SlideShare a Scribd company logo
1 of 16
Download to read offline
November 23, 2020
Cyberattacks on the Rise:
Is Your Nonprofit Prepared?
2 © TechSoup Global. All Rights Reserved.
Using Zoom
• All lines are muted
• Use the Q&A feature to ask questions.
• You will receive an email with this presentation,
recording, and links.
A Global Network Bridging Tech Solutions and
Services for Good.
4 © TechSoup Global. All Rights Reserved.
Today’s Presenter
Paul Fenwick
Sales Engineer @Avast
Cyberattacks on the Rise: Is
Your Nonprofit Prepared?
Presented By Tom Davis & Paul Fenwick
Avast Business
Avast Business
• A division of Avast, one of the world’s largest
security companies in the world
• The most advanced and geographically
dispersed threat intelligence network
• Largest antivirus developer for Windows
systems (source: Statista)
• Smarter data, deeper, inspection, and faster
detection without slowing down devices
• More than 740,000 businesses protected
• World-class partner program
6
Internet
Network
Application
Endpoint
Data
Layered Security – Avast’s Solution
Endpoint Protection
Patch Management
Secure Web Gateway
Firewall Multiple layers are
a vital part of a
comprehensive
security strategy
!
Protecting your charity from Malware
Malware infections can cause material harm to your systems. This might include disruption of
business services, unauthorised export of sensitive information or loss of access to critical data (eg
caused by ransomware)
These can be delivered through Email as an attachment, which will execute when opened. Or it could
be within email content or embedded links, that targets known individuals (known as spear phishing)
with access to sensitive information or roles with elevated privileges. Users can be infected as they
browse websites where malicious content with look to compromise the web browser to gain further
access to the device.
Antivirus software prevents this by scanning as these files or web pages are accessed, spotting
known signatures, which they receive regular updates on. This is very effective as it knows what to
look for but as cybercriminals and malware have evolved, we need more protection.
Current AntiVirus or Endpoint Protection software has much more advanced malware detection
methods which evaluate an object based on its intended actions before it allowed to execute. An
object’s attempt to perform actions that are clearly abnormal or unauthorized would indicate the object
is malicious, or at least suspicious.
Keep all your IT equipment and software up to date
For all your IT equipment (tablets, smartphones, laptops and PCs), make sure that the software and
device(s) operating system are always kept up to date with the latest versions from software
developers, hardware suppliers and vendors. Applying these updates (a process known as patching)
is one of the most important things you can do to improve security.
These updates or patches address vulnerabilities in the software which can effect the security of the
software and device. If this is not carried out, then we can have huge consequences such as those
seen in the 2017 with WannaCry.
It is also worth remembering that it is not just the Operating System that needs updating, all software
should be considered. Adobe Acrobat Reader, Google Chrome, Mozilla Firefox, Teamviewer and
many more have all recently released critical updates to address known vulnerabilities.
To ensure all these updates are done and can be reported on, it is easier to use a Patch Management
system, particularly when you consider the amount of devices you have and updates for each. To give
you an idea, there were 12174 security updates released in 2019.
Prevent successful Phishing Attacks
Phishing is a fraudulent attempt to obtain sensitive data by disguising oneself as a trustworthy entity.
Users are lured by communications purporting to be from trusted parties such as banks,
colleagues/executives, online payment processors, Telecoms companies, HMRC etc. This is often
done through email with a link to a fake website to then gather personal information to use for
financial gain.
These targeted attacks, can be at specific companies or individuals, known as Spear Phishing. They
harvest information through sources such as social media to craft these more relatable attacks,
understanding their intended target, pushing them for urgent action, through false legal threat or
overdue invoice etc. Hoping to scare or panic the target into releasing funds or financial data.
A useful tool is a DNS based security solution. Using a trusted central website indexing service (DNS)
that checks web content prior to allowing access, blocking any suspicious destination. This option
can also protect against access of inappropriate or illegal content or images.
Additional CloudCare Security Tools
Password Manager Secureline VPN Premium Remote Control
Demo
13 © TechSoup Global. All Rights Reserved.
Save Big on Avast
Business Products
During TechSoup’s
Cyber Week
11/30 - 12/4
We've worked with Avast to provide extra
discounts on its CloudCare products to
nonprofits to protect against all forms of
malware and other cyberthreats.
Learn more at
techsoup.org/avast-business
14 © TechSoup Global. All Rights Reserved.
Questions?
This is your chance!
Use the chat box to ask us
any questions you have
about this presentation.
For additional questions,
please reach out to
avast@techsoup.org
15 © TechSoup Global. All Rights Reserved.
More Solutions to Keep You Safe
We have additional offers for data and privacy protection as well as backup and restore
product offers for you. Find all of TechSoup's security products here.
You can also:
● Get training from TechSoup Courses on cybersecurity and cyber liability insurance.
● Watch a webinar on security and privacy.
● Uncover 5 Tips for Protecting Employee Data.
● Learn what you need to know about getting hacked.
Thank You For Attending.
Please complete the post-event survey Zoom will redirect
you to.

