SlideShare a Scribd company logo
1 of 32
Download to read offline
Welcome to
Bloomerang Academy
Thank you for joining us!
Ask questions
Live Transcript
Share ideas
Housekeeping
Housekeeping
We will share the slides and recording of this session with you via
email later today.
Dial in audio access: +1 669 900 6833
Any questions we are not able to answer live or in the Q&A will
be addressed after the session via a follow-up.
If you need further assistance, please reach out to
support@bloomerang.com. Our support team is amazing!
Poll
Katie Gaston
Katie joined the Bloomerang Team after more
than 13 years supporting the growth of various
software organizations. She lives in Boise, Idaho
with her two cats, two dogs, and loving
husband. She is passionate about giving back
and currently serves as a Warhawk Wing Girl
for an organization celebrating veterans.
Sr. Product Marketing Manager
Seth Steward
Seth is the Sr. Director of IT for Bloomerang
and joined the team in March of 2021. His
passions are simplifying complex tasks and
leaving things better than he found them. He is
a proud papa to humans as well as an
adorable mutt (Go Roo!). His favorite causes are
PAWS Chicago and the local Humane Society.
Sr. Director of IT
Protecting Your
Organizational Data
What will we
cover today?
Agenda
1. Why security matters
2. 5 ways to protect your organization
3. How Bloomerang helps
4. Resources
5. Questions
The state of
security threats
for nonprofits
1) Average cost of cyber security
attack for SMB is $25K (but can
be much higher).
2) In 2021, more than 50% of NGOs
reported being targeted by a
cyberattack.
3) 27% of nonprofits worldwide have
experienced a cyber security
attack.
4) The average length of disruption
(inability to do business) is 21 days
following a ransomware attack.
5) Hackers attack every 39 seconds,
on average 2,244 times a day.
Why this matters:
The risk
1) Reputation harm / loss
2) Precious funds to recover data
3) Identify theft
4) Disruption in ability to carry out
business as usual
5) Exposing sensitive data on
donors and stakeholders
6) Holding organization in scrutiny due
to vulnerability in security
7) Spreading politically motivated
messages
Why this matters:
The damage
The Attack: Targeted Code
The Damage: Personal information
for >500K people
The Cost: Reputational Damage
Attack Study:
International
Committee of
Red Cross
The Attack: Held data hostage
requesting $43K
The Damage: Released sensitive
information of cancer patients
online; lost all of organizational
data
The Cost: Reputational damage,
significant staff time
Attack Study:
Cancer Services of
East Central Indiana
- Little Red Door
The Attack: Auth attack that racked
up ~$6K in credit card fees.
The Damage: Stripe initially
requested for payment until media
got involved and they backed down.
The Cost: Staff time, stress, and
potentially lost funds
Attack Study:
Queens Together
1) More than 70% of nonprofits have not
run even one vulnerability assessment
to evaluate their potential risk exposure.
2) 59% of nonprofits do not provide any
cybersecurity training to staff on a
regular basis.
3) Only 20% of nonprofits have a policy in
place to address cyberattacks.
4) 22% of charities have cyber security
insurance as part of a wider insurance
policy; 5% have a specific cyber
security insurance policy.
5) 64% of charities report staff /
volunteers regularly use their own
devices.
Why this matters:
Current state
5 Things to Do THIS
year for Cyber Security
1. Encrypt your data
2. Lock your computer when
you step away
3. Keep your computer
updated
4. Use the cloud to backup &
store data
5. Use Endpoint Protection
software
1. Computer
Housekeeping
2. Use a
Password
Manager +
enable MFA
1. What is a Password Manager?
2. Why use a Password
Manager?
3. What is MFA?
3. Establish a
Security
Awareness
Training
program
1. Be vigilant when clicking on
links in emails - hover over
them
2. Only enter information on
sites that are secure (https://)
4. Use a chat
platform as
your main
form of
internal
communication
1. Harder to impersonate
2. Reduced exposure to spam
and malware
3. End-to-end encryption
5. Build an
Incident
Response
Plan
1. Define scenarios
a. Unintentional deletion
b. Intentional deletion
c. Ransomware
d. Data Compromise
2. Choose who will run point in each scenario
3. Document how each scenario might be
responded to
How Bloomerang can
help with security
1) Fraud Protection (Free)
2) Update Expired Cards
3) PCI-Certified
4) Award winning support
5) 6+ Payment Types
Sign-up for
Bloomerang
Payments
1) Keep Donor Data Secure
2) Grant access to stakeholders
3) Details
a) Admin
i) Full system access
b) Standard
i) Access to specific
areas
ii) View-only access to
transactions,
constituents, reports
iii) Restricted access to
giving info (coming
soon)
User Permissions
1) Bloomerang sends users an
additional code to their
authenticated email during
login.
2) Enter code to access
database.
Bloomerang:
Enable 2-Factor
Authentication
Enable Captcha
1) Sign up for Google
ReCAPTCHA (V3).
2) Add Site Key and Secret Key
to Bloomerang.
3) Enable for Transaction Forms
& Interaction Forms
Bonus: Rate Limit Transactions!
1) Secure websites: Code snippet
2) Unsecure: We’ll host on your
behalf (with CAPTCHA)
How to check if website is secure?
1) Chrome: Look for the lock
2) Should read HTTPs
3) Most websites come secure if
built recently
3) Automatically includes CAPTCHA
S
Secure Forms
Hosting
● Hosted on world-class
infrastructure providers
Amazon Web Services (AWS),
and Google Cloud Platform
(GCP).
● Anti-malware, mobile device
management deployed.
● Data is encrypted in transit
and at-rest.
Database
Resources
Bloomerang Knowledgebase and Support Portal
Resources
Knowledgebase
Host Forms Securely
How does Bloomerang store data? FAQ
How Secure Is the Donation Form?
Prevent Fraudulent Transactions
ReCAPTCHA - Sign Up and Increase Form Security
Tech Tip:
Password Manager Suggestions:
2. Free Options
1. NordPass
2. Dashlane
3. Bitwarden
4. KeePass
3. Paid Options
1. 1Password
Thank you for attending!
Visit our website to see more upcoming
Bloomerang Academy webinars!

