Understanding cyber threats is key to protecting your data and your nonprofit

Jan 7, 2025 | Nonprofits

Mark Siroonian, JD, CPA, CITP, CISA
CEO, Siroonian Technologies

User cybersecurity refers to the practices and measures individuals take to protect their personal information and digital assets from unauthorized access, theft and damage. As our lives become increasingly intertwined with technology, it’s crucial for users to understand and implement effective cybersecurity strategies to safeguard their data.    Cybersecurity

Cyber threats come in various forms, including malware, phishing attacks, ransomware and social engineering. Many people have heard these terms but don’t understand what they mean or how they differ from one another. Here’s a brief explanation:

  • Malware encompasses viruses and spyware designed to infiltrate and damage systems.
  • Phishing involves tricking users into divulging sensitive information, often through deceptive emails or websites.
  • Ransomware locks users out of their systems until a ransom is paid.

Social engineering manipulates individuals into breaking security protocols.For most people, cybersecurity has become an essential part of our job responsibilities. Particularly during the holiday season there is often an increase in fraudulent communications via email and text. While there are many areas to consider, now is the perfect time to consider these key practices that can help protect you and your organization from a cyberattack:

  • Enable multifactor authentication: Activate multifactor authentication on your accounts to drastically reduce the chances of being hacked. It takes a little extra time for you and your staff to log in to accounts with multifactor authentication, but that small investment of time can help avoid a major data breach and, possibly, hundreds of thousands of dollars in damage.
  • Keep software updated: Regularly update your software to ensure that it’s secure and functioning optimally, and make sure your staff are accepting the updates to their computers. Updates often include “patches” that can protect your system from the latest cyberattack methods.
  • Be cautious when clicking: More than 90% of successful cyberattacks begin with phishing emails, so always think before clicking on links or attachments. Even if the email looks legitimate, remember that digital criminals are able to reproduce logos and other branding elements that can fool even the most cautious users. If an email seems unusual in any way, ask your IT provider to confirm that it is safe before clicking on anything.
  • Use strong, unique passwords: Create strong, unique passwords and consider using a password manager to generate and store them securely.
  • Secure your device: Physical security is just as crucial as digital security—ensure your organization’s computers are protected.
  • Use secure connections: When your staff is working remotely or transferring files off-site, make sure they use secure connections such as VPNs or encrypted file transfer options.
  • Access financial accounts safely: Always access bank or financial accounts from a trusted device and network to prevent unauthorized access. As much as possible, avoid accessing financial accounts through cell phone apps when using a public internet connection, such as at a coffee shop.
  • Be careful with external devices: Avoid plugging untrusted devices like infected flash drives or external hard drives into your computer, as they may contain malware. If you need to use a flash drive, buy a new one.
  • Protect all devices: Use passwords or other security measures to protect all devices, including mobile phones.
  • Verify software sources: Only download software from trusted websites to avoid malicious programs.
  • Exercise caution with email attachments: Use a spam filter and be aware of scams texted or emailed to you such as fake software updates, foreign lotteries check overpayment, pay-in-advance credit offers, debt relief, US Postal Service and IRS refunds. Take time to verify whoever contacts you if you believe it could be legitimate communication.

    Cybersecurity is a vital component of our digital lives. By understanding cyber threats and abiding by the safety protocols mentioned above, users can significantly enhance their defense against cybercrime. As technology evolves, remaining vigilant and adaptable is key to navigating the digital landscape safely. With proactive measures and an informed mindset, individuals can protect themselves and their information from cyber threats effectively.

    About
    Siroonian Technologies is a strategic partner of G.T. Reilly & Company.

Author

Related Posts

Share This