More Related Content

What's hot

Webinar - Finding Local Tech Expertise and Support for Nonprofits and Librari...
Webinar - Finding Local Tech Expertise and Support for Nonprofits and Librari...Webinar - Finding Local Tech Expertise and Support for Nonprofits and Librari...
Webinar - Finding Local Tech Expertise and Support for Nonprofits and Librari...TechSoup
 
Microsoft program offerings webinar 2021.11.09
Microsoft program offerings webinar 2021.11.09Microsoft program offerings webinar 2021.11.09
Microsoft program offerings webinar 2021.11.09TechSoup
 
Webinar - Microsoft Windows 10 for Nonprofits and Libraries - 2015-08-27
Webinar - Microsoft Windows 10 for Nonprofits and Libraries - 2015-08-27Webinar - Microsoft Windows 10 for Nonprofits and Libraries - 2015-08-27
Webinar - Microsoft Windows 10 for Nonprofits and Libraries - 2015-08-27TechSoup
 
Webinar - Navigating the World of Donated and Discounted Technology - 2015-09-24
Webinar - Navigating the World of Donated and Discounted Technology - 2015-09-24Webinar - Navigating the World of Donated and Discounted Technology - 2015-09-24
Webinar - Navigating the World of Donated and Discounted Technology - 2015-09-24TechSoup
 
Webinar - Maximize Your Technology Donations Through TechSoup - 2017-03-28
Webinar - Maximize Your Technology Donations Through TechSoup - 2017-03-28Webinar - Maximize Your Technology Donations Through TechSoup - 2017-03-28
Webinar - Maximize Your Technology Donations Through TechSoup - 2017-03-28TechSoup
 
Protect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chainProtect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chainDavid J Rosenthal
 
Threat Intelligence + SIEM: A Force to be Reckoned With
Threat Intelligence +  SIEM: A Force to be Reckoned WithThreat Intelligence +  SIEM: A Force to be Reckoned With
Threat Intelligence + SIEM: A Force to be Reckoned WithSolarWinds
 
Webinar - The Changing Landscape of Library Privacy - 2016-06-15
Webinar - The Changing Landscape of Library Privacy - 2016-06-15Webinar - The Changing Landscape of Library Privacy - 2016-06-15
Webinar - The Changing Landscape of Library Privacy - 2016-06-15TechSoup
 
Webinar: What Microsoft's Cloud Services Can Do For Your Nonprofit-2016-10-27
Webinar: What Microsoft's Cloud Services Can Do For Your Nonprofit-2016-10-27 Webinar: What Microsoft's Cloud Services Can Do For Your Nonprofit-2016-10-27
Webinar: What Microsoft's Cloud Services Can Do For Your Nonprofit-2016-10-27 TechSoup
 
Kyle Taylor – increasing your security posture using mc afee epo
Kyle Taylor – increasing your security posture using mc afee epoKyle Taylor – increasing your security posture using mc afee epo
Kyle Taylor – increasing your security posture using mc afee epoKyle Taylor
 
