Security Archives - data.org http://data.org/topic/security/ Wed, 30 Aug 2023 18:16:40 +0000 en-US hourly 1 https://wordpress.org/?v=6.4.2 https://data.org/wp-content/uploads/2021/07/cropped-favicon-test-32x32.png Security Archives - data.org http://data.org/topic/security/ 32 32 Cybersecurity Strategies for Nonprofit Websites https://data.org/resources/cybersecurity-strategies-for-nonprofit-websites/ Wed, 30 Aug 2023 18:15:14 +0000 https://data.org/?post_type=resource&p=19555 Overview Keeping a nonprofit organization’s website secure is critical. Cyberattacks can cause significant damage to an organization and include threats such as operational disruptions, data breaches, financial loss, and damage to its reputation.

The post Cybersecurity Strategies for Nonprofit Websites appeared first on data.org.

]]>
Overview

Keeping a nonprofit organization’s website secure is critical. Cyberattacks can cause significant damage to an organization and include threats such as operational disruptions, data breaches, financial loss, and damage to its reputation.

Do you have feedback on this resource?

Thank you for your feedback as we strive to curate and publish resources to help social impact organizations succeed with data.

Send us a note

Explore More

Related Guides & Resources

The post Cybersecurity Strategies for Nonprofit Websites appeared first on data.org.

]]>
Online Privacy for Nonprofits: A Guide to Better Practices https://data.org/resources/online-privacy-for-nonprofits-a-guide-to-better-practices/ Wed, 29 Mar 2023 14:57:45 +0000 https://data.org/?post_type=resource&p=16864 Overview For anyone who works at a nonprofit or civil society group, this guide can help protect the digital privacy of their clients and supporters in a number of ways. These principles should be helpful for thinking about how to move towards better privacy practices in an organization.

The post Online Privacy for Nonprofits: A Guide to Better Practices appeared first on data.org.

]]>
Overview

For anyone who works at a nonprofit or civil society group, this guide can help protect the digital privacy of their clients and supporters in a number of ways. These principles should be helpful for thinking about how to move towards better privacy practices in an organization.

Do you have feedback on this resource?

Thank you for your feedback as we strive to curate and publish resources to help social impact organizations succeed with data.

Send us a note

Explore More

Related Guides & Resources

The post Online Privacy for Nonprofits: A Guide to Better Practices appeared first on data.org.

]]>
Strengthen your Nonprofit’s Digital Security https://data.org/resources/strengthen-your-nonprofits-digital-security/ Thu, 14 Apr 2022 14:02:43 +0000 https://data.org/?post_type=resource&p=10385 Overview A nonprofit’s focus is its mission. Whether they’re supporting humanitarian efforts, promoting animal welfare, fighting climate change, or working to improve health equity, they are focused squarely on providing critical services and support to their community. Social impact organizations are deeply engaged in delivering programs, coordinating, managing volunteers, processing…

The post Strengthen your Nonprofit’s Digital Security appeared first on data.org.

]]>
Overview

A nonprofit’s focus is its mission. Whether they’re supporting humanitarian efforts, promoting animal welfare, fighting climate change, or working to improve health equity, they are focused squarely on providing critical services and support to their community. Social impact organizations are deeply engaged in delivering programs, coordinating, managing volunteers, processing donations, supporting fundraising efforts, and myriad other activities. With all these priorities on their plate, security might seem like something that can wait. Unfortunately, it can’t. Security is more critical than ever for nonprofits.

This e-book provides ways to strengthen a nonprofit’s digital security, including tips on gaining buy-in from leadership and your board, and building security awareness and skills throughout the organization.

Do you have feedback on this resource?

Thank you for your feedback as we strive to curate and publish resources to help social impact organizations succeed with data.

Send us a note

Explore More

Related Guides & Resources

The post Strengthen your Nonprofit’s Digital Security appeared first on data.org.

