The Hidden Dangers of Social Media: What You Don't See Can Hurt You
Nina Gille Nielsen • June 12, 2025
Why Mindful Use Matters More Than Ever in a Hyperconnected World
Social media has become a seamless part of our daily lives. We scroll through photos, share updates,
laugh at memes, and connect with people from around the world — all from the palm of our hand. It’s
entertaining, convenient, and sometimes even empowering. But behind the filters, likes, and carefully
curated posts lies a darker side that often goes unnoticed.
Let’s explore some of the hidden dangers of social media and why it’s worth taking a closer look at how
it affects our lives.
1. Mental Health Strain
At first glance, social media seems like a great way to stay connected. But research shows a strong link
between excessive social media use and increased levels of anxiety, depression, and loneliness.
Comparing our real lives to others’ highlight reels can leave us feeling inadequate. The constant pursuit of
likes and validation can turn into an unhealthy obsession.
What to watch for:
- Feeling down after scrolling through others’ posts
- Obsessing over engagement metrics (likes, comments, shares)
- Using social media as a distraction from real-life problems
2. Addictive Design
Social platforms are engineered to keep you hooked. From endless scrolling to notification triggers, every
feature is designed with one goal: to keep your attention. It’s easy to lose track of time or develop
compulsive behaviors without even realizing it.
Red flags:
- Reaching for your phone first thing in the morning
- Difficulty going a few hours without checking your feed
- Mindlessly scrolling even when you're not interested
3. Privacy and Data Exploitation
Many users don’t realize just how much personal information they’re giving away — or how it’s being
used. Social media companies collect vast amounts of data, often selling it to advertisers or using it to
shape the content you see. What feels like harmless sharing can expose you to identity theft, scams, or
unwanted surveillance.
Common pitfalls:
- Oversharing location, daily routines, or personal milestones
- Ignoring privacy settings or terms of service
- Using social logins (e.g., “Login with Facebook”) across multiple sites
4. Echo Chambers and Misinformation
Social platforms tend to show you content that reinforces your existing beliefs. This creates echo
chambers where alternative perspectives are filtered out, and misinformation spreads rapidly. It’s a major driver of polarization and distorted worldviews.
How to stay grounded:
- Follow a diverse range of voices and viewpoints
- Fact-check content before sharing
- Be skeptical of sensational headlines and viral posts
5. Cyberbullying and Online Harassment
Unlike face-to-face interactions, the internet provides anonymity — which unfortunately empowers some
people to behave cruelly. Cyberbullying can have real emotional consequences, especially for teens and
vulnerable users.
Signs to take seriously:
- Receiving hateful or threatening messages
- Being targeted with embarrassing or harmful content
- Feeling unsafe or overwhelmed by online interactions
How to Protect Yourself
While it’s unrealistic (and often unnecessary) to quit social media entirely, mindful use is key. Here are a
few ways to protect your mental health and digital well-being:
- Set boundaries: Limit screen time, turn off non-essential notifications, and schedule regular offline breaks.
- Curate your feed: Unfollow accounts that make you feel anxious, and follow those that inspire and uplift.
- Think before you post: Ask yourself what you're sharing, and why.
- Review your privacy settings regularly.
- Talk about it: If social media is affecting your mental health, open up to someone you trust or seek professional support.
Social media is neither all good nor all bad, it’s a tool. Like any tool, how we use it matters. By being
aware of its hidden dangers and making conscious choices, we can enjoy its benefits without becoming its
victims. Stay informed. Stay mindful. Stay in control.