Interested in working at Druva?
Interested in working at Druva?Interested in working at Druva?
Interested in working at Druva?Druva
 
If an Application Fails in the Datacenter and No Users Are On It, Will it Cut...
If an Application Fails in the Datacenter and No Users Are On It, Will it Cut...If an Application Fails in the Datacenter and No Users Are On It, Will it Cut...
If an Application Fails in the Datacenter and No Users Are On It, Will it Cut...SolarWinds
 
Webinar - Technology Planning Tips for Small Libraries - 2015-08-19
Webinar - Technology Planning Tips for Small Libraries - 2015-08-19Webinar - Technology Planning Tips for Small Libraries - 2015-08-19
Webinar - Technology Planning Tips for Small Libraries - 2015-08-19TechSoup
 
Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)Sarfaraz Chougule
 
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01TechSoup
 
tibbr: Enterprise Social Redefined
tibbr: Enterprise Social Redefinedtibbr: Enterprise Social Redefined
tibbr: Enterprise Social Redefinedtibbr
 
The ROI Global Forum on Enterprise Social Networking
The ROI Global Forum on Enterprise Social NetworkingThe ROI Global Forum on Enterprise Social Networking
The ROI Global Forum on Enterprise Social Networkingtibbr
 
Panorama Necto the most secure, centralized and state of the art Business i...
Panorama Necto   the most secure, centralized and state of the art Business i...Panorama Necto   the most secure, centralized and state of the art Business i...
Panorama Necto the most secure, centralized and state of the art Business i...Panorama Software
 

What's hot (20)

Webinar - Finding Local Tech Expertise and Support for Nonprofits and Librari...
Webinar - Finding Local Tech Expertise and Support for Nonprofits and Librari...Webinar - Finding Local Tech Expertise and Support for Nonprofits and Librari...
Webinar - Finding Local Tech Expertise and Support for Nonprofits and Librari...
 
Microsoft program offerings webinar 2021.11.09
Microsoft program offerings webinar 2021.11.09Microsoft program offerings webinar 2021.11.09
Microsoft program offerings webinar 2021.11.09
 
Webinar - Microsoft Windows 10 for Nonprofits and Libraries - 2015-08-27
Webinar - Microsoft Windows 10 for Nonprofits and Libraries - 2015-08-27Webinar - Microsoft Windows 10 for Nonprofits and Libraries - 2015-08-27
Webinar - Microsoft Windows 10 for Nonprofits and Libraries - 2015-08-27
 
Webinar - Navigating the World of Donated and Discounted Technology - 2015-09-24
Webinar - Navigating the World of Donated and Discounted Technology - 2015-09-24Webinar - Navigating the World of Donated and Discounted Technology - 2015-09-24
Webinar - Navigating the World of Donated and Discounted Technology - 2015-09-24
 
Webinar - Maximize Your Technology Donations Through TechSoup - 2017-03-28
Webinar - Maximize Your Technology Donations Through TechSoup - 2017-03-28Webinar - Maximize Your Technology Donations Through TechSoup - 2017-03-28
Webinar - Maximize Your Technology Donations Through TechSoup - 2017-03-28
 
Protect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chainProtect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chain
 
Threat Intelligence + SIEM: A Force to be Reckoned With
Threat Intelligence +  SIEM: A Force to be Reckoned WithThreat Intelligence +  SIEM: A Force to be Reckoned With
Threat Intelligence + SIEM: A Force to be Reckoned With
 
Webinar - The Changing Landscape of Library Privacy - 2016-06-15
Webinar - The Changing Landscape of Library Privacy - 2016-06-15Webinar - The Changing Landscape of Library Privacy - 2016-06-15
Webinar - The Changing Landscape of Library Privacy - 2016-06-15
 
Webinar: What Microsoft's Cloud Services Can Do For Your Nonprofit-2016-10-27
Webinar: What Microsoft's Cloud Services Can Do For Your Nonprofit-2016-10-27 Webinar: What Microsoft's Cloud Services Can Do For Your Nonprofit-2016-10-27
Webinar: What Microsoft's Cloud Services Can Do For Your Nonprofit-2016-10-27
 
Kyle Taylor – increasing your security posture using mc afee epo
Kyle Taylor – increasing your security posture using mc afee epoKyle Taylor – increasing your security posture using mc afee epo
Kyle Taylor – increasing your security posture using mc afee epo
 
Interested in working at Druva?
Interested in working at Druva?Interested in working at Druva?
Interested in working at Druva?
 
