Trusting Your IT and Cybersecurity Teams: A Critical Component of Nonprofit Success

Nonprofits rely heavily on technology to manage their operations, from fundraising to volunteer management.

little detective is on the trail of luck

As such, IT and cybersecurity teams, internal and external, are critical to ensuring the success of nonprofit organizations.

However, without trust in these teams, nonprofits may experience negative consequences that can impact their ability to achieve their mission.

✔️ Not trusting IT and cybersecurity teams can cause security breaches.

Nonprofits often collect and store sensitive information about their donors, beneficiaries, and volunteers, which must be protected from unauthorized access or theft.

Without trust in IT and cybersecurity teams, the organization may not prioritize security measures, leading to vulnerabilities that hackers can exploit.

A security breach can result in the theft of sensitive data, financial loss, and damage to the nonprofit's reputation.

✔️ Data loss.

A lack of trust in IT and cybersecurity teams may also lead to inadequate data backup and recovery procedures, which can result in permanent data loss in the event of a system failure or cyberattack.

Data loss can significantly impact a nonprofit's operations, making it difficult or impossible to serve beneficiaries effectively.

✔️ Inefficiencies.

IT and cybersecurity teams are responsible for maintaining the organization's technology infrastructure.

Without trust, the nonprofit may not allow the IT and cybersecurity teams to make necessary updates, leading to inefficiencies and potential downtime.

This can significantly impact the nonprofit's ability to achieve its mission.

✔️ Compliance issues.

Nonprofits must comply with various regulations related to data privacy and protection.

Without trust in the IT and cybersecurity teams, the nonprofit may not ensure compliance, leading to legal issues and financial penalties.

✔️ A lack of trust.

Ultimately, a lack of trust in IT and cybersecurity teams can erode trust among donors and beneficiaries.

A security breach or data loss can damage the organization's reputation, leading to decreased funding and support.

Donors and beneficiaries need to trust nonprofits with their sensitive information, and a lack of trust in IT and cybersecurity teams can significantly impact the nonprofit's ability to build and maintain that trust.

IT and cybersecurity teams play a crucial role in protecting sensitive information, maintaining operational efficiency, responding to cyberattacks, ensuring compliance, and building trust for nonprofits.

Nonprofits must trust their IT and cybersecurity teams to keep their organization secure and protect their donors and beneficiaries.

Without trust, nonprofits may experience security breaches, data loss, inefficiencies, compliance issues, and loss of trust, which can significantly impact their ability to achieve their mission.

Protecting Your Non-Profit or Association from Cyber Attacks: Why It Matters

As a non-profit or association, your focus is on serving your cause and making a positive impact on society.

However, the threat of a cyber attack can undermine all the hard work you’ve put in.

Cyber criminals are increasingly targeting non-profits and associations, recognizing them as easy targets with valuable data and resources to steal.

A successful attack can compromise sensitive information, disrupt operations, and cause damage to the organization’s reputation.

It’s crucial for non-profits and associations to take steps to protect their data and intellectual property from cyber threats.

By implementing a comprehensive cybersecurity plan, you can reduce the risk of a successful attack and keep your organization running smoothly.

This includes assessing your current security posture, developing a cybersecurity policy, implementing technical controls, and training employees to detect and respond to cyber threats.

Are you ready to protect your non-profit or association from cyber attacks?

Get the comprehensive guide on securing your organization’s data and intellectual property by downloading the eBook now.

This valuable resource covers everything you need to know, including a step-by-step plan for developing a cybersecurity strategy and incident response procedures.

Cyber is a risk that cannot be insured unless the insured takes on more risk

Cybersecurity is a hot topic in today’s digital age.

With the increasing reliance on technology and the internet, businesses and individuals are at risk of cyber-attacks and data breaches.

Unfortunately, many people assume that their insurance policies will cover them in case of a cyber incident.

However, the reality is that traditional insurance policies may not provide adequate protection against cyber risks.

The main reason for this is that cyber risks are constantly evolving and new threats are constantly emerging. As a result, insurance companies are often unable to keep up with the latest developments in the field.

Furthermore, many insurance policies have exclusions or limitations when it comes to coverage for cyber incidents.

This means that even if you have insurance, you may not be fully protected against a cyber attack.

So, what can you do to protect yourself against cyber risks?

One option is to purchase a standalone cyber insurance policy.

These policies are specifically designed to provide coverage for cyber incidents and typically include coverage for things like data breaches, cyber extortion, and business interruption.