More Related Content

Similar to Protecting Your Organizational Data.pdf

HDI Capital Area Meeting May 2019 Cybersecurity Planning for the Modern Techn...
HDI Capital Area Meeting May 2019 Cybersecurity Planning for the Modern Techn...HDI Capital Area Meeting May 2019 Cybersecurity Planning for the Modern Techn...
HDI Capital Area Meeting May 2019 Cybersecurity Planning for the Modern Techn...hdicapitalarea
 
Cyber Security, IP Theft, and Data Breaches
Cyber Security, IP Theft, and Data BreachesCyber Security, IP Theft, and Data Breaches
Cyber Security, IP Theft, and Data BreachesEthisphere
 
4. Forensic Investigation Techniques By Neil Hare Brown.pptx
4. Forensic Investigation Techniques By Neil Hare Brown.pptx4. Forensic Investigation Techniques By Neil Hare Brown.pptx
4. Forensic Investigation Techniques By Neil Hare Brown.pptxAMIRHAMZA18953
 
Cyber attack response from the CEO perspective - Tallinn Estonia - Short Simu...
Cyber attack response from the CEO perspective - Tallinn Estonia - Short Simu...Cyber attack response from the CEO perspective - Tallinn Estonia - Short Simu...
Cyber attack response from the CEO perspective - Tallinn Estonia - Short Simu...Kevin Duffey
 
Why Do Some People Fall for Phishing Scams and What Do I Do About it?
Why Do Some People Fall for Phishing Scams and What Do I Do About it?Why Do Some People Fall for Phishing Scams and What Do I Do About it?
Why Do Some People Fall for Phishing Scams and What Do I Do About it?Beth Sallay
 
Security Basics Webinar
Security Basics WebinarSecurity Basics Webinar
Security Basics WebinarTechSoup
 
Leading Practices in Information Security & Privacy
Leading Practices in Information Security & PrivacyLeading Practices in Information Security & Privacy
Leading Practices in Information Security & PrivacyDonny Shimamoto
 
Managing privacy by Victor Chapela
Managing privacy by Victor ChapelaManaging privacy by Victor Chapela
Managing privacy by Victor ChapelaJuan Carlos Carrillo
 
Data breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in DangerData breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in DangerZitaAdlTrk
 
ConnXus myCBC Webinar Series: Cybersecurity Risks to Your Business
ConnXus myCBC Webinar Series: Cybersecurity Risks to Your BusinessConnXus myCBC Webinar Series: Cybersecurity Risks to Your Business
ConnXus myCBC Webinar Series: Cybersecurity Risks to Your BusinessConnXus
 
Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91...
Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91...Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91...
Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91...Naga Rohit
 
Shariyaz abdeen data leakage prevention presentation
Shariyaz abdeen   data leakage prevention presentationShariyaz abdeen   data leakage prevention presentation
Shariyaz abdeen data leakage prevention presentationShariyaz Abdeen
 
Drawing And Writing Paper. Online assignment writing service.
Drawing And Writing Paper. Online assignment writing service.Drawing And Writing Paper. Online assignment writing service.
Drawing And Writing Paper. Online assignment writing service.Nicole Savoie
 
Baker Tilly Presents: Emerging Trends in Cybersecurity
Baker Tilly Presents: Emerging Trends in CybersecurityBaker Tilly Presents: Emerging Trends in Cybersecurity
Baker Tilly Presents: Emerging Trends in CybersecurityBakerTillyConsulting
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyMark Albala
 
How Boards Can Learn to Stop Avoiding & Start Loving Cyber Risk!
How Boards Can Learn to Stop Avoiding & Start Loving Cyber Risk!How Boards Can Learn to Stop Avoiding & Start Loving Cyber Risk!
How Boards Can Learn to Stop Avoiding & Start Loving Cyber Risk!Dottie Schindlinger
 
Spam as social engineering presentation.
Spam as social engineering presentation.Spam as social engineering presentation.
Spam as social engineering presentation.fificoco
 

Similar to Protecting Your Organizational Data.pdf (20)

HDI Capital Area Meeting May 2019 Cybersecurity Planning for the Modern Techn...
HDI Capital Area Meeting May 2019 Cybersecurity Planning for the Modern Techn...HDI Capital Area Meeting May 2019 Cybersecurity Planning for the Modern Techn...
HDI Capital Area Meeting May 2019 Cybersecurity Planning for the Modern Techn...
 
Cyber Security, IP Theft, and Data Breaches
Cyber Security, IP Theft, and Data BreachesCyber Security, IP Theft, and Data Breaches
Cyber Security, IP Theft, and Data Breaches
 
4. Forensic Investigation Techniques By Neil Hare Brown.pptx
4. Forensic Investigation Techniques By Neil Hare Brown.pptx4. Forensic Investigation Techniques By Neil Hare Brown.pptx
4. Forensic Investigation Techniques By Neil Hare Brown.pptx
 
Document-3.docx
Document-3.docxDocument-3.docx
Document-3.docx
 
Cyber attack response from the CEO perspective - Tallinn Estonia - Short Simu...
Cyber attack response from the CEO perspective - Tallinn Estonia - Short Simu...Cyber attack response from the CEO perspective - Tallinn Estonia - Short Simu...
Cyber attack response from the CEO perspective - Tallinn Estonia - Short Simu...
 
Why Do Some People Fall for Phishing Scams and What Do I Do About it?
Why Do Some People Fall for Phishing Scams and What Do I Do About it?Why Do Some People Fall for Phishing Scams and What Do I Do About it?
Why Do Some People Fall for Phishing Scams and What Do I Do About it?
 
Security Basics Webinar
Security Basics WebinarSecurity Basics Webinar
Security Basics Webinar
 
Leading Practices in Information Security & Privacy
Leading Practices in Information Security & PrivacyLeading Practices in Information Security & Privacy
Leading Practices in Information Security & Privacy
 
Data security
Data securityData security
Data security
 
Managing privacy by Victor Chapela
Managing privacy by Victor ChapelaManaging privacy by Victor Chapela
Managing privacy by Victor Chapela
 
Data breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in DangerData breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in Danger
 
ConnXus myCBC Webinar Series: Cybersecurity Risks to Your Business
ConnXus myCBC Webinar Series: Cybersecurity Risks to Your BusinessConnXus myCBC Webinar Series: Cybersecurity Risks to Your Business
ConnXus myCBC Webinar Series: Cybersecurity Risks to Your Business
 
Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91...
Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91...Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91...
Internet Security - Naga Rohit S [ IIT Guwahati ] - Coding Club & DefCon DC91...
 
Shariyaz abdeen data leakage prevention presentation
Shariyaz abdeen   data leakage prevention presentationShariyaz abdeen   data leakage prevention presentation
Shariyaz abdeen data leakage prevention presentation
 
Drawing And Writing Paper. Online assignment writing service.
Drawing And Writing Paper. Online assignment writing service.Drawing And Writing Paper. Online assignment writing service.
Drawing And Writing Paper. Online assignment writing service.
 
