BizTech - Technology Solutions That Drive Business https://biztechmagazine.com/rss.xml en Why Security Policies, Social Engineering and Password Management All Matter https://biztechmagazine.com/media/video/why-security-policies-social-engineering-and-password-management-all-matter <span>Why Security Policies, Social Engineering and Password Management All Matter</span> <div><p>It might seem passé or unglamorous, but sweating the details when it comes to the finer points of your security policy can be just as important as the technical tools you implement to defend your corporate data. Furthermore, investments in training non-IT employees to detect and and avoid social engineering are also worth the time and effort as even the best IT solution can be circumvented by the human factor. We spoke with Mikela Lea of CDW to get her insights on policies, social engineering and password management in the modern age.</p> </div> <span><span lang="" about="/user/3" typeof="schema:Person" property="schema:name" datatype="">ricky.ribeiro</span></span> <span>Thu, 02/22/2018 - 14:01</span> <div> <div>Tweet text</div> <div>Why Security Policies, Social Engineering and Password Management All Matter, says @mikelalea #CDWSummITs</div> </div> <div> <div>Video ID</div> <div><p>1393964610</p> </div> </div> <div> <div>video type</div> <div><a href="/conference" hreflang="en">Conference</a></div> </div> <div> <div>CDW Activity ID</div> <div><p>MKT25296</p> </div> </div> <div> <div>CDW Segment</div> <div>Med/Lar</div> </div> <div> <div>Customer Focused</div> <div>False</div> </div> <div> <div>Buying Cycle</div> <div><a href="/awareness" hreflang="en">Awareness</a></div> </div> <div class="pw-widget pw-size-medium pw-layout-vertical" data-layout="vertical" data-url="https://biztechmagazine.com/media/video/why-security-policies-social-engineering-and-password-management-all-matter" data-title="Why Security Policies, Social Engineering and Password Management All Matter, says @mikelalea #CDWSummITs" data-via="BizTechMagazine" data-button-background="none"> <span> <span>Feb</span> <span>22</span> <span>2018</span> </span> <a class="pw-button-twitter cdw-taboola-social"></a> <a class="pw-button-facebook cdw-taboola-social"></a> <a class="pw-button-googleplus cdw-taboola-social"></a> <a class="pw-button-linkedin cdw-taboola-social"></a> <a class="pw-button-reddit cdw-taboola-social"></a> <a class="pw-button-flipboard cdw-taboola-social"></a> <a class="pw-button-email cdw-taboola-social"></a> </div> <div class="pw-widget pw-size-medium pw-layout-horizontal" data-url="https://biztechmagazine.com/media/video/why-security-policies-social-engineering-and-password-management-all-matter" data-title="Why Security Policies, Social Engineering and Password Management All Matter, says @mikelalea #CDWSummITs" data-via="BizTechMagazine" data-button-background="none"> <div> <a class="pw-button-twitter"></a> <span class="pw-box-counter" pw:channel="twitter"></span> </div> <div> <a class="pw-button-facebook"></a> <span class="pw-box-counter" pw:channel="facebook"></span> </div> </div> <div class="pw-widget pw-size-medium pw-layout-horizontal" data-url="https://biztechmagazine.com/media/video/why-security-policies-social-engineering-and-password-management-all-matter" data-title="Why Security Policies, Social Engineering and Password Management All Matter, says @mikelalea #CDWSummITs" data-via="BizTechMagazine" data-button-background="none"> <div> <a class="pw-button-twitter cdw-taboola-social"></a> <a href="https://twitter.com/search?f=realtime&amp;q=https%3A%2F%2Fbiztechmagazine.com%2Frss.xml%3Fdestination%3D%2F%26_exception_statuscode%3D404" target="_blank"><span class="pw-box-counter cdw-taboola" data-channel="twitter"></span></a> </div> <div> <a class="pw-button-facebook cdw-taboola-social"></a> </div> <div> <a class="pw-button-googleplus cdw-taboola-social"></a> </div> <div> <a class="pw-button-linkedin cdw-taboola-social"></a> </div> <div> <a class="pw-button-reddit cdw-taboola-social"></a> </div> <div> <a class="pw-button-flipboard cdw-taboola-social"></a> </div> <div> <a class="pw-button-email cdw-taboola-social"></a> </div> </div> <div> <div>Pull Quote</div> <div> <p class="quote"><a href="node/40481"></a></p> <p class='speaker'> </p> </div> </div> Thu, 22 Feb 2018 19:01:13 +0000 ricky.ribeiro 40481 at https://biztechmagazine.com Managing Risk SummIT: Modernizing Security and Risk for Today’s Threat Landscape https://biztechmagazine.com/managing-risk-summit-modernizing-security-and-risk-todays-threat-landscape <span>Managing Risk SummIT: Modernizing Security and Risk for Today’s Threat Landscape</span> <span><span lang="" about="/user/3" typeof="schema:Person" property="schema:name" datatype="">ricky.ribeiro</span></span> <span>Thu, 02/22/2018 - 13:55</span> <div><p>To thrive in the digital economy, today's organizations need to continuously and rapidly adopt advanced technologies. But these advancements can wreak havoc among those accountable for managing security and risk. While modernized networks and applications may boost business and open new doors for customers, they simultaneously introduce new vulnerabilities at the same incessant pace.</p> </div> <div> <div>Event Image Toggle</div> <div>Off</div> </div> <div class="pw-widget pw-size-medium pw-layout-vertical" data-layout="vertical" data-url="https://biztechmagazine.com/managing-risk-summit-modernizing-security-and-risk-todays-threat-landscape" data-title="Managing Risk SummIT: Modernizing Security and Risk for Today’s Threat Landscape" data-via="BizTechMagazine" data-button-background="none"> <span> <span>Feb</span> <span>22</span> <span>2018</span> </span> <a class="pw-button-twitter cdw-taboola-social"></a> <a class="pw-button-facebook cdw-taboola-social"></a> <a class="pw-button-googleplus cdw-taboola-social"></a> <a class="pw-button-linkedin cdw-taboola-social"></a> <a class="pw-button-reddit cdw-taboola-social"></a> <a class="pw-button-flipboard cdw-taboola-social"></a> <a class="pw-button-email cdw-taboola-social"></a> </div> <div class="pw-widget pw-size-medium pw-layout-horizontal" data-url="https://biztechmagazine.com/managing-risk-summit-modernizing-security-and-risk-todays-threat-landscape" data-title="Managing Risk SummIT: Modernizing Security and Risk for Today’s Threat Landscape" data-via="BizTechMagazine" data-button-background="none"> <div> <a class="pw-button-twitter cdw-taboola-social"></a> <a href="https://twitter.com/search?f=realtime&amp;q=https%3A%2F%2Fbiztechmagazine.com%2Frss.xml%3Fjs%3D1%26pager_element%3D0%26view_args%3Dedge.remove%26view_base_path%3Dmedia%2Fvideo%26view_display_id%3Dpage_2%26view_dom_id%3D1%26view_name%3Dvideo%26view_path%3Dmedia%2Fvideo%2Fedge.remove%26destination%3D%2F%253Fpage%253D5%2525252C14%2526js%253D1%2526pager_element%253D0%2526view_args%253Dedge.remove%2526view_base_path%253Dmedia%2Fvideo%2526view_display_id%253Dpage_2%2526view_dom_id%253D1%2526view_name%253Dvideo%2526view_path%253Dmedia%2Fvideo%2Fedge.remove%26_exception_statuscode%3D404" target="_blank"><span class="pw-box-counter cdw-taboola" data-channel="twitter"></span></a> </div> <div> <a class="pw-button-facebook cdw-taboola-social"></a> </div> <div> <a class="pw-button-googleplus cdw-taboola-social"></a> </div> <div> <a class="pw-button-linkedin cdw-taboola-social"></a> </div> <div> <a class="pw-button-reddit cdw-taboola-social"></a> </div> <div> <a class="pw-button-flipboard cdw-taboola-social"></a> </div> <div> <a class="pw-button-email cdw-taboola-social"></a> </div> </div> <div class="pw-widget pw-size-medium pw-layout-horizontal" data-url="https://biztechmagazine.com/managing-risk-summit-modernizing-security-and-risk-todays-threat-landscape" data-title="Managing Risk SummIT: Modernizing Security and Risk for Today’s Threat Landscape" data-via="BizTechMagazine" data-button-background="none"> <div> <a class="pw-button-twitter"></a> <span class="pw-box-counter" pw:channel="twitter"></span> </div> <div> <a class="pw-button-facebook"></a> <span class="pw-box-counter" pw:channel="facebook"></span> </div> </div> Thu, 22 Feb 2018 18:55:09 +0000 ricky.ribeiro 40471 at https://biztechmagazine.com 25 Must-Read Nonprofit IT Blogs 2018 https://biztechmagazine.com/article/2018/02/25-must-read-nonprofit-it-blogs-2018 <span>25 Must-Read Nonprofit IT Blogs 2018</span> <img src="/sites/biztechmagazine.com/files/articles/%5Bcdw_tech_site%3Afield_site_shortname%5D/201802/TOP25%20BLOGS%20Nonprofit%20Hero.jpg" width="1440" height="560" alt="25 Must-Read Nonprofit IT Blogs 2018 " typeof="foaf:Image" /> <span><span lang="" about="/user/6191" typeof="schema:Person" property="schema:name" datatype="">phil.goldstein_6191</span></span> <span>Thu, 02/22/2018 - 10:00</span> <div><p>Where is nonprofit technology headed? The sector is going in the same direction most of the world is: to mobile and the cloud.</p> <p>For one thing, <strong>mobile giving</strong> is now more popular and necessary than ever. According to Nonprofit Tech for Good's <a href="http://techreport.ngo/wp-content/uploads/2018-Tech-Report-English.pdf">2018 Global NGO Technology Report</a>, 98 percent of nongovernmental organizations in North America have a website, and of those, 88 percent are mobile compatible. Meanwhile, <strong>cloud-based software tools</strong> are becoming more available to help nonprofits effectively launch, manage and track the return on investment of influencer marketing campaigns, <a href="http://moneyinc.com/nonprofit-technology-trends-2018-beyond/">MoneyInc notes</a>.</p> <p>Another key trend is the increasing adoption of <strong>encryption technology</strong>. The NGO Technology report says that 46 percent of North American NGOs use encryption to protect data and communications, and of those, 38 percent use it to protect donor information and a similar amount use it to protect the organization's information.</p> <p>It's a lot to keep up with, especially if you are a harried nonprofit IT professional trying to manage your organization's website and technology upgrades. Fear not, as <em>BizTech</em> has assembled our annual list of Must-Read IT Blogs for the nonprofit sector (here are our <a href="https://biztechmagazine.com/article/2017/02/25-must-read-nonprofit-it-blogs-2017">2017</a>, <a href="https://biztechmagazine.com/article/2016/02/25-must-read-nonprofit-it-blogs-2016">2016</a> and <a href="https://biztechmagazine.com/article/2015/03/25-must-read-nonprofit-it-blogs">2015</a> editions). For this year's list, we tried to inject a large dose of new blood, and while there are some holdovers that remain indispensable, there are also numerous fresh and vital voices.</p> <p>So, without further ado, here is<strong> 2018's Must-Read Nonprofit IT Blogs list</strong>, whose entries we hope will be illuminating, educating and entertaining <span style="font-size:12.0pt"><span style="font-family:&quot;Times New Roman&quot;,serif">— </span></span>sometimes all at once. If your blog is on the list, <a href="https://biztechmagazine.com/2018-nonprofit-it-blog-badges"><strong>grab a badge</strong></a> to share this recognition with your readers!</p> <p><a href="https://biztechmagazine.com/register?newsletter"><strong>SIGN UP: </strong>Get more news from the <em>BizTech</em> newsletter in your inbox every two weeks!</a></p> <div class="subtitle" style="margin: 15px 0px; padding: 0px; box-sizing: border-box; font-family: Prelo-Book; letter-spacing: 0.48px; margin"><span style="font-size: 24px; line-height: 25.6px; font-weight: bold;">Achieve Blog </span></div> <p style="font-size: 16px; line-height: 25.6px;">Want to know how your nonprofit can use technology to effectively reach out to the hyperconnected millennial generation? Derrick Feldmann's research and campaigns agency is an excellent source to get caught up on data-driven thoughts on nonprofit technology and millennial behavior. Some recent posts include, "<a href="http://www.achieveagency.com/3-ways-causes-can-use-data-like-for-profits/">3 Ways Causes Can Use Data Like For-Profits</a>," and "<a href="http://www.achieveagency.com/want-to-engage-millennials-dont-call-them-activists/">Want to engage millennials? Don't call them 'activists</a>.'"</p> <table><tbody><tr><td style="width: 107px;"> <p><a data-entity-type="" data-entity-uuid="" href="http://www.achieveagency.com/blog/"><img alt="" data-entity-type="" data-entity-uuid="" src="/sites/biztechmagazine.com/files/Achieve.png" style="width: 82px; height: 82px;" /></a></p> </td> <td> <p style="font-size: 16px; line-height: 5px; font-weight: bold; padding-top: 17px; display: inline-block;">ACHIEVE AGENCY</p> <p style="font-size: 16px; line-height: 5px;"><a href="https://twitter.com/achieve_agency" target="_blank"><img alt="" data-entity-type="" data-entity-uuid="" src="/k12/sites/default/files/twitter.png" style="width: 20px; height: 15px; margin-right: 5px;" />@achieve_agency</a> | <a href="http://www.achieveagency.com/blog/" target="_blank">Read the blog</a></p> </td> </tr></tbody></table><p> </p> <div class="subtitle" style="margin: 15px 0px; padding: 0px; box-sizing: border-box; font-family: Prelo-Book; letter-spacing: 0.48px; margin"><span style="font-size: 24px; line-height: 25.6px; font-weight: bold;">Beth's Blog </span></div> <p style="font-size: 16px; line-height: 25.6px;">Beth Kanter is a force to be reckoned with in the nonprofit tech community. Kanter has been writing about nonprofits' role in an increasingly connected world for nearly a decade. Her blog is a mix of practical advice and thought leadership, whether that is on the rise of chatbots or tips for nonprofits to help employees combat digital distractions. For nonprofits that want to be in the know about how tech is impacting the sector, Beth's blog is a go-to destination.</p> <table><tbody><tr><td style="width: 107px;"> <p><a data-entity-type="" data-entity-uuid="" href="http://www.bethkanter.org/"><img alt="" data-entity-type="" data-entity-uuid="" src="/sites/biztechmagazine.com/files/Beth%20Kanter.png" style="width: 82px; height: 82px;" /></a></p> </td> <td> <p style="font-size: 16px; line-height: 5px; font-weight: bold; padding-top: 17px; display: inline-block;">BETH KANTER</p> <p style="font-size: 16px; line-height: 5px;"><a href="https://twitter.com/KANTER" target="_blank"><img alt="" data-entity-type="" data-entity-uuid="" src="/k12/sites/default/files/twitter.png" style="width: 20px; height: 15px; margin-right: 5px;" />@kanter</a> | <a href="http://www.bethkanter.org/" target="_blank">Read the blog</a></p> </td> </tr></tbody></table><p> </p> <div class="subtitle" style="margin: 15px 0px; padding: 0px; box-sizing: border-box; font-family: Prelo-Book; letter-spacing: 0.48px; margin"><span style="font-size: 24px; line-height: 25.6px; font-weight: bold;">Capterra Nonprofit Technology Blog</span></div> <p style="font-size: 16px; line-height: 25.6px;">Capterra bills itself as the world's leading digital marketplace for business software. As a result, the blog focuses a great deal on software for nonprofits, but it also highlights how to protect data, embrace mobile technology and more.