Industries: Nonprofits and Associations

Preparing for an Audit Made Easier with Financial Compilations and Reviews

By: Steven Lyons, CPA | Senior Manager, Outsourced Accounting and Advisory Services  In addition to providing a more cost-effective alternative to a financial statement audit, compilations and reviews offer businesses and nonprofit organizations a number of important advantages. Perhaps most important, compilations and reviews help your organization prepare for a future financial audit because they…

Read more ›

DNS Health: Ensure your organizations’ identity is protected

GRF Cybersecurity Risk Assessment and Scorecard Blog Series     Your organization’s domain name (e.g. “example.com”) serves as the base of operations for your online identity – helping interested parties to find you and connect with you online. However, the underlying machine language of the internet is based on numbers. Every site on the internet has…

Read more ›

Network Security: Building Resiliency

GRF Cybersecurity Risk Assessment and Scorecard Blog Series     It’s not just about disruption or inconvenience. A compromised technology incident can have a detrimental impact on your organization’s processes, mission, and reputation. A review of your external network security risk should include looking at any risk that is related to your perimeter network – or…

Read more ›

DDoS Resiliency: Protecting Against the Attack of the Robots

GRF Cybersecurity Risk Assessment and Scorecard Blog Series     Your website is essential for promoting your nonprofit organization’s mission. However, bad actors often target nonprofit websites for attack, assuming they are not as protected as commercial sites. One hacker strategy is to bring the site down entirely through a denial of service attack. That’s where…

Read more ›

Email Security: Don’t let attackers in through the front door

GRF Cybersecurity Risk Assessment and Scorecard Blog Series     Your email is a critical business function that needs to be constantly available and secured. Securing your email systems involves looking at the configuration of your email server, your mail exchange (MX) records, and SMTP (Simple Mail Transfer Protocol) to identify any potential vulnerabilities or misconfigurations….

Read more ›

Attack Surface: Are all your systems’ access points secure?

GRF Cybersecurity Risk Assessment and Scorecard Blog Series     Anything freely available on the internet and open to users can be a point of attack for a malicious actor. To prevent unauthorized access to your network and systems, it’s crucial to understand the vulnerabilities of your network. The term “attack surface” refers to the total…

Read more ›