SlideShare uma empresa Scribd logo
1 de 25
2020 NONPROFIT
CYBERSECURITY INCIDENT
REPORT
Webinar
Series
April 2020
About Community IT
Advancing mission
through the effective
of technology.
100% Employee
Owned
Presenter
Matthew Eshleman
CTO
NONPROFIT
CYBERSECUR
ITY
INCIDENT
REPORT
2020
© 2020 Community IT Innovators, Inc. All Rights Reserved
April 2020 2nd Edition
Agenda
Cybersecurity landscape
Remote work
Our approach to cybersecurity
Types of incidents
Report data
Steps to secure your organization
CYBERSECURITY LANDSCAPE
Persistent and ongoing brute force
attacks on identities
Sophisticated spear phishing
Organizations targeted because of the
work they do
Attacks targeting vendors
CYBERSECURITY LANDSCAPE
New security tools available to
combat new threat types.
Organization’s more proactive about
asking where to start improving their
cybersecurity.
60% of Nonprofits don’t know how
their org handles cybersecurity risk.
Breach response for a small to
medium business is $149,000
Applicability
to more
remote
work
• Management / reporting harder
• Remote work opens up security holes
• Device management / MDM is critical
• Proactive planning pays off
Secure Video
Conferencing
• MicrosoftTeams
• Google Meet
Orgs already
have secure
tools available
to them
• Wire
• Signal
• Jitsi
Orgs with
significant
Privacy and
Security
concerns
• Update your client
• Follow good meeting security
practices
Using Zoom?
OUR APPROACH TO CYBERSECURITY
PREDICTIVE
INTELLIGENCE
IDENTIT
Y
DATA
DEVICE
S
PERIMET
ER
WEB
SECURITY AWARENESS
SECURITY POLICY
BASELINE
INFRASTRUCTURE
SECURITY
PRACTICES
OS UPDATES
THIRD PARTY
PATCHING
BIOS AND DRIVER
UPDATES
ANTIVIRUS
WEB FILTERING
Incident
An event that compromises the integrity,
confidentiality or availability of an information
asset.
Breach
An incident that results in the confirmed
disclosure—
not just potential exposure—of data to an
unauthorized party.
Types of
incidents
• Spam: unwanted or inappropriate email
that is sent to a large number of recipients
• Malware: any type of malicious software,
usually reported by the end user as a slow
computer or strange pop-ups
• Account Compromise: unauthorized use of
a digital identity by someone other than
assigned user
Types of
incidents
• Business Email Compromise: scam using
traditional confidence scheme techniques
combined with email impersonation to extract
funds through illicit means
• Wire Fraud: any fraudulent or deceitful scheme
to steal money by using phone lines or
communications through electronic means
• Virus: a malicious piece of software that can
alter the way a computer works, typically
from one computer to another, often rendering
the computer and/or data unusable
Types of
incidents
• Supply Chain: an attack that is initiated
through a partner of the organization. Also
known as a value-chain or third-party attack.
• Advanced Persistent Threat: State-Sponsored
actor or criminal group focused on targeting a
specific organization or individual, operating
over a long period of time with a goal of
remaining undetected and exfiltrating data.
• Ransomware: a type of virus that has the
characteristic of encrypting files and then
demanding payment for decrypting the files.
06
CYBERSECURITY INCIDENTS
INCIDENT TYPE
COUNT OF
INCIDENTS
COUNT OF
SAMPLE
% OF SAMPLE
EXPERIENCE
INCIDENT
Spam 378 51 71%
Malware 50 31 43%
Account Compromise 15 12 17%
Business Email Compromise 59 35 35%
Wire fraud 3 3 4%
Virus 3 3 4%
Advanced Persistent Threat 1 1 1%
Supply Chain 0 0 0%
Ransomware 0 0 0%
Grand Total 509 72
Compare Year over Year
Trends
Cybersecurity incidents on the rise
Spam continues to be a problem
Business Email Compromise biggest headache
Account compromise is still at a high level
Sector Differences
• Spam and Business Email Compromise attacks affect all
organizations
• Policy /ThinkTank Organizations targeted by Advanced
PersistentThreats
• Social service organizations more susceptible to Business
Email Compromise
SECURE YOUR
NETWORK
01
IMPLEMENT MULTI-FACTOR AUTHENTICATION
Protects against: account compromise
02
03
Protect your Staff from Business Email Compromise
Protects against: account compromise and wire fraud
IMPLEMENT A SECURITY AWARENESS TRAINING
Protects against: email phishing, account compromise,
business email compromise and wire fraud.
Community IT
Cybersecurity
NIST Security Survey
Core Cybersecurity Assessment
Comprehensive Cybersecurity Assessment
Managed Cybersecurity Services
Cyber Liability Insurance
Incident Response
Let’s Talk:
Email: cybersecurity@communityIT.com for a complimentary DarkWeb
Scan to see what accounts are already compromised.
Meet: Books some time with me https://meetings.hubspot.com/meshleman
Upcomin
g
Webinar
What Do Non-Profits
Need FromTheirTech
Leaders?
Wednesday May 20
1:00 – 2:00 PM EDT
cybersecurity@communityit.com
© 2018 Community IT Innovators, Inc.
All Rights Reserved.
www.communityit.com
THANK
YOU!

