Cybersecurity Training
for Nonprofits
Monthly webinar
Series
October 2020
About Community
IT
Advancing mission
through the effective
of technology.
100% Employee
Owned
Presenters
Matthew Eshleman
CTO
Community IT
Agenda
Cybersecurity
Landscape
CybersecurityTraining
Human Firewall
Putting it into Action
CYBERSECURITY LANDSCAPE
Persistent and ongoing
brute force attacks on
identities
Sophisticated
spearphishing
Organizations targeted
because of the work
they do
Attacks targeting
vendors
CYBERSECURITY LANDSCAPE
New security tools available
to combat new threat
types.
Organization’s starting to
ask about where to start in
improving their
cybersecurity.
68% of Nonprofits don’t
have an Incident Response
Plan
Breach response for a small
to medium business is
$149,000
HOW MUCH IS BUSINESS DATA WORTH TO
BAD ACTORS?
CREDIT CARD INFO
$2-$5 (per record)
CUSTOMER PII
$20-$450 (per record)
EMPLOYEE PII
$20-$450 (per record)
PROPRIETARY INFO
Competitive Value
SALES/FINANCIAL INFO
Competitive Value
MEDICAL RECORDS
$20-$50 (per record)
43% OF ALL BREACHES INVOLVED SMB VICTIMS6 BILLION DIGITAL RECORDS EXPOSED IN 2018
Per the Verizon Data Breach Investigation Report
Estimated data values from Sociable
Genius Hacker – 197 IQ
I know 15% of your password
Cybersecurity - Adversaries
NextGen Tools
IDENTIT
Y
DATA DEVICES
PERIMETE
R
WEB
SECURITY AWARENESS
SECURITY POLICY
OUR APPROACH TO
CYBERSECURITY
Cybersecurity
Overview
It’s good to talk openly
about cybersecurity
Share your story and
learn!
Your experience will
help someone else
Contemporar
y Attack
Examples
Email Phishing
Malware
Social Engineering
Phishing
Common attempts How to identify How to respond
http://corpcatererscleveland.com/?24=UCPAUBYKV1CQUuQZCQi
Phishing
Look at the email
Check for red flags
Ask someone or forward to
your IT support provider
Malware
Email attachments
Malvertising
Cryptojacking
Malware keeps
increasing
- Malware is defined as
malicious software
- PUA or potentially
unwanted applications
also fall in this category
- Provides adversaries a
foothold into your
systems
Cryptojacking
• Malicious JavaScript that
mines cryptocurrencies
• Uses your computer’s power
for adversaries benefit
• Think SETI, but for nefarious
purposes
Social Engineering
Trick you into
making payments
1
Trick you into
entering credentials
2
Trick you into
calling for “support”
3
Human Firewall
Devices
Identity
Security
Human
Firewall -
Data
You’re capable of
protecting your
information
• Inventory
• Backup your data
Human
Firewall -
Devices
Patch and Update
• OS
• Firmware
• All devices
• Monthly
Enable and use
Antivirus
• Only 50% effective
(but 50% is better than
0%!)
Human
Firewall -
Identity
Protect your Identity
• Pick a good password
• Use a password
Manager
• Enable MFA
Know your Data
• Audit access to your
Cloud Systems
Cybersecurity
Checklist
Backups
Updates
Strong Passwords with MFA
Antivirus
Audit Cloud Systems
Cybersecurity Awareness Training
Putting it
into Action
• Desktop
• Email
• Cloud Services
• Photos
Inventory systems
• 2 locations
• You have control
Backup
Putting it into
Action
Update your systems
• Operating System (Windows, Mac,
iOS, Android)
• BIOS and Firmware Updates
Quarterly
• Reboot weekly
Putting it
into Action
• LastPass
• 1Password
Get a password manager
• Passphrase
• One for your computer, one for the
password manager
• Here are some guides
• https://communityit.com/how-to-create-
an-excellent-password/
• https://haveibeenpwned.com/Passwords
• Enable MFA
Pick a strong password
MFA is Effective
greatpassword
AntiVirus
• An important layer of
protection
• Traditional AV may miss 50%
of attacks
• New technologies and
approaches are available, in
EDR, but come at a premium
This Photo by Unknown Author is licensed under CC BY-SA-NC
Security
Check Up
Audit access to applications
• Facebook -
https://www.facebook.co
m/help/799880743466869
• Google -
https://myaccount.google
.com/intro/security-
checkup?hl=en-US
• LinkedIn -
https://www.linkedin.com
/psettings/
Cybersecurity Awareness
SMB Nonprofits (1-249
employees)
• Phase 1 (Initial baseline
results) – 39.4%
• Phase 2 (90 days after initial
training) – 14.9%
• Phase 3 (1 year into training
program) – 4.8%
Moving Forward
Cybersecurity can be dauting, but it doesn’t need to be overwhelming
Moving
Forward -
Individual
Steps you can take
• Inventory and backup your data
• Update your computer (OS and Firmware)
• Make sure AV is installed
• Select a good password
• Use a password manager
• Turn on MFA
• Review System access and remove
extra/unnecessary applications
• Schedule time for security
Moving
Forward -
Organization
Steps you can take
• Start with a policy
• Formalize your cybersecurity controls
• Implement Regular User engagement
• Baseline phishing test
• Initial training
• Quarterly phishing tests
• Quarterly focused training
• Regular reporting
• Incorporate feedback
Cybersecurity
Awareness
Training
Training must have Executive Buy-in
Needs to align with Organizational Culture
Training should be frequent in timing
Incorporate testing and feedback
Build a culture of learning
Don’t punish mistakes
Schedule
time for
Cybersecurity
• Set a reminder for yourself
• one week from today
• Have an accountability
partner
• monthly check in
QA
Building a Better Nonprofit Software Selection Process
an "ask the experts" panel webinar with Peter Mirus,
Kyle Haines, and David Deal from Build Consulting
November 18th from 3-4pm EST
Resources
• Community IT Webinar – https://www.communityit.com
• Stop Think Connect – https://www.stopthinkconnect.org
• TechSoup Covid Response bundle -
https://techsoup.course.tc/catalog/track/coronavirus-mitigation-
track
• KnowBe4 Free Resources - https://www.knowbe4.com/free-it-
security-tools
• Microsoft Free Cybersecurity Training -
https://security.microsoft.com/attackSimulatorTrainings

Cybersecurity Training for Nonprofits

Editor's Notes

  • #10 Iconography from Crowdstrike – Chollima (PRNK), Bear (Russia), Panda (China)
  • #22 This is an example of Malvertising. Specifically the Cryptowall virus which was delivered from exploited FLASH. This is an article from http://news.softpedia.com/news/CryptoWall-2-0-Delivered-Through-Malvertising-On-Yahoo-and-Other-Large-Sites-462970.shtml
  • #30 This Photo by Unknown Author is licensed under CC BY-NC-SA
  • #31 This Photo by Unknown Author is licensed under CC BY
  • #32 https://pixabay.com/en/password-reminder-post-note-sticker-1433096/
  • #34 Deep dive https://communityit.com/cybersecurity-readiness-for-nonprofits-playbook/
  • #42 “How do I compare with other organizations who look like me?” To provide a nuanced and accurate answer, the 2020 Phishing By Industry Benchmarking Study analyzed a data set of over 4 million users across 17,000 organizations with over 9.5 million simulated phishing security tests across 19 different industries.