Resources

What Your Board Needs to Know About Cyber Threats

By Melanie Lockwood Herman Risk is top-of-mind for many nonprofit boards these days. Board members understandably want to grasp the top risks facing an organization and have confidence that the management team is prepared to weather the downside risks it cannot avoid. And based on our work with nonprofits across a wide spectrum of missions, … Continued

What Your Board Needs to Know About Cyber Threats

By Melanie Lockwood Herman Risk is top-of-mind for many nonprofit boards these days. Board members understandably want to grasp the top risks facing an organization and have confidence that the management team is prepared to weather the downside risks it cannot avoid. And based on our work with nonprofits across a wide spectrum of missions, … Continued

Framework to Implement a Cybersecurity Plan

by Afua Bruce for NTEN Once organizations understand what cybersecurity is and recognize that it is a threat to their operations, the next step is to assess what cyber risks the organization has. By conducting risk assessments and implementing appropriate protections, organizations can decrease the likelihood of a cybersecurity attack. Additionally, the risk assessment process … Continued

Know Your CyberSpeak: A Cyber Risk Glossary

Navigating the world of cyber risk often feels a lot like learning a foreign language. Terms and concepts can be confusing and unfamiliar. This Cyber Risk Glossary will help nonprofit leaders as they examine cyber liability insurance policies and develop the necessary technology-related security protocols to protect their missions. Cloud – The term “Cloud” refers … Continued

Cloud Computing – BCP Boon or Boobytrap?

(download The Business Continuity Planning issue of Risk Management Essentials, here.) By Katharine Nesslage Many nonprofits are routinely taking advantage of the “Cloud” to provide low-cost software and data solutions. Gone are the days when organizations were required to purchase and maintain expensive servers on-site to house their applications and data. The allure of being able … Continued