Mais conteúdo relacionado

Mais de Community IT Innovators

5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and MoreCommunity IT Innovators
 
How Data Quality Defines Your Organization Webinar November 2019
How Data Quality Defines Your Organization Webinar November 2019How Data Quality Defines Your Organization Webinar November 2019
How Data Quality Defines Your Organization Webinar November 2019Community IT Innovators
 
Nonprofit Cybersecurity Readiness - Community IT Innovators Webinar
Nonprofit Cybersecurity Readiness - Community IT Innovators WebinarNonprofit Cybersecurity Readiness - Community IT Innovators Webinar
Nonprofit Cybersecurity Readiness - Community IT Innovators WebinarCommunity IT Innovators
 
5 Steps to Create an Information Strategy for Your Organization
5 Steps to Create an Information Strategy for Your Organization5 Steps to Create an Information Strategy for Your Organization
5 Steps to Create an Information Strategy for Your OrganizationCommunity IT Innovators
 
Server 2008 and Windows 7 End of Life: 3 Things You Need to Know
Server 2008 and Windows 7 End of Life: 3 Things You Need to KnowServer 2008 and Windows 7 End of Life: 3 Things You Need to Know
Server 2008 and Windows 7 End of Life: 3 Things You Need to KnowCommunity IT Innovators
 
What Makes Nonprofit Tech Projects Succeed?
What Makes Nonprofit Tech Projects Succeed?What Makes Nonprofit Tech Projects Succeed?
What Makes Nonprofit Tech Projects Succeed?Community IT Innovators
 
Community IT Webinar: Working with an Outsourced IT Manager
Community IT Webinar: Working with an Outsourced IT ManagerCommunity IT Webinar: Working with an Outsourced IT Manager
Community IT Webinar: Working with an Outsourced IT ManagerCommunity IT Innovators
 
Improving Nonprofit CRM Data Management in 2019 - Build Consulting and Commun...
Improving Nonprofit CRM Data Management in 2019 - Build Consulting and Commun...Improving Nonprofit CRM Data Management in 2019 - Build Consulting and Commun...
Improving Nonprofit CRM Data Management in 2019 - Build Consulting and Commun...Community IT Innovators
 
Community IT Innovators Technology Trends Round Table 2019
Community IT Innovators Technology Trends Round Table 2019Community IT Innovators Technology Trends Round Table 2019
Community IT Innovators Technology Trends Round Table 2019Community IT Innovators
 
Selecting Nonprofit Software: Technology Comes Last
Selecting Nonprofit Software: Technology Comes LastSelecting Nonprofit Software: Technology Comes Last
Selecting Nonprofit Software: Technology Comes LastCommunity IT Innovators
 
IT Security Incident Response for Nonprofits
IT Security Incident Response for NonprofitsIT Security Incident Response for Nonprofits
IT Security Incident Response for NonprofitsCommunity IT Innovators
 
Nonprofit Development Operations and Technology
Nonprofit Development Operations and TechnologyNonprofit Development Operations and Technology
Nonprofit Development Operations and TechnologyCommunity IT Innovators
 
18NTC Nonprofit Technology Conference Round Up
18NTC Nonprofit Technology Conference Round Up18NTC Nonprofit Technology Conference Round Up
18NTC Nonprofit Technology Conference Round UpCommunity IT Innovators
 
Five Hacks to Weave Constituent Experience Into Your Organization
Five Hacks to Weave Constituent Experience Into Your OrganizationFive Hacks to Weave Constituent Experience Into Your Organization
Five Hacks to Weave Constituent Experience Into Your OrganizationCommunity IT Innovators
 

