Good governance and accountability require an organization to adopt policies and procedures related to IT to provide criteria and guidance for the company’s computer-related operations. To effectively protect computing resources and data, companies should have an...
Artificial Intelligence Acceptable Use Policy
Guest Article: Streamline Nonprofit Management by Automating These 5 Areas
Nonprofit Technology Trends to Watch in 2024: Navigating the Digital Frontier
HOW NONPROFITS CAN UTILIZE ARTIFICIAL INTELLIGENCE
Safeguarding Retirement Plan Data: Navigating the Landscape of Data Privacy and Security in the Wake of the MOVEit Data Breach
Revolutionizing Nonprofit Operations: A Comprehensive Guide to AI Tools
Cerini Connection: Creating an Impactful Website
Artificial Intelligence – Use with Caution
s Artificial Intelligence, or AI, has been thrust into the public consciousness, many parents have become increasingly worried about its potentially negative effects on their children. In response to this, many school districts have been creating policies to ensure that teachers and students use AI responsibly. With input from key stakeholders such as administrators, teachers, students, IT departments, and the community an AI use policy should seek to enable teachers to supplement their students’ learning rather than supplant it. Any sensible AI policy should also seek to emphasis AI with humans in the loop.
Benefits of an Automated AP Workflow – Business
Are AI and Other Technologies the Key to Filling The Labor Gap in Construction?
Guest Article: Cybersecurity – Legal Expert Analysis
Jun 7, 2022
Navigating the ambiguous requirement of ‘Reasonable Security’ measures while protecting personal information. Over the last couple of years, cybersecurity laws have commonly required that sensitive information be protected through the use of “reasonable security.”...
Guest Article: Disposing Technology
Jun 7, 2022
What businesses should know about electronic data destruction and e-recycling to maintain data compliance, avoid a catastrophic data breach, and protect the environment. IT Asset Disposition (ITAD) is the process of retiring computer equipment and other IT Hardware...
Guest Article: Cybersecurity Insurance
Jun 7, 2022
Times have certainly changed with respect to cybersecurity controls. Regardless of industry or organizational size, companies should expect to see a continued disciplined underwriting approach that remains laser-focused on data security controls, with rates continuing...
Guest Article: Cybersecurity Considerations for Small Organizations and Nonprofits
Jun 7, 2022
Ensuring your organization has a robust cybersecurity environment takes a lot of resources specifically qualified people. For small and nonprofit organizations that don’t have the budget to support hiring so many different professionals, this can be problematic. A...
Guest Article: Incident Response Planning
Jun 7, 2022
Imagine this: You’re the Executive Director of a $5 million dollar nonprofit organization. It’s 6:30 AM on Monday morning and even though you wish you were still sleeping; you are logging into your email to follow-up with some donors. You get a login error message,...
Guest Article: Cybersecurity Audits and Assessments
Jun 7, 2022
How do you tell if your information technology environment is properly implemented? An audit is the best way to find out. Many organizations do not have sufficient staff or resources to be able to perform such an audit. Even if you do have a robust internal IT...
Guest Article: Vulnerability Assessments and Penetration Tests
Jun 7, 2022
There is some confusion between what a vulnerability assessment accomplishes versus a penetration test. While both are critical in reducing cybersecurity attacks, a vulnerability assessment encompasses scanning the environment for anomalies within your IT environment....
Guest Article: Outsourcing IT Services as Part of Your Cybersecurity Model
Jun 7, 2022
Most outsourced IT support companies can provide multiple services thereby allowing a company to focus on its business. It is important to understand what your outsourced IT company is or is not providing, especially with respect to security monitoring, threat...