to worry, everything functions the same. Reach out to [email protected]
if you have any questions or concerns.
No word provokes chapter nightmares like the word “hacked”—except maybe the word “fraud,” the topic of our second post in this series about chapters in crisis. When chapter volunteers (and staff) are busy, and they surely are busy, they’re more likely to make the kind of tiny mistakes that can lead to a cybersecurity disaster.
One of them is bound to fall for an email phishing scam one of these days—it’s inevitable. When they do, you want them to feel comfortable turning to you for guidance, no matter their chapter structure: independent or subsidiary. In this post, we assume chapters are subsidiaries, a situation that brings more risk to National, but also supposedly provides more control. Even if your components are independent, you’ll benefit from the advice we share.
We’ve heard countless stories about spoofed emails impersonating a chapter officer, for example:
Spoofed emails are only one way for a chapter leader to get phished—tricked into revealing sensitive information or exposing their computer (and their chapter’s network) to malware.
Another common incident is receiving a legit-looking email from a service provider notifying the recipient of suspicious activity and advising them to log in to their account. Phishing emails like these are seeking your Gmail or other email credentials. Once they have these credentials, they can do all kinds of damage. The creativity of cybercriminals knows no bounds as new phishing schemes are continually unleashed.
Some phishing attacks are targeted at large organizations, but most are not. They’re made possible by inexpensive, automated software called “exploit kits” that spread malware via emails and compromised websites.
The extent of your involvement depends upon your relationship with the chapter. If the chapter is a subsidiary, you might take responsibility for these tasks. But, if an affiliated component is the cybersecurity victim, you can suggest these steps.
Gather your team—IT, membership, communications, member services, and legal—and follow your data breach plan. Hopefully, your association and chapters have a data breach plan to follow. If not, schedule time with a cybersecurity consultant to develop one.
You may need to hire an IT professional to find out how the breach occurred, and help you fix any holes in your security perimeter. Once your network is secure, restore lost data from your backup. Again, this is another area where it pays to plan ahead: make sure your chapters have redundancy plans and backup procedures in place.
Every state, as well as the District of Columbia, has a data breach notification law with specific requirements for notifying anyone whose personal data has been compromised. Don’t delay action. Some state laws require you to notify data owners within 30 days.
Even with the best security perimeter your budget can afford, you need a strong human firewall as your last line of defense. Ensure chapter volunteers and staff have the training they need to protect member and customer data.
Follow a two-prong strategy: teach and test. Mandate attendance or viewing of security training webinars. Provide cybersecurity training resources, such as tip sheets and sample policies. Teach chapter leaders how to safely use personal computers and mobile devices if they’re connecting to a chapter or National network.
Test their cybersecurity knowledge. An automated phishing test service, such as KnowBe4, sends simulated phishing emails to see if staff and volunteer leaders take the bait. If they do, a training video explains what to look for in future emails so they don’t make the same mistake again.
Raise the cybersecurity issue regularly in chapter leader communications so it’s kept top of mind. Use security breaches in the news as teachable moments.
Have policies and procedures in place that make it less likely for chapter leaders to fall for social engineering, for example, a clear procedure for payment and money transfer requests.
Although most security breaches are caused by human error, you must ensure your network’s security perimeter is as tight as possible. If it’s in your budget, arrange for annual cybersecurity audits to identify and fix any vulnerabilities or unsafe practices. These audits are often required now as part of regular financial audits.
Instruct chapters to do regular backups, and, for those with the IT resources, to test data restoration. If they can’t quickly and completely restore data after an incident, they’ll have trouble getting back to business.
Because cybercriminals can scrape email addresses and other data from your public website, don’t publish contact information for staff and volunteer leaders. Use email forms instead.
Find out if your insurance policies cover social engineering claims. Even cyberinsurance may have limitations on claims caused by phishing and ransomware attacks.
Our next post discusses a new topic of concern now that we’re in a post-GDPR world: data privacy complaints.
You receive a lot of emails…we get it. Subscribe to the content you want and we’ll do the rest! We send updates on new articles, guides, webinars, events, conferences and more. Receive awesome resources in your inbox every month >>
[vc_row][vc_column][gem_youtube video_id=”9XDKarnLK70″][/vc_column][/vc_row]
[vc_row][vc_column css=”.vc_custom_1554921625215{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}”][vc_empty_space height=”30px”][vc_icon icon_fontawesome=”fa fa-exclamation-circle” color=”white” background_style=”rounded” background_color=”custom” size=”xl” align=”center” custom_background_color=”#25abe2″][vc_empty_space height=”15px”][vc_column_text]
[/vc_column_text][vc_column_text]
[/vc_column_text][vc_column_text]
[/vc_column_text][vc_empty_space height=”25px”][vc_row_inner][vc_column_inner width=”1/2″][gem_button position=”right” style=”outline” size=”medium” corner=”3″ border=”2″ icon_pack=”elegant” text=”Pay Now” text_color=”#46485c” hover_text_color=”#ffffff” hover_background_color=”#46485c” border_color=”#46485c” hover_border_color=”#46485c” link=”url:https%3A%2F%2Fwww.billhighway.com%2Faph%2Fforchapters%2Fv2%2Fquickpay.aspx|title:Pay%20Now||”][/vc_column_inner][vc_column_inner width=”1/2″][gem_button position=”left” style=”outline” size=”medium” corner=”3″ border=”2″ icon_pack=”elegant” text=”LogIn” text_color=”#46485c” hover_text_color=”#ffffff” hover_background_color=”#46485c” border_color=”#46485c” hover_border_color=”#46485c” link=”url:https%3A%2F%2Fwww.billhighway.com%2Faph%2Fforchapters%2Fv2%2Flogin.aspx|title:Pay%20Now||”][/vc_column_inner][/vc_row_inner][vc_empty_space height=”50px”][/vc_column][/vc_row]
[vc_row][vc_column][gem_youtube video_id=”wjjyW8SuEck”][/vc_column][/vc_row]
[vc_row][vc_column][gem_youtube video_id=”ocVXgZ8A5rI”][/vc_column][/vc_row]
[vc_row][vc_column][gem_youtube video_id=”ZPf3GdKjWeg”][/vc_column][/vc_row]