Baker Tilly Presents: Emerging Trends in Cybersecurity
Baker Tilly Presents: Emerging Trends in CybersecurityBaker Tilly Presents: Emerging Trends in Cybersecurity
Baker Tilly Presents: Emerging Trends in Cybersecurity
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
 
How Boards Can Learn to Stop Avoiding & Start Loving Cyber Risk!
How Boards Can Learn to Stop Avoiding & Start Loving Cyber Risk!How Boards Can Learn to Stop Avoiding & Start Loving Cyber Risk!
How Boards Can Learn to Stop Avoiding & Start Loving Cyber Risk!
 
Types of Cyber Crimes and Security Threats
Types of Cyber Crimes and Security ThreatsTypes of Cyber Crimes and Security Threats
Types of Cyber Crimes and Security Threats
 
Spam as social engineering presentation.
Spam as social engineering presentation.Spam as social engineering presentation.
Spam as social engineering presentation.
 

More from Bloomerang

0311 National Accounts Online Giving Trends.pdf
0311 National Accounts Online Giving Trends.pdf0311 National Accounts Online Giving Trends.pdf
0311 National Accounts Online Giving Trends.pdfBloomerang
 
How to Build a Fundraising Board- Darian Rodriguez Heyman 3-6-24.pdf
How to Build a Fundraising Board- Darian Rodriguez Heyman 3-6-24.pdfHow to Build a Fundraising Board- Darian Rodriguez Heyman 3-6-24.pdf
How to Build a Fundraising Board- Darian Rodriguez Heyman 3-6-24.pdfBloomerang
 
Donations and Pledges Part 2_BLG Build.pdf
Donations and Pledges Part 2_BLG Build.pdfDonations and Pledges Part 2_BLG Build.pdf
Donations and Pledges Part 2_BLG Build.pdfBloomerang
 
0306 - Nonprofit Success Slide Template.pdf
0306 - Nonprofit Success Slide Template.pdf0306 - Nonprofit Success Slide Template.pdf
0306 - Nonprofit Success Slide Template.pdfBloomerang
 
Donations and Pledges Part 1_BLG Build.pdf
Donations and Pledges Part 1_BLG Build.pdfDonations and Pledges Part 1_BLG Build.pdf
Donations and Pledges Part 1_BLG Build.pdfBloomerang
 
Bloomerang Scaling New Heights_ Tailored Strategies for Securing Your Next-Le...
Bloomerang Scaling New Heights_ Tailored Strategies for Securing Your Next-Le...Bloomerang Scaling New Heights_ Tailored Strategies for Securing Your Next-Le...
Bloomerang Scaling New Heights_ Tailored Strategies for Securing Your Next-Le...Bloomerang
 
Kindful to Bloomerang Webinar slides .pdf
Kindful to Bloomerang Webinar slides .pdfKindful to Bloomerang Webinar slides .pdf
Kindful to Bloomerang Webinar slides .pdfBloomerang
 
Bloomerang - Get More Major Gifts From Donors Already Around You.pdf
Bloomerang - Get More Major Gifts From Donors Already Around You.pdfBloomerang - Get More Major Gifts From Donors Already Around You.pdf
Bloomerang - Get More Major Gifts From Donors Already Around You.pdfBloomerang
 
Bloomerang Fundraising Week02.26.2024.pdf
Bloomerang Fundraising Week02.26.2024.pdfBloomerang Fundraising Week02.26.2024.pdf
Bloomerang Fundraising Week02.26.2024.pdfBloomerang
 
02.22.2024 Email Options in Bloomerang.pdf
02.22.2024 Email Options in Bloomerang.pdf02.22.2024 Email Options in Bloomerang.pdf
02.22.2024 Email Options in Bloomerang.pdfBloomerang
 
Actionable Fundraising Planning - Slide Presentation.pptx.pdf
Actionable Fundraising Planning - Slide Presentation.pptx.pdfActionable Fundraising Planning - Slide Presentation.pptx.pdf
Actionable Fundraising Planning - Slide Presentation.pptx.pdfBloomerang
 
02.20 Webinar - Online Giving Trends.pdf
02.20 Webinar - Online Giving Trends.pdf02.20 Webinar - Online Giving Trends.pdf
02.20 Webinar - Online Giving Trends.pdfBloomerang
 
