Categories: Data Privacy, Tech Risk, Cybersecurity
October 17, 2020
Resource Type: Articles, Risk eNews
Demystifying Cyber Liability Insurance
Every nonprofit that collects and stores confidential information, Personally Identifiable Information (PI), or Protected Health Information (PHI) is vulnerable to a costly data breach and its consequences. Data breaches, denial of service attacks, and phishing scams are a sampling of...
Topics: Data Privacy, Tech Risk, Cybersecurity, Insurance and Risk Financing
July 7, 2020
Resource Type: Risk eNews
Resilient and Risk-Aware: Ah-ha Moments in Cyber Risk
This week I’ve been engrossed in The Fifth Domain: Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats, by Richard A. Clarke and Robert K. Knake. The book is one of several I’ve been reading this Summer...
July 2, 2020
Resource Type: Articles
Cloud Computing – BCP Boon or Boobytrap?
(download The Business Continuity Planning issue of Risk Management Essentials, here.) Many nonprofits are routinely taking advantage of the “Cloud” to provide low-cost software and data solutions. Gone are the days when organizations were required to purchase and maintain expensive servers...
Topics: Business Continuity Planning, Data Privacy, Tech Risk, Cybersecurity
July 10, 2019
Resource Type: Webinars
Managing Risk in Tech Vendor Selection
Choosing a technology vendor can feel like learning an entirely new language and consume valuable staff time your team would rather spend on something else! And because tech contracts and marketing materials are filled with unfamiliar terms, some nonprofit teams...
June 20, 2019
Resource Type: Risk eNews
6 Risk Trends that Matter to Your Mission
Yesterday I read with interest Kate Barr’s new blog post titled 8 Trends in the Nonprofit Sector. Kate is the President & CEO of Propel Nonprofits, an organization that supports nonprofits in Minnesota and adjacent states. Propel’s finance factsheets, worksheets...
May 21, 2019
Resource Type: Risk eNews
Surviving and Thriving in the Wake of a Data Breach
In this article, Glenn Mott speaks with Greg Walters, Associate General Counsel for Litigation for the Peace Corps, where he provides comprehensive litigation and compliance assistance to an organization with 7,000 volunteers in 65 countries. His areas of experience include...
September 26, 2018
Resource Type: Risk eNews
Technology Mishaps: Planning for IT and Communications Disasters
For most of us, the word “disaster” usually brings to mind a natural disaster like a hurricane or a tsunami, but in the risk management world technology disasters immediately come to mind. An unexpected loss of data or communication can...
Topics: Business Continuity Planning, Data Privacy, Tech Risk, Cybersecurity
August 15, 2018
Resource Type: Risk eNews
Good Measures: Reassessing Your Social Media Response
Frustrated flyer? Take to social media and dispute it with the airline, looping in one of the top executives with an @ sign. Have a small apartment mailbox clogged with fliers, special offers and unwanted catalogues? Want to stop receiving...
December 29, 2016
Resource Type: Risk eNews
Managing Remote Worker Risk
You've either heard the gossip about remote workers, been the subject of comments about your engagement as a remote worker, or perhaps you're a dreamer, longing to replace an expensive, lengthy commute with a short walk to your home office....
Topics: Data Privacy, Tech Risk, Cybersecurity, HR Risk and Employment Practices
December 8, 2016
Resource Type: Articles
Cyberbullying & Cyber Threats to Young People
In August of 2009, a nonprofit college preparatory day school in Los Angeles was sued for $100 million dollars by a student’s parents following a case of on-site cyberbullying. The incident occurred when nine students accessed another student’s personal website...
Topics: Data Privacy, Tech Risk, Cybersecurity, Youth Protection and Child Safety