RT Vol XV: CH 4: Managing Nonprofit Inevitable Cyber-Vulnerabilities
From the Book: The Refractive Thinker® Vol XV: Non Profits: Strategies for Effective Management


Computer and network-security, vulnerability assessment of cybersecurity and information systems management, written cyber-policy and effective strategies for resilience to address relentless and well-funded vulnerability risks of cyber-attacks, insider-threats and hacking, and cybersecurity response plan to evaluate potential risk of exposure might need review and reexamination by nonprofits’ senior executives. The ability to judge content, awareness of threat-vulnerabilities, incorporating advanced analytics, cryptography, and artificial intelligence (AI) technologies, and consideration of acquiring cyber-liability insurance to safeguard information do apply to not-for-profit organizations in digital-age to reduce the risk of breaches, which could expose personally identifiable information (PII) and sensitive personal information (SPI) of members. A reflective approach in thinking to secure the confidentiality of membership systems and exercise of security efforts could help to alleviate risks of cyber-threats to protect data against a breach or modification by grouping and sorting relevant information sequences. Risks and gains from critical ability to judge information through differentiating facts for gaining understanding of Internet risks of threats are pertinent to reduce exposure to malicious behavior on the world-wide web of Internet, given nonprofit organizations’ leadership’s continual pressure to prove value (Brill, Land, Herrburger, Balcanoff, & Wright, 2018). Rise in insider threats, increase in mobile computing, and unchecked organizational applications and resources, and Internet accounts contribute to nonprofits’ vulnerability of valuable information. Advancements in Internet technologies and cellular telephone communication support the need for nonprofit entities’ exercise of awareness against risks of harm, with the Internet and cellular phone devices’ ease of ability to exchange information. Additionally, the present Internetworking could open gateways to possible access to inappropriate deviants, which could place information at risk of accidental disclosure and privacy risk.