However, purchasing a standalone cyber insurance policy also means taking on more risk.

Many standalone policies have high deductibles and exclusions, which means that you may still be on the hook for a significant portion of the loss in the event of a cyber incident.

Another option is to take a proactive approach to cybersecurity.

This can include implementing strict security protocols, regularly updating software, and training employees on how to recognize and prevent cyber attacks.

By taking steps to reduce your risk, you may be able to negotiate more favorable terms on your insurance policy.

In short, cyber risks are a reality that cannot be ignored.

While insurance can provide some protection, it is not a silver bullet.

Businesses and individuals need to take a holistic approach to cybersecurity, including both insurance and risk management measures.

And remember, just like a good lock on your front door, being proactive can keep cybercriminals at bay.

Ransomware and why it has the impact it does

Ok incoming RANT

On the last 3 Mondays, we have had to clean up 5 fully encrypted networks.

Small to Medium organisations, non-profits and businesses.

Each with a server with more than 10 computers and some cloud-based systems.

Their IT department or person who knows computers was in charge.

They were telling management that they were secure.

No tested backup

No resilience

No awareness training

No management systems.

No anti-virus

No updates

Where does that leave them?

At the moment, in a heap of trouble.

When it comes to cybersecurity, talk to an expert.

Everyone is a target of cybercrime, just some are more secure than others.

Not sure what to do – start with this audit here: https://Action.scoreapp.com

Is there recovery from ransomware?

That really does depend on you.

A ransomware attack can happen to anyone, at any time and on any systems.

If you think it will not happen to me then you could have a problem.

Ransomware is the scourge of cybercrime.

It can be enacted by people who have no technical knowledge and are just following a script and system that was downloaded from the internet.

It can be enacted by sending a couple of thousand email to a list of people that they purchased on the internet.

It can be enacted by targeting a group of internet addresses that they thought would be lucrative.

There use to be a thing called “security by obscurity” where you can hide on the internet and we’re relatively secure.

 

That capability is no longer a viable defence strategy.

If you think you will never be targeted, too small or have nothing worth stealing and you do have a cyber event there is little chance of you being able to recover.

But

If you have a different attitude.

If you think the opposite.

Then there is a chance that you will not be a victim.

If you think that you could be a target then you are already thinking about your response.

You are already thinking proactive.

You are ready to think of contingencies.

Even if you do have a ransomware attack then you already know and your team already knows what to do because you have thought about it.

You have plans, processes, procedures and policies in place.

If you have tested them and improved on them then that makes it even more possible that you will survive.

The old adage expects the best but plan for the worst is prevalent today against the cybercriminal.

Why 2022 could be a bad cybersecurity year for SME’s

SME’s are a prime target for cybercrime.

They have reduced expertise, minimal money, and an attitude, we are too small to be a target, that leaves them wide open to a cyber event.

Our industry, the people who know and think we understand the bad guys have been pushing for an attitude change for the last 10 years. In a large number of ways, we have failed, especially in the SME space.

In some, we have failed significantly.

By the time we get called in, after a cyber event, it is way too late.

To late to recover, too late to respond and definitely too late, in a number of organisations, to get back to business as normal.

Most SMEs, after a cyber event and especially after a ransomware attack, have but 3 choices,

  • pay the ransom,
  • recover from backup and hope you have a decent backup (a decent, tested backup is vital, no matter the situation)
  • or go out of business.

Here are 3 cybersecurity strategies that every SME should implement to be more secure and avoid that devastating cyber event.

Training users

Increased awareness of business security in a workplace is vital in today’s business world.

Not many businesses know where to go to get that training.

Training needs to be done as an ongoing process.

Once or twice a year is inadequate. But training and education has to be easy, bite-size pieces, easily digested, easily implemented and easily followed.

In addition to ongoing training, you also need to incorporate business security into your onboarding process to instill the required cultural elements into new people on staff.

Want some free cybersecurity training, here is something that will definitely help
https://wizer-training.com/partner/caremit

Risk management and gap analysis

SME’s have a limited understanding of the new risks delivered to the business via our digital components.

The game has changed significantly in the last 10 years and we, as small and medium businesses, are constantly playing catch-up.

We are significantly hampered and handicapped by the impact and scale of our digital usage.

It is everywhere, used in every component and used all of the time.

To understand the risks without understanding the systems you need some help.