]]>
6 Data Security Practices For Nonprofits in The Digital Age https://data.org/resources/6-data-security-practices-for-nonprofits-in-the-digital-age/ Thu, 14 Apr 2022 14:01:29 +0000 https://data.org/?post_type=resource&p=10381 Overview In May 2019, one of the biggest nonprofit agencies in western New York experienced a huge data breach. Medical data from both previous and current clients was released, most likely from an employee email, and it was estimated that the data of up to 1,000 clients were exposed during…

The post 6 Data Security Practices For Nonprofits in The Digital Age appeared first on data.org.

]]>
Overview

In May 2019, one of the biggest nonprofit agencies in western New York experienced a huge data breach. Medical data from both previous and current clients was released, most likely from an employee email, and it was estimated that the data of up to 1,000 clients were exposed during the leak. This information included names, addresses, and social security numbers among other pieces of personal information. This resource covers which kinds of data breaches can happen in the nonprofit sector, and how to use the following best practices to prevent them.

Do you have feedback on this resource?

Thank you for your feedback as we strive to curate and publish resources to help social impact organizations succeed with data.

Send us a note

Explore More

Related Guides & Resources

The post 6 Data Security Practices For Nonprofits in The Digital Age appeared first on data.org.

]]>
6 Types of Social Engineering Attacks https://data.org/resources/6-types-of-social-engineering-attacks/ Thu, 14 Apr 2022 13:59:32 +0000 https://data.org/?post_type=resource&p=10377 Overview Social engineering attacks account for a massive portion of all cyber attacks, and studies show that these attacks are on the rise. Social engineers are clever and use manipulative tactics to trick their victims into disclosing private or sensitive information. Once a social engineer has tricked their victim into providing…

The post 6 Types of Social Engineering Attacks appeared first on data.org.

]]>
Overview

Social engineering attacks account for a massive portion of all cyber attacks, and studies show that these attacks are on the rise. Social engineers are clever and use manipulative tactics to trick their victims into disclosing private or sensitive information. Once a social engineer has tricked their victim into providing this information, they can use it to further their attacks. This resource explores the six common types of social engineering attacks.

Do you have feedback on this resource?

Thank you for your feedback as we strive to curate and publish resources to help social impact organizations succeed with data.

Send us a note

Explore More

Related Guides & Resources

The post 6 Types of Social Engineering Attacks appeared first on data.org.

]]>
Best Password Manager to Use for 2022 https://data.org/resources/best-password-manager-to-use-for-2022/ Thu, 14 Apr 2022 13:57:53 +0000 https://data.org/?post_type=resource&p=10373 Overview Memorizing multiple passwords can be a challenge, but it is downright dangerous to use the same one for everything, and online privacy is not the place where anyone should be cutting corners. With many employees still working remotely, it’s never been more essential to make sure that their online presence…

The post Best Password Manager to Use for 2022 appeared first on data.org.

]]>
Overview

Memorizing multiple passwords can be a challenge, but it is downright dangerous to use the same one for everything, and online privacy is not the place where anyone should be cutting corners. With many employees still working remotely, it’s never been more essential to make sure that their online presence is secure and safe from prying eyes.

Do you have feedback on this resource?

Thank you for your feedback as we strive to curate and publish resources to help social impact organizations succeed with data.

Send us a note

Explore More

Related Guides & Resources

The post Best Password Manager to Use for 2022 appeared first on data.org.

]]>
Cybersecurity Basics https://data.org/resources/cybersecurity-basics-podcast/ Thu, 14 Apr 2022 13:56:47 +0000 https://data.org/?post_type=resource&p=10369 Overview This podcast explores cybersecurity preparedness options, and highlights common scams directed at nonprofits.

The post Cybersecurity Basics appeared first on data.org.

]]>
Overview

This podcast explores cybersecurity preparedness options, and highlights common scams directed at nonprofits.

Do you have feedback on this resource?

Thank you for your feedback as we strive to curate and publish resources to help social impact organizations succeed with data.

