Nice to meet you.

Enter your email to receive our weekly G2 Tea newsletter with the hottest marketing news, trends, and expert opinions.

Upgrade Your Nonprofit Data Security With These 5 Tips

September 17, 2019

G2CM_FI1007_Learn_Article_Images_[Database_Security]_V1b

Migrating your corporate information to the cloud can save you time and money—but it also opens a backdoor for hackers to steal valuable information.

It can be easy to assume that the nonprofit sector wouldn’t be a target for hackers because there are bigger fish to fry. After all, why target a local charity when there’s more money to be made with a cyberattack on Wall Street? The answer lies in accessibility.

Nonprofits often lack the sophisticated security measures of larger institutions, making them easier prey for cybercriminals. With the right database security software, even organizations with limited resources can protect their sensitive data and reduce their vulnerability.

Why does your nonprofit need data security?

By virtue of their funding structure, nonprofits are prime targets for hackers as they are a wealth of raw financial and donor information.

Partner with the traditionally low tech-savviness of most small nonprofits, and you’ve got an easy target with a lot of valuable information. For your organization, there’s more at stake than just information to be lost: a data breach can cost your company a lot of money.

Consider the chart below. Would your company be able to recover from a $7.9 million fine? Chances are the cost of a single data breach might bankrupt your entire organization.

cost of a data breach
 

In order to truly understand the importance of nonprofit data security, we sat down with Justin Spelhaug, the General Manager of Microsoft's Tech for Social Impact team. Justin and his team have been working on enabling nonprofits to take control of their data security through their work on Microsoft for Nonprofits.

Five steps for improving your nonprofit data security

The biggest mistake any nonprofit can make when it comes to data security is assuming they aren’t a target. This hands-off approach to risk management is careless and leaves your organization vulnerable to cyber security risks.

So, what can you do to fix that? We’ve highlighted five key takeaways from our interview with Justin Spelhaug that your team can use to improve your data security strategy.

1. Grade your current data security program

If you heard that one of your neighbor's homes had been the target of a burglary, would you wait until your own home was targeted before buying a security camera? Chances are you’d be changing your locks and adding protective measures to your home the same day.

Think of data security in the same way. A proactive approach to protecting your company and your information will do you more good than waiting until an attack has already taken place. According to Justin, the nonprofit sector is already a target for people looking to steal important information from businesses.

"We’ve seen firsthand how the organizations we work with are being targeted. As the threat of cyber attacks increases, we need to be proactive about how we protect donor information. We need these organizations to think ahead and plan for what happens if something goes wrong."

An easy place to start is sitting down with your team and creating a list of all the valuable information your company handles. This information doesn’t have to be directly linked to money. It can be something as simple as an email address.

When creating your data security plan, ask yourself these questions:

  • Do we keep financial records of donors or other businesses?
  • Do we have personal information like social security numbers or addresses on file?
  • What information would be damaging if an unauthorized person got ahold of it?

Once you’ve created your list, you should review your current policy to protect that information. How are you safeguarding this information? Who has access to it? Are they kept in secure cloud storage or a filing cabinet at your office location?

Grade yourself on how well you’re doing already and identify the places you can improve. Hackers will always target the easiest point of entry. This means you should build your strategy starting with your weak points.

2. Understand your legal obligation

As we’ve mentioned earlier in this article, your company may not have a choice when it comes to data security. Chances are your company is legally obligated to protect certain information. As Justin pointed out, nonprofits working in fields such as global aid or health and human services may be subject to HIPAA regulations or other legal obligations.

“Nonprofits are managing some incredibly important and sensitive information, especially if you work in health and human services or global aid. It’s not just donor information. It’s information about the people you’re helping. Keeping that data secure has to be the first priority.”

Reviewing the compliance information for tax-exempt entities on the IRS website is a great place to start. This can give you a clear overview of what you’re required by law to do when it comes to data security. From there, you can integrate those into your strategy and even implement a software solution to help organize and maintain your compliance program.

3. Establish data privacy protocol

Understanding your legal obligations and your weaknesses is just the first step. The best data security strategies have a clear framework, protocols, and established steps that all employees must follow. According to Justin, more than half of organizations don’t have an established plan in place.

“60% of the organizations we worked with didn’t have a data security plan in place. One data breach can unravel years of trust built with the public and your donors. In an age of deep cybersecurity challenges, how are nonprofits proactively protecting the information of their donors?”

Your data privacy plan should include a written protocol for collecting donor information, password security, and data storage. Consider the ways a hacker might try to access your information and work backward from there.

types of network security

Ask yourself the right questions: who has access to what information, how are passwords stored for online access, and what should you do in case of a cyber attack? You cannot be too careful when it comes to data security.

4. Streamline with software

You might wonder when you’ll have the time to monitor all of this information. After all, this seems like a full-time job in itself. According to Justin, 80% of the organizations they work with have fewer than 10 employees. That doesn’t leave much room for a full-time commitment to data security, which is why big tech has been stepping up in a big way.

“Up until now, tech companies haven’t been providing the right capabilities to help these nonprofits protect themselves. We’re seeing that change. Our industry needs to help lead the conversation by providing these organizations with the tools they need. We need to be equal partners in this fight.”

Data privacy software might hold the key to protecting your organization from cyber-attacks. It allows your team to automate the little things and keep your organization running smoothly. The right data privacy software can help your team by assisting in managing and maintaining information compliance, documenting and delivering sensitive information, and more.

Elevate your data security strategy with a comprehensive software solution that works for you. Explore the best options on the market today. Find the highest-rated data privacy software on the market.

5. Involve your employees

Ultimately, data protection is everyone’s job. Whether you hire a single employee to manage your program or utilize a software solution, everyone on your team needs to be involved. As Justin points out, hackers will always target the weakest point of entry to get the information they want.

“It’s the responsibility of every single person at an organization to understand data security and play a role in protecting that valuable information. Hackers will target anyone at an organization, so everyone needs to be prepared for how to deal with a potential attack.”

There are several ways to include your team in data security. Start by training them on your data security plan and protocols. Then, allow them to ask questions and learn what your expectations are for them as employees.

From there, establish good security habits. Use online training and continued education to teach them about common phishing scams and provide them with resources on creating strong passwords.

Keep in mind that security awareness is an ongoing process. As hackers get more clever, so should you and your team. Consider annual security awareness training to help keep your team updated on the latest tricks hackers are using. Protect yourself by staying one step ahead.

Ready to find a security awareness training software to fit your team's unique needs? Check out the best software on the market today. Find the best security awareness training software!

Stay ahead by staying alert

It’s time to shed the stereotype that nonprofits are low-tech and behind on the latest trends. Don’t allow yourself to become a target for hackers. Instead, use the tools at your disposal to protect the information your donors and volunteers trust you with.

So, what happens if you do find yourself the victim of a hacker? Don’t panic. Instead, check out this guide on how to recover from a cyber attack.


Get this exclusive AI content editing guide.

By downloading this guide, you are also subscribing to the weekly G2 Tea newsletter to receive marketing news and trends. You can learn more about G2's privacy policy here.