techimpact.typeform.com Open in urlscan Pro
104.18.22.9  Public Scan

Submitted URL: https://offers.techimpact.org/e3t/Ctc/OL+113/c3Gtm04/VWwhxK8Z7LWvVFZFhv42lJ4fW1-ywb14X5hKXN6TZ7tm3q3pBV1-WJV7CgN-kW3CtVGV5BJ10...
Effective URL: https://techimpact.typeform.com/cybersecurity?typeform-source=word-edit.officeapps.live.com&utm_campaign=TLC%3A%20Monthly%20News...
Submission: On February 16 via manual from US — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

This website stores cookies on your computer. These cookies are used to improve
your website experience and provide more personalized services to you, both on
this website and through other media. To find out more about the cookies we use,
see our Privacy Policy.

We won't track your information when you visit our site. But in order to comply
with your preferences, we'll have to use just one tiny cookie so that you're not
asked to make this choice again.

Accept Decline




ARE YOU VULNERABLE TO A CYBERATTACK?

According to The Online Trust Alliance, 90 percent of all data breaches could
have been prevented. Find out in a few easy questions if your nonprofit is
taking the basic steps to protect itself from cybersecurity risk, and learn how
you can improve your efforts along the way.

Get started!
press Enter ↵
Takes 6 minutes

 
 

Topic 1: Accounts and Identity Security

Your staff members likely have a lot of logins and passwords—to your database,
email accounts, online storage, and social media, to name just a few.

The key to protecting those accounts and identities is:

—Making sure people are who they say they are
—Making sure they only have access to the things they’re supposed to
—Keeping a record of what is being accessed, and by whom

Are your nonprofit's practices up to snuff?



OK