</p> <table><tbody><tr><td style="width: 107px;"> <p><a data-entity-type="" data-entity-uuid="" href="https://blog.capterra.com/articles/nonprofit-tech/"><img alt="" data-entity-type="" data-entity-uuid="" src="/sites/biztechmagazine.com/files/Capterra.png" style="width: 82px; height: 82px;" /></a></p> </td> <td> <p style="font-size: 16px; line-height: 5px; font-weight: bold; padding-top: 17px; display: inline-block;">CAPTERRA</p> <p style="font-size: 16px; line-height: 5px;"><a href="https://twitter.com/capterra" target="_blank"><img alt="" data-entity-type="" data-entity-uuid="" src="/k12/sites/default/files/twitter.png" style="width: 20px; height: 15px; margin-right: 5px;" />@Capterra</a> | <a href="https://blog.capterra.com/articles/nonprofit-tech/" target="_blank">Read the blog</a></p> </td> </tr></tbody></table><p> </p> <div class="subtitle" style="margin: 15px 0px; padding: 0px; box-sizing: border-box; font-family: Prelo-Book; letter-spacing: 0.48px; margin"><span style="font-size: 24px; line-height: 25.6px; font-weight: bold;">ChurchTechToday</span></div> <p style="font-size: 16px; line-height: 25.6px;">ChurchTechToday is an indispensable resource on technology for pastors, communicators and church leaders. The blog dives into a wide range of nonprofit tech topics relevant to churches, including social media, websites, worship, media, mobile technology and software. The site is a great way for church leaders to learn more about how to use tech to connect with and tend to their flocks.</p> <table><tbody><tr><td style="width: 107px;"> <p><a data-entity-type="" data-entity-uuid="" href="https://churchtechtoday.com/"><img alt="" data-entity-type="" data-entity-uuid="" src="/sites/biztechmagazine.com/files/ChurchTechToday_0.png" style="width: 82px; height: 82px;" /></a></p> </td> <td> <p style="font-size: 16px; line-height: 5px; font-weight: bold; padding-top: 17px; display: inline-block;">CHURCHTECHTODAY</p> <p style="font-size: 16px; line-height: 5px;"><a href="https://twitter.com/churchtechtoday" target="_blank"><img alt="" data-entity-type="" data-entity-uuid="" src="/k12/sites/default/files/twitter.png" style="width: 20px; height: 15px; margin-right: 5px;" />@churchtechtoday</a> | <a href="https://churchtechtoday.com/" target="_blank">Read the blog</a></p> </td> </tr></tbody></table><p> </p> <div class="subtitle" style="margin: 15px 0px; padding: 0px; box-sizing: border-box; font-family: Prelo-Book; letter-spacing: 0.48px; margin"><span style="font-size: 24px; line-height: 25.6px; font-weight: bold;">Citizen IBM Blog</span></div> <p style="font-size: 16px; line-height: 25.6px;">IBM has long since moved past its heritage as a computer hardware maker and is much more focused on IT services, the cloud and artificial intelligence today. The company's corporate social responsibility blog offers insights into how it is using its stature in tech to give back to communities around the globe, including helping American veterans pursue careers as data analysts and using data to help address youth suicide in New Zealand. The blog also touches on P-TECH (Pathways in Technology Early College High School), a system of innovative public schools spanning grades 9 to 14 that bring together the best elements of high school, college and career development.</p> <table><tbody><tr><td style="width: 107px;"> <p><a data-entity-type="" data-entity-uuid="" href="https://www.ibm.com/blogs/citizen-ibm/"><img alt="" data-entity-type="" data-entity-uuid="" src="/sites/biztechmagazine.com/files/Citizen%20IBM_0.png" style="width: 82px; height: 82px;" /></a></p> </td> <td> <p style="font-size: 16px; line-height: 5px; font-weight: bold; padding-top: 17px; display: inline-block;">CITIZEN IBM</p> <p style="font-size: 16px; line-height: 5px;"><a href="https://twitter.com/citizenibm" target="_blank"><img alt="" data-entity-type="" data-entity-uuid="" src="/k12/sites/default/files/twitter.png" style="width: 20px; height: 15px; margin-right: 5px;" />@citizenIBM</a> | <a href="https://www.ibm.com/blogs/citizen-ibm/" target="_blank">Read the blog</a></p> </td> </tr></tbody></table><p> </p> <div class="subtitle" style="margin: 15px 0px; padding: 0px; box-sizing: border-box; font-family: Prelo-Book; letter-spacing: 0.48px; margin"><span style="font-size: 24px; line-height: 25.6px; font-weight: bold;">Cloud for Good Blog</span></div> <p style="font-size: 16px; line-height: 25.6px;">Cloud for Good is a Certified B Corporation and a premium <a href="http://www.salesforce.org/">Salesforce.org</a> partner specializing in donor management, case management and marketing automation implementations for nonprofit organizations and higher education institutions. The company's blog obviously highlights how Salesforce tools can help nonprofits, but also focuses on automated marketing, using tech for volunteer management and how cloud tools can make nonprofits' work easier.</p> <table><tbody><tr><td style="width: 107px;"> <p><a data-entity-type="" data-entity-uuid="" href="https://cloud4good.com/blog/"><img alt="" data-entity-type="" data-entity-uuid="" src="/sites/biztechmagazine.com/files/Cloud%20for%20Good.png" style="width: 82px; height: 82px;" /></a></p> </td> <td> <p style="font-size: 16px; line-height: 5px; font-weight: bold; padding-top: 17px; display: inline-block;">CLOUD FOR GOOD</p> <p style="font-size: 16px; line-height: 5px;"><a href="https://twitter.com/cloud4good" target="_blank"><img alt="" data-entity-type="" data-entity-uuid="" src="/k12/sites/default/files/twitter.png" style="width: 20px; height: 15px; margin-right: 5px;" />@cloud4good</a> | <a href="https://cloud4good.com/blog/" target="_blank">Read the blog</a></p> </td> </tr></tbody></table><p> </p> <div class="subtitle" style="margin: 15px 0px; padding: 0px; box-sizing: border-box; font-family: Prelo-Book; letter-spacing: 0.48px; margin"><span style="font-size: 24px; line-height: 25.6px; font-weight: bold;">Creating IT Futures</span></div> <p style="font-size: 16px; line-height: 25.6px;">The Creating IT Futures blog is an element of IT trade association CompTIA's philanthropic arm. The blog offers practical advice to aspiring technologists, and it focuses largely on the work of the Creating IT Futures Foundation. The foundation's mission is to provide IT training and certification to returning veterans and low-income students and adults, and then connect them with potential employers.</p> <table><tbody><tr><td style="width: 107px;"> <p><a data-entity-type="" data-entity-uuid="" href="http://www.creatingitfutures.org/inspiring-success/blog"><img alt="" data-entity-type="" data-entity-uuid="" src="/sites/biztechmagazine.com/files/CreatingITFutures_0.png" style="width: 82px; height: 82px;" /></a></p> </td> <td> <p style="font-size: 16px; line-height: 5px; font-weight: bold; padding-top: 17px; display: inline-block;">CREATING IT FUTURES</p> <p style="font-size: 16px; line-height: 5px;"><a href="https://twitter.com/createitfutures" target="_blank"><img alt="" data-entity-type="" data-entity-uuid="" src="/k12/sites/default/files/twitter.png" style="width: 20px; height: 15px; margin-right: 5px;" />@createITfutures</a> | <a href="http://www.creatingitfutures.org/inspiring-success/blog" target="_blank">Read the blog</a></p> </td> </tr></tbody></table><p> </p> <div class="subtitle" style="margin: 15px 0px; padding: 0px; box-sizing: border-box; font-family: Prelo-Book; letter-spacing: 0.48px; margin"><span style="font-size: 24px; line-height: 25.6px; font-weight: bold;">Global Giving </span></div> <p style="font-size: 16px; line-height: 25.6px;">GlobalGiving bills itself as the largest global crowdfunding community connecting nonprofits, donors, and companies in nearly every country. The organization helps nonprofits from Afghanistan to Zimbabwe (and hundreds of places in between) access the tools, training, and support they need to be more effective and make our world a better place. The organization's blog offers helpful explainers on technologies like application programming interfaces and blockchain, and also useful guides, including how to turn a smartphone into a movie production studio and how to leverage technology on a pro bono basis.</p> <table><tbody><tr><td style="width: 107px;"> <p><a data-entity-type="" data-entity-uuid="" href="https://www.globalgiving.org/learn/tag/technology/"><img alt="" data-entity-type="" data-entity-uuid="" src="/sites/biztechmagazine.com/files/GlobalGiving.png" style="width: 82px; height: 82px;" /></a></p> </td> <td> <p style="font-size: 16px; line-height: 5px; font-weight: bold; padding-top: 17px; display: inline-block;">GLOBAL GIVING</p> <p style="font-size: 16px; line-height: 5px;"><a href="https://twitter.com/createitfutures" target="_blank"><img alt="" data-entity-type="" data-entity-uuid="" src="/k12/sites/default/files/twitter.png" style="width: 20px; height: 15px; margin-right: 5px;" />@</a><a href="https://twitter.com/globalgiving">GlobalGiving</a> | <a href="https://www.globalgiving.org/learn/tag/technology/" target="_blank">Read the blog</a></p> </td> </tr></tbody></table><p> </p> <div class="subtitle" style="margin: 15px 0px; padding: 0px; box-sizing: border-box; font-family: Prelo-Book; letter-spacing: 0.48px; margin"><span style="font-size: 24px; line-height: 25.6px; font-weight: bold;">GuideStar Blog </span></div> <p style="font-size: 16px; line-height: 25.6px;">GuideStar USA is a trusted information service specializing in reporting on U.S. nonprofits, and in 2016, its database provided information on 2.5 million organizations. The organization's blog features a mixture of voices from nonprofit leaders, and while it does not exclusively touch on nonprofit tech issues, it does explore them regularly, including everything from mobile technology to website design, APIs, chatbots and data analytics.</p> <table><tbody><tr><td style="width: 107px;"> <p><a data-entity-type="" data-entity-uuid="" href="https://trust.guidestar.org/"><img alt="" data-entity-type="" data-entity-uuid="" src="/sites/biztechmagazine.com/files/GuideStar_0.png" style="width: 82px; height: 82px;" /></a></p> </td> <td> <p style="font-size: 16px; line-height: 5px; font-weight: bold; padding-top: 17px; display: inline-block;">GUIDESTAR USA</p> <p style="font-size: 16px; line-height: 5px;"><a href="https://twitter.com/GuideStarUSA" target="_blank"><img alt="" data-entity-type="" data-entity-uuid="" src="/k12/sites/default/files/twitter.png" style="width: 20px; height: 15px; margin-right: 5px;" />@GuideStarUSA</a> | <a href="https://trust.guidestar.org/" target="_blank">Read the blog</a></p> </td> </tr></tbody></table><p> </p> <div class="subtitle" style="margin: 15px 0px; padding: 0px; box-sizing: border-box; font-family: Prelo-Book; letter-spacing: 0.48px; margin"><span style="font-size: 24px; line-height: 25.6px; font-weight: bold;">John Haydon's Blog </span></div> <p style="font-size: 16px; line-height: 25.6px;">If you're a nonprofit marketer, John Haydon's eponymous blog is the definition of a must-read. The blog offers a wealth of information on the key tech trends shaping the sector, including payment processing, email marketing and social media. For anyone interested in the intersection of technology and marketing in the nonprofit world, Haydon has something special to offer.</p> <table><tbody><tr><td style="width: 107px;"> <p><a data-entity-type="" data-entity-uuid="" href="https://www.johnhaydon.com/"><img alt="" data-entity-type="" data-entity-uuid="" src="/sites/biztechmagazine.com/files/JohnHaydon.png" style="width: 82px; height: 82px;" /></a></p> </td> <td> <p style="font-size: 16px; line-height: 5px; font-weight: bold; padding-top: 17px; display: inline-block;">JOHN HAYDON</p> <p style="font-size: 16px; line-height: 5px;"><a href="https://twitter.com/johnhaydon" target="_blank"><img alt="" data-entity-type="" data-entity-uuid="" src="/k12/sites/default/files/twitter.png" style="width: 20px; height: 15px; margin-right: 5px;" />@johnhaydon</a> | <a href="https://www.johnhaydon.com/" target="_blank">Read the blog</a></p> </td> </tr></tbody></table><p> </p> <div class="subtitle" style="margin: 15px 0px; padding: 0px; box-sizing: border-box; font-family: Prelo-Book; letter-spacing: 0.48px; margin"><span style="font-size: 24px; line-height: 25.6px; font-weight: bold;">John Kenyon's Blog </span></div> <p style="font-size: 16px; line-height: 25.6px;">There are few voices who are more authoritative when it comes to nonprofit technology than John Kenyon, a nonprofit technology educator and strategist who has been working with nonprofits for more than 20 years. His blog covers everything from the importance of cleaning and normalizing data to practical steps nonprofits can take to ward off cyberattacks. Nonprofits should turn to Kenyon's blog for a healthy dose of on-the-ground knowledge and advice.</p> <table><tbody><tr><td style="width: 107px;"> <p><a data-entity-type="" data-entity-uuid="" href="http://johnkenyon.org/"><img alt="" data-entity-type="" data-entity-uuid="" src="/sites/biztechmagazine.com/files/JohnKenyon_0.png" style="width: 82px; height: 82px;" /></a></p> </td> <td> <p style="font-size: 16px; line-height: 5px; font-weight: bold; padding-top: 17px; display: inline-block;">JOHN KENYON</p> <p style="font-size: 16px; line-height: 5px;"><a href="https://twitter.com/jakenyon" target="_blank"><img alt="" data-entity-type="" data-entity-uuid="" src="/k12/sites/default/files/twitter.png" style="width: 20px; height: 15px; margin-right: 5px;" />@jakenyon</a> | <a href="http://johnkenyon.org/" target="_blank">Read the blog</a></p> </td> </tr></tbody></table><p> </p> <div class="subtitle" style="margin: 15px 0px; padding: 0px; box-sizing: border-box; font-family: Prelo-Book; letter-spacing: 0.48px; margin"><span style="font-size: 24px; line-height: 25.6px; font-weight: bold;">Neon Blog </span></div> <p style="font-size: 16px; line-height: 25.6px;">Want to use technology to gain deeper insights on donors? Neon's blog is the right spot for you. The company provides customer relationship management software for nonprofits, but its blog is chock-full of practical tech tips for nonprofits and is not a sales pitch. Recent posts include tips on how to manage and clean Microsoft Excel data, advice data migrations and email communications. On a monthly basis, the blog also highlights standout nonprofits it works with.