What are the cyber security risks nonprofits face?
In many ways, nonprofits face the same risks as organizations in other industries. To protect themselves, they need to be able to identify risk and understand how to best mitigate it.
Online donations
A growing number of donors choose to give online, with a 2020 Blackbaud report finding that online giving grew 20.7 percent year-on-year. With this in mind, many nonprofits have found their online giving channels an indispensable resource.
However, as demonstrated in incidents like the SolarWinds breach, third parties can leave nonprofit organizations open to risk. Nonprofits must carefully evaluate the services they use to collect and process these payments, and ensure their organization is prepared for the worst by conducting a risk and vulnerability assessment – otherwise, they might put their donor’s most sensitive information at risk.
Volunteers
Nonprofits often employ volunteers or short-term employees for specific, on-the-ground efforts. However, volunteers often do not go through the same rigorous security training or background check process as full-time employees.
This may make volunteers less cyber-aware, putting the organization at risk. For example, they may not understand how to create a secure password, or they may misuse access, accidentally or purposefully. Either way, this places nonprofit-sensitive information at risk.
Phishing scams and ransomware
To communicate with partner organizations and volunteers, nonprofits use email, SMS, instant messaging, and more. Each of these communication channels leaves employees vulnerable to social engineering attacks – and for malicious actors, nonprofits provide a prime opportunity.
Social engineering attacks usually start with phishing scams as a way to deliver malware, like ransomware.
Phishing scams and ransomware
To communicate with partner organizations and volunteers, nonprofits use email, SMS, instant messaging, and more. Each of these communication channels leaves employees vulnerable to social engineering attacks – and for malicious actors, nonprofits provide a prime opportunity.
Social engineering attacks usually start with phishing scams as a way to deliver malware, like ransomware.
Malware attacks
Generally, malware attacks start with phishing scams. However, malicious websites are another malware threat vector. Volunteers and employees looking for information on the internet may accidentally click on a malicious website and download the malware to their device.
SQL Injection attacks
Even though SQL injection attacks sound extremely technical, they are a common, easy-to-use attack methodology for malicious actors. Hackers may target website login portals that collect a username and password. They look for ones that are less secure and insert malicious code. The web application accepts this new code as valid, giving them access to the database where they can view, change, or download sensitive information.