If you're a small business owner, especially one from an underrepresented community, certifications can unlock powerful opportunities. From qualifying for government contracts to gaining access to supplier diversity programs, certifications prove that your business meets specific criteria that agencies and corporations are actively seeking. But with so many acronyms floating around (WBE, MBE, SBE, DBE, WOSB, and 8(a)) it's easy to get confused. Let’s break it down. Key Certifications and What They Mean: WBE – Women Business Enterprise: For businesses 51% owned, controlled, and operated by one or more women. Often used by corporations and state/local governments to meet supplier diversity goals. MBE – Minority Business Enterprise: For businesses 51% owned and controlled by individuals from recognized minority groups (such as Black, Latino, Native American, Asian American, etc.) Commonly sought for supplier diversity programs and state contracts. SBE – Small Business Enterprise: A general designation for businesses that meet size standards set by a certifying agency, often based on revenue or employee count. Helpful in local/state procurement and grant programs. DBE – Disadvantaged Business Enterprise: Used mainly in transportation-related contracts funded by the U.S. Department of Transportation. Must be 51% owned by socially and economically disadvantaged individuals, and meet small business size standards. WOSB – Woman-Owned Small Business (SBA Certified): A federal certification specifically for women-owned small businesses. Gives access to federal set-aside contracts through the SBA. 8(a) – SBA 8(a) Business Development Program: For socially and economically disadvantaged businesses that want to grow through federal contracting. Offers mentorship, sole-source contracts, and long-term support. What You Should Know Ownership Matters: Most certifications require your business to be at least 51% owned, operated, and controlled by the qualifying individual(s). For-Profit Only: Most are only available to for-profit entities (nonprofits typically don’t qualify). Each Has Its Own Process: Certification isn’t automatic—you must apply through the appropriate federal, state, or third-party certifier. Why It’s Worth It Certified businesses gain access to: Exclusive bidding opportunities Corporate supplier diversity programs Mentorship, capital access, and training Stronger visibility and credibility Whether you’re a woman, minority, or small business owner looking to grow, getting certified could be your next big move. These designations aren’t just labels, they’re tools to open doors and level the playing field. Need help determining which certification is right for you? Find Your Vision is here to support you every step of the way.

The Los Angeles County Regional Park and Open Space District (RPOSD) has awarded over $1.7 billion in grants to transform parks, trails, and public spaces across LA County, and now they’re looking for qualified vendors to join them in building the next chapter of green, inclusive community spaces. If you’re a consultant, designer, project manager, or service provider in this space, this is your chance to get involved. Become a Pre-Qualified Vendor RPOSD is currently accepting submissions for its pre-qualified vendor roster. Only vendors on this list will be eligible for upcoming contract opportunities, so it’s important to act now. Learn how to apply by reviewing the Request for Statement of Qualifications (RFSQ): Click here for the RFSQ Attend the Virtual Vendors Conference Want to learn more before you apply? RPOSD is hosting an optional informational session to help walk vendors through the process: Thursday, June 26, 2025 2:00 PM Online – Virtual Conference Register Here This is a great opportunity to ask questions, understand qualifications, and ensure your submission stands out. We believe in building communities through access, equity, and opportunity. Contracts like these aren’t just about business, they’re about shaping the public spaces our families, youth, and elders rely on every day. If your work can help improve outdoor spaces in LA County, now is the time to step up and partner with a district that’s funding real transformation.

Date: Tuesday, June 18, 2025 `Time: 3:00 PM (PDT) Join Us Are you unsure if your SBA EIDL loan qualifies for a 6-month hardship extension? Curious about the best SBA programs to support your business growth? You're not alone, and help is just one click away. Join us for a special live Q&A session with Dr. Kenneth Crawford, also known as Mr. SBA, a trusted loan specialist with over 27 years of experience navigating the ins and outs of SBA lending. What You’ll Learn: The differences between key SBA loan programs: • 7(a) Loan Program • 504 Loan Program • Community Advantage Loans • SBA Microloans How to strengthen your SBA loan application Why a solid business plan is essential for funding success The Women’s Business Center’s 3-part webinar series can guide you through building your own business plan from scratch Whether you're new to SBA programs or already have a loan, this session offers timely insights to help you better understand your options and take advantage of all available resources. Reserve your spot now and invite your fellow entrepreneurs, because good business advice is better when it's shared. Don’t miss it, see you there!

