Tag Archives: data security

Nonprofit Radio for September 22, 2025: The State Of The Sector (Beginning With AI)

 

Gene Takagi & Amy Sample Ward: The State Of The Sector (Beginning With AI)

This year, any conversation about the nonprofit sector finds its way to Artificial Intelligence. So we start there, with our contributors Gene Takagi on legal and Amy Sample Ward on technology. Amy is concerned about our lack of security readiness and shares their Top 5 security must-haves. Gene explains your board’s duties around tech, budgeting and planning. They both see resilience as critical. Plus, a ton more. Gene is principal attorney at NEO Law Group and Amy is the CEO of NTEN.

Gene Takagi

Amy Sample Ward

 

 

 

 

Listen to the podcast

Get Nonprofit Radio insider alerts

Apple Podcast button

 

 

 

We’re the #1 Podcast for Nonprofits, With 13,000+ Weekly Listeners

Board relations. Fundraising. Volunteer management. Prospect research. Legal compliance. Accounting. Finance. Investments. Donor relations. Public relations. Marketing. Technology. Social media.

Every nonprofit struggles with these issues. Big nonprofits hire experts. The other 95% listen to Tony Martignetti Nonprofit Radio. Trusted experts and leading thinkers join me each week to tackle the tough issues. If you have big dreams but a small budget, you have a home at Tony Martignetti Nonprofit Radio.
View Full Transcript