</p> <table><tbody><tr><td style="width: 107px;"> <p><a data-entity-type="" data-entity-uuid="" href="http://www.neoncrm.com/blog/"><img alt="" data-entity-type="" data-entity-uuid="" src="/sites/biztechmagazine.com/files/Neon.png" style="width: 82px; height: 82px;" /></a></p> </td> <td> <p style="font-size: 16px; line-height: 5px; font-weight: bold; padding-top: 17px; display: inline-block;">NEON</p> <p style="font-size: 16px; line-height: 5px;"><a href="https://twitter.com/NeonCRM" target="_blank"><img alt="" data-entity-type="" data-entity-uuid="" src="/k12/sites/default/files/twitter.png" style="width: 20px; height: 15px; margin-right: 5px;" />@NeonCRM</a> | <a href="http://www.neoncrm.com/blog/" target="_blank">Read the blog</a></p> </td> </tr></tbody></table><p> </p> <div class="subtitle" style="margin: 15px 0px; padding: 0px; box-sizing: border-box; font-family: Prelo-Book; letter-spacing: 0.48px; margin"><span style="font-size: 24px; line-height: 25.6px; font-weight: bold;">Nonprofit Hub </span></div> <p style="font-size: 16px; line-height: 25.6px;">Nonprofit Hub is an online educational community, whose mission, the site says, is "giving nonprofits everything they need to better their organizations and communities." The site's technology coverage offers practical tips and guides, including how nonprofits can move human resources to the cloud and how to take advantage of text-to-donate fundraising campaigns.</p> <table><tbody><tr><td style="width: 107px;"> <p><a data-entity-type="" data-entity-uuid="" href="http://nonprofithub.org/category/nonprofit-technology/"><img alt="" data-entity-type="" data-entity-uuid="" src="/sites/biztechmagazine.com/files/Nonprofit%20Hub.png" style="width: 82px; height: 82px;" /></a></p> </td> <td> <p style="font-size: 16px; line-height: 5px; font-weight: bold; padding-top: 17px; display: inline-block;">NONPROFIT HUB</p> <p style="font-size: 16px; line-height: 5px;"><a href="https://twitter.com/NPhub" target="_blank"><img alt="" data-entity-type="" data-entity-uuid="" src="/k12/sites/default/files/twitter.png" style="width: 20px; height: 15px; margin-right: 5px;" />@NPhub</a> | <a href="http://nonprofithub.org/category/nonprofit-technology/" target="_blank">Read the blog</a></p> </td> </tr></tbody></table><p> </p> <div class="subtitle" style="margin: 15px 0px; padding: 0px; box-sizing: border-box; font-family: Prelo-Book; letter-spacing: 0.48px; margin"><span style="font-size: 24px; line-height: 25.6px; font-weight: bold;">NonProfit PRO </span></div> <p style="font-size: 16px; line-height: 25.6px;">NonProfit PRO focuses on nonprofit management and strategy, and the site is aimed at leaders and innovators in the segment. The site covers internal issues (such as human resources, board and volunteer management), technology, tax and legal matters, news and, of course, fundraising. NonProfit PRO's technology coverage centers on data management and e-philanthropy, and includes topics such as how to choose tech tools, the Internet of Things' role in fundraising and the importance of social media.</p> <table><tbody><tr><td style="width: 107px;"> <p><a data-entity-type="" data-entity-uuid="" href="http://www.nonprofitpro.com/blogs"><img alt="" data-entity-type="" data-entity-uuid="" src="/sites/biztechmagazine.com/files/NonProfitPro.png" style="width: 82px; height: 82px;" /></a></p> </td> <td> <p style="font-size: 16px; line-height: 5px; font-weight: bold; padding-top: 17px; display: inline-block;">NONPROFIT PRO</p> <p style="font-size: 16px; line-height: 5px;"><a href="https://twitter.com/non_profit_pro" target="_blank"><img alt="" data-entity-type="" data-entity-uuid="" src="/k12/sites/default/files/twitter.png" style="width: 20px; height: 15px; margin-right: 5px;" />@non_profit_pro</a> | <a href="http://www.nonprofitpro.com/blogs" target="_blank">Read the blog</a></p> </td> </tr></tbody></table><p> </p> <div class="subtitle" style="margin: 15px 0px; padding: 0px; box-sizing: border-box; font-family: Prelo-Book; letter-spacing: 0.48px; margin"><span style="font-size: 24px; line-height: 25.6px; font-weight: bold;">Nonprofit Quarterly </span></div> <p style="font-size: 16px; line-height: 25.6px;">The Nonprofit Quarterly is an independent nonprofit news organization that has been serving nonprofit leaders, charitable foundations, educators, independent activists and others involved in the civil sector for more than 15 years. The site's technology coverage runs the gamut from how to get long-term tech support to digital strategy and cybersecurity.</p> <table><tbody><tr><td style="width: 107px;"> <p><a data-entity-type="" data-entity-uuid="" href="https://nonprofitquarterly.org/tag/technology/"><img alt="" data-entity-type="" data-entity-uuid="" src="/sites/biztechmagazine.com/files/NonProfitQrtly.png" style="width: 82px; height: 82px;" /></a></p> </td> <td> <p style="font-size: 16px; line-height: 5px; font-weight: bold; padding-top: 17px; display: inline-block;">NONPROFIT QUARTERLY</p> <p style="font-size: 16px; line-height: 5px;"><a href="https://twitter.com/npquarterly" target="_blank"><img alt="" data-entity-type="" data-entity-uuid="" src="/k12/sites/default/files/twitter.png" style="width: 20px; height: 15px; margin-right: 5px;" />@npquarterly</a> | <a href="https://nonprofitquarterly.org/tag/technology/">Read the blog</a></p> </td> </tr></tbody></table><p> </p> <div class="subtitle" style="margin: 15px 0px; padding: 0px; box-sizing: border-box; font-family: Prelo-Book; letter-spacing: 0.48px; margin"><span style="font-size: 24px; line-height: 25.6px; font-weight: bold;">Nonprofit Tech for Good</span></div> <p style="font-size: 16px; line-height: 25.6px;">Nonprofit Tech for Good is a mainstay in the nonprofit tech community and it delivers a wide range of clear and concise news, information and resources related to nonprofit IT issues. Created and managed by nonprofit professional Heather Mansfield, author of the books <em>Mobile for Good</em> and <em>Social Media for Social Good</em>, the site is especially helpful for keeping track of major tech trends.</p> <table><tbody><tr><td style="width: 107px;"> <p><a data-entity-type="" data-entity-uuid="" href="http://www.nptechforgood.com/"><img alt="" data-entity-type="" data-entity-uuid="" src="/sites/biztechmagazine.com/files/NonProfitTechforGood.png" style="width: 82px; height: 82px;" /></a></p> </td> <td> <p style="font-size: 16px; line-height: 5px; font-weight: bold; padding-top: 17px; display: inline-block;">NONPROFIT ORGS</p> <p style="font-size: 16px; line-height: 5px;"><a href="https://twitter.com/nonprofitorgs" target="_blank"><img alt="" data-entity-type="" data-entity-uuid="" src="/k12/sites/default/files/twitter.png" style="width: 20px; height: 15px; margin-right: 5px;" />@nonprofitorgs</a> | <a href="http://www.nptechforgood.com/">Read the blog</a></p> </td> </tr></tbody></table><p> </p> <div class="subtitle" style="margin: 15px 0px; padding: 0px; box-sizing: border-box; font-family: Prelo-Book; letter-spacing: 0.48px; margin"><span style="font-size: 24px; line-height: 25.6px; font-weight: bold;">npENGAGE</span></div> <p style="font-size: 16px; line-height: 25.6px;">npENGAGE offers nonprofits a resource for new insights on IT trends as well as best practices to follow. That ranges from how artificial intelligence can help nonprofits to how to make a website work with responsive design. npENGAGE is sponsored by Blackbaud, which provides software and services specifically designed for nonprofits.</p> <table><tbody><tr><td style="width: 107px;"> <p><a data-entity-type="" data-entity-uuid="" href="https://npengage.com/nonprofit-technology/"><img alt="" data-entity-type="" data-entity-uuid="" src="/sites/biztechmagazine.com/files/NPEngage_0.png" style="width: 82px; height: 82px;" /></a></p> </td> <td> <p style="font-size: 16px; line-height: 5px; font-weight: bold; padding-top: 17px; display: inline-block;">NPENGAGE</p> <p style="font-size: 16px; line-height: 5px;"><a href="https://twitter.com/nonprofitorgs" target="_blank"><img alt="" data-entity-type="" data-entity-uuid="" src="/k12/sites/default/files/twitter.png" style="width: 20px; height: 15px; margin-right: 5px;" />@Blackbaud</a> | <a href="https://npengage.com/nonprofit-technology/">Read the blog</a></p> </td> </tr></tbody></table><p> </p> <div class="subtitle" style="margin: 15px 0px; padding: 0px; box-sizing: border-box; font-family: Prelo-Book; letter-spacing: 0.48px; margin"><span style="font-size: 24px; line-height: 25.6px; font-weight: bold;">NTEN Connect Blog </span></div> <p style="font-size: 16px; line-height: 25.6px;">NTEN, a 501(c)(3) organization, aims to have "all nonprofit organizations use technology skillfully and confidently to meet community needs and fulfill their missions." The site offers a mix of practical guidance, such as how nonprofits can stay on top of payment card industry compliance as they collect online donations, as well as thought leadership on key nonprofit tech trends.</p> <table><tbody><tr><td style="width: 107px;"> <p><a data-entity-type="" data-entity-uuid="" href="https://www.nten.org/articles/"><img alt="" data-entity-type="" data-entity-uuid="" src="/sites/biztechmagazine.com/files/NTen_0.png" style="width: 82px; height: 82px;" /></a></p> </td> <td> <p style="font-size: 16px; line-height: 5px; font-weight: bold; padding-top: 17px; display: inline-block;">NTEN</p> <p style="font-size: 16px; line-height: 5px;"><a href="https://twitter.com/ntenorg" target="_blank"><img alt="" data-entity-type="" data-entity-uuid="" src="/k12/sites/default/files/twitter.png" style="width: 20px; height: 15px; margin-right: 5px;" />@NTENorg</a> | <a href="https://www.nten.org/articles/">Read the blog</a></p> </td> </tr></tbody></table><p> </p> <div class="subtitle" style="margin: 15px 0px; padding: 0px; box-sizing: border-box; font-family: Prelo-Book; letter-spacing: 0.48px; margin"><span style="font-size: 24px; line-height: 25.6px; font-weight: bold;">re: charity </span></div> <p style="font-size: 16px; line-height: 25.6px;">Started by nonprofit professional Brady Josephson, this blog serves as a platform for new thinking around charity, fundraising, marketing, storytelling and more. The site offers useful tech tips, including how technology can empower fundraising, as well as more practical concerns like how to increase online donations and improve a nonprofit website's design.</p> <table><tbody><tr><td style="width: 107px;"> <p><a data-entity-type="" data-entity-uuid="" href="https://recharity.ca/"><img alt="" data-entity-type="" data-entity-uuid="" src="/sites/biztechmagazine.com/files/ReCharity.png" style="width: 82px; height: 82px;" /></a></p> </td> <td> <p style="font-size: 16px; line-height: 5px; font-weight: bold; padding-top: 17px; display: inline-block;">BRADY JOSEPHSON</p> <p style="font-size: 16px; line-height: 5px;"><a href="https://twitter.com/bradyjosephson" target="_blank"><img alt="" data-entity-type="" data-entity-uuid="" src="/k12/sites/default/files/twitter.png" style="width: 20px; height: 15px; margin-right: 5px;" />@bradyjosephson</a> | <a href="https://recharity.ca/">Read the blog</a></p> </td> </tr></tbody></table><p> </p> <div class="subtitle" style="margin: 15px 0px; padding: 0px; box-sizing: border-box; font-family: Prelo-Book; letter-spacing: 0.48px; margin"><span style="font-size: 24px; line-height: 25.6px; font-weight: bold;">Technology for Good Blog</span></div> <p style="font-size: 16px; line-height: 25.6px;">This blog, from networking giant Ericsson, focuses on how technology can increase sustainability and help solve humanitarian crises. While it does not exclusively focus on network technology, that is its clear bent, and the blog highlights the ways in which nonprofits and humanitarian organizations are turning to the Internet of Things to address social issues.</p> <table><tbody><tr><td style="width: 107px;"> <p><a data-entity-type="" data-entity-uuid="" href="https://www.ericsson.com/thecompany/sustainability_corporateresponsibility/technology-for-good-blog/"><img alt="" data-entity-type="" data-entity-uuid="" src="/sites/biztechmagazine.com/files/TechForFood.png" style="width: 82px; height: 82px;" /></a></p> </td> <td> <p style="font-size: 16px; line-height: 5px; font-weight: bold; padding-top: 17px; display: inline-block;">TECHNOLOGY FOR GOOD</p> <p style="font-size: 16px; line-height: 5px;"><a href="https://twitter.com/ericssonsustain" target="_blank"><img alt="" data-entity-type="" data-entity-uuid="" src="/k12/sites/default/files/twitter.png" style="width: 20px; height: 15px; margin-right: 5px;" />@Ericssonsustain</a> | <a href="https://www.ericsson.com/thecompany/sustainability_corporateresponsibility/technology-for-good-blog/">Read the blog</a></p> </td> </tr></tbody></table><p> </p> <div class="subtitle" style="margin: 15px 0px; padding: 0px; box-sizing: border-box; font-family: Prelo-Book; letter-spacing: 0.48px; margin"><span style="font-size: 24px; line-height: 25.6px; font-weight: bold;">TechSoup Blog</span></div> <p style="font-size: 16px; line-height: 25.6px;">If you're a nonprofit professional looking to integrate new IT into your organization, TechSoup is an excellent resource. The site offers a wide-ranging and robust community for sharing ideas, insights and advice related to nonprofit tech. Grab a bowl and get warmed up with wisdom.</p> <table><tbody><tr><td style="width: 107px;"> <p><a data-entity-type="" data-entity-uuid="" href="http://forums.techsoup.org/cs/community/"><img alt="" data-entity-type="" data-entity-uuid="" src="/sites/biztechmagazine.com/files/TechSoup_0.png" style="width: 82px; height: 82px;" /></a></p> </td> <td> <p style="font-size: 16px; line-height: 5px; font-weight: bold; padding-top: 17px; display: inline-block;">TECHSOUP</p> <p style="font-size: 16px; line-height: 5px;"><a href="https://twitter.com/TechSoup" target="_blank"><img alt="" data-entity-type="" data-entity-uuid="" src="/k12/sites/default/files/twitter.png" style="width: 20px; height: 15px; margin-right: 5px;" />@TechSoup</a> | <a href="http://forums.techsoup.org/cs/community/">Read the blog</a></p> </td> </tr></tbody></table><p> </p> <div class="subtitle" style="margin: 15px 0px; padding: 0px; box-sizing: border-box; font-family: Prelo-Book; letter-spacing: 0.48px; margin"><span style="font-size: 24px; line-height: 25.6px; font-weight: bold;">The Nerdy Nonprofit </span></div> <p style="font-size: 16px; line-height: 25.6px;">This blog offers the latest news in nonprofit digital marketing and technology. It is run by ArcStone, a full-service digital agency in Minneapolis, which started the site after noticing a gap in digital strategy and the need for a better nonprofit marketing resource. The site's technology coverage focuses a great deal on software tools, web design and how tech and marketing intersect.