Loading…

Fraud & Scam Protection

How Non-profits Can Protect Against Cybercrime and Ransomware

February 11, 2024 GrantFunds Editorial Team

How Non-profits Can Protect Against Cybercrime and Ransomware

The Rising Cybercrime Threat to Non-profits

Non-profit organizations have become increasingly prominent targets for cybercrime — including ransomware, business email compromise, data theft, and network intrusion — for reasons that combine organizational attractiveness to criminals with organizational vulnerability to attack. The attractiveness factors include: the valuable personal and financial data that Non-profits hold (donor payment information, beneficiary personal records, organizational financial accounts); the reputational sensitivity that makes ransomware extortion effective (organizations working on sensitive social issues face reputational damage from data exposure that creates strong motivation to pay ransoms); and the trust relationships that Non-profits maintain with funders, partners, and government agencies that can be exploited through business email compromise schemes once organizational email accounts are compromised. The vulnerability factors include: chronically limited IT budgets that result in outdated software, inadequate security configurations, and absence of security monitoring; reliance on small or volunteer IT support without cybersecurity expertise; lack of cybersecurity awareness training for staff; and organizational cultures that prioritize program delivery over operational security investment. The combination of high attractiveness and significant vulnerability has made Non-profit organizations one of the most frequently targeted sectors in ransomware attacks, with devastating consequences for those without adequate backup systems and incident response capabilities.

Understanding Ransomware and How It Enters Organizations

Ransomware — malicious software that encrypts organizational files and systems, making them inaccessible, and demands payment in cryptocurrency for the decryption key — typically enters Non-profit organizations through three primary vectors: phishing emails that trick staff into clicking malicious links or attachments that install ransomware on organizational systems; exploitation of unpatched software vulnerabilities in operating systems, applications, or network infrastructure that allow attackers to gain access without requiring staff interaction; and compromised credentials (usernames and passwords) obtained through prior phishing attacks or purchased from criminal marketplaces that enable attackers to log into organizational systems with legitimate credentials and deploy ransomware directly. Understanding these entry vectors is essential for building effective prevention — because ransomware is not a force of nature but a human-executed attack that requires specific preconditions that organizations can systematically prevent. Organizations that maintain current software patches across all systems, use multi-factor authentication for all remote access and email accounts, train staff to recognize and report phishing attempts, and segment their networks to limit the spread of infections that do occur are dramatically less vulnerable to successful ransomware attacks than those without these basic protections in place.

Advertisement
Discover thousands of grant opportunities

Critical Prevention Measures

The Non-profit cybersecurity measures with the highest return on investment — the actions that prevent the most significant proportion of successful cyberattacks at the lowest cost — can be implemented by organizations with limited IT budgets and without dedicated cybersecurity staff. Multi-factor authentication (MFA) — requiring a second verification factor (a code sent to a mobile phone, a hardware security key, or an authenticator app code) in addition to a password for all organizational account logins — prevents the vast majority of credential-based account takeovers, because stolen passwords alone are insufficient to access MFA-protected accounts. Regular, tested offline or cloud backups — backup copies of all organizational data maintained in locations that ransomware cannot reach and tested regularly to verify they can actually be restored — transform a potentially catastrophic ransomware attack (encrypting all organizational data without a backup) into a manageable recovery event. Staff phishing awareness training — regular simulated phishing exercises that test staff ability to recognize suspicious emails, combined with training that explains the tactics attackers use — measurably reduces the click rates on phishing emails that would otherwise install malware on organizational systems. These three measures — MFA, tested backups, and phishing training — address the highest-probability attack vectors and should be the starting point for any Non-profit cybersecurity improvement program regardless of organizational size or technical sophistication.

Incident Response: What to Do When You Are Attacked

Even well-protected Non-profit organizations can be successfully attacked by sophisticated threat actors, and having a documented incident response plan — a set of procedures for detecting, containing, and recovering from cybersecurity incidents — dramatically improves the outcome of attacks that do succeed. A basic Non-profit incident response plan addresses: detection (how staff identify and report suspected security incidents, including clear reporting channels and assurance that reporting is encouraged rather than stigmatized); initial response (who is called first when an incident is suspected, what immediate steps are taken to limit spread — typically isolating affected systems from the network immediately — and what decisions require leadership involvement); external resources (the cybersecurity incident response firm, cyber insurance carrier, and legal counsel whose support should be engaged quickly in significant incidents); notification obligations (the legal requirements to notify affected individuals, regulators, and in some cases funders or law enforcement when data breaches occur); and recovery (the process for restoring systems from backups, verifying that malware has been eliminated before reconnecting systems to organizational networks, and documenting lessons learned to prevent recurrence). Organizations that have rehearsed their incident response plan — even through tabletop exercises that walk through a hypothetical attack scenario without deploying actual systems — respond significantly more effectively to real incidents than those encountering their plan for the first time under attack conditions.

Found this helpful? Share it: