SlideShare ist ein Scribd-Unternehmen logo
1 von 10
Miranda R. Dalton
511C
10.18.11




         NPOs and Information Security
   An analysis of the factors that contribute to the vulnerability of NPOs
            and best practices in combating criminal activity.
Agenda

                                                   Recommendations


                                      Securing
                                     Information


                  Vulnerability of
                      NPOs
                   Responsible
                     Factors

The Interest in
  Nonprofits
Research Approach


 • Articles disseminated over a three year period
                    (2007-2010)

 • Similarities and discrepancies among articles
   explored

 • Nonprofit Organizations will be referenced as
   NPOs
Nonprofit Sector
A growing sector in our nation’s economy


                                          1.5 Million
                                         NPOs in 2008




               A Target For Cyber Criminals
Why the Interest in Nonprofits?
  Cyber Criminals see tremendous financial gain

•Nonprofit budgets are growing

• If successful, cyber criminals can gain access to organization’s financial accounts
and personal/financial information of donors

• Cyber Criminals are finding new and innovative malware to penetrate      networks

• New malware is not easily stopped

• Development of new malware has morphed into a multi-billion dollar global
enterprise
The Vulnerability of NPOs
Responsible Factors
   Human Carelessness            Financial Constraints        Underestimating the Risk

• Accidentally posting        • Anti-virus software costly • NPOs have versatile
  information online            and quickly become out       payments options for
                                of date                      donors
• Discarding information in
  an unsecured dumpster       • Majority of funding is for   • In the process,
                                program services and           information security is
• Stolen hardware &             delivery                       lost
  information by
  temporary employees         • Difficult to allot money to • Larger NPOs more
                                purchase current security     security measures, but
                                software and employ IT        greater financial
                                staff                         transactions -TARGET
Securing Information
      A comparison of strategic approaches
    Install latest antivirus           Undergo cultural change           Back up and redundant
software and employ IT staff            related to information                  systems
                                               security

•   McAfee                         •   Securing information is the   •   The issue – reactive in nature
                                       responsibility of all
•   Norton                                                           •   Only relevant once networks
                                   •   Security Awareness Programs       have been compromised
•   Latest security versions           - training in information
    should be installed in             security                    •     Should not become the
    computers                                                            prevailing IT strategy
                                   •    Adoption of proper
•   Expensive                          protocols/procedures in
                                       securing information
•   Budgetary Issues –
    organization can’t afford IT   •   Buy in needed of all key
    staff or to contract out to        stakeholders
    third partyies
Recommendations to Nonprofits


• Information security must become a key component of
strategic planning
      * Will assist in changing the culture of an organization

      * NPOs will begin to dialogue concerning matters of information
        security and the adoption of security initiatives

• Training must occur on an ongoing basis
      * Argument: NPOs are already stressed and further training would
        add to the frustration of NPOs

      * Counter Argument: If IT and security matters are not a priority, it could harm
        contributions if donors feel that their information has been compromised
Recommendations to Nonprofits

    Five Steps in Creating an Information Security Plan

1. Develop information security policies

2. Communicate the information security policies

3. Indentify critical information assets and risks
     Five Steps in Creating an Information
4. Test and reevaluate risks
     Security Plan
5. Obtain stakeholder support
Security and the Internet - Fighting Malware. (2008, July). OECD Observer, 10-11.

Six ID Theft Trends for 2010. (2010, February). Credit Union Magazine, 42.

Baltzan, Phillips, & Haag. (2009). Information Technology and Management. (third, Ed.) McGraw-
Hill.

Dinerman, B. (2009, July 21). Security Threats: A guide for small and mid-size nonprofits.
Retrieved October 10, 2011, from TechSoup:
http://www.techsoup.org/learningcenter/techplan/page11904.cfm

Meron, J. (2009, January 26). NP Tech News. Retrieved October 10, 2011, from
http://www.nptechnews.com/management-features/increasing-data-security-in-an-increasingly-
insecure-world.html

Popa, C. (2007, February). Information Security for Nonprofits. CMA Management, 19-21.

