{"id":114695,"date":"2022-12-01T14:02:57","date_gmt":"2022-12-01T19:02:57","guid":{"rendered":"https:\/\/kingston12.net\/?p=114695"},"modified":"2022-12-01T18:05:11","modified_gmt":"2022-12-01T23:05:11","slug":"it-will-never-happen-here-until-it-happens-nonprofits-and-cyber-security","status":"publish","type":"post","link":"https:\/\/kingston12.net\/2020\/2022\/12\/01\/it-will-never-happen-here-until-it-happens-nonprofits-and-cyber-security\/","title":{"rendered":"It Will Never Happen Here &#8211; Until It Happens: Nonprofits and Cyber-security."},"content":{"rendered":"\n<p>Nonprofit organizations are usually tax-exempted or charitable entities which pays no income tax on the money they make. They operate religious, scientific research, charitable or educational institutions and here in the United States, public media or religious broadcast stations. Their revenue model is built mostly on donations and grants to fund their annual goals and objectives. Many of these organizations usually do not consider themselves targets for cyber-security breach, partly because they think that as a non-profit company, hackers understand that they do not have large amounts of disposable income to pay for a cyber ransom, and therefore might not be worth hacking. However, a 2016 Cyber Claims Study conducted by NetDiligence &#8211; a cyber risk assessment data breach service company, ranked nonprofit organizations among the top-five affected industry.<\/p>\n\n\n\n<p>The reason for this is quite evident. Nonprofit are usually not expecting an attack. Therefore their \u201cguards are down\u201d, which makes them an easy target. Also, some nonprofits have the tendency to undervalue their most valuable asset \u2013 their donors list, which is priceless for cyber hackers. Sometimes even when nonprofits are alerted of their own vulnerability, there is usually the underlying thought \u2013 it will never happen to us.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Today as we move on full speed towards the new digital economy, nonprofits are becoming more dependent on technology. As such dependency grow, they will become more vulnerable than for-profit businesses which have a lot more resources to allocate to cyber-security. Many nonprofit business models rely on collecting and sharing data. Such data is usually stored elsewhere by cloud services and are accessible everywhere either by employees, consultants or call centers.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"343\" height=\"147\" src=\"https:\/\/kingston12.net\/2020\/wp-content\/uploads\/2022\/08\/Cyber-Security-1.jpg\" alt=\"\" class=\"wp-image-114804\"\/><figcaption class=\"wp-element-caption\">Cyber Security<\/figcaption><\/figure>\n<\/div>\n\n\n<p>Whenever data is made available to multiple access point, cyber threats are usually not very far behind. One primary source for such threats is usually internal &#8211; someone very familiar with the organization such as a disgruntled employee. Such a person may delete or destroy data or programs; crash systems or even illegally sell data to a third party.&nbsp;&nbsp;<\/p>\n\n\n\n<p>However, the major sources of data breach that nonprofits have to worry about are usually comes from outside attackers or hackers. These sometimes come from nations outside our own borders such as Eastern Europe, Africa, India or China. Their mode of attacks usually take the form of hacking, DDoS attack, social engineering (phishing), email hacking, website hack, cyber blackmail&nbsp; or simple old fashion virus\/malware attack on email servers, laptop and desk top computers \u2013 all with the intent of extortion as the end game. Some hackers are sophisticated enough to hack into trusted third party vendors\/partners, such as website hosting companies, cloud storage vendors or call centers that manage\/use the nonprofit\u2019s database.&nbsp;&nbsp;<\/p>\n\n\n\n<p>The NetDiligence study (published January 2017) titled \u201cCyber-security Outlook and Key Considerations for Nonprofits\u201d goes into details on the Cyber risk landscape and alert us to some of technical weak spots that nonprofits should constantly be aware of. They advise that nonprofits implement an effective cyber-security strategy which includes assessment of their readiness. \u201cEmployees should understand applicable regulations such as state privacy regulations, payment card industry (PCI) and Health Insurance Portability and Accountability Act (HIPAA) guidelines\u201d. Mark Greisiger, president of NetDiligence, advise that \u201cIt\u2019s important to show that your organization has made a good faith effort to safeguard information assets. It is well understood that achieving 100 percent effectiveness in cyber-security is not realistic. What\u2019s key is demonstrating that your organization is proactive in mitigating its cyber risk.