Hello, and my voice cracked. Welcome to Tony Martignetti Nonprofit Radio, big nonprofit ideas for the other 95%. I’m your aptly named host and the podfather of your favorite hebdominal podcast. Oh, I’m glad you’re with us. I’d suffer the effects of chondrodermatitis, nodularis helicus. If I heard that you missed this week’s show. Here’s our associate producer Kate with what’s on the menu. Hello Tony. I hope it’s so funny. It’s that voice cracks like I’m 14. Hey, Tony, I hope our listeners are hungry. The state of the sector, beginning with AI. This year, any conversation about the nonprofit sector finds its way to artificial intelligence. So we start there with our contributors Gene Takagi on legal and Amy Sample Ward on technology. Amy is concerned about our lack of security readiness and shares their top five security must-haves. Gan explains your board’s duties around tech, budgeting and planning. They both see resilience as critical, plus a ton more. Jean is principal attorney at Neo Law Group, and Amy is the CEO of N10. On Tony’s take two. Tales from the gym. The cure for dry eyes. Here is the state of the sector, beginning with AI. It’s a pleasure to welcome back Gene Takagi and Amy Sample Ward, our contributors to nonprofit radio. Gene is our legal contributor and principal of NEO, the nonprofit and exempt organizations law group in San Francisco. He edits that wildly popular nonprofit law blog.com. The firm is at neolawgroup.com and he’s at GTech. Amy Sample Ward is our technology contributor and CEO of N10. They were awarded a 2023 Bosch Foundation fellowship and their most recent co-authored book is The Tech That Comes Next, about equity and inclusiveness in technology development. You’ll find them on Blue Sky as Amy sampleward, aptly named. Welcome. Good to see you both. Gene, Amy, welcome back. Good to see you both as well. I actually got to see Gene in person this week, which was a real treat. But your faces coming through the internet. Where? Where? In DC in a in a meeting. Oh, cool. Yeah, it was wonderful to see Amy and hear a little bit more about her family and learn, learn about things going on. um, and great to see you too, Tony. Thank you. Last time we were together was the 50th. That’s right. Yes. All right, um. So Amy You have been, uh, you have lots of conversations with funders, intermediaries, nonprofits, uh, I’d like to start with you just. What are folks talking about? Yeah, I think there’s A lot of desire for thoughtful conversation across the sector right now and, and over, you know, the last handful of months and I’m sure the months to come. And that desire for thoughtful conversation is trying to be held in a time where things feel rapidly unraveling, you know, and A few, I think patterns have been coming up at least in the versions of conversations that I’m, I’m in, whether those are, you know, 1 to 1 with other intermediary organizations, capacity building organizations, um, nonprofit service groups or, or even philanthropy serving organizations or with funders themselves, and they’re, of course, different. You know, flavors of the same dish maybe, but I think everyone really wants to hear and help and It feels like there’s not that much help happening. Um, I think when you talk to funders are presume you’re talking about. How does that go? Like you you should be funding technology, you should be funding capacity building, you should be funding. that are advocating for things or yeah, I mean, part of what sees as our kind of theory of change in the way that we make impact is of course and directly supporting nonprofit staff through training but also shifting the conditions in which all of us are doing this work. Right, so asking funders to fund adequately for the technology and data that is needed to, to deliver the programs, their funding right is part of that or, or all kinds of other advocacy, um, big, big a little a, you know, influencing thropy, and they, and I, I have to do, so they take these meetings like they don’t mind being told what they ought to be funding. Oh, it’s easy to take a meeting. It doesn’t mean you’re making you’re implementing what’s what’s the outcome and what’s the action? I realize that. But I’m OK, I’m, I’m, I think that most of the, most of the conversations N10 is entered into with foundations are not necessarily on the premise of like, can you please give us this feedback to fund a certain way, right? We just say that when we have access to. To folks that we, that we could share it with, but mostly, um, I think in these times, just like honestly in 2020 funders and other philanthropy serving organizations are asking for what we see because we are able to see into a lot of different types of organizations across the sector, not even just in the. and see trends that are emerging, see what folks are really asking for help on right in a way where we’re not having to divulge, oh, this organization that’s your grantee, they don’t know how to do this, right? There there’s not that vulnerability we’re able to share trends and unfortunately, the trends aren’t aren’t new, but, but at least they’re asking about them right now and they. are very, um, vulnerable issues. Like we are seeing incredible lack of security readiness in organizations. And as we’ve talked about on this show, and Gin has talked about, you know, there’s a lot to be concerned about when you think of a nonprofit organizations like digital and cybersecurity because It’s your staff, it’s your content, but it’s also all of your constituents, all of those people who’ve received programs and services, and if you feel that your mission and your programs and services are vulnerable, those folks in your community who’ve accessed them are 10 times more vulnerable, right? um, than your organization is, and that’s something that I think for us we just. We care about that kind of more than anything and so it really has felt like a spotlight on security and even just to um illustrate, we we can created a new program just to try to help in this way, um, a 3 month just security focused program. We had a single email that said that it was open. Um, In 4 days, we had 400 applicants from 26 different countries asking to be in the 20 people, you know, cohort, so That was, I think, validation that we were really hearing the trend and hearing what, OK, what are, what’s behind some of these questions that we’re getting? What are people really struggling with and oh my gosh, OK, we’re right, they are really struggling with security. This is um let’s, let’s bring Gene in on uh on security. You’re nodding a lot, Gene. And, and we have talked about, as Amy said, uh, as they said, we, we have talked about it, but, uh, you know, it’s, it bears amplification, because we, we all have talked about cybersecurity, protecting data, but especially as Amy’s saying, the, the, the people you’re doing the work for, if you’re, if you’re involved in a people, uh people oriented work, Gene, remind us. Oh, I’m amplifying everything Amy says, as I’m wise to do, um, but maybe I’ll just add that, you know, when people think, including funders, when they think about technology and, and some of them are just focused on AI right now, but technology is much broader than that, of course. When they’re thinking about technology, they really have to think of it as one of the core assets of an organization, and that’s not all because it’s also a huge risk and liability not only to the organization but all to all its beneficiaries and its communities that they serve and it’s communities that they exist in so it’s all of that it’s it’s even more complicated. To manage if I might venture and say this, then your other main investments which are like in staffing and in facilities like this is stuff that we don’t have a lot of experience with it’s newer things that are coming up. We haven’t learned how to manage it very well. It’s a little bit out of control. as it develops as with AI going on we don’t even know what the laws are related to this um so this is stuff that funders need to fund and organizations need to invest in really badly and when they don’t think about doing this they’re they’re really. Living for the short term at the expense of the intermediate term because it’s not even that far off in the future where these risks will ripen. They will ripen very, very quickly now. um, so that’s my two cents. And add to what she’s saying. I talked to two different, um. Funders who are who are regional funders, not national funders, and said, hey, I know the folks that are your grantees, they’re um predominantly rural organizations. They’re predominantly very small organizations, you know, single digit FTEs. There are folks that we can see in our data, not as individuals or individual organizations, but by kind of organizational demographics, are, are very likely to have really low scores, you know, ineffectiveness in these areas. We have free resources. We’re not even like asking you to fund us necessarily, like, which I should have been asking, but, you know, coming at it from really how do we get these resources available to organizations who we know are vulnerable, and their feedback was, well, security is not an issue that any of our grantees have raised with us. And I just want to pause there because why would a grantee in the vast power imbalance between a very small rural two-person organization and a funder, say we don’t have a security certificate on our website, we don’t have secure, you know, donation portal, we don’t. Have a database protect like why would they surface these would be fun? Of course they had of course no one has brought this up, right? Why would they point you, you need to be thinking beyond what was in that grant application and about really the, the safeguarding of that mission. Not only why would they admit it, but it may very well have nothing to do with, although it’s, well, it is related to what they might be seeking money for, but it, it’s, it’s grant application. Yeah, it’s not, it’s right, it’s not gonna be a question on the grant application is your, you know, do you have a, do you have a secure fundraising portal? Um, Gene, you have some advice around board like this should be at a board level, board level CEO conversation, right? Yeah, I mean it’s where it starts to get started. Yeah, and, and very obviously like technology comes up as a budget item, right, for the board. So when the boards are approving annual budgets, are they leaving any space for technology changes? Well, so many organizations, including public governments, are, are just like putting patches, right? They’re investing in patches and so they’ll patch, patch, patch. Um, but the technology is advancing so much quicker than patches can actually address. And again, The persons and organizations at risk are not only the the charity itself, right? It’s all of the beneficiaries whose data they’ve compiled and potentially like just goes beyond that as well. So it’s really, really important now for the boards to say let’s think about this as one of our core assets and our core risks and figure out how we’re going to properly budget for this item. And talking about sort of risk opportunity, you know, assessments and saying, well, what happens I, I’m a big fan of scenario planning and maybe it’s hard because these things don’t have definitions but over strategic planning for like a a longer term plan. I think scenario planning right now is really important because the the environment is just shifting so quickly, right? It’s like shifting every few months it feels like so scenario planning for different scenarios and and some of that would be well what happens if we don’t change our technology or what happens if we don’t invest? What are the worst things that can happen? What are the likely things that are gonna happen? and do we actually have board members who understand any of this? Do we need to relook at our board composition? Do we have anybody younger than 50 on our board? And for a lot of organizations, too many organizations, the answer is no, which will hurt you in the fundraising sort of pipeline down the road very quickly as well. Um, we’re not incorporating enough, um, Gen Z, millennials into the governance and leadership positions as, as boomers and even, um, Gen X are are are hanging on to positions longer. You know, for, for a reason, for a good reason, but, um, we need to bring more younger people into the pipelines because they have perspectives. They have a lot of what’s at risk, um, here as well. So that’s kind of my thinking in with respect to fiduciary duties, in the budgeting, they’ve got to understand it. In the recruiting for board members, they’ve got to figure out how to develop the pipeline of who to bring in on the board, like in their duty of loyalty, like to the organization’s best interests, they’ve got to be. Thinking not only about the purpose or the mission of the organization they’ve got to be thinking of the values of the organization, including how much they value the community and all of this relates to the organization’s um what what I’ll call it’s. Reputation or it’s just um legitimacy to the public at a time when the government is poking holes at organizations’ legitimacy if you haven’t earned that from your own community fundraising and everything else will will just dry up so you’ve got to invest in legitimacy if you’re not investing in technology at this point and protecting persons that rely on you. To safeguard their data you’re gonna lose legitimacy really quickly and you’re gonna be irrelevant or or, you know, liable for, for what are two quick things to what Gene’s saying on, on the staff side but then also on the board side. Plus a million to everything Gene said about making boards more diverse, um, including age, but I don’t want folks to think that that means because you need to like have a 25 year old on your board that’s now in charge of your technology. The board’s job is not to be in charge of your technology, but having more folks in that board meeting who have perspective or experience a lot of different. Things are possible helps open up strategic conversations to say, hey, have we considered this? Not that I’m now the implementer because I’m the board member, but it really does help and I just want to draw that line that we’re not saying make someone on your board in charge of technology, but having people comfortable with technology strategy conversations is very, very valuable, of course. The other side on the staff side, You know, one thing we see in our research, um, and our, you know, different assessment tools and in our programs, yes, there are still organizations that don’t have all the policies that they could have, right? They don’t have strong data retention policy, they only think, oh well, payroll files or HR files, right? They’re not thinking about all of the data, all of the content, you know, all these different things, right? We can have a big policy book and there’s work to be done there. But the real area of vulnerability that we see is organizations likely have some policies, but they do not have staff fidelity to those policies. So you could like go through a checklist and be like, yep, data consent policy, data collection, you know, but staff don’t know the policies exist and they are not practicing them at all in a consistent way. And so I wanted to go back to the scenario planning note because I think we see some folks um. You know, yes, you could bring in a consultant or you could get some sort of big security like test going, but what you could also do is in a staff meeting just take that time and say right now if we got an email that we had been hacked, what do we all think we would do? And just talk it through together and see oh this person. Thinks we would do this and this person over here says, oh we have an account here. What do we have? What, what is our answer, right? What, what are the questions we don’t know how to answer? Let’s go answer those questions for ourselves and really have more um opportunity I think to surface with staff where people don’t know something, not in a shame way but in a like, gosh, this is what we should focus our training on isn’t just let’s draft another policy. Let’s understand how to do these things as the people doing them every day. Amy, uh, in, in a couple of minutes after Gene and I talk about something that I’m gonna ask him, then I’m gonna ask you something, but you, you, I don’t want to put you on the spot with no, no forewarning. If we have, let’s, let’s take a, let’s take a, our audience is small to mid-size, so let’s go more toward the smaller, let’s take a, let’s take a, a 15 person nonprofit. Uh, it, I’m not sure it matters what the mission is. I, I, I don’t want to constrain you. I want you to think broadly. I, I’m the CEO of a 15-person nonprofit. Uh, we’ve got a $4 million annual budget. Is that 2, maybe 33 to $4 million annual budget for 15 employees, full-time employees. Uh, what I’m gonna ask you in a couple of minutes is what, what are some, what, what basic things can you name for us that, that we ought to have? OK. You, I thought that was you know way, you know, yeah, I know you’re gonna start writing, thank you. Gene, I want to ask you, uh, I, I, let’s let’s talk about the core assets of a nonprofit. Uh, you, you, I love that you’re identifying technology as a core asset. Are there, are there other core assets that, that I’m not thinking of? The staff is typically number one, right? Facilities is typically a pretty big investment, although that’s been changing um with a lot of remote working now and organizations seeking to downsize how they allocate where their investments are, where their assets are. um, staffing is also changing and. Part because of some technology, right? So if technology isn’t in that bucket in there, you may be downsizing staffing, you may be reducing facilities, but why is that happening? Probably somewhat related to your technology. If your funding stays stable. I know that’s a big assumption, but probably technology is playing a part in that. Is your technology? Gonna break down like in a year. That’s something to really think about. If you’re now reducing staffing and reducing facilities, relying on technology that’s gonna break down in a year or give you problems in a year or create harm to your beneficiaries, that’s like the big one that that Amy raised that, that really hits home for me. It’s like. Now you’ve got to really rethink what was the board doing? Did you even think about that? Um, so you know as part of your fiduciary duty of care, and again I love to think of it in terms of both the mission of the organization and the values of the organization which if I bring it down to fundamental human rights, it’s preserving dignity to your beneficiaries, right? And if you’re not safeguarding your private data and if you’re letting health data flow away, and this includes your employees too, right? like. Like your key stakeholders, if they can’t trust you. Then your legitimacy is also gone, right? So you’re really just shooting yourself in the foot unless you’re doing that. So boards have got to now rethink like we maybe weren’t thinking about technology that way so much before, but as we’ve seen how exponentially, you know, um, exponential changes technology creates for our organizations and the environments and what we invest in and what our risks are, boards have got to be in the mix and I agree absolutely with with um. Amy, it shouldn’t be the 30 year old or 25 year old board member who’s like, OK, you’re in charge of the technology. Yeah, no, no, it’s, it’s, but it’s another perspective in there. Yeah, and it’s, it’s, it’s better informed, uh, look, I’m the oldest person on the on the meeting, uh, in our chat. Uh, they’re, they’re better informed, you know, they, they, they have a a fluidity, they think about things that, that 63 year old is not gonna think about or 55 year old is not gonna think about. Um, so I’m just kind of fleshing out, yeah, of course, different perspective, but how so? Because they, uh, depending on their age, they either grew up with, you know, uh, technology is an add-on to my life. And some people have had it since like age 5. You know, I had a rotary phone at age 5. And I always dialed it backwards. So, you know, I was challenged from the beginning. Our colleague, our colleague is looking up from our uh homework assignment, homework from their homework assignment. What, uh, what, what do you, what you, what can you enumerate for us? I have 5 things I wrote down off the top of my head. I don’t know that if I had. You know, 50 minutes instead of 5 minutes that I would write the blog post with these same 5 pieces, but I think all of them, I know you gave me an organization, kind of 15 people, 4 million, but I don’t think any of these. Are unique to that organization. So I just want to say that. The first is cyber insurance. I know everybody thinks like let’s make sure we have our DNO in place. Check the box for some insurance as well, you know, um. Let’s make sure everybody DNO directors and officers insurance in case you’re not familiar with that, that’s, that’s an essential should definitely have that directs and officers, thank you. Yeah. Yeah, the second piece I um put down was data deletion practices. I feel like there’s such a focus on preserving data and content at all human reason, um, but actually, Like, to what end do you have this, especially to to Jean’s point before about the dignity of people, and they’re not in your program, you’re not reporting on them, you know, to a funder, you’re not, why are you saving every bit of this if it means somehow that list is taken, you know, um, and we talk a lot in our kind of closed cohorts when we’re working with organizations. That it isn’t that we don’t think there’s value in being able to look at longitudinal data of your programs and, you know, do that evaluation, but you don’t need to know that Amy Sample Ward was the person in that program, right? There are ways that you could anonymize the data and still preserve the pieces that are helpful for your program like evaluation. Well, removing the, the risk of it still being me or Jean or Tony, you know, associated. So I really think deletion practices and policies that dictate when you delete things, how much of it you delete, what you um anonymize is really important. Third, This is, I think, hopefully more top of mind for folks since so many organizations. Maybe became hybrid or virtual or remote permanently from the pandemic and that’s content and machine backups and and redundancy. I see a lot of organizations who say, oh, but we use the cloud, right? Like we use Microsoft 365 or we use Google Workspace. OK, but in your day to day is every single document that someone’s working on in those systems and if they’re downloading it to work on it offline for any reason. Well, does it have data in it? You have constituent information in it, um, but also like if someone’s working on something and they’re You know, computer is stolen or broken or vulnerable, is all of that backed up somewhere? Do you, you know, there it’s quite simple to set a full machine backup to the cloud every day too, right? But it, it just takes thinking of that, prioritizing it and setting it up, um, including, including with that recognizing. That employees might be using their own devices. They, they probably shouldn’t be, you should be, or you should, you should at least be funding their technology, their, their monthly Wi Fi bill, etc. but beyond just recognizing that they may not even be using exclusively your technology and, and what’s the, what’s, so then what’s the redundancy and backup of on their own devices. Technology policies that say the only tool you could use is the laptop we gave you are intentionally limiting your own understanding of how those workers are working because there’s no way that they are only using that laptop you gave them. So, having a policy that says this is how you safely access our tools, whether you’re using our laptop or not, at least allows you to build the practices, the human side of security into that use instead of pretending it doesn’t happen, you know. Yes, yeah, OK, number 4 and number 5 are somewhat similar, but again this is where we see big breakdowns in practice. Number 4 is that Every system that can have it has two factor enabled and is required. There’s so many ways to do to factor that it isn’t an excuse to say that it’s like burdensome, it doesn’t have to be like, it doesn’t have to be a personal text message. It could be an authenticator app, whatever, but like you need to have to factor on everywhere, um. And need to be using a password manager so that staff are not sharing passwords with each other by saying, hey Gene, the password to, you know, our every.org account is is this like, oh my God, you know, that we can both we can both log in but it’s encrypted we don’t see the password, right? We’re sharing it um in a safe way. And then the last one, number 5, is that, again, a practice, organizations have established processes for admin access for if you get logged out of something that it is not. I email Tony and say, oh, hey, will you send that password to me? Like, most of the security vulnerabilities that we see with organizations isn’t because somebody was in a basement and hacked their way in. It’s they sent one phishing