CYBER 101

  • Alerts
  • Blog
  • Cyber Briefing
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Domains
  • FAQ
  • Incidents
  • Tutorials

Subscribe to our newsletter

FOLLOW US

No Result
View All Result
  • Login
  • Register
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
  • Jobs
  • Vendors
Get Help
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
No Result
View All Result
  • Jobs
  • Vendors
Get Help
CyberMaterial
Home Document

2022 Nonprofit Cybersecurity Incident Report

Reading Time: 2 mins read
in Career, Document, Nonprofits, Report

Executive Summary

Cybersecurity is a topic that has become more and more visible to nonprofits in the years since we started this report in 2019, although there are still too many nonprofit leaders who consider cybersecurity “something the IT department does.” Security should be the goal of everyone at your organization, and this year’s Incident Report makes that clear. We hope to also make it clear that attending to a few basics – many low-cost, or using free tools, or existing security features of platforms and subscriptions you already pay for – goes a long way toward protecting your entire nonprofit.

2021 saw the responses to COVID, including remote work, shift from a temporary solution to a new permanent environment of hybrid, in-person, and at-home workers needing IT support. We saw a continuing increase in the volume of targeted spear phishing emails with staff working from home.

The transition to working from home has also increased security risks, as more personal devices are used to access work resources, and more remote workers may attempt to work around security requirements when the security barriers don’t align with their access needs.

Happily, we saw many organizations implementing and requiring Multi-Factor Authentication on all logins or moving to Single Sign On where possible. In fact, the only nonprofits in our network to suffer account compromise had not required MFA on the accounts that were exploited, showing the strength of this fairly simple and low-cost deterrent.

We can also report evidence that frequent, robust, “micro” training for all staff in identifying and responding to basic level attempts to infiltrate your IT systems is successful in lowering the success of these attempts at fraud. While there is some research that watching an annual security video has little effect on staff practices, peer-to-peer and gamified micro-training programs work to increase awareness and activate an attitude of healthy skepticism that can counter increasingly sophisticated wire fraud scams.

 

GET DOCUMENT

Tags: Community ITDocumentsNonprofitsNonprofits DocumentsNonprofits ReportsReportsSecurity
ADVERTISEMENT

Related Posts

Digital Footprint – Course

Digital Footprint – Course

February 5, 2023
Foundation Certificate in Cyber Security

Foundation Certificate in Cyber Security

February 5, 2023
Digital footprint awareness and training

Digital footprint awareness and training

February 5, 2023
Cybersecurity: A Self-Defense Guide

Cybersecurity: A Self-Defense Guide

February 5, 2023

More Articles

Alerts

CISA adds new flaws Exploited Vulnerabilities

August 29, 2022
Incidents

Aditya Birla Fashion confirms data breach

January 18, 2022
Alerts

SynAck ransomware gang releases decryption keys for old victims

August 13, 2021
Incidents

Lithuanian ad website hit by cyberattack

July 20, 2022
Tool

TrustArc Privacy Management Platform

March 21, 2022
Book

Good Code, Bad Code: Think like a software engineer

July 25, 2022
Incidents

Norton LifeLock says thousands of customer accounts breached

January 16, 2023
Incidents

Textile Company Sferra Discloses Data Breach

August 22, 2022
Load More

Security through data

Cybersecurity Domains

  • API Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • HSM
  • KPIs / KRIs
  • Penetration Testing
  • Shift Left
  • Vulnerability Scan

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • E-Commerce
  • Healthcare
  • IoT
  • Quantum Computing

Frameworks

  • CIS Controls
  • CCPA
  • GDPR
  • NIST
  • 23 NYCRR 500
  • HIPAA

Repository

  • Books
  • Certifications
  • Definitions
  • Documents
  • Entertainment
  • Quotes
  • Reports

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering

© 2023 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
No Result
View All Result
  • Audience
    • Cyber Citizens
    • Cyber Professionals
    • Institutions
  • Highlights
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Domains
    • Incidents
    • Threats
  • Opportunities
    • Events
    • Jobs
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Frameworks
    • Games
    • Hardware Tools
    • Memes
    • Movies
    • Papers
    • Podcasts
    • Quotes
    • Reports
  • Report Cyber Incident
  • GET HELP

Subscribe to our newsletter

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Sign In with Google
Sign In with Linked In
OR

Forgotten Password? Sign Up

Create New Account!

Sign Up with Google
Sign Up with Linked In
OR

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.