Sherstobitoff, R. (2008, April 21). How to Make Sure You Aren't the "Low-Hanging Fruit" for Fraud.
8.

Weitere ähnliche Inhalte

Mehr von M Dalton

NC-Puerto Rico Workforce Pipeline Part II
NC-Puerto Rico Workforce Pipeline Part IINC-Puerto Rico Workforce Pipeline Part II
NC-Puerto Rico Workforce Pipeline Part IIM Dalton
 
NC-Puerto Rico Workforce Pipeline
NC-Puerto Rico Workforce PipelineNC-Puerto Rico Workforce Pipeline
NC-Puerto Rico Workforce PipelineM Dalton
 
Can the Intranet Take Business Processes to the Next Level?
Can the Intranet Take Business Processes to the Next Level?Can the Intranet Take Business Processes to the Next Level?
Can the Intranet Take Business Processes to the Next Level?M Dalton
 
Contributing Factors That Lead to Ineffective Nonprofit Boards
Contributing Factors That Lead to Ineffective Nonprofit BoardsContributing Factors That Lead to Ineffective Nonprofit Boards
Contributing Factors That Lead to Ineffective Nonprofit BoardsM Dalton
 
Rockingham County Head Start Community Assessment Report, 2012- 2013
Rockingham County Head Start Community Assessment Report, 2012- 2013Rockingham County Head Start Community Assessment Report, 2012- 2013
Rockingham County Head Start Community Assessment Report, 2012- 2013M Dalton
 
Five Year Strategic Plan
Five Year Strategic PlanFive Year Strategic Plan
Five Year Strategic PlanM Dalton
 
Annual Campaign
Annual CampaignAnnual Campaign
Annual CampaignM Dalton
 
Financial Analysis
Financial AnalysisFinancial Analysis
Financial AnalysisM Dalton
 
Succession Planning
Succession PlanningSuccession Planning
Succession PlanningM Dalton
 
A Case for Support
A Case for SupportA Case for Support
A Case for SupportM Dalton
 
Community Service Project
Community Service ProjectCommunity Service Project
Community Service ProjectM Dalton
 

Mehr von M Dalton (11)

NC-Puerto Rico Workforce Pipeline Part II
NC-Puerto Rico Workforce Pipeline Part IINC-Puerto Rico Workforce Pipeline Part II
NC-Puerto Rico Workforce Pipeline Part II
 
NC-Puerto Rico Workforce Pipeline
NC-Puerto Rico Workforce PipelineNC-Puerto Rico Workforce Pipeline
NC-Puerto Rico Workforce Pipeline
 
Can the Intranet Take Business Processes to the Next Level?
Can the Intranet Take Business Processes to the Next Level?Can the Intranet Take Business Processes to the Next Level?
Can the Intranet Take Business Processes to the Next Level?
 
Contributing Factors That Lead to Ineffective Nonprofit Boards
Contributing Factors That Lead to Ineffective Nonprofit BoardsContributing Factors That Lead to Ineffective Nonprofit Boards
Contributing Factors That Lead to Ineffective Nonprofit Boards
 
Rockingham County Head Start Community Assessment Report, 2012- 2013
Rockingham County Head Start Community Assessment Report, 2012- 2013Rockingham County Head Start Community Assessment Report, 2012- 2013
Rockingham County Head Start Community Assessment Report, 2012- 2013
 
Five Year Strategic Plan
Five Year Strategic PlanFive Year Strategic Plan
Five Year Strategic Plan
 
Annual Campaign
Annual CampaignAnnual Campaign
Annual Campaign
 
Financial Analysis
Financial AnalysisFinancial Analysis
Financial Analysis
 
Succession Planning
Succession PlanningSuccession Planning
Succession Planning
 
A Case for Support
A Case for SupportA Case for Support
A Case for Support
 
Community Service Project
Community Service ProjectCommunity Service Project
Community Service Project
 