If your family has been displaced by a natural disaster in California, such as the 2025 LA wildfires, you’re not alone, and you don’t have to navigate the recovery process without support. From mortgage relief grants to FEMA paperwork help, Los Angeles County and community partners are stepping up to provide life-saving resources. Here’s what you need to know: Apply for Mortgage Relief Through CalAssist Homeowners whose homes were destroyed or rendered unlivable by a California disaster between January 1, 2023 and January 8, 2025 may qualify for up to $20,000 in mortgage assistance, and these funds never have to be repaid. Covers 3 months of mortgage payments Funds are paid directly to your lender Available for primary residences including single-family homes, condos, or manufactured homes (up to 4 units) You must meet income limits and have a mortgage or reverse mortgage Apply now at calassistmortgagefund.org Attend the Free CalAssist Workshop Loma Alta Park, Altadena, CA Saturday, June 14 | 10 AM – 12 PM Learn more about your eligibility and get help with the application process in person. Need Help Recovering from the Eaton Fire? A new Survivor Support Center has opened in Altadena for fire survivors. No appointment is needed, just stop by for help with: FEMA applications Federal disaster loans Housing and tenant protections Worker assistance Altadena Community Center 730 E. Altadena Drive, Altadena, CA Monday – Friday, 9 AM – 5 PM Learn more: dcba.lacounty.gov/altadena-center Know Your Rights: Support for All, Regardless of Immigration Status We want to remind our community that everyone has rights under the U.S. Constitution, regardless of immigration status. The LA County Office of Immigrant Affairs (OIA) offers: Legal resources and tip sheets Workshops on how to interact with immigration officers Free help from trained representatives Learn more or download “Know Your Rights” materials: oia.lacounty.gov/kyr Call: (800) 593-8222 Foreclosure Relief for Wildfire-Affected Homeowners If your home was affected by the fires and you have an FHA-insured mortgage, you may qualify for relief. Foreclosure moratorium in effect through July 7, 2025 For help: Call (800) 593-8222 or visit dcba.lacounty.gov/foreclosure-prevention Find Your Vision Is Here to Help You Navigate This We are committed to making sure our community members, especially those affected by disaster or displacement, have access to accurate information, financial help, and the dignity of support without judgment. You don’t have to go through this alone. Let’s rebuild stronger, together.

Ransomware isn’t just about encryption anymore. Today’s most dangerous attacks begin long before the ransom note appears. Instead of crashing through the front door, threat actors are quietly slipping in the back, using modular tools like Skitnet and TransferLoader to silently map systems, steal credentials, and plant malware in stages. These advanced loaders and backdoors are turning corporate networks into slow-burning fuse lines, setting the stage for devastating, full-scale ransomware detonation. In this post, we break down how Skitnet and TransferLoader operate, why they're so hard to detect, and what cybersecurity teams must do to stop them before it’s too late. 1. From Stealth to Siege: Skitnet Malware What it is: Skitnet (also known as Bossnet) is a modular, multi-stage malware marketed on underground forums like RAMP since April 2024. Swiss firm PRODAFT observed its increasing use by ransomware gangs such as Black Basta, Cactus, and others throughout early 2025 (thehackernews.com, zscaler.com). How it works: Initial loader: A Rust-based binary decrypts a Nim payload in memory. Communication: The Nim payload establishes a DNS-based reverse shell via dynamic GetProcAddress resolution and threading, sneaking past detection every ~10 seconds (scworld.com, logstail.com). Commands: Allows persistence, screenshots, AV enumeration, installation of remote tools (AnyDesk, RUT‐Serv), PowerShell script execution, and additional payload downloads like .NET loaders (thehackernews.com). Why it's worrying: With plugins for credential theft, lateral movement, and ransomware, Skitnet primes environments for full-scale attacks long before encryption begins (csoonline.com). 2. A Sneaky Enabler: TransferLoader Overview: Identified by Zscaler’s ThreatLabz and others, TransferLoader is a sophisticated loader active since at least February 2025. It has been used to deploy Morpheus ransomware, notably against a U.S. law firm (zscaler.com). Modular design: Downloader: Fetches malicious payloads while displaying harmless decoy PDFs. Backdoor loader: Manages decryption and execution of the backdoor component. Backdoor: Enables arbitrary remote command execution and updates configuration. Evasion techniques: Implements heavy anti-analysis: dynamic API resolution via hashing, PEB debugging checks, dynamic string decryption, control-flow obfuscation (jump address modification, SIMD instruction tricks), and filename checks (logstail.com, zscaler.com). Resilient communication: If primary C2 is down, the backdoor falls back to IPFS (InterPlanetary File System) to fetch updates – bypassing takedown efforts (zscaler.com). 