email and a staff person responded and was like, oh yeah, here’s your password, right? Like, it wasn’t hard to get in. So, If you have a policy that says you’ll never email each other to say I got logged out, what is, what is a more secure way? OK, well, I call you on the phone. We have this secure password that we say to each other that only staff know and like. I’m not saying that has to be your plan, right, but it isn’t just randomly, oh, the ED sends an email to the staff person that says, please reset my password. Like, I don’t think that’s gonna be foolproof, you know. OK, so it’s just as simple as like a procedure for what happens when somebody can’t can’t log in. Exactly, because that does happen. So why not create something where everybody on the team knows this is what we do. I know I’m doing it safely, you know, and following the procedure. OK, those are pretty, those are pretty simple. Um, so you might, you might say, well, cyber insurance, that’s not simple. It’s not like I can do it today, but you can talk to brokers, you can talk to insurance brokers for cyber insurance, data deletion policy. I’m gonna venture that N10 has a, uh, sample data deletion policy and its resources. There you go. Backup and redundancy. Do you have, is there advice about that in Yeah, there’s lots of it, but I’ll put it on our list to make sure that there’s some guidance on that on our cybersecurity resource hub, which is all free resources, so I’ll make a note of that. Beautiful. 2 factor and and password manager. All right, that, I think that’s pretty well understood. I mean, uh, I, I have clients that use the, uh, the, the Microsoft authenticator. As soon as, as soon as I hit, as soon as I hit enter on the, on the laptop, I can’t even turn to my phone fast enough. The Microsoft Authenticator app is already open, notified. I’ve already got the not in the, in the second it takes me to turn from one side of my desk to the other. The authenticator is open. Uh, so it’s not, there’s no, it’s not like there’s no delay. Right, um, OK, and a procedure for not being able to log in, uh, uh, I bet you could find that on the intense site too. All right, thank you for that quick, quick homework. Thank you. All right, all right, so this is eminently doable. And then there’s, you know, of course you have to go deeper. There, there are policies that you need to have, but you know, I wanted something kind of quick and dirty, so thank you for that. All right, all right. Um, Should we turn to just like general state of the sector from our cybersecurity conversation? Sure, um, Amy, you wanna, you wanna kick that off? You kick that off. Yeah, I do talk to lots of people and I think, you know, we’re hitting the two-year mark of kind of like unavoidability of people constantly talking about AI which I have my own feelings about, but, you know, If I step out of any one day’s conversations about AI and look at the last two years, we’re in a very different place of those conversations, you know, um, in a way that I think I finally feel good about how the trend is going in those conversations, um, a lot of one on one calls I have with, with really diverse organizations, you know, small advocacy organizations, global HQ or, you know, like all kinds of folks is. How do we not use the tools that are being marketed to us? And how do we build a tool that’s purpose-built, that’s closed model, that’s just the content we want it to have, right? And like actually useful for us. Which I think is really exciting, that folks are kind of seeing that it’s, it’s just technology, just like, yes, it has different capabilities, you do different things, different tools do different things, of course, but I’m really excited that it feels like folks are trending towards. Well, we have some use cases. How do we build for those use cases versus we want to adopt these things? How could we find something to do with these things we want to adopt, which I think was the reverse order of it all. You and you and I have a friend who is devoted to this exact project, uh, George Weiner, CEO Whole whale, they’ve created Cas writer. Yeah Horider.AI, which is intended exclusively for the use of small and mid-size nonprofits, limited, limited learning model, uh, your content safe within it and not being skilled in artificial intelligence, that’s about the most I can say about it. But whole well, they have a, they’ve, and they’re not the only one I’m sure, but they’ve created a product specifically, uh, to take advantage of. The technology of AI, but reduce a small and mid-size nonprofit’s risks around your use of it in terms of what it brings in and how it treats the data that you provided. Yeah, causes writer, change agent, there’s a number of folks in the community. You know, trying to help organizations in this way, which I think is great, um, but a trend, a smaller trend in the last couple months in these AI conversations, bigger trends like I said, but there’s also this piece where I’m hearing from folks saying that. They can tell, for example, a colleague used Chat GPT Gemini, and, you know, a large tool like that to to make this proposal that they sent to them or this email, and when they say, hey, it’s really clear that you used Gen AI tools to write this, could we talk about it and get into like your thoughts more about it? There where they had in the past felt that folks were like, oh yeah, I did, but like here’s what I was thinking. Now there’s just complete denial that the tools were used. They lie. People lie? Yes, that’s right. And so to, they’re like, well, how do we have strategic conversations about the way we use these tools if you’re going to deny that you’re using them. Well, let’s let’s talk about what, when you lie to someone about anything, especially I don’t, I don’t, it seems innocuous to me, but, uh, including AI, well, I’ll, I’ll, I’ll leave my own adjective out of it. I think it’s innocuous. It’s so the the technology is so ubiquitous, but all right, if you lie about anything, you, you lose legitimacy. I, if I were a funder, uh, OK, thank you very much. Goodbye, because you just, you just lied to me about something that I don’t think is such a big deal even. And I’m giving you a chance that I was able to point to it, you know, yeah, and I’m giving you a chance to overcome it. I want to have a chat human to human, and you’re denying that the premise of my question. OK. All right, I’m so I’m shocked, obviously, I really, I’m dismayed that people are lying about their use. That’s completely contrary to what the advice is ubiquitous advice is that you’re supposed to disclose the use. Right. I’ll just throw in there that. Please, Gene, get me off my, push me off my soapbox. Well, back to kind of board composition, if you ask a bunch of board members, I think many of them. Would say AI is just like one thing. They have no idea that like AI is a million things, right? And you’re probably using many, many forms already whether you realize it or not, even on a Google search, like, you know, AI is popping up now you might, that might be a little bit more obvious now, but. Just to, to know that AI if I compared it to a vehicle, for example, it could be an airplane, it could be a bicycle, it could be a tank, right? They they all have very, very different purposes and repercussions and so you have to understand that like, oh we’re gonna like invest more in AI. That doesn’t mean a whole lot. So, um, to figure out what your what your strategy is again, I, I, I think, um. Cybersecurity and when when organizations are gonna venture off into AI a little bit more they’ve got to see it as part of governance and not just information technology it’s not just the uh a management tool it’s part of their governance responsibilities. It’s time for Tony’s Take too. Thank you, Kate. Got another tails from the gym. This time, two folks whose names I don’t know yet, but I do see them. Fairly often, they’re not as regular as Rob. The marine semplify or uh Roy, I’ve talked about Roy in the past, not, not, not as common, but we’ll, we’ll, we’ll find out. Like I did find out the uh name of the sourdough purveyor, you recall that just a couple of weeks ago. Uh, I, I’m gonna hold her name, it’s in suspense now, but, uh, I learned her name, the, the one who gave the sourdough to to, to Rob. So these two folks were one of them, uh, the guy. Suffers dry eyes. And the woman he was talking to had the definitive. cure for dry eyes. You have to try this. And she was on him for like 5 minutes, you gotta try this. Hold, hold on to your, make sure you’re sitting because you know you’re not, you, you’re not gonna wanna, you’re not gonna wanna stumble and fall down when you hear the startling news of the dry ice cure of the uh of the century. Pistachios, pistachios. She was very clear. 