</p> <table><tbody><tr><td style="width: 107px;"> <p><a data-entity-type="" data-entity-uuid="" href="http://www.thenerdynonprofit.com/category/nonprofit-technology/"><img alt="" data-entity-type="" data-entity-uuid="" src="/sites/biztechmagazine.com/files/TheNerdyNonProfit.png" style="width: 82px; height: 82px;" /></a></p> </td> <td> <p style="font-size: 16px; line-height: 5px; font-weight: bold; padding-top: 17px; display: inline-block;">THE NERDY NONPROFIT</p> <p style="font-size: 16px; line-height: 5px;"><a href="https://twitter.com/ArcStoneforNP" target="_blank"><img alt="" data-entity-type="" data-entity-uuid="" src="/k12/sites/default/files/twitter.png" style="width: 20px; height: 15px; margin-right: 5px;" />@ArcStoneforNP</a> | <a href="http://www.thenerdynonprofit.com/category/nonprofit-technology/">Read the blog</a></p> </td> </tr></tbody></table><p> </p> <div class="subtitle" style="margin: 15px 0px; padding: 0px; box-sizing: border-box; font-family: Prelo-Book; letter-spacing: 0.48px; margin"><span style="font-size: 24px; line-height: 25.6px; font-weight: bold;">The NonProfit Times </span></div> <p style="font-size: 16px; line-height: 25.6px;">Want to know where the nonprofit sector is going? Check out The Nonprofit Times, which is widely considered a source for front-page news in the nonprofit world. The site focuses largely on nonprofit management and offers advice and regular updates on industry news and trends. For the busy IT pro at a nonprofit, this site is a great way to stay on top of the big news in the sector.</p> <table><tbody><tr><td style="width: 107px;"> <p><a data-entity-type="" data-entity-uuid="" href="http://www.thenonprofittimes.com/"><img alt="" data-entity-type="" data-entity-uuid="" src="/sites/biztechmagazine.com/files/NonProfitTimes_0.png" style="width: 82px; height: 82px;" /></a></p> </td> <td> <p style="font-size: 16px; line-height: 5px; font-weight: bold; padding-top: 17px; display: inline-block;">THE NONPROFIT TIMES</p> <p style="font-size: 16px; line-height: 5px;"><a href="https://twitter.com/NonProfitTimes" target="_blank"><img alt="" data-entity-type="" data-entity-uuid="" src="/k12/sites/default/files/twitter.png" style="width: 20px; height: 15px; margin-right: 5px;" />@NonProfitTimes</a> | <a href="http://www.thenonprofittimes.com/">Read the blog</a></p> </td> </tr></tbody></table><p> </p> <div class="subtitle" style="margin: 15px 0px; padding: 0px; box-sizing: border-box; font-family: Prelo-Book; letter-spacing: 0.48px; margin"><span style="font-size: 24px; line-height: 25.6px; font-weight: bold;">TriplePundit </span></div> <p style="font-size: 16px; line-height: 25.6px;">TriplePundit bills itself as "a global media platform covering the intersection of people, planet and profit." The site's advocates argue that economy, environment and society are inseparably related, and an understanding of all three is critical to society's ability to flourish long term. The site's posts, written by staff authors and guest contributors, include news stories, industry items of note and op-eds. TriplePundit's IT coverage ranges from how major tech companies approach corporate social responsibility to how public policy and technology interact.</p> <table><tbody><tr><td style="width: 107px;"> <p><a data-entity-type="" data-entity-uuid="" href="https://www.triplepundit.com/category/industry-verticals/information-technology/"><img alt="" data-entity-type="" data-entity-uuid="" src="/sites/biztechmagazine.com/files/TriplePundit.png" style="width: 82px; height: 82px;" /></a></p> </td> <td> <p style="font-size: 16px; line-height: 5px; font-weight: bold; padding-top: 17px; display: inline-block;">TRIPLEPUNDIT</p> <p style="font-size: 16px; line-height: 5px;"><a href="https://twitter.com/TriplePundit" target="_blank"><img alt="" data-entity-type="" data-entity-uuid="" src="/k12/sites/default/files/twitter.png" style="width: 20px; height: 15px; margin-right: 5px;" />@TriplePundit</a> | <a href="https://www.triplepundit.com/category/industry-verticals/information-technology/">Read the blog</a></p> </td> </tr></tbody></table><p> </p> <div class="subtitle" style="margin: 15px 0px; padding: 0px; box-sizing: border-box; font-family: Prelo-Book; letter-spacing: 0.48px; margin"><span style="font-size: 24px; line-height: 25.6px; font-weight: bold;">Wild Apricot Blog </span></div> <p style="font-size: 16px; line-height: 25.6px;">Wild Apricot provides web-based software for small associations and nonprofits to help manage membership, website, events and other activities. The company's blog focuses on practical concerns, such as how to do more with less, and how to pick and deploy the right IT solutions, along with a healthy dose of humor and general industry news. The blog focuses on leading-edge technology such as augmented reality, as well as more mundane technologies, such as time tracking for employees.</p> <table><tbody><tr><td style="width: 107px;"> <p><a data-entity-type="" data-entity-uuid="" href="https://www.wildapricot.com/blogs/newsblog"><img alt="" data-entity-type="" data-entity-uuid="" src="/sites/biztechmagazine.com/files/Wild%20Apricot.png" style="width: 82px; height: 82px;" /></a></p> </td> <td> <p style="font-size: 16px; line-height: 5px; font-weight: bold; padding-top: 17px; display: inline-block;">WILD APRICOT</p> <p style="font-size: 16px; line-height: 5px;"><a href="https://twitter.com/WildApricot" target="_blank"><img alt="" data-entity-type="" data-entity-uuid="" src="/k12/sites/default/files/twitter.png" style="width: 20px; height: 15px; margin-right: 5px;" />@WildApricot</a> | <a href="https://www.wildapricot.com/blogs/newsblog">Read the blog</a></p> </td> </tr></tbody></table></div> <div> <div>Content Subtype</div> <div>Article</div> </div> <div> <div>CDW Activity ID</div> <div><p>MKT24637</p> </div> </div> <div> <div>CDW VV2 Strategy</div> <div>Core</div> </div> <div> <div>CDW Segment</div> <div>Non Profit</div> </div> <div> <div>Original or Curated</div> <div>Curated</div> </div> <div> <div>Customer Focused</div> <div>False</div> </div> <div> <div>Buying Cycle</div> <div><a href="/engagement" hreflang="en">Engagement</a></div> </div> <div> <div>Content Length</div> <div>Over 1000 words</div> </div> <div> <div>Related Articles</div> <div> <div> <article class="node node-article node-type-article node-promoted node--view-mode-teaser"> <div class="content"> <a href="/article/2017/02/25-must-read-nonprofit-it-blogs-2017"><img src="/sites/biztechmagazine.com/files/styles/frontpage_highlighted_category/public/articles/ITBLOGS-NP-WEB.jpg?itok=fiK4-QGu" width="124" height="94" alt="" typeof="foaf:Image" /> </a> </div> <div class="desc"> <h2 class="link-term"><a class="taxonomy-term vocabulary-primary-topic term-default" href="https://biztechmagazine.com/internet">Internet</a> </h2> <header class="link-node"> <a href="/article/2017/02/25-must-read-nonprofit-it-blogs-2017"><span>25 Must-Read Nonprofit IT Blogs 2017</span> </a> </header> </div> </article> </div> <div> <article class="node node-article node-type-article node-promoted node--view-mode-teaser"> <div class="content"> <a href="/article/2018/02/will-nonprofits-turn-chatbots-help-fulfill-their-missions"><img src="/sites/biztechmagazine.com/files/styles/frontpage_highlighted_category/public/articles/%5Bcdw_tech_site%3Afield_site_shortname%5D/201802/BizTech--NonprofitChatbot.jpg?itok=uveqd-9g" width="124" height="94" alt="Chatbot on a smartphone " typeof="foaf:Image" /> </a> </div> <div class="desc"> <h2 class="link-term"><a class="taxonomy-term vocabulary-primary-topic term-default" href="https://biztechmagazine.com/software">Software</a> </h2> <header class="link-node"> <a href="/article/2018/02/will-nonprofits-turn-chatbots-help-fulfill-their-missions"><span>Will Nonprofits Turn to Chatbots to Help Fulfill Their Missions?</span> </a> </header> </div> </article> </div> <div> <article class="node node-article node-type-article node-promoted node--view-mode-teaser"> <div class="content"> <a href="/article/2017/06/most-nonprofits-are-investing-more-software-hardware-study-shows"><img src="/sites/biztechmagazine.com/files/styles/frontpage_highlighted_category/public/articles/BizTech/201706/Sailors_lift_a_structural_wall_during_a_Habitat_for_Humanity_build_for_Houston_Navy_Week._%2830411106696%29.jpg?itok=yXMkHwwj" width="124" height="94" alt="" typeof="foaf:Image" /> </a> </div> <div class="desc"> <h2 class="link-term"><a class="taxonomy-term vocabulary-primary-topic term-default" href="https://biztechmagazine.com/management">Management</a> </h2> <header class="link-node"> <a href="/article/2017/06/most-nonprofits-are-investing-more-software-hardware-study-shows"><span>Most Nonprofits Are Investing More in Software than Hardware, Study Shows</span> </a> </header> </div> </article> </div> </div> </div> <div class="pw-widget pw-size-medium pw-layout-horizontal" data-url="https://biztechmagazine.com/article/2018/02/25-must-read-nonprofit-it-blogs-2018" data-title="Our new list is here! Check out these must-read #nonprofit #tech blogs and how they can help your #techforgood strategies. #nptech" data-via="BizTechMagazine" data-button-background="none"> <div> <a class="pw-button-twitter"></a> <span class="pw-box-counter" pw:channel="twitter"></span> </div> <div> <a class="pw-button-facebook"></a> <span class="pw-box-counter" pw:channel="facebook"></span> </div> </div> <div class="pw-widget pw-size-medium pw-layout-horizontal" data-url="https://biztechmagazine.com/article/2018/02/25-must-read-nonprofit-it-blogs-2018" data-title="Our new list is here! Check out these must-read #nonprofit #tech blogs and how they can help your #techforgood strategies. #nptech" data-via="BizTechMagazine" data-button-background="none"> <div> <a class="pw-button-twitter cdw-taboola-social"></a> <a href="https://twitter.com/search?f=realtime&amp;q=https%3A%2F%2Fbiztechmagazine.com%2Frss.xml%3Fitem_id%3D158" target="_blank"><span class="pw-box-counter cdw-taboola" data-channel="twitter"></span></a> </div> <div> <a class="pw-button-facebook cdw-taboola-social"></a> </div> <div> <a class="pw-button-googleplus cdw-taboola-social"></a> </div> <div> <a class="pw-button-linkedin cdw-taboola-social"></a> </div> <div> <a class="pw-button-reddit cdw-taboola-social"></a> </div> <div> <a class="pw-button-flipboard cdw-taboola-social"></a> </div> <div> <a class="pw-button-email cdw-taboola-social"></a> </div> </div> <div class="pw-widget pw-size-medium pw-layout-vertical" data-layout="vertical" data-url="https://biztechmagazine.com/article/2018/02/25-must-read-nonprofit-it-blogs-2018" data-title="Our new list is here! Check out these must-read #nonprofit #tech blogs and how they can help your #techforgood strategies. #nptech" data-via="BizTechMagazine" data-button-background="none"> <span> <span>Feb</span> <span>22</span> <span>2018</span> </span> <a class="pw-button-twitter cdw-taboola-social"></a> <a class="pw-button-facebook cdw-taboola-social"></a> <a class="pw-button-googleplus cdw-taboola-social"></a> <a class="pw-button-linkedin cdw-taboola-social"></a> <a class="pw-button-reddit cdw-taboola-social"></a> <a class="pw-button-flipboard cdw-taboola-social"></a> <a class="pw-button-email cdw-taboola-social"></a> </div> <div> <div class="field-author"> <div id="taxonomy-term-" class=""> <div class="author-photo"> <a href="/author/phil-goldstein"><img src="/sites/biztechmagazine.com/files/styles/face_small/public/people/CoMfravQ_400x400.jpg?itok=W9IAwS8L" width="58" height="58" alt="Phil Goldstein" typeof="foaf:Image" /> </a> </div> <div class="author-info"> <span>by </span><a rel="author" href="/author/phil-goldstein"> <div>Phil Goldstein</div> </a> <a target="_blank" class="twitter" href="https://twitter.com/intent/follow?region=follow_link&amp;screen_name=philgoldstein&amp;tw_p=followbutton&amp;variant=2.0"><span>Twitter</span></a> </div> <div class="author-bio"> <p> <div><p>Phil Goldstein is a web editor for <em>FedTech</em> and <em>BizTech</em>. Besides keeping up with the latest in technology trends, he is also an avid lover of the New York Yankees, poetry, photography, traveling and escaping humidity.</p> </div> </p> </div> </div> </div> </div> <div> <div>Pull Quote</div> <div> <p class="quote"><a href="node/40441"></a></p> <p class='speaker'> </p> </div> </div> Thu, 22 Feb 2018 15:00:00 +0000 phil.goldstein_6191 40441 at https://biztechmagazine.com The Lessons of a Tough Year in Cybersecurity https://biztechmagazine.com/article/2018/02/lessons-tough-year-cybersecurity <span>The Lessons of a Tough Year in Cybersecurity</span> <img src="/sites/biztechmagazine.com/files/articles/%5Bcdw_tech_site%3Afield_site_shortname%5D/201802/BizTech-CyberRisk2018.jpg" width="1440" height="560" alt="Cyber hacking " typeof="foaf:Image" /> <span><span lang="" about="/user/6191" typeof="schema:Person" property="schema:name" datatype="">phil.goldstein_6191</span></span> <span>Thu, 02/22/2018 - 09:07</span> <div><p>Cybersecurity has become a top priority for organizations across the country, but that may not be enough.<strong> "Security needs to be a national priority,"</strong> said author and expert <a href="https://krebsonsecurity.com/about/">Brian Krebs</a>.</p> <p>Speaking at the CDW Managing Risk Summit in Las Vegas, Krebs and other experts observed that as breaches <a href="https://biztechmagazine.com/article/2018/02/cybercrime-costs-global-economy-600-billion-year">have had an increasing impact in recent years</a>, organizations have taken security far more seriously. Noting <a href="https://krebsonsecurity.com/2015/09/inside-target-corp-days-after-2013-breach/">the 2013 Target breach</a> that led to the resignation of Gregg Steinhafel, the company's president and chief executive, Krebs said:<strong> "Any time a data breach has the capacity to show the CEO the door, it tends to catch your attention."</strong></p> <p><a href="https://www.csoonline.com/author/Bob-Bragdon/">Bob Bragdon</a>, publisher of <em>CSO</em>, noted that Steinhafel wasn't the only executive to face such consequences. Chief executives at <a href="https://www.bloomberg.com/news/articles/2017-09-26/equifax-ceo-smith-resigns-barros-named-interim-chief-after-hack">Equifax</a> and <a href="https://techcrunch.com/2017/06/13/verizon-closes-4-5b-acquisition-of-yahoo-marissa-mayer-resigns-memo/">Yahoo</a> also departed in the wake of major breaches at their companies.</p> <p>While these breaches were damaging for the companies that suffered them, they <strong>provide insights that can help others better protect their data and respond to attacks more effectively</strong>.</p> <p><a href="https://biztechmagazine.com/register?newsletter"><strong>SIGN UP: </strong>Get more news from the <em>BizTech</em> newsletter in your inbox every two weeks!</a></p> <h2>Organizations Must Deal with the Inevitability of Breaches </h2> <p>One of the key lessons of the massive breaches of 2017 is that <strong>it is essentially impossible to keep persistent, skilled attackers from penetrating an organization's exterior defenses</strong>. CDW research indicates that <strong>46 percent</strong> of organizations have experienced a serious data breach, while <strong>22 percent have reported a near breach in the past 12 months</strong>.</p> <p>Further, Sadik Al-Abdulla, director of security solutions at CDW, stated that in the first 60 penetration tests he conducted as a security engineer, he was successful in taking full administrative control of the customer's network in all of them <span style="font-size:11.0pt"><span style="font-family:&quot;Calibri&quot;,sans-serif">—</span></span> and <strong>in 59 attempts, he was able to do so within an hour</strong>. The lesson? <strong>Skilled, dedicated attackers will find a way past nearly any defense</strong>. Organizations should work to keep threats out, but they also must have a plan for how to respond when an attacker gets in.