KPM

Board Committees Sudden Wave Of Support Non-Profit Restructuring Inflation Reduction Mission changes Reimbursement Policy Protecting Your Non-Profit Against Financial Threats Non-Profit Retirment Plan Look Internally To Fill Non-Profit Guide To Planned Giving Financial Statement Auditing Process Flexible Budget Rules Of Form W-9 Potential Obstacles Of Going Global Advertising Payments To Non-Profits Searching For New Staffers Operate Your Non-Profit 501(c)(6) Board Meeting Minutes Planned Gifts Diversity For-Profit Subsidiary IRS Compliance Merging Non-Profits Return a donation Internal Controls Term Limits Pay transparency Accountable Plan Fundraising Disaster Plan Audit Conflict-Of-Interest HR Function Volunteer Risk non-profit tax reporting Cryptocurrency Donations Culture

Protect Your Non-Profit: Train Employees To Combat Hackers

If you don’t properly train your employees, your non-profit can’t consider its cybersecurity program. If employees visit ‘dangerous’ websites, mix work and personal accounts, or can’t recognize a social engineering scheme, they may open the door to hackers. Both new employee training and refresher courses for longtime staffers can protect your organization.

Leading Cause Of Data Loss
According to a recent study from the Ponemon Institute, a technology consulting company, employee negligence is the leading cause of data loss incidents. In fact, almost 60% of organizations experienced data loss due to an employee mistake involving email in the previous 12 months.

The shift to remote work, increasingly common for non-profits, is notable, too. The Ponemon study found a strong correlation between the number of remote workers an organization has and a data breach’s cost. But the study also found that certain factors — including employee training — are associated with a lower-than-average breach cost.

Social Engineering Threats
Perhaps the most critical cybersecurity threat to your organization is social engineering, so make it a central focus of employee training. In social engineering attacks, including phishing schemes, cybercriminals use social skills to obtain data or compromise a target’s network. Phishing is responsible for 16% of data breaches, according to the Ponemon report.

But phishing is just one example of the social engineering threats your employees might encounter. ‘Vishing,’ for example, uses voice communication. It can be combined with other types of social engineering to lure a victim to call a certain number and reveal sensitive information. ‘Smishing’ leverages SMS messages with dangerous links.

Making Technology Safer
Another common risk is when staffers mix business and personal accounts, information, and devices. You need to explain why they shouldn’t conduct business activities (such as accessing your organization’s bank account) on their personal phone or play games on their employer-provided laptop. Similarly, they shouldn’t share USB flash drives, hard drives, or other external hardware between business and personal devices. And they shouldn’t download software or apps from unknown sources either.

Creating a culture of safe browsing is particularly important now that so much work is done remotely. In addition to warning employees to be cautious about suspicious attachments and links, you might want to require them to use a virtual private network (VPN) when accessing your system. A VPN establishes a secure, encrypted connection, hides the user’s IP address, and acts as a filter to protect data from cybercriminals.

As always, strong passwords that are frequently changed should be required. Passwords to access accounting, HR, and other sensitive data should be given only to those who require it and changed as soon as they don’t.

Training Format
The substantive content of your employee cybersecurity training is critical, but don’t overlook the importance of format. One-sided lectures and slide shows are unlikely to engage or stick with the audience. If you want staffers to walk away ready to put your lessons into action, make the training interactive. For example, create simulations during or after training that allow trainees to put what they’ve learned to the test.

Some organizations deploy simulations during the workday to check how employees respond. These real-time assessments can provide much better insight into whether employees retain actionable knowledge than a quiz during training.

If The Worst Happens
If despite all best efforts from leadership and staffers, your network is hacked, don’t try to handle the situation yourself. Work with IT security experts to repair the damage.

Related Articles

Talk with the pros

Our CPAs and advisors are a great resource if you’re ready to learn even more.