Enterprise risk management is becoming more common in the not-for-profit sector, but recent research finds that risk management practices are not keeping pace with the increased complexity of risks for nonprofits. On July 12, 2022, the Enterprise Risk Management (ERM) Initiative at NC State University published the 13th edition of its annual State of Risk…
GRF Cybersecurity Risk Assessment and Scorecard Blog Series Your organization’s reputation can be influenced by a variety of factors including brand image, online reviews, social media presence, customer experience, and more. Each of these elements factors into the overall image of the organization. When it comes to your internet reputation, important elements are different…
GRF Cybersecurity Risk Assessment and Scorecard Blog Series Have you ever wondered how end users view your company? Is your domain seen as safe and trusted? Is your website optimized? These are just some of the areas that business analytics tools assess to evaluate your brand. Every organization is adapting to the changing digital…
GRF Cybersecurity Risk Assessment and Scorecard Blog Series While web ranking is not necessarily a security concern, having insight into the popularity of your website helps measure the success of ad campaigns, assess visitor engagement with your content, and identify opportunities for growth. Web ranking sites include Alexa, Cisco, and Majestic, and each site…
GRF Cybersecurity Risk Assessment and Scorecard Blog Series When downloading a new app, be sure it’s from a credible source. Hackers can create fraudulent applications that look very similar in name or appearance to well-known apps. To make matters worse, these fake apps can sometimes be found on trusted sites like the Apple or…
GRF Cybersecurity Risk Assessment and Scorecard Blog Series Fraudulent domains look very similar to your organization’s domain name and are used to fool people into thinking they are interacting with you. These domains are often used in phishing attacks, which according to CSO Online, account for more than 80% of all reported security incidents….
GRF Cybersecurity Risk Assessment and Scorecard Blog Series Your organization’s domain name (e.g. “example.com”) serves as the base of operations for your online identity – helping interested parties to find you and connect with you online. However, the underlying machine language of the internet is based on numbers. Every site on the internet has…
GRF Cybersecurity Risk Assessment and Scorecard Blog Series It’s not just about disruption or inconvenience. A compromised technology incident can have a detrimental impact on your organization’s processes, mission, and reputation. A review of your external network security risk should include looking at any risk that is related to your perimeter network – or…
GRF Cybersecurity Risk Assessment and Scorecard Blog Series Your website is essential for promoting your nonprofit organization’s mission. However, bad actors often target nonprofit websites for attack, assuming they are not as protected as commercial sites. One hacker strategy is to bring the site down entirely through a denial of service attack. That’s where…
GRF Cybersecurity Risk Assessment and Scorecard Blog Series Your email is a critical business function that needs to be constantly available and secured. Securing your email systems involves looking at the configuration of your email server, your mail exchange (MX) records, and SMTP (Simple Mail Transfer Protocol) to identify any potential vulnerabilities or misconfigurations….