У нас вы можете посмотреть бесплатно Strengthen Your Nonprofit’s Cybersecurity - Strategies & Solutions или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
🎥 Watch the full webinar replay: Strengthen Your Nonprofit’s Cybersecurity - Strategies & Solutions with ITS' Rob Schenk and Field Effect’s Alyssa Parenteau 📅 Originally aired January 24, 2024 Nonprofits are often targeted because they handle valuable data and usually have lean IT resources. This webinar explains how to reduce cyber risk without needing a large security team. Rob Schenk (Intelligent Technical Solutions) and Alyssa Parenteau (Field Effect) break down the current threat environment, why security needs ongoing attention, and where nonprofits are most exposed, including donor data, third-party vendors, and volunteers using personal devices. You’ll hear practical steps such as strengthening multi-factor authentication (MFA), running phishing awareness training, setting clear bring your own device (BYOD) guidelines, and building an incident response plan before a crisis. The session also covers how ITS helps nonprofits assess risk, prioritize fixes, and improve defenses while keeping day-to-day work moving. #cybersecurity #phishing #ransomware #dataprotection #cyberawareness --------------------------------------------------------------------------------------------------------------- Need a consultation? Click here: https://www.itsasap.com/it-services-c... --------------------------------------------------------------------------------------------------------------- Check Our Socials: Website: http://www.itsasap.com/ YouTube: / @managedtechnologychannelbyits Facebook: / itslasvegas LinkedIn: / intelligent-technical-solutions Twitter: / itsasap Thanks for watching! 00:00 Welcome + housekeeping 02:04 Cyber landscape: continuous risk management 04:45 Everyday risk parallels 06:45 Proactive monitoring before incidents 07:31 Data sovereignty + sensitive donor data 10:35 Third-party risk + vendor ransomware examples 14:09 Cloud shared responsibility model 15:34 Cyber hygiene challenges for nonprofits 19:44 Incident response planning + awareness culture 22:24 Grants: requirements + cybersecurity funding 23:53 Breach impacts: downtime, reputation, legal, financial 26:51 What good cybersecurity looks like 28:53 Next steps + free risk assessment 31:40 Q&A + wrap-up