Nonprofits On The Internet: A Secure System Is Essential The Internet may be one of the best communication tools ever for nonprofits, but to ensure that this powerful tool works for - not against - an organization, security must be a priority, from the moment that a nonprofit decides to establish an online presence and continuing as long as the group is using the Internet. As people become more sensitive about personal information they provide online, the margin for error on security matters becomes increasingly small for nonprofits. Not only is constituent trust at stake, but most nonprofits don't have the resources to weather an incident such as a major exposure of constituents' personal information. One significant security breach can, in a matter of days, undo years of building a trusting relationship with supporters; nonprofits must protect themselves and their most valuable asset - a loyal constituent base. Take stock of risk factors A nonprofit must take steps proactively to protect itself: any attempted exchange of data between the Internet and the organization's systems must be carefully controlled, and assumed to be hostile unless proven otherwise. Running an Internet service accessing constituents' data without proper security measures is akin to leaving the donor history file in plain view on the back seat of an unlocked car. Design security into the system Maintain constant vigilance Sophisticated criminals aware of security holes often craft automated tools to easily compromise thousands of unsuspecting owners' desktop computers and small servers. The recent NIMDA and Code Red worms exemplify this. Conversely, an attack against a well-run system usually involves days or weeks of careful probing to discover technical details and obscure flaws about those systems. Vigilance is once again the key - logging and monitoring information will provide clues about potential attacks while there's still time for taking additional preventative measures. SSL is not the cure-all Manage credit card risks 1. Information used for one transaction (name, card number, zip code and sometimes address) can be used for another with a different payee. 2. The payee can be in a foreign country. Internet criminals refer to the combination of a card number and personal details as a "phish," which they treat as a form of tradable currency. A computer with stored card details can yield thousands of "phish" in a single theft, and organized crime is starting to turn its attention to this lucrative new medium. One solution: process all credit card gifts and memberships instantly, immediately provide the donor a receipt and never store card details. Partner with a security specialist Top 5 questions to ask partners 1. In lay terms, how will you approach the online security needs of our organization? If the answer is a list of product names and buzzwords, think twice. 2. What types of training and experience does your operating team have? As in any other field, there's a big difference between a system administrator with 10 years of experience in running secure, enterprise-level IT systems, and a junior person with vendor certification in operating an office PC network. 3. Who are your other clients, what is the duration of their contracts with your company and how many have renewed or expanded their relationships with you? 4. What quantifiable "results" or case studies can you share regarding your work with clients? 5. May we talk with some of your clients? Protect Your Investments |
|