Kürzlich hochgeladen

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 

Kürzlich hochgeladen (20)

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 

NPOs and Information Security

  • 1. Miranda R. Dalton 511C 10.18.11 NPOs and Information Security An analysis of the factors that contribute to the vulnerability of NPOs and best practices in combating criminal activity.
  • 2. Agenda Recommendations Securing Information Vulnerability of NPOs Responsible Factors The Interest in Nonprofits
  • 3. Research Approach • Articles disseminated over a three year period (2007-2010) • Similarities and discrepancies among articles explored • Nonprofit Organizations will be referenced as NPOs
  • 4. Nonprofit Sector A growing sector in our nation’s economy 1.5 Million NPOs in 2008 A Target For Cyber Criminals
  • 5. Why the Interest in Nonprofits? Cyber Criminals see tremendous financial gain •Nonprofit budgets are growing • If successful, cyber criminals can gain access to organization’s financial accounts and personal/financial information of donors • Cyber Criminals are finding new and innovative malware to penetrate networks • New malware is not easily stopped • Development of new malware has morphed into a multi-billion dollar global enterprise
  • 6. The Vulnerability of NPOs Responsible Factors Human Carelessness Financial Constraints Underestimating the Risk • Accidentally posting • Anti-virus software costly • NPOs have versatile information online and quickly become out payments options for of date donors • Discarding information in an unsecured dumpster • Majority of funding is for • In the process, program services and information security is • Stolen hardware & delivery lost information by temporary employees • Difficult to allot money to • Larger NPOs more purchase current security security measures, but software and employ IT greater financial staff transactions -TARGET
  • 7. Securing Information A comparison of strategic approaches Install latest antivirus Undergo cultural change Back up and redundant software and employ IT staff related to information systems security • McAfee • Securing information is the • The issue – reactive in nature responsibility of all • Norton • Only relevant once networks • Security Awareness Programs have been compromised • Latest security versions - training in information should be installed in security • Should not become the computers prevailing IT strategy • Adoption of proper • Expensive protocols/procedures in securing information • Budgetary Issues – organization can’t afford IT • Buy in needed of all key staff or to contract out to stakeholders third partyies
  • 8. Recommendations to Nonprofits • Information security must become a key component of strategic planning * Will assist in changing the culture of an organization * NPOs will begin to dialogue concerning matters of information security and the adoption of security initiatives • Training must occur on an ongoing basis * Argument: NPOs are already stressed and further training would add to the frustration of NPOs * Counter Argument: If IT and security matters are not a priority, it could harm contributions if donors feel that their information has been compromised
  • 9. Recommendations to Nonprofits Five Steps in Creating an Information Security Plan 1. Develop information security policies 2. Communicate the information security policies 3. Indentify critical information assets and risks Five Steps in Creating an Information 4. Test and reevaluate risks Security Plan 5. Obtain stakeholder support
  • 10. Security and the Internet - Fighting Malware. (2008, July). OECD Observer, 10-11. Six ID Theft Trends for 2010. (2010, February). Credit Union Magazine, 42. Baltzan, Phillips, & Haag. (2009). Information Technology and Management. (third, Ed.) McGraw- Hill. Dinerman, B. (2009, July 21). Security Threats: A guide for small and mid-size nonprofits. Retrieved October 10, 2011, from TechSoup: http://www.techsoup.org/learningcenter/techplan/page11904.cfm Meron, J. (2009, January 26). NP Tech News. Retrieved October 10, 2011, from http://www.nptechnews.com/management-features/increasing-data-security-in-an-increasingly- insecure-world.html Popa, C. (2007, February). Information Security for Nonprofits. CMA Management, 19-21. Sherstobitoff, R. (2008, April 21). How to Make Sure You Aren't the "Low-Hanging Fruit" for Fraud. 8.