</p> <p>Al-Abdulla recommended a four-step approach to security:</p> <ul><li><strong>Accept </strong>that a breach is inevitable</li> <li>Design defenses for <strong>post-breach detection</strong></li> <li>Design defenses to<strong> limit the impact of a breach</strong></li> <li>Plan for <strong>breach response</strong></li> </ul><p>Krebs' prescription for an effective defense largely follows a similar approach. The first step, he suggested, is to know that <strong>if your goal is only to keep attackers out of your IT environment, you've already lost the game</strong>. "If you still think you can keep the bad guys out, you probably don't know enough to know when they get in," he said.</p> <p>A more effective strategy, he said, is to <strong>anticipate when and how a breach might occur and to look for those signs to determine if one has taken place</strong>. Then, the response must be quick and effective. "Companies need to spend a lot more time anticipating these breaches and responding to them, instead of trying to prevent them," he said.</p> <h2>Passwords Prove to Be Weak Links </h2> <p>Both Krebs and Al-Abdulla identified <strong>passwords</strong> as a major vulnerability for many organizations. "It's 2018," Krebs said. <strong>"How are we still so reliant on passwords? They're the source of so many </strong><strong>cyberbreaches</strong><strong>."</strong></p> <p>Al-Abdulla noted that many organizations establish password policies that allow users to rely on weak or easily guessed passwords. One strategy for addressing the vulnerability of passwords is to <a href="https://biztechmagazine.com/article/2016/07/identity-and-access-management-offers-secure-authentication-businesses">implement two-factor authentication</a>, which uses <strong>an element that the user knows</strong> (such as a password) in combination with <strong>an element that the user carries </strong>(such as a token or smartphone) or <strong>an element that is unique to the user's person</strong> (typically, biometrics such as fingerprints or retinal patterns). Implementing two-factor authentication requires attackers<strong> not only to steal or guess a user's </strong><strong>password,</strong><strong> but also to compromise a second factor that identifies the authorized user</strong>, a much more difficult task for attackers to achieve.</p> <p>However, not every organization has the resources to implement two-factor authentication, and it's not appropriate for every application. In such cases, Al-Abdulla suggested <strong>a strong password policy that uses passphrases that are more difficult to guess</strong>.</p> <p><a href="https://biztechmagazine.com/article/2017/10/data-protection-tips-protecting-against-phishing-scams-2017">Phishing</a> remains another dangerous attack vector. Many attackers use a target's personal information to get him or her to <strong>click on a malicious link or open a malicious attachment</strong>. This was the key way in which attackers were able to <a href="http://www.bbc.com/news/technology-41385951">compromise the defenses of Deloitte in 2017</a>. "All it took was one guy to get phished" for attackers to gain administrative access to Deloitte's systems, Krebs said.</p> <p>Krebs suggested that organizations should <strong>make greater budgetary considerations to address the need for cybersecurity professionals to defend against these sophisticated attacks</strong>. Al-Abdulla added that <a href="https://biztechmagazine.com/article/2017/10/4-steps-your-organization-can-take-boost-cybersecurity">more effective training</a> can help users identify potential phishing attacks and avoid them. "If we keep letting the people be the weak point in our defenses," he said, "attackers will keep exploiting them."</p> <h2>Encryption and Patch Management Can Help Mitigate Attacks</h2> <p>In addition to security policies to defend against password-based exploits and phishing attacks, experts at the CDW Summit also recommended <strong>solutions to help deal with security breaches</strong>.</p> <p>Elton Fontaine, <a href="https://www.cdw.com/content/brands/paloalto/default.aspx">Palo Alto Networks</a>' director of sales engineering for the Western U.S., recommended<strong> Secure Sockets Layer decryption as a tool for breach defense</strong>. Attackers hide malicious payloads among the increasing amount of network traffic that is encrypted. <strong>Using SSL to decrypt this traffic can help organizations detect attacks.</strong></p> <p>Fontaine recognized that implementing SSL decryption can pose some challenges, such as network performance degradation. To deal with such problems, he suggested that organizations <strong>focus on high-priority traffic that is often used to deliver malicious payloads, such as email or social media traffic</strong>. This will address the most common threats quickly, he said.</p> <p><strong>Patch management </strong>is another weakness that attackers often exploit. Massive ransomware attacks in 2017, fueled by <a href="https://biztechmagazine.com/article/2017/05/how-protect-your-business-following-wannacry-ransomware-attack">WannaCry</a> and <a href="https://biztechmagazine.com/article/2017/06/cisco-live-2017-why-petyanyetya-ransomware-attack-tops-wannacry">NotPetya</a> malware, relied on unpatched vulnerabilities. In many IT environments, some systems are difficult to patch. In this case, <strong>segmentation</strong> can help IT teams prevent attackers from using access to one system to help them compromise connected systems, which often contain more valuable data.</p> <p>Establishing a defense that strives to keep attackers out, but also <strong>limits the damage they can do in the event of a successful breach</strong>, is essential in the modern threat environment.</p> </div> <div> <div>Content Subtype</div> <div>Article</div> </div> <div> <div>CDW Activity ID</div> <div><p>MKT24637</p> </div> </div> <div> <div>CDW VV2 Strategy</div> <div>Security</div> </div> <div> <div>CDW Segment</div> <div>SMB</div> </div> <div> <div>Original or Curated</div> <div>Original</div> </div> <div> <div>Customer Focused</div> <div>False</div> </div> <div> <div>Buying Cycle</div> <div><a href="/engagement" hreflang="en">Engagement</a></div> </div> <div> <div>Content Length</div> <div>500-1000 words</div> </div> <div> <div>Related Articles</div> <div> <div> <article class="node node-article node-type-article node-promoted node--view-mode-teaser"> <div class="content"> <a href="/article/2018/02/how-protect-your-small-business-multigenerational-workforce"><img src="/sites/biztechmagazine.com/files/styles/frontpage_highlighted_category/public/articles/%5Bcdw_tech_site%3Afield_site_shortname%5D/201802/BizTech--AgilITY-5_0.jpg?itok=siM_UFHu" width="124" height="94" alt="Multi-generational workforce " typeof="foaf:Image" /> </a> </div> <div class="desc"> <h2 class="link-term"><a class="taxonomy-term vocabulary-primary-topic term-default" href="https://biztechmagazine.com/security">Security</a> </h2> <header class="link-node"> <a href="/article/2018/02/how-protect-your-small-business-multigenerational-workforce"><span>How to Protect Your Small Business with a Multigenerational Workforce</span> </a> </header> </div> </article> </div> <div> <article class="node node-article node-type-article node--view-mode-teaser"> <div class="content"> <a href="/article/2017/12/how-your-business-can-plan-cyberattacks-2018"><img src="/sites/biztechmagazine.com/files/styles/frontpage_highlighted_category/public/articles/BizTech/201712/BizTech--Cyber2018.jpg?itok=fD2Uh2dq" width="124" height="94" alt="" typeof="foaf:Image" /> </a> </div> <div class="desc"> <h2 class="link-term"><a class="taxonomy-term vocabulary-primary-topic term-default" href="https://biztechmagazine.com/security">Security</a> </h2> <header class="link-node"> <a href="/article/2017/12/how-your-business-can-plan-cyberattacks-2018"><span>How Your Business Can Plan for Cyberattacks in 2018</span> </a> </header> </div> </article> </div> <div> <article class="node node-article node-type-article node-promoted node--view-mode-teaser"> <div class="content"> <a href="/article/2017/10/4-steps-your-organization-can-take-boost-cybersecurity"><img src="/sites/biztechmagazine.com/files/styles/frontpage_highlighted_category/public/articles/BizTech/201710/BizTech--CyberChicagoIdeas--cropped.jpg?itok=BWUbD7ux" width="124" height="94" alt="" typeof="foaf:Image" /> </a> </div> <div class="desc"> <h2 class="link-term"><a class="taxonomy-term vocabulary-primary-topic term-default" href="https://biztechmagazine.com/security">Security</a> </h2> <header class="link-node"> <a href="/article/2017/10/4-steps-your-organization-can-take-boost-cybersecurity"><span>The 4 Steps Your Organization Can Take to Boost Cybersecurity</span> </a> </header> </div> </article> </div> </div> </div> <div class="pw-widget pw-size-medium pw-layout-horizontal" data-url="https://biztechmagazine.com/article/2018/02/lessons-tough-year-cybersecurity" data-title="You can tell that #cybersecurity has become more important in recent years, because CEOs now often get fired after major breaches, says @briankrebs ‏at #CDWSummit2018:" data-via="BizTechMagazine" data-button-background="none"> <div> <a class="pw-button-twitter"></a> <span class="pw-box-counter" pw:channel="twitter"></span> </div> <div> <a class="pw-button-facebook"></a> <span class="pw-box-counter" pw:channel="facebook"></span> </div> </div> <div class="pw-widget pw-size-medium pw-layout-horizontal" data-url="https://biztechmagazine.com/article/2018/02/lessons-tough-year-cybersecurity" data-title="You can tell that #cybersecurity has become more important in recent years, because CEOs now often get fired after major breaches, says @briankrebs ‏at #CDWSummit2018:" data-via="BizTechMagazine" data-button-background="none"> <div> <a class="pw-button-twitter cdw-taboola-social"></a> <a href="https://twitter.com/search?f=realtime&amp;q=https%3A%2F%2Fbiztechmagazine.com%2Frss.xml%3Fdestination%3D%2F%26_exception_statuscode%3D404" target="_blank"><span class="pw-box-counter cdw-taboola" data-channel="twitter"></span></a> </div> <div> <a class="pw-button-facebook cdw-taboola-social"></a> </div> <div> <a class="pw-button-googleplus cdw-taboola-social"></a> </div> <div> <a class="pw-button-linkedin cdw-taboola-social"></a> </div> <div> <a class="pw-button-reddit cdw-taboola-social"></a> </div> <div> <a class="pw-button-flipboard cdw-taboola-social"></a> </div> <div> <a class="pw-button-email cdw-taboola-social"></a> </div> </div> <div class="pw-widget pw-size-medium pw-layout-vertical" data-layout="vertical" data-url="https://biztechmagazine.com/article/2018/02/lessons-tough-year-cybersecurity" data-title="You can tell that #cybersecurity has become more important in recent years, because CEOs now often get fired after major breaches, says @briankrebs ‏at #CDWSummit2018:" data-via="BizTechMagazine" data-button-background="none"> <span> <span>Feb</span> <span>22</span> <span>2018</span> </span> <a class="pw-button-twitter cdw-taboola-social"></a> <a class="pw-button-facebook cdw-taboola-social"></a> <a class="pw-button-googleplus cdw-taboola-social"></a> <a class="pw-button-linkedin cdw-taboola-social"></a> <a class="pw-button-reddit cdw-taboola-social"></a> <a class="pw-button-flipboard cdw-taboola-social"></a> <a class="pw-button-email cdw-taboola-social"></a> </div> <div> <div class="field-author"> <div id="taxonomy-term-" class=""> <div class="author-photo"> <a href="/author/matt-mclaughlin"><img src="/sites/biztechmagazine.com/files/styles/face_small/public/matt-mcl-bio.jpg?itok=XfJ5VhTd" width="58" height="58" alt="" typeof="foaf:Image" /> </a> </div> <div class="author-info"> <span>by </span><a rel="author" href="/author/matt-mclaughlin"> <div>Matt McLaughlin</div> </a> <a target="_blank" class="google-plus" href="https://plus.google.com/u/0/107912838375761270668/?rel=author"><span>Google+</span></a> <a target="_blank" class="twitter" href="https://twitter.com/intent/follow?region=follow_link&amp;screen_name=MattMcLDC&amp;tw_p=followbutton&amp;variant=2.0"><span>Twitter</span></a> </div> <div class="author-bio"> <p> <div><p>Matt is a regular contributor to<em> </em>the CDW Tech Magazines.</p> </div> </p> </div> </div> </div> </div> <div> <div>Pull Quote</div> <div> <p class="quote"><a href="node/40466"></a></p> <p class='speaker'> </p> </div> </div> Thu, 22 Feb 2018 14:07:04 +0000 phil.goldstein_6191 40466 at https://biztechmagazine.com Take Action and Automate Your Threat Prevention https://biztechmagazine.com/media/video/take-action-and-automate-your-threat-prevention <span>Take Action and Automate Your Threat Prevention</span> <div><p>To keep up with the modern malware and threat landscape, organizations must turn to automation. In a world where bots can wreak havoc on endpoints and data centers, it might seem counterintuitive to reduce the human element in your threat prevention strategies, but <a href="https://www.cdw.com/content/brands/paloalto/default.aspx" target="_blank" title="Palo Alto Networks">Palo Alto Networks</a>' Elton Fontaine argues it's essential since those IT workers can refocus their attention on proactive security instead of reactive security.