Communications Trends for Fundraising Success in 2024.pdf
Communications Trends for Fundraising Success in 2024.pdfCommunications Trends for Fundraising Success in 2024.pdf
Communications Trends for Fundraising Success in 2024.pdfBloomerang
 
Database Set Up Basics Bloomerang Academy
Database Set Up Basics Bloomerang AcademyDatabase Set Up Basics Bloomerang Academy
Database Set Up Basics Bloomerang AcademyBloomerang
 
Database Management.pdf
Database Management.pdfDatabase Management.pdf
Database Management.pdfBloomerang
 
Leading With Impact: Looking Ahead at 2024 Trends in Leadership
Leading With Impact: Looking Ahead at 2024 Trends in LeadershipLeading With Impact: Looking Ahead at 2024 Trends in Leadership
Leading With Impact: Looking Ahead at 2024 Trends in LeadershipBloomerang
 
Google & Yahoo's Email Update: Your Must-Do Checklist
Google & Yahoo's Email Update: Your Must-Do ChecklistGoogle & Yahoo's Email Update: Your Must-Do Checklist
Google & Yahoo's Email Update: Your Must-Do ChecklistBloomerang
 
2_7_24 NP Success_ Annual Reports.pdf
2_7_24 NP Success_ Annual Reports.pdf2_7_24 NP Success_ Annual Reports.pdf
2_7_24 NP Success_ Annual Reports.pdfBloomerang
 
Copy of PayPal Course - Academy Slide Deck 2024.pdf
Copy of PayPal Course - Academy Slide Deck 2024.pdfCopy of PayPal Course - Academy Slide Deck 2024.pdf
Copy of PayPal Course - Academy Slide Deck 2024.pdfBloomerang
 
Strategic Planning The PROCESS Handout 2024.pdf
Strategic Planning The PROCESS Handout 2024.pdfStrategic Planning The PROCESS Handout 2024.pdf
Strategic Planning The PROCESS Handout 2024.pdfBloomerang
 

More from Bloomerang (20)

0311 National Accounts Online Giving Trends.pdf
0311 National Accounts Online Giving Trends.pdf0311 National Accounts Online Giving Trends.pdf
0311 National Accounts Online Giving Trends.pdf
 
How to Build a Fundraising Board- Darian Rodriguez Heyman 3-6-24.pdf
How to Build a Fundraising Board- Darian Rodriguez Heyman 3-6-24.pdfHow to Build a Fundraising Board- Darian Rodriguez Heyman 3-6-24.pdf
How to Build a Fundraising Board- Darian Rodriguez Heyman 3-6-24.pdf
 
Donations and Pledges Part 2_BLG Build.pdf
Donations and Pledges Part 2_BLG Build.pdfDonations and Pledges Part 2_BLG Build.pdf
Donations and Pledges Part 2_BLG Build.pdf
 
0306 - Nonprofit Success Slide Template.pdf
0306 - Nonprofit Success Slide Template.pdf0306 - Nonprofit Success Slide Template.pdf
0306 - Nonprofit Success Slide Template.pdf
 
Donations and Pledges Part 1_BLG Build.pdf
Donations and Pledges Part 1_BLG Build.pdfDonations and Pledges Part 1_BLG Build.pdf
Donations and Pledges Part 1_BLG Build.pdf
 
Bloomerang Scaling New Heights_ Tailored Strategies for Securing Your Next-Le...
Bloomerang Scaling New Heights_ Tailored Strategies for Securing Your Next-Le...Bloomerang Scaling New Heights_ Tailored Strategies for Securing Your Next-Le...
Bloomerang Scaling New Heights_ Tailored Strategies for Securing Your Next-Le...
 
Kindful to Bloomerang Webinar slides .pdf
Kindful to Bloomerang Webinar slides .pdfKindful to Bloomerang Webinar slides .pdf
Kindful to Bloomerang Webinar slides .pdf
 
Bloomerang - Get More Major Gifts From Donors Already Around You.pdf
Bloomerang - Get More Major Gifts From Donors Already Around You.pdfBloomerang - Get More Major Gifts From Donors Already Around You.pdf
Bloomerang - Get More Major Gifts From Donors Already Around You.pdf
 
Bloomerang Fundraising Week02.26.2024.pdf
Bloomerang Fundraising Week02.26.2024.pdfBloomerang Fundraising Week02.26.2024.pdf
Bloomerang Fundraising Week02.26.2024.pdf
 