Mais de Community IT Innovators (20)

5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More
 
How Data Quality Defines Your Organization Webinar November 2019
How Data Quality Defines Your Organization Webinar November 2019How Data Quality Defines Your Organization Webinar November 2019
How Data Quality Defines Your Organization Webinar November 2019
 
Nonprofit Cybersecurity Readiness - Community IT Innovators Webinar
Nonprofit Cybersecurity Readiness - Community IT Innovators WebinarNonprofit Cybersecurity Readiness - Community IT Innovators Webinar
Nonprofit Cybersecurity Readiness - Community IT Innovators Webinar
 
5 Steps to Create an Information Strategy for Your Organization
5 Steps to Create an Information Strategy for Your Organization5 Steps to Create an Information Strategy for Your Organization
5 Steps to Create an Information Strategy for Your Organization
 
Server 2008 and Windows 7 End of Life: 3 Things You Need to Know
Server 2008 and Windows 7 End of Life: 3 Things You Need to KnowServer 2008 and Windows 7 End of Life: 3 Things You Need to Know
Server 2008 and Windows 7 End of Life: 3 Things You Need to Know
 
What Makes Nonprofit Tech Projects Succeed?
What Makes Nonprofit Tech Projects Succeed?What Makes Nonprofit Tech Projects Succeed?
What Makes Nonprofit Tech Projects Succeed?
 
Community IT Webinar: Working with an Outsourced IT Manager
Community IT Webinar: Working with an Outsourced IT ManagerCommunity IT Webinar: Working with an Outsourced IT Manager
Community IT Webinar: Working with an Outsourced IT Manager
 
Nonprofit Cybersecurity Incident Report
Nonprofit Cybersecurity Incident ReportNonprofit Cybersecurity Incident Report
Nonprofit Cybersecurity Incident Report
 
Improving Nonprofit CRM Data Management in 2019 - Build Consulting and Commun...
Improving Nonprofit CRM Data Management in 2019 - Build Consulting and Commun...Improving Nonprofit CRM Data Management in 2019 - Build Consulting and Commun...
Improving Nonprofit CRM Data Management in 2019 - Build Consulting and Commun...
 
Community IT Innovators Technology Trends Round Table 2019
Community IT Innovators Technology Trends Round Table 2019Community IT Innovators Technology Trends Round Table 2019
Community IT Innovators Technology Trends Round Table 2019
 
Selecting Nonprofit Software: Technology Comes Last
Selecting Nonprofit Software: Technology Comes LastSelecting Nonprofit Software: Technology Comes Last
Selecting Nonprofit Software: Technology Comes Last
 
IT Security Incident Response for Nonprofits
IT Security Incident Response for NonprofitsIT Security Incident Response for Nonprofits
IT Security Incident Response for Nonprofits
 
Office 365 Security Best Practices
Office 365 Security Best PracticesOffice 365 Security Best Practices
Office 365 Security Best Practices
 
Nonprofit Development, Meet Accounting!
Nonprofit Development, Meet Accounting!Nonprofit Development, Meet Accounting!
Nonprofit Development, Meet Accounting!
 
IT Management Fundamentals
IT Management FundamentalsIT Management Fundamentals
IT Management Fundamentals
 
Encryption 101 for Nonprofits
Encryption 101 for NonprofitsEncryption 101 for Nonprofits
Encryption 101 for Nonprofits
 
Nonprofit Development Operations and Technology
Nonprofit Development Operations and TechnologyNonprofit Development Operations and Technology
Nonprofit Development Operations and Technology
 
18NTC Nonprofit Technology Conference Round Up
18NTC Nonprofit Technology Conference Round Up18NTC Nonprofit Technology Conference Round Up
18NTC Nonprofit Technology Conference Round Up
 
PowerBI for Nonprofits
PowerBI for NonprofitsPowerBI for Nonprofits
PowerBI for Nonprofits
 
Five Hacks to Weave Constituent Experience Into Your Organization
Five Hacks to Weave Constituent Experience Into Your OrganizationFive Hacks to Weave Constituent Experience Into Your Organization
Five Hacks to Weave Constituent Experience Into Your Organization
 

Último

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 

Último (20)