If an Application Fails in the Datacenter and No Users Are On It, Will it Cut...
If an Application Fails in the Datacenter and No Users Are On It, Will it Cut...If an Application Fails in the Datacenter and No Users Are On It, Will it Cut...
If an Application Fails in the Datacenter and No Users Are On It, Will it Cut...
 
Webinar - Technology Planning Tips for Small Libraries - 2015-08-19
Webinar - Technology Planning Tips for Small Libraries - 2015-08-19Webinar - Technology Planning Tips for Small Libraries - 2015-08-19
Webinar - Technology Planning Tips for Small Libraries - 2015-08-19
 
4.5.cloud security
4.5.cloud security4.5.cloud security
4.5.cloud security
 
Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)
 
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01
 
Mind the gap
Mind the gapMind the gap
Mind the gap
 
tibbr: Enterprise Social Redefined
tibbr: Enterprise Social Redefinedtibbr: Enterprise Social Redefined
tibbr: Enterprise Social Redefined
 
The ROI Global Forum on Enterprise Social Networking
The ROI Global Forum on Enterprise Social NetworkingThe ROI Global Forum on Enterprise Social Networking
The ROI Global Forum on Enterprise Social Networking
 
Panorama Necto the most secure, centralized and state of the art Business i...
Panorama Necto   the most secure, centralized and state of the art Business i...Panorama Necto   the most secure, centralized and state of the art Business i...
Panorama Necto the most secure, centralized and state of the art Business i...
 

Similar to Cyberattacks on the Rise: Is Your Nonprofit Prepared?

Internet safety and you
Internet safety and youInternet safety and you
Internet safety and youArt Ocain
 
How to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the CloudHow to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the CloudNordic Backup
 
Security Minded - Ransomware Awareness
Security Minded - Ransomware AwarenessSecurity Minded - Ransomware Awareness
Security Minded - Ransomware AwarenessGreg Wartes, MCP
 
Cyber Security Magazine
Cyber Security MagazineCyber Security Magazine
Cyber Security MagazineQuentin Brown
 
Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Jay Nagar
 
Asset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt LabsAsset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt LabsRedhuntLabs2
 
It's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint SecurityIt's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint SecurityLumension
 
2016 CYBERSECURITY PLAYBOOK
2016 CYBERSECURITY PLAYBOOK2016 CYBERSECURITY PLAYBOOK
2016 CYBERSECURITY PLAYBOOKBoris Loukanov
 
3 Tips to Stay Safe Online in 2017
3 Tips to Stay Safe Online in 20173 Tips to Stay Safe Online in 2017
3 Tips to Stay Safe Online in 2017Bret Piatt
 
Should You Pay Ransomware.pdf
Should You Pay Ransomware.pdfShould You Pay Ransomware.pdf
Should You Pay Ransomware.pdfKavitaDubey18
 
Panda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion GuidePanda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion GuidePanda Security
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksHokme
 
WithSecure Deepguard WhitePaper
WithSecure Deepguard WhitePaperWithSecure Deepguard WhitePaper
WithSecure Deepguard WhitePaperlincktello
 
Why You Need An Antivirus For Your Business?
Why You Need An Antivirus For Your Business?Why You Need An Antivirus For Your Business?
Why You Need An Antivirus For Your Business?SoftwareDeals
 
Cyber Security and GDPR Made Easy
Cyber Security and GDPR Made EasyCyber Security and GDPR Made Easy
Cyber Security and GDPR Made EasyChristoanSmit
 