Here is some help for you.
Https://CareMIT.scoreapp.com

With the report, you can now implement a gap analysis and work out what you need to do to increase security around your organisation.

The report also ties in well with:

Implemented a framework

If you are looking for a better way to manage security within your Organisation, you need to look no further than a framework.

A framework is a documented system that allows an organisation to follow the bouncing ball and tighten up the security in a regimented way.

The more the components of the framework are implemented the more secure and mature the organisation.

Frameworks are easy to follow and implement and the one I recommend is the National Institute of Standards and Technology (NIST) cybersecurity framework.
https://www.nist.gov/cyberframework

Answer the 98 questions, honestly, and you now have a road map to implement cybersecurity in a significant way.

The NIST cybersecurity framework also gives you a number.

Between 0 – 4, it can be used as a comparison between businesses, supply chain components, and government departments so you can do business with like-minded organisations.

What can SME’s do?

It is not too late to implement any of these strategies. The bad guys are getting more and more clever, so time is running out.

They are targeting everyone who is connected to the digital world, the internet, with more sophisticated systems, a number of them are now fully automated.

Some of those automated systems have minimal human involvement after the initial set up.

From initial social engineering attack, all the way through to payment of ransom everything is automated and driven by machine learning.

Every SME should be implementing a training and education process, doing a risk and gap analysis and implementing a cybersecurity and business security framework.

With that everything else will follow.

The business will be more stable, the culture of the organisation will change and getting back to business as normal after an attack can be significantly easier.

The impact of a cyber event for an organisation implementing these 3 components or not is significant.

If you haven’t implemented these 3 strategies in the last 12 months, 2 years or 5 years then 2020 is going to be a bad year.

But it’s not too late.

Encryption and Backups are your fall back position

When it comes to business security there are 2 systems that will save you after the impact of a cyber event.   The first is a good backup and the second in encryption.

Neither of them is as foolproof as business owners think.

Understanding the importance of backups.

The whole point of a comprehensive back up regime is to be able to get back to business as normal as fast as possible.

A good backup will help you achieve that.   So will a good disaster recovery plan, a decent business continuity plan as well as building in as much resilience as possible into the organisation itself.

Like any plan or solution it has to be tested, it has to be stressed and more importantly, everyone in the organisation needs to know what to do, where information is and how to implement those plans.

Failing to test or improve from the experiences of real-time tests and war-games is usually where an organisation fails.

You cannot improve a system unless it is tested regularly.   Once tested you can rectify issues discovered during the testing.

You DO NOT want to have the cyber event as the first test of system failure and recovery.

What to do with backups.

When it comes to a backup it needs the following items in place.

  • A copy of all critical and non-critical data stored in another location.
  • A copy of that information only connected to the system when it is doing a backup
  • A process that has no human requirements except to check it has happened and fixing it when it fails (immediately)
  • A system that is regularly tested and improved.  In business everything changes, the systems and data need to be tested but the people involved as well.

Protecting your encryption keys

The second component is encryption.   Seen by many as the silver bullet of data security, it is just another deterrent.   If your data is stolen then encryption will ensure that the data is unreadable, unless the bad guys have the keys.

The most important component of encryption is the security of those keys, if the keys are stolen or get out the encryption is useless.

So protecting those keys is more important than protecting the data the keys are securing.

When it comes to SME’s, not for profit organisations and charities we often find the security keys, especially for securing websites, just lying around a system.   Usually, they are saved in a folder called certificates with no added security around those files.

Protecting your encryption

There are many ways of using encryption and all of them cannot be discussed here so here are a few ideas.

  • Make sure your encryption key is not hardcoded into the applications using it.
  • Make sure your encryption key is your property and not owned by a third party.
  • The encryption keys should never be stored on or in the same system using them.
  • Make sure there is an audit trail in their use.
  • Only use one administrative account to encrypt data, record that account and the password in an out of band location, only used for that specific role.
  • Your keys can be encrypted!
  • Cryptographic keys change regularly, create a policy, process and procedure around that requirement.
  • Back them up.   The keys can be stored on an encrypted thumb drive and stored in a secure location. IE – a safe (part of the policy?)

To stop a cyber event instead of just recovering from one you also need to implement other components.   To survive the onslaught of cybercrime, follow and implement the best practices documented all over the internet.

A plan B is important, just like insurance is important.   When everything else fails your recovery is critical.

The CareMIT Security Methodology will help you secure your systems, people and data.