Introduction

Helping Those Who Help Others: Security for Non-Profits

Helping Those Who Help Others: Security for Non-Profits

After the massive breaches and attacks of last year, everyone has become far more aware of their vulnerability to being hacked. Security has taken on new meaning as people start putting defensive measures in place. Yet for many, especially those in the Non-Profit sector, this still seems a daunting task due to the perceived costs and skills required to know just what to do.

Like every other business, Non-Profits need to make information security a priority. They are just as much a target for cybercrime, just as susceptible to phishing attacks, ransomware and viruses. Ironically, like Healthcare, they are even more vulnerable because of the volume and sensitivity of the data they have on both donors and those they help. But the reality is that most just don’t have the same budgets, skills and resources. How can we best help those who help others?

There’s an old adage that goes “Give a man a fish, he’ll eat for a day. But teach a man to fish and he’ll eat the rest of his life.” Low budget/no budget should not preclude a solid security foundation. Utilizing the shared wealth of information and experience currently available, there are affordable, manageable steps any organization can take and put in place. Here is a basic ten step framework for Non-Profit Security.

1) Support your local sheriff. You need to have someone in-house who is in charge, ready not only to lay down the law, but to defend it regarding security matters. This person will be your key resource, and liaison with external support. They will know and understand what compliance and governance means for your organization, so that liability doesn’t have to become a consequence.

2) You’ve got to have a plan. A Disaster Recovery/Business Continuity Plan. The daily news gives us all the reasons we need: fire, severe storms and acts of nature, and increasingly cyber attacks and ransomware. Putting a plan in place ensures that you have data saved from a recent point in time that you can restore from. That means, essentially, being able to pick up where you left off so that you aren’t losing donors, funding, and time. It is the responsible thing to do. There are no excuses for not having one, and it doesn’t have to cost much more than the time you invest in doing it.

3) Backups. This is fundamental to your security and ability to restore should something happen. You can decide what data is most crucial and back that up daily. Other information can be done weekly. There are a range of very flexible and affordable options utilizing cloud storage. The key is to do them frequently and have redundancy. Yes. Have more than one, in a different location. Because ransomware, system crashes, and acts of nature all happen to backups too.

4) Training. Your staff need to be made aware of what they can and cannot do while at work, or with remote access, or if they bring in their own devices. Your organization is accountable to those donors whose information is on record, as well as to your own team and their safety. Regular training sessions can keep everyone well-informed and up to date on current threats like phishing emails, malicious links, dangerous websites, and ransomware. Because threats are constantly changing, sporadic or infrequent bouts of training are not effective. Staff needs to feel their share of responsibility for the overall security of your data and systems. Everyone needs to play their part, and training is essential to explaining not just how but why.

5) Stay current. Keep your software and operating systems current and updated regularly. This is one of the most effective things you can do because it will limit system vulnerabilities that hackers find and exploit. Check for monthly security patches and then install them. Outdated software does not receive security patches or support, leaving you exposed.

6) Invest in technology Like an enterprise level firewall. This is over and above the software firewall offered by Windows or extended anti-virus programs. Firewalls work to keep intruders out by blocking inbound internet traffic, and the risks are high when you connect via DSL or broadband cable and are always on.

7) Limit access. Who has access to your data, especially the most critical or sensitive data? Is this data accessible remotely? You need to restrict access so that accidents don’t happen via social engineering tactics frequently used by hackers. And you don’t want this data to be copied onto portable media like CDs, flash drives or USB keys which can be lost, duplicated or stolen. Only a select few people should have access, with passwords being changed regularly.

8) Passwords, encryption and VPNs. These all put up safe barriers against unwanted intrusion. Passwords are the first line of defence but can only be effective if the basic rules are followed: Strong passwords that are 10 characters minimum, combining numbers, letters and special character, with alternating cases. Never use the same password for more than one purpose. And change up passwords because once a hacker finds it, they will keep using it. Do you encrypt what you send out? If not, you should be, particularly for sensitive data. Consider an email provider like Constant Contact or MailChimp to send email blasts and fundraising appeals. Encrypt stored data on site by using tools to encrypt the entire hard drive. Examples are Bitlocker for Windows and FileVault for Mac. VPNs or Virtual Private Networks allow you to securely send data between two points through a digital or virtual tunnel, shielding it from outside threats. These can be easily set up, and much safer than sending via the open Internet.

9) Pay now or pay later. How do you handle you online payment processing and payment processing in general? Have you investigated your providers to make sure they are reputable? Your method needs to be secure, but it cannot be complicated because you don’t want to discourage donors. While many non-profits use PayPal, it has suffered some security breaches in past. There are other third party services for nonprofits, such as Network for Good or Razoo. It pays to fully investigate your options on this.

10) Secure Your Wireless Network. Many small organizations use wireless routers. But they leave the default settings in place. Hackers know these and use them to get right into your network. Change your default SSID or wireless network name, and the default or admin password. And again, change up your password. Enable encryption. –

Non-profits hold a special place in our hearts. Helping others is a wonderful thing. Helping secure those who help others – well, that’s a reward in and of itself. So go on making the world a better place – and stay safe while you do! PS, there’s also a nice website for non-profits, TechSoup, with how-tos and helpful articles of all kinds.

 

By Cheryl Biswas

March 27 2015