\u201d&nbsp;<\/p>\n\n\n\n<p>Finally, it is a worthwhile expenditure to have ongoing training for employees, and where possible, add someone with some level of cyber-security expertise to the staff. That person must be able to perform periodic risk assessment \u2013 including examination of network systems, applications and be able to develop incident response plans as needed. He\/she should understand encryption, patch management and be able to manage outsourced projects.&nbsp;<\/p>\n\n\n\n<p>sydney@kingston12.net<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Nonprofit organizations are usually tax-exempted or charitable entities which pays no income tax on the money they make. They operate religious, scientific research, charitable or educational institutions and here in the United States, public media or religious broadcast stations. Their revenue model is built mostly on donations and grants to&hellip;<\/p>\n","protected":false},"author":1,"featured_media":114804,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[57,196,150,151,607],"tags":[],"class_list":["post-114695","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-articles","category-international-news","category-technology","category-technology-articles","category-techtalk"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/kingston12.net\/2020\/wp-content\/uploads\/2022\/08\/Cyber-Security-1.jpg","jetpack-related-posts":[{"id":115648,"url":"https:\/\/kingston12.net\/2020\/2026\/01\/28\/digital-ids-transforming-identity-in-a-digital-world\/","url_meta":{"origin":114695,"position":0},"title":"Digital IDs: Transforming Identity in a Digital World","author":"Sydney","date":"January 28, 2026","format":false,"excerpt":"Digital identification systems, commonly referred to as \"digital IDs,\" are poised to revolutionize how individuals authenticate themselves in an increasingly interconnected society. As governments, businesses, and international organizations modernize their services, digital IDs are emerging as a fundamental tool for secure, efficient, and inclusive identity management. What Is a Digital\u2026","rel":"","context":"In &quot;International&quot;","block_context":{"text":"International","link":"https:\/\/kingston12.net\/2020\/category\/news\/international-news\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kingston12.net\/2020\/wp-content\/uploads\/2026\/01\/Digital-ID-1.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kingston12.net\/2020\/wp-content\/uploads\/2026\/01\/Digital-ID-1.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kingston12.net\/2020\/wp-content\/uploads\/2026\/01\/Digital-ID-1.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kingston12.net\/2020\/wp-content\/uploads\/2026\/01\/Digital-ID-1.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":115663,"url":"https:\/\/kingston12.net\/2020\/2026\/01\/28\/the-echo-in-the-machine-how-ai-redefined-the-music-industry\/","url_meta":{"origin":114695,"position":1},"title":"The Echo in the Machine: How AI Redefined the Music Industry","author":"Sydney","date":"January 28, 2026","format":false,"excerpt":"For decades, the music industry has navigated digital disruptions\u2014from the MP3, the shift away from large production studios to the streaming revolution. However, 2025 has brought a new evolution: Generative Artificial Intelligence (AI). AI is no longer a futuristic concept. It has become a foundational element of the music industry,\u2026","rel":"","context":"In &quot;Technology&quot;","block_context":{"text":"Technology","link":"https:\/\/kingston12.net\/2020\/category\/articles\/technology-articles\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kingston12.net\/2020\/wp-content\/uploads\/2026\/01\/AI-Music-2.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kingston12.net\/2020\/wp-content\/uploads\/2026\/01\/AI-Music-2.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kingston12.net\/2020\/wp-content\/uploads\/2026\/01\/AI-Music-2.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kingston12.net\/2020\/wp-content\/uploads\/2026\/01\/AI-Music-2.png?resize=700%2C400&ssl=1 2x"},"classes":[]}],"jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/kingston12.net\/2020\/wp-json\/wp\/v2\/posts\/114695","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kingston12.net\/2020\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kingston12.net\/2020\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kingston12.net\/2020\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/kingston12.net\/2020\/wp-json\/wp\/v2\/comments?post=114695"}],"version-history":[{"count":3,"href":"https:\/\/kingston12.net\/2020\/wp-json\/wp\/v2\/posts\/114695\/revisions"}],"predecessor-version":[{"id":115025,"href":"https:\/\/kingston12.net\/2020\/wp-json\/wp\/v2\/posts\/114695\/revisions\/115025"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kingston12.net\/2020\/wp-json\/wp\/v2\/media\/114804"}],"wp:attachment":[{"href":"https:\/\/kingston12.net\/2020\/wp-json\/wp\/v2\/media?parent=114695"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kingston12.net\/2020\/wp-json\/wp\/v2\/categories?post=114695"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kingston12.net\/2020\/wp-json\/wp\/v2\/tags?post=114695"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}