News & Resources
Why Associations Are the New Favorite Target for Cybercriminals
Associations hold valuable data but often lack dedicated security teams. Learn why cybercriminals are increasingly targeting associations and what leadership can do about it.
Part 2: Business Email Compromise and Vendor Fraud: The Hidden Risk to Associations
Business Email Compromise and vendor fraud are among the fastest-growing threats facing associations today. When attackers compromise email accounts, they can quietly redirect payments, alter invoices, and exploit trusted relationships. Learn how enhanced identity logging, deception canaries, and post-compromise assessment strengthen defense in depth and protect your organization.
Part 1: Bank Impersonation and Phishing Scams: Why Prevention Is No Longer Enough
Financial institutions continue to warn businesses and individuals about rising bank impersonation and phishing scams. These attacks are not slowing down. They are becoming more convincing. Associations are particularly attractive targets. They manage member data,...
🎄 A Very Secure Christmas 🎄
Santa got the cookies. The canaries protected the data. A fun holiday poem from Vortacity Cyber about why early detection and proactive security matter — even on Christmas Eve.
Penetration Testing Explained: Internal vs External, Cloud Testing, and What Associations Really Need
Not every association needs a penetration test. Learn the difference between internal and external testing, why pen tests are costly and time consuming, how cloud environments change the equation, and what security controls may deliver more value than testing alone.
Understanding Post Compromise Security Assessments for Associations
Account takeovers continue to be one of the most common and disruptive incidents affecting associations. A single compromised identity can create ripple effects across email, files, shared drives, committee workspaces, board communications, and member-facing systems. Even after passwords are reset, many organizations are left wondering what the attacker accessed, what configuration weaknesses made it possible, and what should change to prevent similar issues.
This is where a Post Compromise Security Assessment becomes an important step in the recovery process. It gives associations a clear understanding of what happened and what to do next.