</p> </div> <span><span lang="" about="/user/3" typeof="schema:Person" property="schema:name" datatype="">ricky.ribeiro</span></span> <span>Thu, 02/22/2018 - 08:25</span> <div> <div>Tweet text</div> <div>Take Action and Automate Your Threat Prevention, says Elton Fontaine of @PaloAltoNtwks #CDWSummITs</div> </div> <div> <div>Video ID</div> <div><p>1293036032 </p> </div> </div> <div> <div>video type</div> <div><a href="/conference" hreflang="en">Conference</a></div> </div> <div> <div>CDW Activity ID</div> <div><p>MKT25296</p> </div> </div> <div> <div>CDW VV2 Strategy</div> <div>Security</div> </div> <div> <div>CDW Segment</div> <div>Med/Lar</div> </div> <div> <div>Customer Focused</div> <div>False</div> </div> <div> <div>Buying Cycle</div> <div><a href="/awareness" hreflang="en">Awareness</a></div> </div> <div class="pw-widget pw-size-medium pw-layout-vertical" data-layout="vertical" data-url="https://biztechmagazine.com/media/video/take-action-and-automate-your-threat-prevention" data-title="Take Action and Automate Your Threat Prevention, says Elton Fontaine of @PaloAltoNtwks #CDWSummITs" data-via="BizTechMagazine" data-button-background="none"> <span> <span>Feb</span> <span>22</span> <span>2018</span> </span> <a class="pw-button-twitter cdw-taboola-social"></a> <a class="pw-button-facebook cdw-taboola-social"></a> <a class="pw-button-googleplus cdw-taboola-social"></a> <a class="pw-button-linkedin cdw-taboola-social"></a> <a class="pw-button-reddit cdw-taboola-social"></a> <a class="pw-button-flipboard cdw-taboola-social"></a> <a class="pw-button-email cdw-taboola-social"></a> </div> <div class="pw-widget pw-size-medium pw-layout-horizontal" data-url="https://biztechmagazine.com/media/video/take-action-and-automate-your-threat-prevention" data-title="Take Action and Automate Your Threat Prevention, says Elton Fontaine of @PaloAltoNtwks #CDWSummITs" data-via="BizTechMagazine" data-button-background="none"> <div> <a class="pw-button-twitter"></a> <span class="pw-box-counter" pw:channel="twitter"></span> </div> <div> <a class="pw-button-facebook"></a> <span class="pw-box-counter" pw:channel="facebook"></span> </div> </div> <div class="pw-widget pw-size-medium pw-layout-horizontal" data-url="https://biztechmagazine.com/media/video/take-action-and-automate-your-threat-prevention" data-title="Take Action and Automate Your Threat Prevention, says Elton Fontaine of @PaloAltoNtwks #CDWSummITs" data-via="BizTechMagazine" data-button-background="none"> <div> <a class="pw-button-twitter cdw-taboola-social"></a> <a href="https://twitter.com/search?f=realtime&amp;q=https%3A%2F%2Fbiztechmagazine.com%2Frss.xml%3Fitem_id%3D592" target="_blank"><span class="pw-box-counter cdw-taboola" data-channel="twitter"></span></a> </div> <div> <a class="pw-button-facebook cdw-taboola-social"></a> </div> <div> <a class="pw-button-googleplus cdw-taboola-social"></a> </div> <div> <a class="pw-button-linkedin cdw-taboola-social"></a> </div> <div> <a class="pw-button-reddit cdw-taboola-social"></a> </div> <div> <a class="pw-button-flipboard cdw-taboola-social"></a> </div> <div> <a class="pw-button-email cdw-taboola-social"></a> </div> </div> <div> <div>Pull Quote</div> <div> <p class="quote"><a href="node/40461"> You have to be able to take action on threats you&#039;re seeing on the global level as well as threats you&#039;re seeing in your environment. </a></p> <img src="/sites/biztechmagazine.com/files/styles/photo_quote_thumb/public/2018-02/elton-fontaine-200.jpg?itok=bCBPeGFT" width="60" height="60" alt="Elton Fontaine" typeof="foaf:Image" /> <p class='speaker'> <span>Elton Fontaine</span> Director, Systems Engineering </p> </div> </div> Thu, 22 Feb 2018 13:25:18 +0000 ricky.ribeiro 40461 at https://biztechmagazine.com Email Is 45 Years Old and Also Your Biggest Corporate Vulnerability https://biztechmagazine.com/media/video/email-45-years-old-and-also-your-biggest-corporate-vulnerability <span>Email Is 45 Years Old and Also Your Biggest Corporate Vulnerability</span> <div><p>Good, ol' reliable email is certainly not the new kid on the block in the IT realm, but it remains the number one target for most corporate hacks and breach attempts. We spoke with Ryan Kalember from <a href="https://www.cdw.com/content/cdw/en/brand/proofpoint.html" target="_blank" title="Proofpoint">Proofpoint</a> to get his take on why email remains a popular attack point for organizations, what they can do to defend against them and gauge if the ransomware trend we saw on the rise in recent years has begun to wane.</p> </div> <span><span lang="" about="/user/3" typeof="schema:Person" property="schema:name" datatype="">ricky.ribeiro</span></span> <span>Thu, 02/22/2018 - 07:59</span> <div> <div>Tweet text</div> <div>#Email Is 45 Years Old and Also Your Biggest Corporate Vulnerability, says @rkalember of @proofpoint #CDWSummITs</div> </div> <div> <div>Video ID</div> <div><p>1693240408</p> </div> </div> <div> <div>video type</div> <div><a href="/conference" hreflang="en">Conference</a></div> </div> <div> <div>CDW Activity ID</div> <div><p>MKT25296</p> </div> </div> <div> <div>CDW VV2 Strategy</div> <div>Security</div> </div> <div> <div>CDW Segment</div> <div>Med/Lar</div> </div> <div> <div>Customer Focused</div> <div>False</div> </div> <div> <div>Buying Cycle</div> <div><a href="/awareness" hreflang="en">Awareness</a></div> </div> <div class="pw-widget pw-size-medium pw-layout-vertical" data-layout="vertical" data-url="https://biztechmagazine.com/media/video/email-45-years-old-and-also-your-biggest-corporate-vulnerability" data-title="#Email Is 45 Years Old and Also Your Biggest Corporate Vulnerability, says @rkalember of @proofpoint #CDWSummITs" data-via="BizTechMagazine" data-button-background="none"> <span> <span>Feb</span> <span>22</span> <span>2018</span> </span> <a class="pw-button-twitter cdw-taboola-social"></a> <a class="pw-button-facebook cdw-taboola-social"></a> <a class="pw-button-googleplus cdw-taboola-social"></a> <a class="pw-button-linkedin cdw-taboola-social"></a> <a class="pw-button-reddit cdw-taboola-social"></a> <a class="pw-button-flipboard cdw-taboola-social"></a> <a class="pw-button-email cdw-taboola-social"></a> </div> <div class="pw-widget pw-size-medium pw-layout-horizontal" data-url="https://biztechmagazine.com/media/video/email-45-years-old-and-also-your-biggest-corporate-vulnerability" data-title="#Email Is 45 Years Old and Also Your Biggest Corporate Vulnerability, says @rkalember of @proofpoint #CDWSummITs" data-via="BizTechMagazine" data-button-background="none"> <div> <a class="pw-button-twitter"></a> <span class="pw-box-counter" pw:channel="twitter"></span> </div> <div> <a class="pw-button-facebook"></a> <span class="pw-box-counter" pw:channel="facebook"></span> </div> </div> <div class="pw-widget pw-size-medium pw-layout-horizontal" data-url="https://biztechmagazine.com/media/video/email-45-years-old-and-also-your-biggest-corporate-vulnerability" data-title="#Email Is 45 Years Old and Also Your Biggest Corporate Vulnerability, says @rkalember of @proofpoint #CDWSummITs" data-via="BizTechMagazine" data-button-background="none"> <div> <a class="pw-button-twitter cdw-taboola-social"></a> <a href="https://twitter.com/search?f=realtime&amp;q=https%3A%2F%2Fbiztechmagazine.com%2Frss.xml%3Fdestination%3D%2F%26_exception_statuscode%3D404" target="_blank"><span class="pw-box-counter cdw-taboola" data-channel="twitter"></span></a> </div> <div> <a class="pw-button-facebook cdw-taboola-social"></a> </div> <div> <a class="pw-button-googleplus cdw-taboola-social"></a> </div> <div> <a class="pw-button-linkedin cdw-taboola-social"></a> </div> <div> <a class="pw-button-reddit cdw-taboola-social"></a> </div> <div> <a class="pw-button-flipboard cdw-taboola-social"></a> </div> <div> <a class="pw-button-email cdw-taboola-social"></a> </div> </div> <div> <div>Pull Quote</div> <div> <p class="quote"><a href="node/40451"> The way that inbound targeted attacks affect most organizations in the world is via email. </a></p> <img src="/sites/biztechmagazine.com/files/styles/photo_quote_thumb/public/2018-02/ryan-kalember-200.jpg?itok=gppEUwVS" width="60" height="60" alt="Ryan Kalember" typeof="foaf:Image" /> <p class='speaker'> <span>Ryan Kalember</span> SVP, Cybersecurity Strategy, Proofpoint </p> </div> </div> Thu, 22 Feb 2018 12:59:41 +0000 ricky.ribeiro 40451 at https://biztechmagazine.com Security Evolutions Require Sophisticated Approaches for Cloud, Threat Prevention and IoT https://biztechmagazine.com/media/video/security-evolutions-require-sophisticated-approaches-cloud-threat-prevention-and-iot <span>Security Evolutions Require Sophisticated Approaches for Cloud, Threat Prevention and IoT</span> <div><p>The way that security is deployed in today's IT ecosystem is vastly different from the way that organizations grappled with threats and bad actors just five years ago. The boom of cloud computing and the emergence of the Internet of Things is expanding the threat at a breathtaking pace. We spoke with Himanshu Raval from <a href="https://www.cdw.com/content/cdw/en/brand/cisco.html" target="_blank" title="Cisco Systems">Cisco Systems</a> to learn more about how his company is creating tools and solutions that equip IT teams with more advanced, effective security defenses.</p> </div> <span><span lang="" about="/user/3" typeof="schema:Person" property="schema:name" datatype="">ricky.ribeiro</span></span> <span>Thu, 02/22/2018 - 07:06</span> <div> <div>Tweet text</div> <div>Security Evolutions Require Sophisticated Approaches for #Cloud, Threat Prevention and #IoT #CDWSummITs</div> </div> <div> <div>Video ID</div> <div><p>1649625983</p> </div> </div> <div> <div>video type</div> <div><a href="/conference" hreflang="en">Conference</a></div> </div> <div> <div>CDW Activity ID</div> <div><p>MKT25296</p> </div> </div> <div> <div>CDW VV2 Strategy</div> <div>Security</div> </div> <div> <div>CDW Segment</div> <div>Med/Lar</div> </div> <div> <div>Customer Focused</div> <div>False</div> </div> <div> <div>Buying Cycle</div> <div><a href="/awareness" hreflang="en">Awareness</a></div> </div> <div class="pw-widget pw-size-medium pw-layout-vertical" data-layout="vertical" data-url="https://biztechmagazine.com/media/video/security-evolutions-require-sophisticated-approaches-cloud-threat-prevention-and-iot" data-title="Security Evolutions Require Sophisticated Approaches for #Cloud, Threat Prevention and #IoT #CDWSummITs" data-via="BizTechMagazine" data-button-background="none"> <span> <span>Feb</span> <span>22</span> <span>2018</span> </span> <a class="pw-button-twitter cdw-taboola-social"></a> <a class="pw-button-facebook cdw-taboola-social"></a> <a class="pw-button-googleplus cdw-taboola-social"></a> <a class="pw-button-linkedin cdw-taboola-social"></a> <a class="pw-button-reddit cdw-taboola-social"></a> <a class="pw-button-flipboard cdw-taboola-social"></a> <a class="pw-button-email cdw-taboola-social"></a> </div> <div class="pw-widget pw-size-medium pw-layout-horizontal" data-url="https://biztechmagazine.com/media/video/security-evolutions-require-sophisticated-approaches-cloud-threat-prevention-and-iot" data-title="Security Evolutions Require Sophisticated Approaches for #Cloud, Threat Prevention and #IoT #CDWSummITs" data-via="BizTechMagazine" data-button-background="none"> <div> <a class="pw-button-twitter"></a> <span class="pw-box-counter" pw:channel="twitter"></span> </div> <div> <a class="pw-button-facebook"></a> <span class="pw-box-counter" pw:channel="facebook"></span> </div> </div> <div class="pw-widget pw-size-medium pw-layout-horizontal" data-url="https://biztechmagazine.com/media/video/security-evolutions-require-sophisticated-approaches-cloud-threat-prevention-and-iot" data-title="Security Evolutions Require Sophisticated Approaches for #Cloud, Threat Prevention and #IoT #CDWSummITs" data-via="BizTechMagazine" data-button-background="none"> <div> <a class="pw-button-twitter cdw-taboola-social"></a> <a href="https://twitter.com/search?f=realtime&amp;q=https%3A%2F%2Fbiztechmagazine.com%2Frss.xml%3Fdestination%3D%2F%26_exception_statuscode%3D404" target="_blank"><span class="pw-box-counter cdw-taboola" data-channel="twitter"></span></a> </div> <div> <a class="pw-button-facebook cdw-taboola-social"></a> </div> <div> <a class="pw-button-googleplus cdw-taboola-social"></a> </div> <div> <a class="pw-button-linkedin cdw-taboola-social"></a> </div> <div> <a class="pw-button-reddit cdw-taboola-social"></a> </div> <div> <a class="pw-button-flipboard cdw-taboola-social"></a> </div> <div> <a class="pw-button-email cdw-taboola-social"></a> </div> </div> <div> <div>Pull Quote</div> <div> <p class="quote"><a href="node/40446"></a></p> <p class='speaker'> </p> </div> </div> Thu, 22 Feb 2018 12:06:23 +0000 ricky.ribeiro 40446 at https://biztechmagazine.com Cybercrime Costs Global Economy $600 Billion Per Year https://biztechmagazine.com/article/2018/02/cybercrime-costs-global-economy-600-billion-year <span>Cybercrime Costs Global Economy $600 Billion Per Year </span> <span><span lang="" about="/user/6191" typeof="schema:Person" property="schema:name" datatype="">phil.goldstein_6191</span></span> <span>Wed, 02/21/2018 - 11:08</span> <div><p>The old saying that “crime doesn't pay” doesn't seem to apply to cybercrime. It pays for cybercriminals and it costs businesses a great deal of money. </p> <p>Cybercrime costs businesses close to <strong>$600 billion</strong>, or 0.8 percent of global GDP, <a href="https://www.businesswire.com/news/home/20180221005206/en/New-Global-Cybersecurity-Report-Reveals-Cybercrime-Takes">according to a report</a> from <a href="https://www.cdw.com/content/brands/mcafee/default.aspx">McAfee</a> and the <a href="https://www.csis.org/">Center for Strategic and International Studies</a>, a Washington, D.C.-based think tank.  The $600 billion figure is<strong> up from costs of about $445 billion</strong> that the pair <a href="http://cts.businesswire.com/ct/CT?id=smartlink&amp;url=https%3A%2F%2Fwww.mcafee.com%2Fus%2Fabout%2Fnews%2F2014%2Fq2%2F20140609-01.aspx&amp;esheet=51760338&amp;newsitemid=20180221005206&amp;lan=en-US&amp;anchor=2014+study&amp;index=2&amp;md5=0077c3fe33048ad7c36a9d8a148e439a">calculated in 2014</a>. The new study, “<a href="http://cts.businesswire.com/ct/CT?id=smartlink&amp;url=https%3A%2F%2Fwww.mcafee.com%2Fus%2Fresources%2Freports%2Frestricted%2Feconomic-impact-cybercrime.pdf&amp;esheet=51760338&amp;newsitemid=20180221005206&amp;lan=en-US&amp;anchor=Economic+Impact+of+Cybercrime+%E2%80%93+No+Slowing+Down%2C&amp;index=1&amp;md5=dae7926af855b1107f7504de6419360a" rel="nofollow" target="_blank">Economic Impact of Cybercrime – No Slowing Down,</a>” attributes the growth over three years to several factors.