1/4 cup. She, she did not say a handful, which to me a handful is a 1/4 cup. She didn’t say a handful. It’s a 1/4 cup of pistachios daily, right? This is a daily regimen you have to follow and you will get results within 3 to 4 hours. She swears it 3 to 4 hours, your eyes are gonna start watering. It’s gonna be like you’re crying and tearing, like you’re at a funeral or a wedding. That’s how much water you’re gonna have. All right, I editorialized that I added the wedding funeral, uh, uh, analogy, but she swears within 3 to 4 hours your eyes are, are gonna be watering. Follow the regimen, pistachios. She was also very precise. These are shelled pistachios. You don’t wanna get the, uh, the unshelled ones too much work, uh, which to me that’s interesting now that’s, that’s contrary to the advice that I’m hearing on, uh, YouTube. There’s that guy on YouTube, the commercial that I always skip, but sometimes I listen, uh, Doctor Gundry, you may have heard Doctor Gundry on the YouTube commercials. He talks about pistachios. He says get the unshelled ones because that way you won’t eat too many of them because you have to go through the task of shelling them yourself so you won’t eat too many because too many pistachios, according to Doctor Gundry now this is too many pistachios is bad, but the right amount of pistachios is, is, is, is beneficial, but he’s not as precise as the gym lady. He does not say Gundry, you can’t pin Gundry down. Of course, I didn’t listen to his 45 minute commercials, so, you know, I listened for like 7 minutes and I got the, the shelling, uh, the tip from, uh, from Gundry. So, He’s not as precise as the uh the dry eyes cure lady. A 1/4 cup of pistachios shelled every day. You’re gonna get immediate results. That’s all, it’s just that simple. cure the dry eyes. Don’t buy, don’t buy the over the counter. Don’t buy the saline in the bottle. Don’t buy the uh red eyes. Well, red eyes is a different condition that, uh, it’s different. She doesn’t claim to have a cure for that. Dry eyes, she, she stays in her lane. She’s in her lane, dry eyes. That is Tony’s take too. Kate. I like the specificity of the uh the shelled unshelled unshelled, no, no, no, get the shell, the ones without the shell, they’re already been shelled. She’s very precise cause that, because the shells are gonna take up more capacity and you know, and then you’re not gonna get the full 1/4 cup uh therapy. The treatment is gonna be lacking because you’re not gonna get a 1/4 cup because the shells are taking up space in your measuring cup. Well, then my next question would be like, salted, unsalted, old bay, no old bay. It’s like, Well, you should have been there with me. Uh, she didn’t, she didn’t specify. I think just straight up. She didn’t say salted or unsalted. That’s a good question. You’re gonna have to go on your own, let’s say if it’s a, if it’s a dry eyes regimen. Then you wanna, you wanna be encouraging fluids. So I would guess, now this is not her. I don’t wanna, I don’t wanna impugn her, her remedy, her treatment, you know, with my, my advice now I’m just stay in my lane. This is not my specialty, dry eye cures like hers. I would say you probably want the unsalted because salt, uh, salt causes, uh. More dryness, right, if too much salt, you know, you become dehydrated, I believe, so. But again, that’s not her. You know, I don’t wanna, I don’t wanna add anything on to her, her strict regimen. Um, oh, and by the way, uh, I heard one of the, uh, commentators I listened to on YouTube said, uh, somebody had Riz. I knew exactly what they meant, yeah, I knew exactly. I didn’t have to go look it up in the, I knew it, charismama. I said, oh, I know that. I don’t, I don’t have to go look it up in the uh in the slang dictionary. Oh, so proud of you. Yes, thank you. That’s just a couple of days later. All right. We’ve got Beu but loads more time. Here’s the rest of the state of the sector, beginning with AI with Jean Takagi and Amy Sample Ward. Now I asked about the state of the sector and we’re back into cybersecurity. It only took about 6 minutes, uh, and we’re like 1 minute and uh and then we just talked about it for 5.5 minutes. So, all right, where there are bigger things going on in the nonprofit sector. You know, our, our, uh, federal government, uh, the regime is, is, uh, has found nonprofits that are complicit in terms of universities. Uh, I don’t think it’s gonna stop there. um, we are, you know, both the left is, is under attack and. In a lot of different ways and that, that impacts a lot of nonprofits that do the type of work that is essential, you know, whether it’s legal rights or human rights, uh, simple advocacy, um, I mean, even feeding certain populations, uh, so obviously immigrant work, um, let’s. Uh, let’s go to the uplifting subject of, uh, the, uh, the state of the sector generally. Like, let’s put AI aside now for, for 15 or 20 minutes and just talk about. What people are, what people are feeling, what people are revealing to you. Gene, I’ll turn to you first for this, you know, what, what, what do you, what are people concerned about? What’s happening? Well, um, what’s on people’s minds is what I what I mean. Yeah, I, I think the sector is still feeling the the impact of the broader public being very polarized, um, and the effect of not only government actors on, um, uh, inflaming the polarization but on media as well, and nonprofit media is not exempt from that, uh, as well. So really is about trying to figure out, well, how do we. Move forward at a time where it is so polarized and where for many organizations the government is acting uh adverse to where our mission and our values are and they are affecting our funding and what’s gonna happen. So one of the trends going on right now I, I, I see is. There’s a greater understanding that we’re not gonna go back to the world. That, that was a year, right? We’re not going back there. We’re in this, what I’ll call is probably a transitionary period. I don’t think this period will last exactly like this either, but what’s gonna be next? What’s forthcoming? Is it gonna be worse? Is it gonna be better? And what can we do now as nonprofits to shape that direction? Like we can fight. Tooth and nail for everything right now, but if we’re not and by we, I’m including myself in the nonprofit sector, so forgive that indulgence, but if we can work towards a brighter future strategically, what are we thinking about instead of just sort of defending against every new executive order or every law and just trying to sort of fight on a piece by piece basis to just maintain scraps of of rights that. That we can preserve what what is our future plan, um, so we’re gonna also see with the diminished fundraising we’re gonna see some um consolidation in the sector, right? There’s, there’s a lot of nonprofits out there and they’re going to be a lot fewer nonprofits in 4 years. So what is gonna happen? So we’re gonna see more collaboration. We’re gonna see more mergers. We’re just gonna see a lot of dissolutions, um, and that’s gonna mean that a lot of communities are no longer gonna be served. So what other organizations are gonna pick that up? And if we have less funding to serve communities, do we need to find ways to do it in different ways, um, and so you know, back to technology, people will rely on technology, but that’s not the panacea for everything. Um, and I think collaboration is going to be a big part of it as well. So yes, there’ll be some consolidation and some mergers, but there’s gotta be other sorts of collaborations because the need is just gonna keep growing. Uh, but also trying to shape what we want in the sector is important and to understand that we’re not the only country that’s going through this, right? And we are more and more in a, you know, and this is one world and everybody impacts each other. And there are other very authoritarian countries that have really harmed their civil society and their nonprofit sectors, right? Yet there are nonprofits that continue to thrive. In those sectors, what are they doing? What can we learn from them? What gives them legitimacy when the government is not