The period between Christmas and New Year’s Day has long been the time people give to charities the most, making the charities themselves attractive targets for cyber criminals. Because the events of 2020 will likely boost existing trends, nonprofit cybersecurity challenges may be greater than ever this year — even as groups find themselves with fewer resources to devote to cutting down on this risk.

It will be important for nonprofit cybersecurity leaders to emphasize cost-effective defenses, which include careful scrutiny of vendors, if you are to avoid the increased threats to nonprofits that this holiday season will bring. 

Financial Woes Add to Nonprofit Cybersecurity Risks

In a typical year, charities collect more than one-third of their annual donation revenues during Q4, with as much as 21% of giving occurring during December alone. However, 2020 has impacted the overall charity landscape. 

The economic downturn’s effect on giving has been uneven, with some sectors seeing growth and others seeing major losses, with the most dramatic shrinkage occurring midway through the year. A report published by Fidelity Charitable in June 2020 showed that charitable giving actually increased by 16% over the first four months of 2020, with the human services sector — particularly food banks — seeing very large gains. In a pattern similar to what’s seen after natural disasters, however, that initial surge in donations was followed by a major drop-off.

“What we are anticipating is for the remainder of this year, our donations will be significantly down. The very people who have been most economically harmed by COVID-19 are United Way’s donors,” says Steve Taylor, a senior vice president and counsel for public policy at the United Way.

In the face of disruption and ongoing financial flux, nonprofits and charities are now looking to holiday season donations to make up shortfalls from much of the rest of the year. The goodwill this season often brings will be of the utmost importance to the nonprofit cybersecurity world this year.

Today’s Nonprofit Cybersecurity Landscape

The ways charities cultivate donor partnerships have undergone a major shift. With in-person fundraising events canceled for the near future, donor retention and stewardship — even moreso through online and technology-enabled means — have become the most popular and effective avenues for fundraising. 

At the very moment when maintaining the confidence of longtime supporters has become more important, charities are being challenged to conduct these partnerships only online. In this climate, the potential fallout of a breach — including loss of donors’ trust – is huge. 

Threat actors have long tried to capitalize on the annual holiday giving surge by creating fake charities that attempt to fundraise on false pretenses. It’s only logical that they’d extend their schemes to include real charities as well, especially since they’re known to hold donors’ personally identifiable information (PII) and payment card data and often lack robust controls and defenses.

Nonprofit cybersecurity challenges are made worse by slender budgets and the fact that inadequate attention is paid to risk reduction by many boards and donors, who tend to be critical of spending that doesn’t appear to contribute directly to the front-line mission.

Data Protection for Charities

While it’s always been important to keep an eye on nonprofit cybersecurity needs to protect the privacy and security of donor information, this year’s budgetary constraints make it even more important that they focus on the technologies, policies and process improvements likely to do the most good at the lowest cost. 

These include:

  • Awareness training for nonprofit cybersecurity. These programs range widely. Some can be informal training sessions developed in-house using open-source tools and materials freely available to the public. Others are formal programs that are custom built by a third-party vendor. Even the most elaborate paid offerings are relatively inexpensive, yet their use can have a major impact on organizational culture by encouraging employees to become more risk-aware and helping them cultivate better habits.
  • Strengthen authentication procedures. Nonprofits and charities are moving larger portions of their IT work to the cloud than ever before. Therefore, maintaining secure remote access procedures for all user accounts and admin resources has grown in importance. Multifactor authentication (MFA) is relatively simple and not expensive to use. It’s even possible to build your own solution at no cost by combining open source tools and an API backend. Teach strong password hygiene to employees, and recommend the use of a password manager tool. Open-source password managers that help with nonprofit cybersecurity can also be found for free.   
  • Promptly install all software updates and patches. Even moreso across larger charities, automation is key for speeding up the deployment of critical software updates. Look for solutions that can improve the efficiency of your content delivery infrastructure. This step can save money and bolster your defenses at the same time.

Find a Sample Data Protection Policy for Charities

Nonprofits and charities frequently outsource a lot of their day-to-day IT work or make use of cloud-hosted solutions, such as software-as-a-service (SaaS) options. However, there’s a growing trend among threat actors to exploit third-party providers in order to gain access to their customers’ data assets. As the past year’s high-profile breach of Blackbaud should remind us, nonprofits may be at extra risk from these types of attacks. 

It’s vital to examine the data privacy and security policies that your provider has in place, as well as to check that all relevant compliance audits are up to date. Cloud use has grown across industries over the course of 2020. This, in turn, puts increased pressure on managed service providers, who are challenged to find the talent they need to manage their data in the cloud. (Cloud environments require more specialized skills because they’re so complex.)

Finally, it may be worthwhile to purchase cybersecurity insurance if you don’t already carry it. A well-chosen policy can absorb many of the financial risks that come with collecting donations online. Keeping ahead of nonprofit cybersecurity risks provides valuable protection for your reputation, and helps ensure that it’ll be healthy, robust and able to work toward achieving its mission — for many holiday seasons to come. 

More from Data Protection

The Importance of Modern-Day Data Security Platforms

Data is the backbone of businesses and companies everywhere. Data can range from intellectual property to critical business plans to personal health information or even money itself. At the end of the day, businesses are looking to grow revenue, innovate, and operationalize but to do that, they must ensure that they leverage their data first because of how important and valuable it is to their organization. No matter the industry, the need to protect sensitive and personal data should be…

Meeting Today’s Complex Data Privacy Challenges

Pop quiz: Who is responsible for compliance and data privacy in an organization? Is it a) the security department, b) the IT department, c) the legal department, d) the compliance group or e) all of the above? If you answered "all of the above," you are well-versed in the complex world of compliance and data privacy! While compliance is a complex topic, the patchwork of regulations imposed by countries, regions, states and industries further compounds it. This complexity has turned…

The Digital World is Changing Fast: Data Discovery Can Help

The rise in digital technology is creating opportunities for individuals and organizations to achieve unprecedented success. It’s also creating new challenges, particularly in protecting sensitive personal and financial information. Personally identifiable information (PII) is trivial to manage. It’s often spread across multiple locations and formats and can be challenging to find and classify. Organizations need a modern data discovery and classification solution to identify sensitive data across physical, virtual and public clouds. The Current State of Sensitive Data Discovery and…

Backdoor Deployment and Ransomware: Top Threats Identified in X-Force Threat Intelligence Index 2023

Deployment of backdoors was the number one action on objective taken by threat actors last year, according to the 2023 IBM Security X-Force Threat Intelligence Index — a comprehensive analysis of our research data collected throughout the year. Backdoor access is now among the hottest commodities on the dark web and can sell for thousands of dollars, compared to credit card data — which can go for as low as $10. On the dark web — a veritable eBay for…