Send us a note

Explore More

Related Guides & Resources

The post Cybersecurity Basics appeared first on data.org.

]]>
Cybersecurity Guide for Nonprofits https://data.org/resources/cybersecurity-guide-for-nonprofits/ Thu, 14 Apr 2022 13:45:29 +0000 https://data.org/?post_type=resource&p=10389 Overview On a nearly weekly basis, reports of cyberattacks against private companies or government entities surface. Although news headlines may not be filled with the vulnerabilities nonprofit organizations face, nonprofits are not immune. By understanding what cybersecurity is, performing a risk assessment, and implementing simple strategies, nonprofit organizations can protect…

The post Cybersecurity Guide for Nonprofits appeared first on data.org.

]]>
Overview

On a nearly weekly basis, reports of cyberattacks against private companies or government entities surface. Although news headlines may not be filled with the vulnerabilities nonprofit organizations face, nonprofits are not immune. By understanding what cybersecurity is, performing a risk assessment, and implementing simple strategies, nonprofit organizations can protect themselves from cyberattacks.

This guide provides an informative overview of cybersecurity, and offers a risk assessment along with simple strategies to help nonprofits protect themselves from cyberattacks.

Do you have feedback on this resource?

Thank you for your feedback as we strive to curate and publish resources to help social impact organizations succeed with data.

Send us a note

Explore More

Related Guides & Resources

The post Cybersecurity Guide for Nonprofits appeared first on data.org.

]]>
Data Security for Nonprofits https://data.org/guides/data-security-for-nonprofits/ Wed, 13 Apr 2022 14:31:09 +0000 https://data.org/?post_type=guide&p=9991 Introduction A wise person once said to only collect what you can protect. As nonprofit and social impact organizations, we often have sensitive data about the individuals we interact with. This includes financial information about our donors, personal information about the people we serve (who are often already in vulnerable…

The post Data Security for Nonprofits appeared first on data.org.

]]>
Introduction

A wise person once said to only collect what you can protect. As nonprofit and social impact organizations, we often have sensitive data about the individuals we interact with. This includes financial information about our donors, personal information about the people we serve (who are often already in vulnerable situations), and data about the people we employ. We must ensure that in our desire to collect and use the information we are not increasing the vulnerability of those we work with. 

In this Guide
  • How valuable is the data your organization holds
  • Types of risks and adverse actors
  • Best practices you can deploy today
  • Resources for going deeper in data security

Elements of Digital Security

To begin, what do we mean by Digital Security? In short, it is the protection of the digital assets that your organization maintains. There is real financial value in the digital assets of your organization. For example, a stolen credit card number sells for anywhere between $5 and $150 on the dark web. Take a minute and think about how much credit card data your organization has stored in its fundraising system.

It is not just financial information that is at risk. Sometimes, actors want access to information about those that you are serving for something other than financial gain. There’s the basic stolen identity stuff like social security numbers, addresses, and birth dates. Then there are more targeted goals, like governments trying to identify opposition actors or LGBT activists. If your organization works with individuals and populations that are marginalized or exploited you must consider that those doing the exploiting might value your data.

When it comes to digital security you must assume that someone is trying to take the valuable information you have — and that it is your job to thwart their efforts.

Best Practices to Get Started

The most common way that information is leaked is through people inadvertently giving an adverse actor access to your system. This happens through tactics like baiting, phishing, and scareware where an adverse actor tricks an employee into giving up information allowing them to access your information. It also happens through gaining access to compromised passwords elsewhere and then re-using them on your system. So the first line of defense for your organization’s digital security is your people. Invest in password management apps that make it easy to create unique passwords for every log-in and two-factor authentication for your systems. Teach people throughout your organization how to identify when they might be the targets of these social engineering campaigns and you will be increasing the security of your data.

