Date: Wednesday, January 6, 2021
Time: 2:00 - 3:00 PM EDT

Non-profits are being targeted by sophisticated digital attacks at an unprecedented rate. In this webinar, we’ll take a close look at exactly how these attacks work from end to end: how the attackers get into your systems in the first place, what they do once they’re in, and the mess they leave in their wake.

The webinar will provide an overview on what you need to do to clean up after an attack, and what you can do to prevent attackers from getting into your systems in the first place.

We’ll also dispel some common myths about IT security, and tell you exactly what you need to know to defend your organization against today’s threats.

This is a previously recorded webinar. You can still submit your questions during the session and we'll respond after. 

Register Now

Hosted by Jordan Mccarthy
Jordan firmly believes that social progress should shape the implementation of technology, not the other way around. Jordan loves working with organizations of every shape and size – from 3-person grassroots advocacy groups to 300+ person social-services providers – to help them figure out what kinds of technical tools, analyses, and strategies can help them maximize their social impact. Jordan has a decade of experience in systems and network administration, technical writing and education, and technology policy analysis.


We were at a point in our organization's growth when the data tracking systems we had in place were not keeping pace with the amount of data that we needed to gather, track, and analyze on a regular basis to be successful. Tech Impact helped us create a flexible system that meets every one of our complex needs in tracking student attendance, session progress, training evaluations, outcome assessments and many other types of data, all in one centralized location. We are now completely on top of how our projects are going in real time as we serve tens of thousands of youth across multiple countries...
Kate Sachs Leventhal // CorStone