3. The Playbook: How These Tools Work Together Initial compromise A phishing email drops Skitnet or TransferLoader, initiating DNS-based communication and stealthy reconnaissance. Lateral movement & persistence Skitnet’s DNS shell paves the way for deeper infiltration. TransferLoader secures foothold and flexes its backdoor to execute commands silently. Payload delivery TransferLoader delivers Morpheus or other ransomware variants; meanwhile, Skitnet continues to harvest data, credentials, or escalate privileges. Ransomware detonation Once systems are weaponized, attackers move to encrypt or exfiltrate critical files, demanding ransom. 4. What It Means for Cybersecurity Teams Stealth communications matter DNS-based C2 and IPFS-fallback mechanisms bypass common detection channels, so monitoring for unusual DNS traffic or IPFS requests is critical. Defeat the loader architecture Detect dynamic API resolution or memory-based decryption, routine EDR and antivirus may not catch these evasive techniques. Modular chain detection Alerts for one stage (e.g., DNS shell) should trigger deeper inspections, early detection disrupts the ransomware kill chain. IT hygiene matters Enforce multi-factor authentication, patch systems vigorously, tighten controls on PowerShell usage and remote tools like AnyDesk. 5. Defending Against This Wave; Strategy and Why It Helps DNS and IPFS monitoring - Identifies stealth C2 traffic early Behavioral EDR - Detects in-memory decryption, dynamic API usage PowerShell hardening - Blocks misuse for persistence and control Network segmentation - Limits lateral movement and credential abuse Threat intelligence feeds - Keep IOCs and TTPs up to date (e.g., multiple C2 domains, backdoor indicators) The rise of Skitnet and TransferLoader highlights a troubling trend in ransomware: modular, stealthy pre-encryption frameworks that deeply infiltrate networks before detonating. These aren't simple "encrypt and demand" tools, they're multi-stage instruments of sustained compromise. Defenders must adopt a layered approach: detect stealth communications, analyze behavioral anomalies, and thwart loaders before they deploy payloads. In today’s landscape, stopping the infection early means the difference between a blocked threat and a catastrophic breach. Sources: Detailed analysis of Skitnet behavior, DNS-based C2, and ransomware toolkits (thehackernews.com, impresscomputers.com, linkedin.com, hivepro.com, pcrisk.com, csoonline.com, linkedin.com, scworld.com, stratosally.com) Zscaler, GBHackers, SC Media, and Gurucul insights into TransferLoader’s loader-backdoor ransomware pipeline, evasion tactics, and IPFS fallback (zscaler.com)

Navigating nonprofit tax requirements isn’t easy, especially when one small misstep can lead to costly penalties, delayed funding, or even threats to your organization’s good standing. That’s why we’re encouraging nonprofit professionals, board members, and financial leads to join this expert-led webinar hosted by Moss Adams, one of the nation’s top accounting and consulting firms. Webinar: Tax Issues for Nonprofits Common Mistakes to Avoid Thursday, June 26, 2025 11:00 AM – 12:00 PM (PDT) FREE for CalNonprofits Members | $50 for Non-Members What You’ll Learn In this informative session, you’ll get direct insights on how to: Meet essential tax filing requirements Avoid common IRS audit triggers and penalties Implement strategies for minimizing liabilities Adopt best practices for record-keeping and financial management The session will include a live Q&A with Michael Lumsden, Tax Senior Manager, Nonprofit/Healthcare Industry at Moss Adams Why This Webinar Matters Too often, nonprofits fall into compliance issues simply because of lack of access to up-to-date financial guidance. Whether you're preparing your first Form 990 or want to ensure you're audit-ready, this is your chance to hear directly from experts who specialize in nonprofit finance. Who Should Attend Nonprofit executive directors Financial and operations staff Board members and treasurers Development teams managing restricted funds or reporting Anyone responsible for compliance or recordkeeping Registration & Pricing Free for CalNonprofits Members $50 for Non-Members Contact: Robert Gibbons, CalNonprofits Email: events@calnonprofits.org Registration Link: Click here Can’t make it live? Register anyway to receive the recording and materials post-event. We’re proud to support capacity-building events that protect the sustainability of nonprofit organizations. Join us and Moss Adams on June 26 for a practical, timely training that could save your organization thousands in the long run.

