09
Jul

LSC TIP Grant Expanded for Cybersecurity Assessment: Apply by Aug 6th

Posted by on · · · | Blog · Featured · News · Press

LSC recently announced expanded eligibility for Technology Improvement Project grants (TIP) that allow any current grantee in good standing to apply. The maximum amount of $25,000 has been increased to $35,000 for applications that include a security assessment, an important addition given the significant increase in cyber-attacks the community is experiencing. Details on eligibility requirements and how […]

Read More
14
Jun

Join Just-Tech for MIE’s Cyber Risk Management Virtual Training Series

Posted by on · · · | Blog · Events · Featured · News

Due to the pandemic and shift to remote working environments, there has been a significant growth in cybersecurity risks and potential threats. Technology and best practices have been developed in order to reduce the risk of successful breaches as well as their impact on your organization. After a series of security incidents at non-profit organizations, we feel that it […]

Read More
11
Mar

Top Security Recommendations for Your Non-Profit

Posted by on · · · · · · | Blog · Featured · News

Following recent security incidents at a number of non-profit organizations, we feel it is critical to raise awareness and provide recommendations about what can be done to help reduce the risk. We see that malicious emails are often used to trick users and steal passwords or program funds. Legal Services Corporation (LSC) recently posted a […]

Read More
20
Aug

Non-Profit Legal in Hackers’ Crosshairs: Top signs you’re a spear-phishing target and how to defend yourself

Posted by on · · · · · · · | Blog

People are often the weakest link when it comes to being a target for cyber criminals, so it’s important to know the signs in order to avoid becoming a victim of email-based scams.  Background  Globally, the rate of email spam and phishing remained high in the second quarter of 2020. Roughly 50 percent of all email traffic was spam related. To make […]

Read More
02
Apr

Sample Emergency Work from Home Policy

Posted by on · · · · · · | Blog · News

This sample Emergency Work From Home (eWFH) policy is presented to Just-Tech clients and other legal services organizations to modify and use as necessary during this time.  Please note that this document contains language and provisions that may or may not apply to your organization, and should be adapted as necessary to fit your organization’s […]

Read More
20
Jun

Widely used D-Link Modem/Router Under Attack

Posted by on · · · · | News

Ars Technica is running a story on how the Sartori botnet has been actively targeting widely used D-Link DSL Internet modems in a effort to expand its infected base and likely launch new, and more sophisticated attacks against networks and devices. What makes the focus on D-Link notable is its position as one of the […]

Read More
11
May

Security for a Civil Society

Posted by on · · · · · · · | Blog

The Ford Foundation recently partnered with The Engine Room to conduct research on the current state of digital security within the civil society community. The report is broken into three sections: The Contextual Nature of Security – which discusses “basic understandings of digital security, consider[s] political contexts, and take[s] a brief look at current and […]

Read More
06
Apr

NYC Announces City’s First-Ever Cybersecurity Initiative

Posted by on · · · | News

Via NYC.gov: Mayor Bill de Blasio has a announced “NYC Secure“, New York City’s first ever cyber-security initiative. NYC Secure will defend New Yorkers from malicious cyber activity on mobile devices, across public Wi-Fi networks, and beyond. The first NYC Secure programs will include a free City-sponsored smartphone protection app that, when installed, will issue […]

Read More
27
Mar

Facebook, Privacy, and What You Need to Know

Posted by on · · · · | Blog

Last week, New Zealand student and technologist Dylan McKay downloaded his entire Facebook archive to see just how much data the company had harvested from. To his surprise, he discovered that not only had Facebook collected the identities of his friends and family from his address book, but that, for a short period between 2016 […]

Read More
06
Feb

In Just 24 hours, 5,000 Android Devices are Conscripted into Mining Botnet

Posted by on · · · · | Blog · News

Via Ars Technica: A new internet worm emerged over the weekend that took less than 24-hours to infect Android devices such a smartphones and TV boxes. Once infected, the devices began mining the Monero brand of crypto-currency, and seeking additional devices to infect: Once infected, Android phones and TV boxes scan networks for other devices […]

Read More