Similar to Cyberattacks on the Rise: Is Your Nonprofit Prepared? (20)

Internet safety and you
Internet safety and youInternet safety and you
Internet safety and you
 
How to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the CloudHow to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the Cloud
 
Measures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacksMeasures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacks
 
Measure To Avoid Cyber Attacks
Measure To Avoid Cyber AttacksMeasure To Avoid Cyber Attacks
Measure To Avoid Cyber Attacks
 
Security Minded - Ransomware Awareness
Security Minded - Ransomware AwarenessSecurity Minded - Ransomware Awareness
Security Minded - Ransomware Awareness
 
Cyber Security Magazine
Cyber Security MagazineCyber Security Magazine
Cyber Security Magazine
 
Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual
 
Asset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt LabsAsset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt Labs
 
It's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint SecurityIt's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint Security
 
Information Security Seminar
Information Security SeminarInformation Security Seminar
Information Security Seminar
 
ITPG Secure on WannaCry
ITPG Secure on WannaCryITPG Secure on WannaCry
ITPG Secure on WannaCry
 
2016 CYBERSECURITY PLAYBOOK
2016 CYBERSECURITY PLAYBOOK2016 CYBERSECURITY PLAYBOOK
2016 CYBERSECURITY PLAYBOOK
 
3 Tips to Stay Safe Online in 2017
3 Tips to Stay Safe Online in 20173 Tips to Stay Safe Online in 2017
3 Tips to Stay Safe Online in 2017
 
Should You Pay Ransomware.pdf
Should You Pay Ransomware.pdfShould You Pay Ransomware.pdf
Should You Pay Ransomware.pdf
 
Panda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion GuidePanda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion Guide
 
Research Paper
Research PaperResearch Paper
Research Paper
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP Leaks
 
WithSecure Deepguard WhitePaper
WithSecure Deepguard WhitePaperWithSecure Deepguard WhitePaper
WithSecure Deepguard WhitePaper
 
Why You Need An Antivirus For Your Business?
Why You Need An Antivirus For Your Business?Why You Need An Antivirus For Your Business?
Why You Need An Antivirus For Your Business?
 
Cyber Security and GDPR Made Easy
Cyber Security and GDPR Made EasyCyber Security and GDPR Made Easy
Cyber Security and GDPR Made Easy
 

More from TechSoup

Executive Directors Chat Embracing Diversity and Cultural Differences
Executive Directors Chat  Embracing Diversity and Cultural DifferencesExecutive Directors Chat  Embracing Diversity and Cultural Differences
Executive Directors Chat Embracing Diversity and Cultural DifferencesTechSoup
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Building the Commons: Community Archiving & Decentralized Storage
Building the Commons: Community Archiving & Decentralized StorageBuilding the Commons: Community Archiving & Decentralized Storage
Building the Commons: Community Archiving & Decentralized StorageTechSoup
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
Welcome to TechSoup - New Member Orientation and Q & A (April 2024)
Welcome to TechSoup - New Member Orientation and Q & A (April 2024)Welcome to TechSoup - New Member Orientation and Q & A (April 2024)
Welcome to TechSoup - New Member Orientation and Q & A (April 2024)TechSoup
 
Executive Directors Chat Initiating Equity for Impact.pdf
Executive Directors Chat  Initiating Equity for Impact.pdfExecutive Directors Chat  Initiating Equity for Impact.pdf
Executive Directors Chat Initiating Equity for Impact.pdfTechSoup
 
Set the Path Forward with Smart Technology Decisions.pdf
Set the Path Forward with Smart Technology Decisions.pdfSet the Path Forward with Smart Technology Decisions.pdf
Set the Path Forward with Smart Technology Decisions.pdfTechSoup
 
What is the Future of QuickBooks DeskTop?
What is the Future of QuickBooks DeskTop?What is the Future of QuickBooks DeskTop?
What is the Future of QuickBooks DeskTop?TechSoup
 
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdfMaximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdfTechSoup
 