Saturday, June 14, 2025 12:00 p.m. – 4:00 p.m. Roy Campanella Park 14812 S. Stanford Ave, Compton, CA 90220 RSVP: mitchell.lacounty.gov/juneteenth-2025 Join us as we honor economic empowerment and community resilience at the 5th Annual Juneteenth Celebration & Resource Fair, hosted by Supervisor Holly J. Mitchell and the LA County Department of Economic Opportunity (DEO). This free, family-friendly event brings together community voices, culture, and county-wide resources — all in one powerful afternoon. What to Expect Live Entertainment Food Trucks Kid-friendly Activities Giveaways Onsite County Services & Business Resources Small Business Concierge Support All in a vibrant outdoor setting designed to uplift and unite. We e ncourage small business owners, youth job seekers, and local entrepreneurs to visit the DEO table for exclusive services, including: Small Business Concierge Support Permit-readiness reviews for: Permit-readiness reviews for: Microenterprise Home Kitchen Operations (MEHKO) Compact Mobile Food Operations Hands-on help for: Sidewalk Vending Certificate Applications Small Business Mobility Fund Grants Personalized concierge services for business formalization and growth Shop Local LA County Activation Make a Shop Local Pledge Spin the wheel for branded giveaways! Youth@Work Enrollment (Ages 14–24) Apply on the spot for LA County’s Youth@Work paid job program Mini resume & interview clinics — bring your resume! Sign up for interviews with: Summer Stars (LA County Library) Teen Spot (Parks Department) RSVP today: mitchell.lacounty.gov/juneteenth-2025

LA County’s parks are more than open spaces, they are hubs for wellness, community, culture, and care. From youth programming to senior fitness to summer swim lessons, our parks have long served as places of free, accessible connection for all Angelenos. But now, the Los Angeles County Department of Parks and Recreation is facing a $22.2 million budget cut, and that means real changes are coming this summer. What’s Changing To continue serving millions of visitors each year, the County will reduce hours, suspend enhanced programs, and introduce limited fee increases at some sites. Here’s what to expect starting June 30, 2025: Park Hours Regional Parks (Castaic, Bonelli, Kenneth Hahn, Schabarum, Santa Fe Dam, Whittier Narrows) Closed Mondays and Tuesdays Open Wednesday–Sunday Lakes at Regional Parks Swimming, boating, and fishing suspended on Mondays and Tuesdays Summer Pool Program Enhanced summer season shortened from 23 weeks to 11 weeks Open: June 2 – August 16, 2025 Parks After Dark Programming Suspended Special summer, winter, and spring night programming paused at 34 parks Core programs like youth camps, nutrition, senior activities, and community partnerships will continue Staffing Reductions Cuts to part-time staff, overtime availability, and supply budgets Select Fee Increases To help preserve free access to core programs, some admission and rental fees will increase: Arboretum and Botanic Gardens admission New community access program will offer free entry for EBT cardholder Regional Park vehicle entrance fees Walking, biking, and public transit access remains freE Facility rental fees Adjusted to align with regional benchmarks Most Park Programs Will Remain Free or Low-Cost Even amid budget cuts, LA County Parks will continue to offer core and safety-net services, including: Youth after-school programs Summer camps and free lunch/snack programs Teen centers and team sports Senior wellness programs Year-round and summer aquatic programs How You Can Support LA County Parks If these parks have ever given you a place to breathe, grow, connect, or heal—now is the time to give back in any way you can: Donate to the LA County Parks Foundation Support a park or program you love: https://www.lacpf.org Volunteer Your Time or Talent Be a coach, program mentor, or docent: volunteers@parks.lacounty.gov Be Kind to Park Staff They’re doing more with less. Patience and gratitude go a long way. Leave No Trace Clean up after yourself and model care in your community spaces. We understand that parks are more than amenities, they are lifelines. For families, for youth, for seniors, and for anyone in need of safe, open space. As we navigate these changes together, let’s keep showing up for our parks—as users, volunteers, and advocates. For more information and ongoing updates: https://parks.lacounty.gov

Facial recognition technology (FRT) has rapidly integrated into various aspects of daily life, from unlocking smartphones to law enforcement surveillance. While offering convenience and security benefits, FRT also presents significant risks to privacy, civil liberties, and social equity. This blog post delves into the multifaceted dangers of facial recognition, highlighting the urgent need for robust oversight and regulation.(news, Harvard Gazette) 1. Privacy Invasion and Mass Surveillance FRT enables the covert collection and analysis of individuals' facial data without their knowledge or consent. Unlike other biometric data, facial features can be captured remotely and surreptitiously, raising profound privacy concerns. The widespread deployment of FRT in public spaces can lead to a surveillance state where individuals are constantly monitored, infringing upon the right to privacy and freedom of movement. (ISACA, Liberties) 2. Algorithmic Bias and Discrimination Studies have revealed that FRT systems often exhibit biases, particularly against women and people of color. For instance, research by Joy Buolamwini demonstrated that commercial facial analysis algorithms had error rates of up to 34.7% for darker-skinned women, compared to 0.8% for lighter-skinned men. Such disparities can lead to misidentification and discriminatory outcomes, especially when FRT is used in law enforcement and security contexts.