</p> <p>First, cybercriminals have<strong> quickly adopted new technologies</strong>. It's also <strong>easier to engage in cybercrime</strong>, the report notes. And top-tier cybercriminals have become<strong> more financially sophisticated</strong>. </p> <p><strong>Ransomware</strong> is the fastest growing cybercrime tool, the report says, with more than <strong>6,000 </strong>online criminal marketplaces <a href="https://biztechmagazine.com/article/2017/07/3-main-ways-ransomware-spreads-2017">and Ransomware as a Service</a> gaining in popularity. Cybercrime as a service has become more sophisticated, with "flourishing markets offering a broad diversity of tools and services such as <strong>exploit kits, custom malware and botnet rentals</strong>," according to a statement from McAfee and CSIS. </p> <p><strong>Banks </strong>remain the favorite target of cybercriminals, the report says, and nation-states are the most dangerous source of cybercrime. Russia, North Korea and Iran are the most active in hacking financial institutions, while China is the most active in cyber espionage, according to the report. </p> <p> </p> </div> <div> <div>Content Subtype</div> <div>Article</div> </div> <div> <div>CDW Activity ID</div> <div><p>MKT24637 </p> </div> </div> <div> <div>CDW VV2 Strategy</div> <div>Security</div> </div> <div> <div>CDW Segment</div> <div>Med/Lar</div> </div> <div> <div>Original or Curated</div> <div>Curated</div> </div> <div> <div>Customer Focused</div> <div>False</div> </div> <div> <div>Buying Cycle</div> <div><a href="/awareness" hreflang="en">Awareness</a></div> </div> <div> <div>Content Length</div> <div>Under 300 words</div> </div> <div> <div>Related Articles</div> <div> <div> <article class="node node-article node-type-article node-promoted node--view-mode-teaser"> <div class="content"> <a href="/article/2017/10/how-get-more-sophisticated-about-fighting-ransomware"><img src="/sites/biztechmagazine.com/files/styles/frontpage_highlighted_category/public/articles/BizTech/201710/BizTech--Ransomware.jpg?itok=dPm9FWsR" width="124" height="94" alt="" typeof="foaf:Image" /> </a> </div> <div class="desc"> <h2 class="link-term"><a class="taxonomy-term vocabulary-primary-topic term-default" href="https://biztechmagazine.com/security">Security</a> </h2> <header class="link-node"> <a href="/article/2017/10/how-get-more-sophisticated-about-fighting-ransomware"><span>How to Get More Sophisticated About Fighting Ransomware </span> </a> </header> </div> </article> </div> <div> <article class="node node-article node-type-article node-promoted node--view-mode-teaser"> <div class="content"> <a href="/article/2017/07/3-main-ways-ransomware-spreads-2017"><img src="/sites/biztechmagazine.com/files/styles/frontpage_highlighted_category/public/articles/BizTech/201707/BizTech--ransomware4.jpg?itok=Oe684Lmg" width="124" height="94" alt="" typeof="foaf:Image" /> </a> </div> <div class="desc"> <h2 class="link-term"><a class="taxonomy-term vocabulary-primary-topic term-default" href="https://biztechmagazine.com/security">Security</a> </h2> <header class="link-node"> <a href="/article/2017/07/3-main-ways-ransomware-spreads-2017"><span>The 3 Main Ways Ransomware Spreads in 2017 </span> </a> </header> </div> </article> </div> <div> <article class="node node-article node-type-article node-promoted node--view-mode-teaser"> <div class="content"> <a href="/article/2017/11/inside-real-world-fight-against-ransomware"><img src="/sites/biztechmagazine.com/files/styles/frontpage_highlighted_category/public/articles/BizTech/201711/Q0417-BT-Feat-Wong-Hero.jpg?itok=ODKhKLw7" width="124" height="94" alt="" typeof="foaf:Image" /> </a> </div> <div class="desc"> <h2 class="link-term"><a class="taxonomy-term vocabulary-primary-topic term-default" href="https://biztechmagazine.com/security">Security</a> </h2> <header class="link-node"> <a href="/article/2017/11/inside-real-world-fight-against-ransomware"><span>Inside the Real-World Fight Against Ransomware </span> </a> </header> </div> </article> </div> </div> </div> <div class="pw-widget pw-size-medium pw-layout-horizontal" data-url="https://biztechmagazine.com/article/2018/02/cybercrime-costs-global-economy-600-billion-year" data-title="#Cybercrime pays--and hurts. It costs businesses about $600 billion per year, according to @McAfee and @CSIS. #cybersecurity" data-via="BizTechMagazine" data-button-background="none"> <div> <a class="pw-button-twitter"></a> <span class="pw-box-counter" pw:channel="twitter"></span> </div> <div> <a class="pw-button-facebook"></a> <span class="pw-box-counter" pw:channel="facebook"></span> </div> </div> <div class="pw-widget pw-size-medium pw-layout-horizontal" data-url="https://biztechmagazine.com/article/2018/02/cybercrime-costs-global-economy-600-billion-year" data-title="#Cybercrime pays--and hurts. It costs businesses about $600 billion per year, according to @McAfee and @CSIS. #cybersecurity" data-via="BizTechMagazine" data-button-background="none"> <div> <a class="pw-button-twitter cdw-taboola-social"></a> <a href="https://twitter.com/search?f=realtime&amp;q=https%3A%2F%2Fbiztechmagazine.com%2Frss.xml%3Fdestination%3D%2F%26_exception_statuscode%3D404" target="_blank"><span class="pw-box-counter cdw-taboola" data-channel="twitter"></span></a> </div> <div> <a class="pw-button-facebook cdw-taboola-social"></a> </div> <div> <a class="pw-button-googleplus cdw-taboola-social"></a> </div> <div> <a class="pw-button-linkedin cdw-taboola-social"></a> </div> <div> <a class="pw-button-reddit cdw-taboola-social"></a> </div> <div> <a class="pw-button-flipboard cdw-taboola-social"></a> </div> <div> <a class="pw-button-email cdw-taboola-social"></a> </div> </div> <div class="pw-widget pw-size-medium pw-layout-vertical" data-layout="vertical" data-url="https://biztechmagazine.com/article/2018/02/cybercrime-costs-global-economy-600-billion-year" data-title="#Cybercrime pays--and hurts. It costs businesses about $600 billion per year, according to @McAfee and @CSIS. #cybersecurity" data-via="BizTechMagazine" data-button-background="none"> <span> <span>Feb</span> <span>21</span> <span>2018</span> </span> <a class="pw-button-twitter cdw-taboola-social"></a> <a class="pw-button-facebook cdw-taboola-social"></a> <a class="pw-button-googleplus cdw-taboola-social"></a> <a class="pw-button-linkedin cdw-taboola-social"></a> <a class="pw-button-reddit cdw-taboola-social"></a> <a class="pw-button-flipboard cdw-taboola-social"></a> <a class="pw-button-email cdw-taboola-social"></a> </div> <div> <div class="field-author"> <div id="taxonomy-term-" class=""> <div class="author-photo"> <a href="/author/phil-goldstein"><img src="/sites/biztechmagazine.com/files/styles/face_small/public/people/CoMfravQ_400x400.jpg?itok=W9IAwS8L" width="58" height="58" alt="Phil Goldstein" typeof="foaf:Image" /> </a> </div> <div class="author-info"> <span>by </span><a rel="author" href="/author/phil-goldstein"> <div>Phil Goldstein</div> </a> <a target="_blank" class="twitter" href="https://twitter.com/intent/follow?region=follow_link&amp;screen_name=philgoldstein&amp;tw_p=followbutton&amp;variant=2.0"><span>Twitter</span></a> </div> <div class="author-bio"> <p> <div><p>Phil Goldstein is a web editor for <em>FedTech</em> and <em>BizTech</em>. Besides keeping up with the latest in technology trends, he is also an avid lover of the New York Yankees, poetry, photography, traveling and escaping humidity.</p> </div> </p> </div> </div> </div> </div> <div> <div>Pull Quote</div> <div> <p class="quote"><a href="node/40436"></a></p> <p class='speaker'> </p> </div> </div> Wed, 21 Feb 2018 16:08:08 +0000 phil.goldstein_6191 40436 at https://biztechmagazine.com 4 Tactics to Make Sure Your Disaster Recovery Plans Are Up to Date https://biztechmagazine.com/article/2018/02/4-tactics-make-sure-your-disaster-recovery-plans-are-date <span>4 Tactics to Make Sure Your Disaster Recovery Plans Are Up to Date</span> <img src="/sites/biztechmagazine.com/files/articles/%5Bcdw_tech_site%3Afield_site_shortname%5D/201802/Q0118-BT-TechTips-Bright-Hero.jpg" width="1440" height="560" alt="Life preserver in water " typeof="foaf:Image" /> <span><span lang="" about="/user/6191" typeof="schema:Person" property="schema:name" datatype="">phil.goldstein_6191</span></span> <span>Wed, 02/21/2018 - 08:11</span> <div><p>After experiencing a crisis such as a natural disaster, <a href="https://www.sba.gov/business-guide/manage/prepare-emergencies-disaster-assistance">1 in 4 small businesses never reopens its doors</a>. Another <strong>40 percent </strong>close shop within two years.</p> <p>Sobering stats such as these are commonly touted by the Federal Emergency Management Administration, Labor Department and Small Business Administration. <strong>How can your business avoid a tragic end?</strong></p> <p>In the wake of the <a href="https://statetechmagazine.com/article/2018/01/state-and-local-it-departments-take-steps-prepare-disasters">extensive hurricanes, wildfires </a><a href="https://statetechmagazine.com/article/2018/01/state-and-local-it-departments-take-steps-prepare-disasters">and</a><a href="https://statetechmagazine.com/article/2018/01/state-and-local-it-departments-take-steps-prepare-disasters"> floods</a> that have <a href="https://www.ncdc.noaa.gov/billions/">swept the country over the past year</a>, SMBs should revisit or develop a business continuity plan to ensure that they are adequately prepared, should disaster strike.</p> <p><a href="https://biztechmagazine.com/register?newsletter"><strong>SIGN UP: </strong>Get more news from the <em>BizTech</em> newsletter in your inbox every two weeks!</a></p> <h2>1. Update Business Impact Analyses and Risk Assessments</h2> <p>BIAs and RAs identify the consequences and potential losses that could result from a disruption. To be valuable, <strong>these assessments require periodic review, during which business assets can be reprioritized, if necessary, and protective measures and continuity strategies can be revised</strong>.</p> <p>Consider not only natural disaster scenarios, but also human hazards such as workplace accidents and robberies, as well as technological risks such as power failures and supply chain delays. Learn how to conduct or improve BIAs and RAs at <a href="https://www.ready.gov/"><em>ready.gov</em></a>.</p> <h2>2. Keep Business Continuity Plans Simple and Widely Available</h2> <p>Create separate plans to address each type of disruption, and<strong> keep them simple and straightforward so they can be carried out speedily by a shoestring team</strong>. Be sure to <strong>update them as important business changes occur</strong>.</p> <p>Keep digital copies of all plans in <strong>multiple electronic locations, including users’ smartphones</strong>, and make sure the IT team can globally update the information as needed.</p> <h2>3. Layer in Resiliency to Disaster Recovery</h2> <p><a href="https://biztechmagazine.com/article/2016/08/creating-right-disaster-recovery-plan">Disaster Recovery as a Service</a> will allow for quick recovery of applications and data should a crisis occur. In the event of a disruption on-premises, avoid downtime by shifting users to cloud-hosted services.</p> <p>Ultimately, a hurricane <strong>won’t discriminate between a cloud provider’s data center and a business’s on-premises or backup facility</strong>. To mitigate the risks of any given natural disaster, <strong>maintain multiple backups in disparate geographic locations</strong>. Also, account for possible connectivity disruptions by creating multiple paths to data.</p> <h2>4. Test Your Recovery Plan Regularly </h2> <p>A well-crafted recovery plan can help a business efficiently resume operations after a disruption occurs — <strong>but even the best-laid plan needs to be vetted to make sure it works</strong>.</p> <p>Test recovery plans <strong>at least twice a year t</strong>o ensure that<strong> </strong>employees know what to do,<strong> particularly if leadership is unreachable</strong>. Document manual processes to be used if a corresponding technological process is compromised.</p> </div> <div> <div>Content Subtype</div> <div>Article</div> </div> <div> <div>CDW Activity ID</div> <div><p>MKT14P51</p> </div> </div> <div> <div>CDW VV2 Strategy</div> <div>Data Center</div> </div> <div> <div>CDW Segment</div> <div>SMB</div> </div> <div> <div>Original or Curated</div> <div>Original</div> </div> <div> <div>Customer Focused</div> <div>False</div> </div> <div> <div>Buying Cycle</div> <div><a href="/awareness" hreflang="en">Awareness</a></div> </div> <div> <div>Content Length</div> <div>300-500 words</div> </div> <div> <div>Related Articles</div> <div> <div> <article class="node node-article node-type-article node-promoted node--view-mode-teaser"> <div class="content"> <a href="/article/2012/02/key-maintaining-uptime-offsite-disaster-recovery"><img src="/sites/biztechmagazine.com/files/styles/frontpage_highlighted_category/public/articles/2012/02/shawn_thobe_400.jpg?itok=EXw-8e9w" width="124" height="94" alt="The Key to Maintaining Uptime Is In Offsite Disaster Recovery" title="The Key to Maintaining Uptime Is In Offsite Disaster Recovery" typeof="foaf:Image" /> </a> </div> <div class="desc"> <h2 class="link-term"><a class="taxonomy-term vocabulary-primary-topic term-default" href="https://biztechmagazine.com/data-center">Data Center</a> </h2> <header class="link-node"> <a href="/article/2012/02/key-maintaining-uptime-offsite-disaster-recovery"><span>The Key to Maintaining Uptime Is In Offsite Disaster Recovery</span> </a> </header> </div> </article> </div> <div> <article class="node node-article node-type-article node-promoted node--view-mode-teaser"> <div class="content"> <a href="/article/2012/02/disaster-recovery-cloud-reduces-downtime"><img src="/sites/biztechmagazine.com/files/styles/frontpage_highlighted_category/public/articles/2012/02/recovery_disastercloud.jpg?itok=CNfMqtwu" width="124" height="94" alt="Disaster Recovery in the Cloud Reduces Downtime" title="Disaster Recovery in the Cloud Reduces Downtime" typeof="foaf:Image" /> </a> </div> <div class="desc"> <h2 class="link-term"><a class="taxonomy-term vocabulary-primary-topic term-default" href="https://biztechmagazine.com/data-center">Data Center</a> </h2> <header class="link-node"> <a href="/article/2012/02/disaster-recovery-cloud-reduces-downtime"><span>Disaster Recovery in the Cloud Reduces Downtime</span> </a> </header> </div> </article> </div> <div> <article class="node node-article node-type-article node-promoted node--view-mode-teaser"> <div class="content"> <a href="/article/2012/01/disaster-recovery-ready-and-running-no-matter-what"><img src="/sites/biztechmagazine.com/files/styles/frontpage_highlighted_category/public/articles/2012/01/disaster_ready_400.jpg?itok=jbzmzHc0" width="124" height="94" alt="Disaster Recovery Ready: Up and Running, No Matter What" title="Disaster Recovery Ready: Up and Running, No Matter What" typeof="foaf:Image" /> </a> </div> <div class="desc"> <h2 class="link-term"><a class="taxonomy-term vocabulary-primary-topic term-default" href="https://biztechmagazine.com/data-center">Data Center</a> </h2> <header class="link-node"> <a href="/article/2012/01/disaster-recovery-ready-and-running-no-matter-what"><span>Disaster Recovery Ready: Up and Running, No Matter What</span> </a> </header> </div> </article> </div> </div> </div> <div class="pw-widget pw-size-medium pw-layout-horizontal" data-url="https://biztechmagazine.com/article/2018/02/4-tactics-make-sure-your-disaster-recovery-plans-are-date" data-title="#DisasterRecovery tip: Keep digital copies of your #DR plans in multiple electronic locations, including users’ smartphones. #smallbiz" data-via="BizTechMagazine" data-button-background="none"> <div> <a class="pw-button-twitter"></a> <span class="pw-box-counter" pw:channel="twitter"></span> </div> <div> <a class="pw-button-facebook"></a> <span class="pw-box-counter" pw:channel="facebook"></span> </div> </div> <div class="pw-widget pw-size-medium pw-layout-horizontal" data-url="https://biztechmagazine.com/article/2018/02/4-tactics-make-sure-your-disaster-recovery-plans-are-date" data-title="#DisasterRecovery tip: Keep digital copies of your #DR plans in multiple electronic locations, including users’ smartphones. #smallbiz" data-via="BizTechMagazine" data-button-background="none"> <div> <a class="pw-button-twitter cdw-taboola-social"></a> <a href="https://twitter.com/search?f=realtime&amp;q=https%3A%2F%2Fbiztechmagazine.com%2Frss.xml%3Fdestination%3D%2F%26_exception_statuscode%3D404" target="_blank"><span class="pw-box-counter cdw-taboola" data-channel="twitter"></span></a> </div> <div> <a class="pw-button-facebook cdw-taboola-social"></a> </div> <div> <a class="pw-button-googleplus cdw-taboola-social"></a> </div> <div> <a class="pw-button-linkedin cdw-taboola-social"></a> </div> <div> <a class="pw-button-reddit cdw-taboola-social"></a> </div> <div> <a class="pw-button-flipboard cdw-taboola-social"></a> </div> <div> <a class="pw-button-email cdw-taboola-social"></a> </div> </div> <div class="pw-widget pw-size-medium pw-layout-vertical" data-layout="vertical" data-url="https://biztechmagazine.com/article/2018/02/4-tactics-make-sure-your-disaster-recovery-plans-are-date" data-title="#DisasterRecovery tip: Keep digital copies of your #DR plans in multiple electronic locations, including users’ smartphones. #smallbiz" data-via="BizTechMagazine" data-button-background="none"> <span> <span>Feb</span> <span>21</span> <span>2018</span> </span> <a class="pw-button-twitter cdw-taboola-social"></a> <a class="pw-button-facebook cdw-taboola-social"></a> <a class="pw-button-googleplus cdw-taboola-social"></a> <a class="pw-button-linkedin cdw-taboola-social"></a> <a class="pw-button-reddit cdw-taboola-social"></a> <a class="pw-button-flipboard cdw-taboola-social"></a> <a class="pw-button-email cdw-taboola-social"></a> </div> <div> <div class="field-author"> <div id="taxonomy-term-" class=""> <div class="author-photo"> <a href="/author/neil-bright"><img src="/sites/biztechmagazine.com/files/styles/face_small/public/author/neil_bright_.png.jpg?itok=-e7PPplz" width="58" height="58" typeof="foaf:Image" /> </a> </div> <div class="author-info"> <span>by </span><a rel="author" href="/author/neil-bright"> <div>Neil Bright</div> </a> </div> <div class="author-bio"> <p> <div><p>Neil Bright is a research scientist and chief HPC architect at the Georgia Institute of Technology’s Office of IT.