The reality is that sometimes an intruder will gain access to your system. It’s now important to identify that activity as quickly as possible. Cybersecurity tools from companies like Splunk or DataDog can identify these threats and help your team respond quickly and efficiently. If your system is compromised, it is important to communicate these breaches as clearly and quickly as you can. You have been entrusted with people’s information, and if that information is compromised they have a right to know in order to respond themselves.

The last best practice to get started with is a bit counterintuitive: it’s to destroy your data! If your organization is storing data it is no longer using, you should destroy that data. It’s a simple cost-benefit analysis. If you are no longer getting value from your data, it becomes a liability; it makes no sense to keep that information lying around! Create a policy and a practice for destroying data that is no longer being used. If you don’t want to destroy all of the information then destroy the identifiable aspects that have the highest risk associated with them.

Going Deeper

As you go along your digital security journey and if you have more amounts of sensitive information there is more that can be done to ensure the safety and security of your data. For example, investigating whether your organization should pursue cyber liability insurance to invest in better tools for monitoring threats to build out a team that is solely focused on ensuring the security of your data.

Conclusion

Your organization has been entrusted with sensitive and valuable data. It is your responsibility to protect that information. If you are investing in data collection and analytics, you also need to invest in protecting that information. Invest in your people. Invest in systems to help you identify and respond to threats. Invest in practices that help you limit the risks your organization faces.

Join Our Community

Make connections with other social impact organizations and receive a curated listing of community and data.org events and opportunities.

By submitting your information and clicking “Submit”, you agree to the data.org Privacy Policy and Terms and Conditions, and to receive email communications from data.org.

The post Data Security for Nonprofits appeared first on data.org.

]]>
Crafting Your Data Strategy https://data.org/guides/crafting-your-data-strategy/ Wed, 12 Jan 2022 18:34:49 +0000 https://data.org/?post_type=guide&p=6359 Introduction A data strategy lays out your approach to using data at your organization, including what data capabilities you want to have and how you’ll collect and manage your data. Executing your data strategy may involve building new data collection and management systems, as well as hiring new data talent.…

The post Crafting Your Data Strategy appeared first on data.org.

]]>
Introduction

A data strategy lays out your approach to using data at your organization, including what data capabilities you want to have and how you’ll collect and manage your data. Executing your data strategy may involve building new data collection and management systems, as well as hiring new data talent. Importantly, your strategy will also help you identify where you need to make behavioral or cultural changes at your organization so that your staff is all thinking about and acting on data in ways that support your strategy.

In data.org’s Data Maturity Assessment (DMA), you’ll see three dimensions that define a strong data strategy: Purpose, Practice, and People. If you’re looking to improve your organization’s use of data, these three dimensions can be helpful for thinking about what you need to change. If you haven’t already taken the DMA, we encourage you to do so in order to get a sense of where you may have opportunities for improving your data capabilities. 

In this Guide
  • Learn about getting started with data strategy and how to implement it in your organization.
  • Read about the three dimensions that define a strong data strategy. 
  • Assess your organization’s data journey through the Data Maturity Assessment.

Purpose

The most important part of any data strategy is to identify what it is you actually want to use data to do. It’s no use creating a new database for storing data if you haven’t already established the ways you’ll use that data. The uses of data are numerous, ranging from reporting output numbers to funders, to feeding data-driven algorithms that speed up your work, to persuading people to join your cause. If you’re at the beginning of your data journey or are considering a new strategy at your organization, it may be a good time to assess what outcomes you want to achieve with data.

Here are some resources to help you determine your purpose:

Practice

Once you’ve determined the outcomes you want to achieve with data, you’ll next want to think about how you’ll go about achieving them. The data practice at your organization encompasses all of the stages of the “data value lifecycle”, i.e. how you manage data from collection to analysis. There are many considerations to make in this phase, so we’ve interspersed overall guides with our favorite resources on specific stages of the data use pipeline.