giving them legitimacy? There’s a lot to grow from here, evolve and adapt, um, but we are, and admittedly we’re in really, really harsh circumstances, so everybody is just sort of, you know, running all over the place without, without any direction still, but I think there’s more and more. Understanding that we’re gonna have to start to gather together and and and create some plans. I really agree with Jean and I, I’m also thinking about how we first started our conversation and How I said, you know, I’m experiencing folks really wanting to have thoughtful conversations, even though we may not be able to even make a container for those thoughtful conversations because of all the pressures and the anxiety and the unknowns. And I feel similarly here and in the way Gan is framed, framed the the uncertainty ahead because I see so many organizations who have never, through all the ups and downs, even if they’ve existed for 100 years, have never had to say. That their mission was political because no one has ever said that feeding hungry children was political or that housing people that don’t have a house is political or, or, you know, name most of the missions across the sector, right? Um. And now we’re in a place, you know, the last few months of the budget cycle and all of those debates made snap and uh so many programs became something where we we saw staff in the community saying like, oh gosh, well, normally I send a newsletter, normally, you know, this is my job and now I’m having to defend. That our organization exists and why we would exist and and what our programs do, but I also think to Jean’s point, there’s so much to learn and there is so much we already know. We do know how to do our work, right? Our folks who are running all kinds of missions and movements are experts and so even if we are. Um, looking at opportunities to collaborate, not just mergers and, and acquisitions or closing, but, but really collaborate in new and different ways, we don’t need to enter those conversations feeling like we don’t know anything. We know a lot. We’re just looking for maybe new venues or ways to apply that learning and that knowledge and I, I just, I wanna say that part because I, I don’t want folks feeling like they can’t enter those conversations because. They’ve just never done it before and they don’t know what what to even say. No, you know all about housing. You know all about resource mobilization in your community, whatever it might be, right? And so from there, there’s lots to grow from that that there’s already fertile ground. We, we have, yeah, we have experience, we have wisdom. Um, it sounds like, you know, you’re, you’re both talking about resilience. You know, we, we, we need, we’re, I guess in the current moment, we’re sort of treading water to see what’s coming as we’re, as we’re defending our, whatever, whatever our work is or whatever is important to us personally, because we, you know, we know that we, we can’t, we can’t take on everything, but, you know, we’re, we’re standing up for what it means the most to us. As, as individuals and as, as nonprofits. And then we’re waiting to see what, you know, what the future holds, um. I, I, I agree. I, I don’t, I don’t think it’s gonna be this extreme, but I also agree we’re not, we’re not going back to uh the 2016. Yeah, I’m just a really strong believer in, in one thing you said, Tony, about like what we want. There, there’s some things we want, and I think that is true of most of the country. I think for a lot of things, we want the same thing, right? It fundamentally it’s dignity for everybody, um. Uh, and, and dignity for our own communities. So just trying to find that and showing how nonprofits further that goal and making sure. That your representatives know that is really critical. So right now our our representatives just seem to be voting as blocks, right? They just vote along party lines and they’re not doing much more, but that would change if en masse, like the people that vote them into power say these are the things that really are meaningful to us like do something. You know about these fundamental things we wanna be able to feed our children we wanna feel safe on our streets like they’re just fundamental things, um, and then we can talk about how to accomplish that and we might have disagreements on, on that, but make sure the representatives know that they’re gonna be held accountable for helping people get what they really want and what the things that most are are most important to to them. That are meaningful to them, um, because so many things that people are shifting the arguments towards have no real meaning to their personal lives like attacking certain groups, you know, for, for, for allowing them to have rights probably, you know, the people people are attacking them. It probably doesn’t make any difference in their day to day lives or not whether those other people have rights or not when we’re speaking about certain minority groups, but why are they attacking it because that makes them or or they’ve been positioned. I, I think they’ve been. Uh again with, with technology and AI they’ve been brainwashed into thinking this is the fundamental thing that separates us versus them and we have to be better than them and um I, I, I think we’ve really got to get off of that sort of framework of thinking and really having nonprofits connected with their communities and tying them to their representatives is really really important at this time. Yeah, that that zero-sum thinking. That everything somebody else gets detracts and takes away from me, my, mine. Whether it’s an organization or person. It reminded me of a conversation we had on the podcast. I’m trying to remember when it was, it was years ago, years ago, um. And I don’t remember what if it was uh political administration change or it was natural disaster. I don’t remember what maybe the original impetus was when we, when we very first talked about this, but It is reminding me of, you know, we’ve said before the value that every organization has in, in kind of sharing the, the information and the data and the lessons and the truth of your community and your work so that when people are putting into the garbage machine, you know, tell me the tell me the real. You know, stats about hunger in my city or whatever, who, who cares about that? But if they actually came to your website as an organization that addresses hunger and you said this, these are the real numbers, right? This is what it, this is what hunger looks like. It looks like a lot of different things, right? It’s like AI hunger can be all these different things, um. That’s an important role in this time that every organization I think can be contributing, really saying this is what we know, this is what we see. This we are experts on these topics so that There’s a little, even if it’s a small antidote to the spin and the and the media and the wherever those online conversations go, at least you were kind of putting on the record what you do know and see in your work. Exactly right. I, I think I remember we were talking about how to be heard when there’s so much noise out there in the social networks and in media. How, how does, how does a nonprofit get get heard, and part of your advice was you have your own channels. So, and including your own website. Yeah. Thank you. All right. All right. What are you hearing, Tony? You get to talk to people all the time too. You have your own angle. You’re sitting over here grilling Gene and I. You got that’s not fair. I don’t see and hearing. Gene, I hate when they do this to me. Gene, help me out. No, um, alright, I’m gonna put AI aside because there is so much of that. Um, Still, you know, funding, uh, people still reeling from the USAID cuts, you know, it fucking kills me. It’s $1.5 billion which there are, there are several 1000 people in the world who could pull out $11.5 billion from their pocket and replace all the AI, all the USAID funding. See, I said AI when I’m, it’s a ubiqui it’s, it’s, we’re, we’re. We’re like, we’re, we’re conditioned that could replace all the USAID funding with a check or with a crypto transfer, and they wouldn’t actually be cash like that’s bananas, and they wouldn’t miss it. So, you know, people still reeling, um, missions still reeling from the USAIDs. I have a client that’s, but I, I, I hear about it from others as well, um. And it wasn’t just USAID, but State Department cuts that were non-USAID funds. The State