techimpact.typeform.com
Open in
urlscan Pro
104.18.22.9
Public Scan
Submitted URL: https://offers.techimpact.org/e3t/Ctc/OL+113/c3Gtm04/VWwhxK8Z7LWvVFZFhv42lJ4fW1-ywb14X5hKXN6TZ7tm3q3pBV1-WJV7CgN-kW3CtVGV5BJ10...
Effective URL: https://techimpact.typeform.com/cybersecurity?typeform-source=word-edit.officeapps.live.com&utm_campaign=TLC%3A%20Monthly%20News...
Submission: On February 16 via manual from US — Scanned from DE
Effective URL: https://techimpact.typeform.com/cybersecurity?typeform-source=word-edit.officeapps.live.com&utm_campaign=TLC%3A%20Monthly%20News...
Submission: On February 16 via manual from US — Scanned from DE
Form analysis
0 forms found in the DOMText Content
This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy. We won't track your information when you visit our site. But in order to comply with your preferences, we'll have to use just one tiny cookie so that you're not asked to make this choice again. Accept Decline ARE YOU VULNERABLE TO A CYBERATTACK? According to The Online Trust Alliance, 90 percent of all data breaches could have been prevented. Find out in a few easy questions if your nonprofit is taking the basic steps to protect itself from cybersecurity risk, and learn how you can improve your efforts along the way. Get started! press Enter ↵ Takes 6 minutes Topic 1: Accounts and Identity Security Your staff members likely have a lot of logins and passwords—to your database, email accounts, online storage, and social media, to name just a few. The key to protecting those accounts and identities is: —Making sure people are who they say they are —Making sure they only have access to the things they’re supposed to —Keeping a record of what is being accessed, and by whom Are your nonprofit's practices up to snuff? OK