Hitting the Inbox: Email Authentication Changes and What You Need to Know
Hitting the Inbox: Email Authentication Changes and What You Need to KnowHitting the Inbox: Email Authentication Changes and What You Need to Know
Hitting the Inbox: Email Authentication Changes and What You Need to KnowTechSoup
 
Welcome to TechSoup New Member Orientation March 2024
Welcome to TechSoup New Member Orientation March 2024Welcome to TechSoup New Member Orientation March 2024
Welcome to TechSoup New Member Orientation March 2024TechSoup
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
 
Celebrate National Library Lovers Month with TechSoup! We love libraries!.pdf
Celebrate National Library Lovers Month with TechSoup! We love libraries!.pdfCelebrate National Library Lovers Month with TechSoup! We love libraries!.pdf
Celebrate National Library Lovers Month with TechSoup! We love libraries!.pdfTechSoup
 
Google Ad Grants Services at TechSoup.pdf
Google Ad Grants Services at TechSoup.pdfGoogle Ad Grants Services at TechSoup.pdf
Google Ad Grants Services at TechSoup.pdfTechSoup
 
Techsoup_ Prompt Strategy _ Template.docx.pdf
Techsoup_ Prompt Strategy _ Template.docx.pdfTechsoup_ Prompt Strategy _ Template.docx.pdf
Techsoup_ Prompt Strategy _ Template.docx.pdfTechSoup
 
Ask the Exerts - Focus on AI Prompt Engineering.pdf
Ask the Exerts - Focus on AI Prompt Engineering.pdfAsk the Exerts - Focus on AI Prompt Engineering.pdf
Ask the Exerts - Focus on AI Prompt Engineering.pdfTechSoup
 
Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use CasesTechSoup
 
Grantseeking Solo- Securing Awards with Limited Staff PDF.pdf
Grantseeking Solo- Securing Awards with Limited Staff  PDF.pdfGrantseeking Solo- Securing Awards with Limited Staff  PDF.pdf
Grantseeking Solo- Securing Awards with Limited Staff PDF.pdfTechSoup
 
Welcome to TechSoup New Member Orientation and Q & A (February 2024)
Welcome to TechSoup New Member Orientation and Q & A (February 2024)Welcome to TechSoup New Member Orientation and Q & A (February 2024)
Welcome to TechSoup New Member Orientation and Q & A (February 2024)TechSoup
 
Choosing the Right CRM for your Website, Fundraising, and Marketing _ TechSou...
Choosing the Right CRM for your Website, Fundraising, and Marketing _ TechSou...Choosing the Right CRM for your Website, Fundraising, and Marketing _ TechSou...
Choosing the Right CRM for your Website, Fundraising, and Marketing _ TechSou...TechSoup
 

More from TechSoup (20)

Executive Directors Chat Embracing Diversity and Cultural Differences
Executive Directors Chat  Embracing Diversity and Cultural DifferencesExecutive Directors Chat  Embracing Diversity and Cultural Differences
Executive Directors Chat Embracing Diversity and Cultural Differences
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Building the Commons: Community Archiving & Decentralized Storage
Building the Commons: Community Archiving & Decentralized StorageBuilding the Commons: Community Archiving & Decentralized Storage
Building the Commons: Community Archiving & Decentralized Storage
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
Welcome to TechSoup - New Member Orientation and Q & A (April 2024)
Welcome to TechSoup - New Member Orientation and Q & A (April 2024)Welcome to TechSoup - New Member Orientation and Q & A (April 2024)
Welcome to TechSoup - New Member Orientation and Q & A (April 2024)
 
Executive Directors Chat Initiating Equity for Impact.pdf
Executive Directors Chat  Initiating Equity for Impact.pdfExecutive Directors Chat  Initiating Equity for Impact.pdf
Executive Directors Chat Initiating Equity for Impact.pdf
 
Set the Path Forward with Smart Technology Decisions.pdf
Set the Path Forward with Smart Technology Decisions.pdfSet the Path Forward with Smart Technology Decisions.pdf
Set the Path Forward with Smart Technology Decisions.pdf
 
What is the Future of QuickBooks DeskTop?
What is the Future of QuickBooks DeskTop?What is the Future of QuickBooks DeskTop?
What is the Future of QuickBooks DeskTop?
 