</p> </div> </p> </div> </div> </div> </div> <div> <div>Pull Quote</div> <div> <p class="quote"><a href="node/40431"></a></p> <p class='speaker'> </p> </div> </div> Wed, 21 Feb 2018 13:11:07 +0000 phil.goldstein_6191 40431 at https://biztechmagazine.com National Battery Day: Where is Battery Technology Headed? https://biztechmagazine.com/article/2018/02/national-battery-day-where-battery-technology-headed <span>National Battery Day: Where is Battery Technology Headed?</span> <img src="/sites/biztechmagazine.com/files/articles/%5Bcdw_tech_site%3Afield_site_shortname%5D/201802/BizTech-BatteryDay.jpg" width="1440" height="560" alt="A smartphone charging " typeof="foaf:Image" /> <span><span lang="" about="/user/6191" typeof="schema:Person" property="schema:name" datatype="">phil.goldstein_6191</span></span> <span>Sun, 02/18/2018 - 09:09</span> <div><p>They are the often unseen workhorses that power modern computing, and the devices workers use to get their jobs done: <strong>batteries</strong>.</p> <p>Feb. 18 is <a href="https://www.call2recycle.org/nationalbatteryday/">National Battery Day</a>, the unofficial holiday <a href="http://www.holidayscalendar.com/event/battery-day/">designed to show appreciation for the convenience of batteries</a>, <strong>without which modern notebooks, smartphones, tablets and other critical office equipment would not be able to function</strong>.</p> <p>Batteries <a href="https://en.wikipedia.org/wiki/History_of_the_battery">have a long history</a>, <strong>dating back to 1800 with Alessandro Volta's invention of the first battery</strong>, which came to be known as the voltaic pile. In 1836, British chemist John Frederic Daniell created the first practical battery with the <strong>Daniell cell</strong>. Then, in 1859, <strong>Gaston Planté invented the lead-acid battery</strong>, the first battery that could be recharged via passing a reverse current through it. The modern lithium-ion batteries that power laptops and smartphones were invented in the 1980s, and <strong>Sony commercialized the lithium-ion battery in 1991</strong>.</p> <p>Since then, battery technology has largely been stuck. Technology companies have <strong>invented ways to recharge batteries faster, but lithium-ion batteries remain the main industry standard for powering electronic devices</strong>. Researchers and tech companies are trying to push the envelope with advances in battery technology that will <strong>make them more efficient</strong>.</p> <p>Here is a roundup of some of the latest developments:</p> <p><a href="https://biztechmagazine.com/register?newsletter"><strong>SIGN UP: </strong>Get more news from the <em>BizTech</em> newsletter in your inbox every two weeks!</a></p> <h2>Lithium-Metal Batteries Show Promise</h2> <p><a href="http://www.solidenergysystems.com/">SolidEnergy Systems</a> has developed a lithium-metal battery, which, <a href="https://www.technologyreview.com/s/602245/why-we-still-dont-have-better-batteries/">as MIT Technology Review reports</a>, "has a metallic anode, rather than the graphite material used for the anode in traditional lithium-ion batteries."</p> <p>The company's batteries <strong>could offer much better energy density over today's devices</strong>, the publication notes. However, it is unclear if or when they might be commercialized.</p> <p>"In terms of moving from an idea to a product," Qichao Hu, the founder of SolidEnergy Systems, tells MIT Technology Review, "it's hard for batteries, <strong>because when you improve one aspect, you compromise other aspects</strong>."</p> <h2>New Approach Combines the Best of Both Worlds in Batteries</h2> <p>Another company, <a href="http://ionicmaterials.com/">Ionic Materials</a>, which is funded in part by tech luminary <a href="https://en.wikipedia.org/wiki/Bill_Joy">Bill Joy</a>, thinks it has solved the battery dilemma by creating a new kind of battery.</p> <p><a href="https://www.wired.com/story/bill-joy-finds-the-jesus-battery/https:/www.wired.com/story/bill-joy-finds-the-jesus-battery/">Joy tells <em>Wired </em></a>that the company's technology<strong> combines</strong> "the advantages of the familiar <strong>alkaline batteries</strong> we buy at the drugstore (cheap, safe and reliable) with those of the more expensive, fire-prone <strong>lithium batteries in our computers and phones</strong> (powerful, rechargeable and more earth-friendly)."</p> <p>Ionic's batteries replace the liquids common in lithium-ion batteries with a polymer, according to Joy. "It also turns out that this polymer just happens to be essentially a fire-retardant material," he says. "So, when you build batteries with this polymer, you don't have a safety problem." Using the polymer also <strong>essentially makes the battery into an alkaline battery that can be recharged like a lithium-ion battery</strong>.</p> <p>Companies could use this technology to improve their lithium-ion batteries, Joy says, but in the long run, Joy tells <em>Wired</em>, "advanced alkaline — the chemistry used in the ones you buy in the drugstore [that have been] made rechargeable — has a chance of upending the reign of lithium-ion batteries, because the materials are cheaper," he says to <em>Wired</em>.</p> <p>"You can potentially make alkaline batteries with aluminum. We've made some. We don't have as many cycles as we need yet, but, you know, we're working on it," he adds. "We think that ultimately things like aluminum-alkaline batteries will meet the performance of lithium, but with abundant materials and way cheaper. And it's also recyclable."</p> <p>Joy, who spoke to <em>Wired</em> in August, believes that new battery technology <strong>could enable a smart grid by providing low-cost solutions that can power renewable energy sources such as wind and hydroelectric</strong>. But he warned that it might be two or three years before the technology is generally available.</p> <h2>Samsung Promotes Graphene Ball Tech</h2> <p>In November, <a href="https://www.cdw.com/content/cdw/en/brand/samsung-interstitial.html">Samsung Electronics</a>' research arm <a href="https://news.samsung.com/global/samsung-develops-battery-material-with-5x-faster-charging-speed">announced</a> that it has developed <strong>a "graphene ball"</strong> that can be used to make lithium-ion batteries last longer and charge faster.</p> <p>Samsung Advanced Institute of Technology said that by using graphene ball material to <strong>make batteries it will increase existing batteries' capacity by 45 percent and increase their charging speed by five times</strong>. Lithium-ion batteries take an hour to fully charge, but this will be reduced to <strong>12 minutes</strong> with the new tech, Samsung notes. SAIT has filed two applications for the graphene ball technology patent in the United States and South Korea.</p> </div> <div> <div>Content Subtype</div> <div>Article</div> </div> <div> <div>CDW Activity ID</div> <div><p>MKT24637</p> </div> </div> <div> <div>CDW VV2 Strategy</div> <div>Core</div> </div> <div> <div>CDW Segment</div> <div>Med/Lar</div> </div> <div> <div>Original or Curated</div> <div>Curated</div> </div> <div> <div>Customer Focused</div> <div>False</div> </div> <div> <div>Buying Cycle</div> <div><a href="/awareness" hreflang="en">Awareness</a></div> </div> <div> <div>Content Length</div> <div>500-1000 words</div> </div> <div> <div>Related Articles</div> <div> <div> <article class="node node-article node-type-article node-promoted node--view-mode-teaser"> <div class="content"> <a href="/article/2016/01/how-battery-technology-charging-ahead"><img src="/sites/biztechmagazine.com/files/styles/frontpage_highlighted_category/public/articles/batterypower_0.jpg?itok=mSTeQepc" width="124" height="94" alt="" typeof="foaf:Image" /> </a> </div> <div class="desc"> <h2 class="link-term"><a class="taxonomy-term vocabulary-primary-topic term-default" href="https://biztechmagazine.com/hardware">Hardware</a> </h2> <header class="link-node"> <a href="/article/2016/01/how-battery-technology-charging-ahead"><span>How Battery Technology is Charging Ahead</span> </a> </header> </div> </article> </div> <div> <article class="node node-article node-type-article node-promoted node--view-mode-teaser"> <div class="content"> <a href="/article/2017/11/get-ready-future-virtualized-devices"><img src="/sites/biztechmagazine.com/files/styles/frontpage_highlighted_category/public/articles/BizTech/201711/Q0417-BT-ITFuturist-Keller-Hero.jpg?itok=GrDzEOIk" width="124" height="94" alt="" typeof="foaf:Image" /> </a> </div> <div class="desc"> <h2 class="link-term"><a class="taxonomy-term vocabulary-primary-topic term-default" href="https://biztechmagazine.com/digital-workspace">Digital Workspace</a> </h2> <header class="link-node"> <a href="/article/2017/11/get-ready-future-virtualized-devices"><span>Get Ready for a Future of Virtualized Devices </span> </a> </header> </div> </article> </div> <div> <article class="node node-article node-type-article node-promoted node--view-mode-teaser"> <div class="content"> <a href="/article/2016/11/wouldnt-it-be-nice-harvest-power-wi-fi"><img src="/sites/biztechmagazine.com/files/styles/frontpage_highlighted_category/public/articles/Q0416-BT-ITFuturist_VanWinkle_hero.jpg?itok=arHSKzx0" width="124" height="94" alt="" typeof="foaf:Image" /> </a> </div> <div class="desc"> <h2 class="link-term"><a class="taxonomy-term vocabulary-primary-topic term-default" href="https://biztechmagazine.com/networking">Networking</a> </h2> <header class="link-node"> <a href="/article/2016/11/wouldnt-it-be-nice-harvest-power-wi-fi"><span>Wouldn’t It Be Nice to Harvest Power from Wi-Fi?</span> </a> </header> </div> </article> </div> </div> </div> <div class="pw-widget pw-size-medium pw-layout-horizontal" data-url="https://biztechmagazine.com/article/2018/02/national-battery-day-where-battery-technology-headed" data-title="It's #NationalBatteryDay! To celebrate, we look at where battery #tech is going next." data-via="BizTechMagazine" data-button-background="none"> <div> <a class="pw-button-twitter"></a> <span class="pw-box-counter" pw:channel="twitter"></span> </div> <div> <a class="pw-button-facebook"></a> <span class="pw-box-counter" pw:channel="facebook"></span> </div> </div> <div class="pw-widget pw-size-medium pw-layout-horizontal" data-url="https://biztechmagazine.com/article/2018/02/national-battery-day-where-battery-technology-headed" data-title="It's #NationalBatteryDay! To celebrate, we look at where battery #tech is going next." data-via="BizTechMagazine" data-button-background="none"> <div> <a class="pw-button-twitter cdw-taboola-social"></a> <a href="https://twitter.com/search?f=realtime&amp;q=https%3A%2F%2Fbiztechmagazine.com%2Frss.xml%3Fdestination%3D%2F%26_exception_statuscode%3D404" target="_blank"><span class="pw-box-counter cdw-taboola" data-channel="twitter"></span></a> </div> <div> <a class="pw-button-facebook cdw-taboola-social"></a> </div> <div> <a class="pw-button-googleplus cdw-taboola-social"></a> </div> <div> <a class="pw-button-linkedin cdw-taboola-social"></a> </div> <div> <a class="pw-button-reddit cdw-taboola-social"></a> </div> <div> <a class="pw-button-flipboard cdw-taboola-social"></a> </div> <div> <a class="pw-button-email cdw-taboola-social"></a> </div> </div> <div class="pw-widget pw-size-medium pw-layout-vertical" data-layout="vertical" data-url="https://biztechmagazine.com/article/2018/02/national-battery-day-where-battery-technology-headed" data-title="It's #NationalBatteryDay! To celebrate, we look at where battery #tech is going next." data-via="BizTechMagazine" data-button-background="none"> <span> <span>Feb</span> <span>18</span> <span>2018</span> </span> <a class="pw-button-twitter cdw-taboola-social"></a> <a class="pw-button-facebook cdw-taboola-social"></a> <a class="pw-button-googleplus cdw-taboola-social"></a> <a class="pw-button-linkedin cdw-taboola-social"></a> <a class="pw-button-reddit cdw-taboola-social"></a> <a class="pw-button-flipboard cdw-taboola-social"></a> <a class="pw-button-email cdw-taboola-social"></a> </div> <div> <div class="field-author"> <div id="taxonomy-term-" class=""> <div class="author-photo"> <a href="/author/phil-goldstein"><img src="/sites/biztechmagazine.com/files/styles/face_small/public/people/CoMfravQ_400x400.jpg?itok=W9IAwS8L" width="58" height="58" alt="Phil Goldstein" typeof="foaf:Image" /> </a> </div> <div class="author-info"> <span>by </span><a rel="author" href="/author/phil-goldstein"> <div>Phil Goldstein</div> </a> <a target="_blank" class="twitter" href="https://twitter.com/intent/follow?region=follow_link&amp;screen_name=philgoldstein&amp;tw_p=followbutton&amp;variant=2.0"><span>Twitter</span></a> </div> <div class="author-bio"> <p> <div><p>Phil Goldstein is a web editor for <em>FedTech</em> and <em>BizTech</em>. Besides keeping up with the latest in technology trends, he is also an avid lover of the New York Yankees, poetry, photography, traveling and escaping humidity.</p> </div> </p> </div> </div> </div> </div> <div> <div>Pull Quote</div> <div> <p class="quote"><a href="node/40426"></a></p> <p class='speaker'> </p> </div> </div> Sun, 18 Feb 2018 14:09:34 +0000 phil.goldstein_6191 40426 at https://biztechmagazine.com