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 

2020 April Community IT Webinar: Nonprofit Incident Report 2020 edition

  • 2. About Community IT Advancing mission through the effective of technology. 100% Employee Owned
  • 4. NONPROFIT CYBERSECUR ITY INCIDENT REPORT 2020 © 2020 Community IT Innovators, Inc. All Rights Reserved April 2020 2nd Edition
  • 5. Agenda Cybersecurity landscape Remote work Our approach to cybersecurity Types of incidents Report data Steps to secure your organization
  • 6. CYBERSECURITY LANDSCAPE Persistent and ongoing brute force attacks on identities Sophisticated spear phishing Organizations targeted because of the work they do Attacks targeting vendors
  • 7. CYBERSECURITY LANDSCAPE New security tools available to combat new threat types. Organization’s more proactive about asking where to start improving their cybersecurity. 60% of Nonprofits don’t know how their org handles cybersecurity risk. Breach response for a small to medium business is $149,000
  • 8. Applicability to more remote work • Management / reporting harder • Remote work opens up security holes • Device management / MDM is critical • Proactive planning pays off
  • 9. Secure Video Conferencing • MicrosoftTeams • Google Meet Orgs already have secure tools available to them • Wire • Signal • Jitsi Orgs with significant Privacy and Security concerns • Update your client • Follow good meeting security practices Using Zoom?
  • 10. OUR APPROACH TO CYBERSECURITY PREDICTIVE INTELLIGENCE IDENTIT Y DATA DEVICE S PERIMET ER WEB SECURITY AWARENESS SECURITY POLICY
  • 12. Incident An event that compromises the integrity, confidentiality or availability of an information asset.
  • 13. Breach An incident that results in the confirmed disclosure— not just potential exposure—of data to an unauthorized party.
  • 14. Types of incidents • Spam: unwanted or inappropriate email that is sent to a large number of recipients • Malware: any type of malicious software, usually reported by the end user as a slow computer or strange pop-ups • Account Compromise: unauthorized use of a digital identity by someone other than assigned user
  • 15. Types of incidents • Business Email Compromise: scam using traditional confidence scheme techniques combined with email impersonation to extract funds through illicit means • Wire Fraud: any fraudulent or deceitful scheme to steal money by using phone lines or communications through electronic means • Virus: a malicious piece of software that can alter the way a computer works, typically from one computer to another, often rendering the computer and/or data unusable
  • 16. Types of incidents • Supply Chain: an attack that is initiated through a partner of the organization. Also known as a value-chain or third-party attack. • Advanced Persistent Threat: State-Sponsored actor or criminal group focused on targeting a specific organization or individual, operating over a long period of time with a goal of remaining undetected and exfiltrating data. • Ransomware: a type of virus that has the characteristic of encrypting files and then demanding payment for decrypting the files.
  • 17. 06 CYBERSECURITY INCIDENTS INCIDENT TYPE COUNT OF INCIDENTS COUNT OF SAMPLE % OF SAMPLE EXPERIENCE INCIDENT Spam 378 51 71% Malware 50 31 43% Account Compromise 15 12 17% Business Email Compromise 59 35 35% Wire fraud 3 3 4% Virus 3 3 4% Advanced Persistent Threat 1 1 1% Supply Chain 0 0 0% Ransomware 0 0 0% Grand Total 509 72
  • 19. Trends Cybersecurity incidents on the rise Spam continues to be a problem Business Email Compromise biggest headache Account compromise is still at a high level
  • 20. Sector Differences • Spam and Business Email Compromise attacks affect all organizations • Policy /ThinkTank Organizations targeted by Advanced PersistentThreats • Social service organizations more susceptible to Business Email Compromise
  • 21. SECURE YOUR NETWORK 01 IMPLEMENT MULTI-FACTOR AUTHENTICATION Protects against: account compromise 02 03 Protect your Staff from Business Email Compromise Protects against: account compromise and wire fraud IMPLEMENT A SECURITY AWARENESS TRAINING Protects against: email phishing, account compromise, business email compromise and wire fraud.
  • 22. Community IT Cybersecurity NIST Security Survey Core Cybersecurity Assessment Comprehensive Cybersecurity Assessment Managed Cybersecurity Services Cyber Liability Insurance Incident Response
  • 23. Let’s Talk: Email: cybersecurity@communityIT.com for a complimentary DarkWeb Scan to see what accounts are already compromised. Meet: Books some time with me https://meetings.hubspot.com/meshleman
  • 24. Upcomin g Webinar What Do Non-Profits Need FromTheirTech Leaders? Wednesday May 20 1:00 – 2:00 PM EDT
  • 25. cybersecurity@communityit.com © 2018 Community IT Innovators, Inc. All Rights Reserved. www.communityit.com THANK YOU!