02.22.2024 Email Options in Bloomerang.pdf
02.22.2024 Email Options in Bloomerang.pdf02.22.2024 Email Options in Bloomerang.pdf
02.22.2024 Email Options in Bloomerang.pdf
 
Actionable Fundraising Planning - Slide Presentation.pptx.pdf
Actionable Fundraising Planning - Slide Presentation.pptx.pdfActionable Fundraising Planning - Slide Presentation.pptx.pdf
Actionable Fundraising Planning - Slide Presentation.pptx.pdf
 
02.20 Webinar - Online Giving Trends.pdf
02.20 Webinar - Online Giving Trends.pdf02.20 Webinar - Online Giving Trends.pdf
02.20 Webinar - Online Giving Trends.pdf
 
Communications Trends for Fundraising Success in 2024.pdf
Communications Trends for Fundraising Success in 2024.pdfCommunications Trends for Fundraising Success in 2024.pdf
Communications Trends for Fundraising Success in 2024.pdf
 
Database Set Up Basics Bloomerang Academy
Database Set Up Basics Bloomerang AcademyDatabase Set Up Basics Bloomerang Academy
Database Set Up Basics Bloomerang Academy
 
Database Management.pdf
Database Management.pdfDatabase Management.pdf
Database Management.pdf
 
Leading With Impact: Looking Ahead at 2024 Trends in Leadership
Leading With Impact: Looking Ahead at 2024 Trends in LeadershipLeading With Impact: Looking Ahead at 2024 Trends in Leadership
Leading With Impact: Looking Ahead at 2024 Trends in Leadership
 
Google & Yahoo's Email Update: Your Must-Do Checklist
Google & Yahoo's Email Update: Your Must-Do ChecklistGoogle & Yahoo's Email Update: Your Must-Do Checklist
Google & Yahoo's Email Update: Your Must-Do Checklist
 
2_7_24 NP Success_ Annual Reports.pdf
2_7_24 NP Success_ Annual Reports.pdf2_7_24 NP Success_ Annual Reports.pdf
2_7_24 NP Success_ Annual Reports.pdf
 
Copy of PayPal Course - Academy Slide Deck 2024.pdf
Copy of PayPal Course - Academy Slide Deck 2024.pdfCopy of PayPal Course - Academy Slide Deck 2024.pdf
Copy of PayPal Course - Academy Slide Deck 2024.pdf
 
Strategic Planning The PROCESS Handout 2024.pdf
Strategic Planning The PROCESS Handout 2024.pdfStrategic Planning The PROCESS Handout 2024.pdf
Strategic Planning The PROCESS Handout 2024.pdf
 

Recently uploaded

VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒anilsa9823
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
Best Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaBest Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaShree Krishna Exports
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Tina Ji
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Roomdivyansh0kumar0
 
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...noida100girls
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth MarketingShawn Pang
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetDenis Gagné
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 

Recently uploaded (20)

VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
Best Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaBest Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in India
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
 
