Page One
Services
Digital Thinking Blog
About Portfolio
Contact

Portfolio

Page One
Services
Digital Thinking Blog
About Portfolio
Contact
iphone-20120209091602-1.jpg
February 9, 2012
February 9, 2012

February 9, 2012
Newer PostAre you socially mobile?
Older PostGrow green: Building better business events virtually

What we're blogging about

CATEGORIES

  • Best Practices 41
  • BizSafe 11
  • In the news 11
  • Innovation 4
  • Internet of things 7
  • Tech in the workplace 18
  • business 114
  • cloud computing 4
  • communication 48
  • connections 14
  • future 4
  • futurist 15
  • media 11
  • mobile media 7
  • mobile technology 43
  • mobile workforce 28
  • networking 6
  • nonprofits 10
  • security 57
  • social media 35
  • tablets 3
  • technology 103
  • technology in the workpla 2
  • training 18
  • virtual events 6
  • workplace 20
  • writing 6
Subscribe
Non-Profit Hack Series
BizSafe, security, nonprofits
Digital Maven, digital maven, Nonprofit Hacks, phishing
BizSafe, security, nonprofits
Digital Maven, digital maven, Nonprofit Hacks, phishing

Nonprofits, regardless of size are a profitable target for hackers. The reliance on volunteers, tighter purse strings, and lesser likelihood of having strong IT support makes them attractive targets. Here's how to even the odds a bit.

61633338 - people, family, charitable organizations and nursing concepts, close-up of two hands holding a family of four

Read More →
BizSafe, security, nonprofits
Digital Maven, digital maven, Nonprofit Hacks, phishing
nonprofits, security
bizsafe, Nonprofit Hacks
nonprofits, security
bizsafe, Nonprofit Hacks

Exposure to hacking, cracking and fraud is a huge risk for nonprofits. So Portfolio and Wessel Accounting are offering their BizSafe security review to a dozen nonprofits in the Upstate of SC for free this year. Find out how you can nominate your favorite nonprofit for one. Friends don't let friends get hacked.

Read More →
nonprofits, security
bizsafe, Nonprofit Hacks
Best Practices, security, nonprofits, technology, training
nonprofit security, Nonprofit Hacks, nonprofit fraud, shadow database
Best Practices, security, nonprofits, technology, training
nonprofit security, Nonprofit Hacks, nonprofit fraud, shadow database

Shadow databases are risky business, but widely used. But well-meaning volunteers or hard-working employees may expose your business to unnecessary risk. Don't be one of the 60 percent of businesses that goes under after a data breach. This risk is avoidable.

Read More →
Best Practices, security, nonprofits, technology, training
nonprofit security, Nonprofit Hacks, nonprofit fraud, shadow database

Subscribe to Digital Thinking

Back to Top
BizSafe - The Security-Fraud Review
Technology Consulting
Communications Consulting
Virtual Events
Published Work
3620 Pelham Rd., #53, Greer, SC, 29650, USA864-986-0126laura@portfoliosc.com

Powered by Squarespace

Print