? How To Protect Your Nonprofit’s Data,” held with Idealware and Fission Strategy, encourages organizations to rethink their security. Panelists from several organizations, including Sinu co-founder and CTO, Larry Velez, Idealware board member Leon Wilson of the Cleveland Foundation, and Shauna Dillavou of Community Red, contribute to the conversation about keeping your nonprofit data safe while bringing more productivity and safety to your team and constituents.

 

Don’t wait! 3 easy steps to protect your Yahoo account

Some time around August 2013, the email system of Yahoo was attacked and the records of more than 1 billion users were stolen. Information included names, birth dates, phone numbers and passwords which were encrypted with an easily broken form of security. Now they are for sale on the Dark Web.

Budgeting for system updates and technology replacement

Most nonprofit organizations work off of a strategic plan to guide them to achieve their mission. Many organizations, however, have not developed a plan for their technology and how it can support that mission. Instead, they take a more reactionary stance toward hardware and software: if hardware breaks down or mission-critical software cannot run on an obsolete operating system, it gets replaced. However, adopting a more strategic approach to technology replacement can help avoid surprise expenses, save money, mitigate data security risks, and increase productivity.

Top Nonprofit Tech Challenges: Data backup and continuity solutions

Business continuity planning includes developing policies and procedures your organization can use to mitigate risk and ensure that your operational work can continue should there be disruption to your technology solutions, whether it's caused by human error or natural disaster. An important part of business continuity planning is identifying which operations are essential and to map out what technologies must be set up through back-up plans or redundant systems to enable your work to continue.

Top Tech Challenges of Nonprofits: Obsolete Technology

Knowing when to upgrade and install updates is critical to keeping your data secure, but it can be challenging to keep up with it all. Sinu takes care of these updates automatically, but if you are managing your IT in-house, here are a few tips on avoiding obsolete technology.

Social engineering: Bad people tricking good people

Social engineering: Bad people tricking good people

Social engineering is the psychological manipulation of people into performing actions or divulging confidential or sensitive data for the purpose of fraud and/or system access. It is often difficult to identify the attacker because it is just one layer in a sophisticated hacking scheme.

The future of enterprise: Apple, GE look to consumer tech

When asked about the future of enterprise technology, the chief executives from two of America's largest companies agree that it is personalization.

7 Data Security Tips

Whether it’s the BASH flaw we blogged about recently, the JP Morgan/Chase hack this summer, or the discovery of the Reddit Mac iWorm, it seems that news about data breaches has been more prevalent than ever. Data security has never been more important – as the amount of data that is stored online continues to increase and hackers get significantly more sophisticated, making even the savviest of computer users susceptible to breaches.

How secure is your password?

In the days after the Heartbleed story broke earlier this year, Sinu, along with other technology experts, advised our customers to change the passwords of their online accounts to protect their data. Since then, a myriad of security breaches have been announced.