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 

Protecting Your Organizational Data.pdf

  • 3. Housekeeping We will share the slides and recording of this session with you via email later today. Dial in audio access: +1 669 900 6833 Any questions we are not able to answer live or in the Q&A will be addressed after the session via a follow-up. If you need further assistance, please reach out to support@bloomerang.com. Our support team is amazing!
  • 5. Katie Gaston Katie joined the Bloomerang Team after more than 13 years supporting the growth of various software organizations. She lives in Boise, Idaho with her two cats, two dogs, and loving husband. She is passionate about giving back and currently serves as a Warhawk Wing Girl for an organization celebrating veterans. Sr. Product Marketing Manager
  • 6. Seth Steward Seth is the Sr. Director of IT for Bloomerang and joined the team in March of 2021. His passions are simplifying complex tasks and leaving things better than he found them. He is a proud papa to humans as well as an adorable mutt (Go Roo!). His favorite causes are PAWS Chicago and the local Humane Society. Sr. Director of IT
  • 8. What will we cover today? Agenda 1. Why security matters 2. 5 ways to protect your organization 3. How Bloomerang helps 4. Resources 5. Questions
  • 9. The state of security threats for nonprofits
  • 10. 1) Average cost of cyber security attack for SMB is $25K (but can be much higher). 2) In 2021, more than 50% of NGOs reported being targeted by a cyberattack. 3) 27% of nonprofits worldwide have experienced a cyber security attack. 4) The average length of disruption (inability to do business) is 21 days following a ransomware attack. 5) Hackers attack every 39 seconds, on average 2,244 times a day. Why this matters: The risk
  • 11.
  • 12. 1) Reputation harm / loss 2) Precious funds to recover data 3) Identify theft 4) Disruption in ability to carry out business as usual 5) Exposing sensitive data on donors and stakeholders 6) Holding organization in scrutiny due to vulnerability in security 7) Spreading politically motivated messages Why this matters: The damage
  • 13. The Attack: Targeted Code The Damage: Personal information for >500K people The Cost: Reputational Damage Attack Study: International Committee of Red Cross
  • 14. The Attack: Held data hostage requesting $43K The Damage: Released sensitive information of cancer patients online; lost all of organizational data The Cost: Reputational damage, significant staff time Attack Study: Cancer Services of East Central Indiana - Little Red Door
  • 15. The Attack: Auth attack that racked up ~$6K in credit card fees. The Damage: Stripe initially requested for payment until media got involved and they backed down. The Cost: Staff time, stress, and potentially lost funds Attack Study: Queens Together
  • 16. 1) More than 70% of nonprofits have not run even one vulnerability assessment to evaluate their potential risk exposure. 2) 59% of nonprofits do not provide any cybersecurity training to staff on a regular basis. 3) Only 20% of nonprofits have a policy in place to address cyberattacks. 4) 22% of charities have cyber security insurance as part of a wider insurance policy; 5% have a specific cyber security insurance policy. 5) 64% of charities report staff / volunteers regularly use their own devices. Why this matters: Current state
  • 17. 5 Things to Do THIS year for Cyber Security
  • 18. 1. Encrypt your data 2. Lock your computer when you step away 3. Keep your computer updated 4. Use the cloud to backup & store data 5. Use Endpoint Protection software 1. Computer Housekeeping
  • 19. 2. Use a Password Manager + enable MFA 1. What is a Password Manager? 2. Why use a Password Manager? 3. What is MFA?
  • 20. 3. Establish a Security Awareness Training program 1. Be vigilant when clicking on links in emails - hover over them 2. Only enter information on sites that are secure (https://)
  • 21. 4. Use a chat platform as your main form of internal communication 1. Harder to impersonate 2. Reduced exposure to spam and malware 3. End-to-end encryption
  • 22. 5. Build an Incident Response Plan 1. Define scenarios a. Unintentional deletion b. Intentional deletion c. Ransomware d. Data Compromise 2. Choose who will run point in each scenario 3. Document how each scenario might be responded to
  • 23. How Bloomerang can help with security
  • 24. 1) Fraud Protection (Free) 2) Update Expired Cards 3) PCI-Certified 4) Award winning support 5) 6+ Payment Types Sign-up for Bloomerang Payments
  • 25. 1) Keep Donor Data Secure 2) Grant access to stakeholders 3) Details a) Admin i) Full system access b) Standard i) Access to specific areas ii) View-only access to transactions, constituents, reports iii) Restricted access to giving info (coming soon) User Permissions
  • 26. 1) Bloomerang sends users an additional code to their authenticated email during login. 2) Enter code to access database. Bloomerang: Enable 2-Factor Authentication
  • 27. Enable Captcha 1) Sign up for Google ReCAPTCHA (V3). 2) Add Site Key and Secret Key to Bloomerang. 3) Enable for Transaction Forms & Interaction Forms Bonus: Rate Limit Transactions!
  • 28. 1) Secure websites: Code snippet 2) Unsecure: We’ll host on your behalf (with CAPTCHA) How to check if website is secure? 1) Chrome: Look for the lock 2) Should read HTTPs 3) Most websites come secure if built recently 3) Automatically includes CAPTCHA S Secure Forms Hosting
  • 29. ● Hosted on world-class infrastructure providers Amazon Web Services (AWS), and Google Cloud Platform (GCP). ● Anti-malware, mobile device management deployed. ● Data is encrypted in transit and at-rest. Database
  • 31. Resources Knowledgebase Host Forms Securely How does Bloomerang store data? FAQ How Secure Is the Donation Form? Prevent Fraudulent Transactions ReCAPTCHA - Sign Up and Increase Form Security Tech Tip: Password Manager Suggestions: 2. Free Options 1. NordPass 2. Dashlane 3. Bitwarden 4. KeePass 3. Paid Options 1. 1Password
  • 32. Thank you for attending! Visit our website to see more upcoming Bloomerang Academy webinars!