(Wikipedia) 3. Misidentification and Wrongful Arrests The reliance on FRT by law enforcement has led to instances of wrongful arrests. In 2020, Robert Williams was mistakenly arrested in Detroit after FRT incorrectly identified him as a suspect. Similarly, Alonzo Sawyer was detained based on a flawed FRT match, despite evidence contradicting his involvement. These cases underscore the potential for FRT to cause significant harm when errors occur. (Wikipedia, Time, The New Yorker) 4. Chilling Effect on Free Expression The pervasive use of FRT can deter individuals from participating in public demonstrations or expressing dissent, fearing identification and potential repercussions. This "chilling effect" undermines democratic principles and the right to free expression. Activists and civil rights groups have raised concerns about FRT being used to monitor and suppress protests, particularly those involving marginalized communities. (San Francisco Chronicle, Wikipedia) 5. Data Security and Potential for Abuse The aggregation of facial data in centralized databases poses significant security risks. Breaches can lead to unauthorized access to sensitive biometric information, which, unlike passwords, cannot be changed if compromised. Moreover, companies like Clearview AI have amassed vast facial image databases without individuals' consent, leading to legal challenges and fines in various jurisdictions. (Wikipedia, Liberties) 6. Lack of Regulation and Oversight The rapid advancement of FRT has outpaced the development of comprehensive legal frameworks to govern its use. In the UK, for example, the Ada Lovelace Institute has called for stronger regulations to address the unchecked deployment of FRT by police and private entities. Similarly, in New York, audits have highlighted deficiencies in the oversight of AI systems, including FRT, emphasizing the need for clear guidelines and accountability mechanisms. (Wikipedia, Financial Times, Times Union) While facial recognition technology offers certain benefits, its potential to infringe upon privacy, perpetuate biases, and erode civil liberties cannot be overlooked. The documented cases of misidentification, surveillance overreach, and data misuse highlight the urgent need for stringent regulations and ethical guidelines. As society grapples with the implications of FRT, it is imperative to balance technological advancements with the protection of fundamental human rights.

If you're a small business owner looking for funding, training, and real support, there’s one opportunity you can’t afford to skip: the Verizon Small Business Digital Ready (VSBDR) program. This initiative was created to help small businesses succeed in the digital economy—with free courses, expert coaching, networking opportunities, and yes, the chance to apply for $10,000 grants. What Is the Verizon Small Business Digital Ready Program? VSBDR is a free online learning and resource platform developed by Verizon in partnership with LISC (Local Initiatives Support Corporation). It’s designed specifically for small businesses and includes: Personalized online courses based on your business goals Expert coaching from seasoned pros and Verizon staff Peer networking with business owners from across the country Discounts and product incentives Eligibility to apply for national grants up to $10,000 🌟Verizon’s goal is to help 1 million small businesses thrive by 2030, and they’re already making it happen, one entrepreneur at a time. How to Become Eligible for a Grant Here’s the key: You must engage with the Digital Ready platform to qualify. That means: Create an account Complete at least two courses, coaching sessions, or community events Apply during an active grant cycle This approach ensures that business owners are not just receiving funding, but are equipped with knowledge and tools to grow and sustain their businesses. Get started here: https://digitalready.verizonwireless.com Why This Matters to Find Your Vision Clients We know how hard it is to grow a business, especially when you're self-managed, underfunded, or coming from a community that’s often overlooked. That’s why we’re encouraging our clients to take advantage of opportunities like this one. The VSBDR platform is free, accessible, and designed for small business owners like you. If you’re already doing the work, this is the support that can help you go even further. Who Is Eligible for the Grants? These $10,000 grants are available to Digital Ready participants and are distributed through LISC. In addition to the course participation requirement, your business must meet general eligibility, such as: Be a small business operating in the United States Priority is often given to minority- and women-owned businesses, or those in under-resourced communities Learn more about the grant structure: https://digitalready.verizonwireless.com/grants Start Today, Get Ahead Verizon's Digital Ready platform is one of the most direct paths to funding, training, and lasting growth. Don’t wait until the next grant cycle opens, get registered and complete your first two courses now. Register now: https://digitalready.verizonwireless.com Learn more about the grant: https://digitalready.verizonwireless.com/grants