Day Pitney remains committed to providing quality legal counsel, while protecting our clients and employees, and transforming our communities into more just, equal and equitable spaces. For more information, please visit our COVID-19 Resource Center | Racial Justice and Equity Task Force.
When it comes to cybersecurity, it is tempting for nonprofits to envy their for-profit counterparts' budgets, to wince and then hope for the best. How safe a nonprofit is, however, need not depend on how much it has to spend on IT upgrades. Rather, the most important predicate to improved cybersecurity is whether that organization's leadership commits to revamping work procedures to reduce IT-borne risk.
The scary cyberthreats that nonprofits face arise in part from the porous technologies that everyone – good, criminal or careless – uses. The internet, computers and smartphones are engineered to favor instant copying and transmission of data – in volume, across networks and borders. Thus, security technologies are an iffy exercise in retrofitting, conflicting as they do with IT's bias in favor of openness, which bad guys so often find ways to exploit.
In such circumstances, it makes little sense to equate improved cybersecurity with security technology spend (even if one can spend a lot). Rather, an organization can best protect itself by candidly examining how it uses IT to perform its mission, revising its work habits to reduce its overall risk and, as funds permit, upgrading tech. Important steps in this process include the following:
An article from Day Pitney's Fall 2016 Nonprofit Newsletter
An article from Day Pitney's Fall 2016 Nonprofit Newsletter
An article from Day Pitney's Fall 2016 Nonprofit Newsletter
An article from Day Pitney's Fall 2016 Nonprofit Newsletter
An article from Day Pitney's Fall 2016 Nonprofit Newsletter
This website may use cookies, pixel tags and other passive tracking technologies, including Google Analytics, to improve functionality and performance. For more information, see our Privacy Policy. By using our website, you are consenting to our use of these tracking technologies. You can alter the configuration of your browser to refuse to accept cookies, but if you do so, it is possible that some areas of web sites that use cookies will not function properly when you view them. To learn more about how to delete and manage cookies, refer to the support instructions for each browser (e.g., see AllAboutCookies.org). You may locate Google Analytics' currently available opt-outs for the web here.
This website may use cookies, pixel tags and other passive tracking technologies, including Google Analytics, to improve functionality and performance. For more information, see our Privacy Policy. By using our website, you are consenting to our use of these tracking technologies. You can alter the configuration of your browser to refuse to accept cookies, but if you do so, it is possible that some areas of web sites that use cookies will not function properly when you view them. To learn more about how to delete and manage cookies, refer to the support instructions for each browser (e.g., see AllAboutCookies.org). You may locate Google Analytics' currently available opt-outs for the web here.