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdfMaximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
 
Hitting the Inbox: Email Authentication Changes and What You Need to Know
Hitting the Inbox: Email Authentication Changes and What You Need to KnowHitting the Inbox: Email Authentication Changes and What You Need to Know
Hitting the Inbox: Email Authentication Changes and What You Need to Know
 
Welcome to TechSoup New Member Orientation March 2024
Welcome to TechSoup New Member Orientation March 2024Welcome to TechSoup New Member Orientation March 2024
Welcome to TechSoup New Member Orientation March 2024
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Celebrate National Library Lovers Month with TechSoup! We love libraries!.pdf
Celebrate National Library Lovers Month with TechSoup! We love libraries!.pdfCelebrate National Library Lovers Month with TechSoup! We love libraries!.pdf
Celebrate National Library Lovers Month with TechSoup! We love libraries!.pdf
 
Google Ad Grants Services at TechSoup.pdf
Google Ad Grants Services at TechSoup.pdfGoogle Ad Grants Services at TechSoup.pdf
Google Ad Grants Services at TechSoup.pdf
 
Techsoup_ Prompt Strategy _ Template.docx.pdf
Techsoup_ Prompt Strategy _ Template.docx.pdfTechsoup_ Prompt Strategy _ Template.docx.pdf
Techsoup_ Prompt Strategy _ Template.docx.pdf
 
Ask the Exerts - Focus on AI Prompt Engineering.pdf
Ask the Exerts - Focus on AI Prompt Engineering.pdfAsk the Exerts - Focus on AI Prompt Engineering.pdf
Ask the Exerts - Focus on AI Prompt Engineering.pdf
 
Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use Cases
 
Grantseeking Solo- Securing Awards with Limited Staff PDF.pdf
Grantseeking Solo- Securing Awards with Limited Staff  PDF.pdfGrantseeking Solo- Securing Awards with Limited Staff  PDF.pdf
Grantseeking Solo- Securing Awards with Limited Staff PDF.pdf
 
Welcome to TechSoup New Member Orientation and Q & A (February 2024)
Welcome to TechSoup New Member Orientation and Q & A (February 2024)Welcome to TechSoup New Member Orientation and Q & A (February 2024)
Welcome to TechSoup New Member Orientation and Q & A (February 2024)
 
Choosing the Right CRM for your Website, Fundraising, and Marketing _ TechSou...
Choosing the Right CRM for your Website, Fundraising, and Marketing _ TechSou...Choosing the Right CRM for your Website, Fundraising, and Marketing _ TechSou...
Choosing the Right CRM for your Website, Fundraising, and Marketing _ TechSou...
 

Recently uploaded

Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 

Recently uploaded (20)

Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 

Cyberattacks on the Rise: Is Your Nonprofit Prepared?