People

You may have your Purpose and Practice mapped out, but data strategies don’t run themselves. You’ll need our third P, People to make your work come to life. You’ll want to consider three types of personnel factors: technical skills, workflow changes, and cultural changes. Technical skills are the most straightforward—you’ll need people who know how to collect and use data to execute on your strategy and may have to train or hire staff to succeed. Workflow changes take into consideration the changes your staff will have to make for your data strategy to succeed, even if they’re not the “tech people” or “data people”. For example, in order to analyze the operations of your online mentoring program, you may now need tutors to log how much time they spend with each student. Lastly, cultural changes refer to the changes you’ll need to make in peoples’ mindsets and behaviors around data generally. For example, decision-makers may nod along with a data strategy but secretly resent having a computer “tell them” what to do and thus undermine the strategy in practice. If you are looking for more data capabilities on staff or are considering a substantial change to your data strategy that will require workflow and mindset shifts, this section may be a good place for you to start.

Conclusion

We hope this guide helps you on your data journey, whether you’re just taking your first steps or lacing up for your next marathon. No matter what, remember that building your data strategy is an ever-evolving process that you’ll continue to nudge, mold, and tweak as you find what works for you. Don’t be deterred if you need to keep experimenting, since change is really the only constant when it comes to data. Keep going and good luck on your data journey! Please feel free to suggest any other guides you found helpful by contacting us and we may incorporate them. 

Join Our Community

Make connections with other social impact organizations and receive a curated listing of community and data.org events and opportunities.

By submitting your information and clicking “Submit”, you agree to the data.org Privacy Policy and Terms and Conditions, and to receive email communications from data.org.

The post Crafting Your Data Strategy appeared first on data.org.

]]>
Contractual Wheel of Data Collaboration https://data.org/resources/contractual-wheel-of-data-collaboration/ Mon, 10 Jan 2022 21:55:42 +0000 https://data.org/?post_type=resource&p=5854 Overview In taking on urgent global challenges, organizations are faced with a critical hurdle: a lack of necessary data. There are many ongoing efforts to fill this data gap, including developing new technologies, sources, and collaborations. But promising data-sharing partnerships and data collaboratives (particularly between the private and public sectors)…

The post Contractual Wheel of Data Collaboration appeared first on data.org.

]]>
Overview

In taking on urgent global challenges, organizations are faced with a critical hurdle: a lack of necessary data. There are many ongoing efforts to fill this data gap, including developing new technologies, sources, and collaborations. But promising data-sharing partnerships and data collaboratives (particularly between the private and public sectors) can struggle to overcome institutional and legal barriers.

This resource provides both an analytical framework and an online library of legal clauses that capture the key elements of sharing agreements for data collaboration, complete with links to several detailed guides. This resource addresses the lack of clarity around data sharing and data action issues that often result in high transaction costs and significant delays during the negotiation process.

Do you have feedback on this resource?

Thank you for your feedback as we strive to curate and publish resources to help social impact organizations succeed with data.

Send us a note

Explore More

Related Guides & Resources

The post Contractual Wheel of Data Collaboration appeared first on data.org.

]]>
Data Impact Assessments https://data.org/resources/data-impact-assessments/ Mon, 10 Jan 2022 21:35:05 +0000 https://data.org/?post_type=resource&p=5759 Overview This resource provides an introduction to Data Impact Assessments (DIAs) in humanitarian action. DIAs can help maximize benefits and minimize risks in operational data management. DIAs can also serve as a compliance mechanism with applicable laws, regulations, and internal policies and provide other guidance to reduce risks in data…

The post Data Impact Assessments appeared first on data.org.

]]>
Overview

This resource provides an introduction to Data Impact Assessments (DIAs) in humanitarian action. DIAs can help maximize benefits and minimize risks in operational data management. DIAs can also serve as a compliance mechanism with applicable laws, regulations, and internal policies and provide other guidance to reduce risks in data management.

Do you have feedback on this resource?

Thank you for your feedback as we strive to curate and publish resources to help social impact organizations succeed with data.

Send us a note

Explore More

Related Guides & Resources

The post Data Impact Assessments appeared first on data.org.

]]>