  • 1. November 23, 2020 Cyberattacks on the Rise: Is Your Nonprofit Prepared?
  • 2. 2 © TechSoup Global. All Rights Reserved. Using Zoom • All lines are muted • Use the Q&A feature to ask questions. • You will receive an email with this presentation, recording, and links.
  • 3. A Global Network Bridging Tech Solutions and Services for Good.
  • 4. 4 © TechSoup Global. All Rights Reserved. Today’s Presenter Paul Fenwick Sales Engineer @Avast
  • 5. Cyberattacks on the Rise: Is Your Nonprofit Prepared? Presented By Tom Davis & Paul Fenwick Avast Business
  • 6. Avast Business • A division of Avast, one of the world’s largest security companies in the world • The most advanced and geographically dispersed threat intelligence network • Largest antivirus developer for Windows systems (source: Statista) • Smarter data, deeper, inspection, and faster detection without slowing down devices • More than 740,000 businesses protected • World-class partner program 6
  • 7. Internet Network Application Endpoint Data Layered Security – Avast’s Solution Endpoint Protection Patch Management Secure Web Gateway Firewall Multiple layers are a vital part of a comprehensive security strategy !
  • 8. Protecting your charity from Malware Malware infections can cause material harm to your systems. This might include disruption of business services, unauthorised export of sensitive information or loss of access to critical data (eg caused by ransomware) These can be delivered through Email as an attachment, which will execute when opened. Or it could be within email content or embedded links, that targets known individuals (known as spear phishing) with access to sensitive information or roles with elevated privileges. Users can be infected as they browse websites where malicious content with look to compromise the web browser to gain further access to the device. Antivirus software prevents this by scanning as these files or web pages are accessed, spotting known signatures, which they receive regular updates on. This is very effective as it knows what to look for but as cybercriminals and malware have evolved, we need more protection. Current AntiVirus or Endpoint Protection software has much more advanced malware detection methods which evaluate an object based on its intended actions before it allowed to execute. An object’s attempt to perform actions that are clearly abnormal or unauthorized would indicate the object is malicious, or at least suspicious.
  • 9. Keep all your IT equipment and software up to date For all your IT equipment (tablets, smartphones, laptops and PCs), make sure that the software and device(s) operating system are always kept up to date with the latest versions from software developers, hardware suppliers and vendors. Applying these updates (a process known as patching) is one of the most important things you can do to improve security. These updates or patches address vulnerabilities in the software which can effect the security of the software and device. If this is not carried out, then we can have huge consequences such as those seen in the 2017 with WannaCry. It is also worth remembering that it is not just the Operating System that needs updating, all software should be considered. Adobe Acrobat Reader, Google Chrome, Mozilla Firefox, Teamviewer and many more have all recently released critical updates to address known vulnerabilities. To ensure all these updates are done and can be reported on, it is easier to use a Patch Management system, particularly when you consider the amount of devices you have and updates for each. To give you an idea, there were 12174 security updates released in 2019.
  • 10. Prevent successful Phishing Attacks Phishing is a fraudulent attempt to obtain sensitive data by disguising oneself as a trustworthy entity. Users are lured by communications purporting to be from trusted parties such as banks, colleagues/executives, online payment processors, Telecoms companies, HMRC etc. This is often done through email with a link to a fake website to then gather personal information to use for financial gain. These targeted attacks, can be at specific companies or individuals, known as Spear Phishing. They harvest information through sources such as social media to craft these more relatable attacks, understanding their intended target, pushing them for urgent action, through false legal threat or overdue invoice etc. Hoping to scare or panic the target into releasing funds or financial data. A useful tool is a DNS based security solution. Using a trusted central website indexing service (DNS) that checks web content prior to allowing access, blocking any suspicious destination. This option can also protect against access of inappropriate or illegal content or images.
  • 11. Additional CloudCare Security Tools Password Manager Secureline VPN Premium Remote Control
  • 12. Demo
  • 13. 13 © TechSoup Global. All Rights Reserved. Save Big on Avast Business Products During TechSoup’s Cyber Week 11/30 - 12/4 We've worked with Avast to provide extra discounts on its CloudCare products to nonprofits to protect against all forms of malware and other cyberthreats. Learn more at techsoup.org/avast-business
  • 14. 14 © TechSoup Global. All Rights Reserved. Questions? This is your chance! Use the chat box to ask us any questions you have about this presentation. For additional questions, please reach out to avast@techsoup.org
  • 15. 15 © TechSoup Global. All Rights Reserved. More Solutions to Keep You Safe We have additional offers for data and privacy protection as well as backup and restore product offers for you. Find all of TechSoup's security products here. You can also: ● Get training from TechSoup Courses on cybersecurity and cyber liability insurance. ● Watch a webinar on security and privacy. ● Uncover 5 Tips for Protecting Employee Data. ● Learn what you need to know about getting hacked.
  • 16. Thank You For Attending. Please complete the post-event survey Zoom will redirect you to.