Department did a lot, um. Yeah, a little, a little in media, you know, I, I listened to some media folks, um, Voice of America, trashed, trashed under, uh, what’s Carrie Lake, you know, uh, used to, used to, you know, like our, our soft. What’s it called soft diplomacy, right? Like, like bags of rice, bags of flour and sugar through USAID and State Department, news and information that was trusted, unbiased. I know there are a lot of people who would disagree that it was unbiased, but still, the, the effort was to, to be unbiased, spreading news and information around the world, around the world. Uh, and then I guess also, uh, public media cuts here in the United States where grossly, ironically, Red rural communities are most impacted because they’re not gonna get emergency flood warnings like like just failed in help me with the state was it Kentucky, the the river that flowed and the and the camp that lost 20 counselors and children, was it Kentucky, Texas. I’m sorry, it was Texas, right, thank you, um. You know, emergency warning systems, let alone news and information, you know, we’ve, we’ve gutted, uh, corporate media long ago gutted local media, but just so news and information. Lost through the Corporation for Public Broadcasting funding. Corporation for Public Broadcasting, of course, winding down in I think October. September or October, uh, so their funding lost and even just as basic as like I’m saying, you know, emergency warning systems for rural communities, horns that blow. Uh, messages that get sent at 3:30 in the morning. That that overcome your do not disturb. Lost, you know, lost. Stupidly Um, and a, a lot of this, you know, we’re just not, what, what aggravates me personally is we’re just not gonna see the impact of it, some of it for decades, and we haven’t even gotten into healthcare. But we’re, we’re maybe not even decades, but just several years. It’s gonna take several years of Fail failed warnings about things that NOAA and the National Weather Service used to be able to warn us about, you know, 8 months ago, um, and health, health impacts in terms of loss of insurance, lost subsidies around Obamacare, uh, Medicaid cuts, and Medicare cuts likely coming, you know, we’re we’re gonna see. Sicker people. We’re gonna see a sicker population, but it’s gonna take time. It’s not gonna happen in 6 weeks or even 6 months, but it will within 6 years. We’re gonna be, we’re gonna be worse off, and we’re not, and we’re gonna blame the, the current then administration, whatever form it’s in. Nobody’s gonna be wise enough to look back 6 years. And say 6 years ago, we cut Noah and that’s why now today, in 2031, you didn’t get the hurricane notice. And then of course healthcare too. How about in fundraising, Tony? I mean, what I’m, what I’m hearing is, don’t rely on the billionaire philanthropists anymore. Like, yeah, yeah, we’re over, thankfully, we’re over that. I, I, I never, I, I, you know, there’s, there’s so far and few, few and far between and, and 10,000 people, 10,000 nonprofits want to be in, um, Jeff Bezos’ ex-wife, uh, pocket, I can’t remember her name, Mackenzie Mackenzie Scott’s pocket. 10,000, 100,000 nonprofits are pursuing that, you know, the focus on your relationships, build, work on donor acquisition, but not at the billion dollar level. Work on your sustainer giving program. Work on, work on the grassroots. Can you, can you do more in personal relationship building so that, so that people of modest means can give you $1000 or $5000. And, and people who are better off can maybe give you $50,000 but they’re not ultra high net worth. But if you’re building those relationships from the sustainer base up working on your donor acquisition program, how are you doing? Are you doing with the petitions, emails, and then a welcome journey and you’re moving folks along and then you’re bringing them in and then inviting them to things, you know, work at work at the grassroots level. Among the, the, the 99.9. 8% of us that aren’t ultra high net worth. The other 95%, for God’s sake, we’ve been doing this since 2010, 2010. Yeah, 2010, 15 years, right? Yeah, 15 years, 7, yeah. The other 95% were, you know, don’t focus on the wealthy that everybody wants to, you know, the celebrity. I got a client with big celebrity problems on their board. Names you would know, 3 names you would, everybody would know. Um, they’re a headache. They don’t, they don’t make board meetings. They cancel at the last minute. They, uh, last minute, like a couple of hours. After all the work has been done, all the board books have been sent, and a couple of hours’ notice, they can’t make it. And then the and then another one drops out. Well, if she can’t, then, then I can’t also. Uh, as if that’s a reason, and then, and then the board meeting is scrubbed, and now, now we’re, you know, now they’re struggling to meet the requisite board meeting requirement in the bylaws, right? But so, you know, celebrities, you don’t need celebrities, you need dedicated folks on your board who recognize their fiduciary duties as Gene talks about often, to you, loyalty, care. Is there a duty of obedience to? Is that one? Or is that’s, no, that’s, that’s the clergy. That’s the duty of obedience. I know it’s not celibacy. I know that’s not, I know that’s not good. Amy, why did you mute your mic when you’re laughing? Come on, let us hear you laugh. Uh, now I know it’s not celibacy, but uh loyalty and obedience, loyalty and care, sorry, loyalty and care. And what’s the other? There are 3. What’s the other of obedience in the laws and internal policies. Yeah, yeah, obedience to laws and internal policies, right. So but, but care and loyalty. That’s another one, another one of these celebrities. The giving to Giving to a charity that’s identical to the, the one that I’m that I’m working with in the same community, does the exact same work and major giving to that charity. So Yeah, you, you know, focus on the, on the 99.98% of us who aren’t ultra high net worth. The grassroots, work on your work on your donor acquisition and sustainer giving and move folks along from the $5 level to the $50 level. This is how it gets done. Things are hard, and there are things we can do. Yeah, thank you. There are, there always are. Yeah. If we’re, if we’re focused in the right place and, and bring it back to artificial intelligence, you don’t even need to use artificial intelligence if you don’t want to. Amy, you’ve said this to us. You don’t need to, and it, but, you know, but that’s, it’s, that is not all of technology and that is not all of your focus in 2025 and beyond. Especially. When using it is impacting care and loyalty and obedience and data protection and everything else, right? Thank you for putting a quarter in my slot. That really worked. There’s a lot going on and there are things we can do. How about we end with that? Because that’s up, that’s upbeat. There is a lot you can do. There’s a lot you know. Amy, you were saying we have so much you can do. There’s so much you do already know and That doesn’t change because it is so hard. It just reinforces how important it is that you do know all of that, that you do know what you are doing, that you can take some actions, even if they feel small. Making sure 2 factor is enabled everywhere could be the thing that saves your organization from being in the news, you know, like, that’s worth it. And it didn’t feel that big or overwhelming. And also everything is still horrible, but you did that thing and it was important to do. Know what you know. You know, a lot of people we don’t know what we don’t know, but you, you do know what you do know. Know what you do know, and, and take action around what you do know. Whether it’s two-factor authentication or, or uh talking to your board about sound technology, investment, or it’s Focusing on your sustainer giving. And there’s a lot going on, there’s a lot you can do. Thank you. And pat yourself on the back whenever you take those small steps because they’re probably bigger than you think. That was Gene Takagi. Leaving it right there. Our legal contributor principal of NO. With Gene Amy Sample Ward, our technology contributor and CEO of NE. Thank you very much, Amy. Thank you very much, Gene. We’ll see you again soon. Thanks, Tony. Thank you Tony. Next week, better governance and relational leadership. If you missed any part of this week’s show, I beseech you. Find it at Tony Martignetti.com. Our creative producer is Claire Meyerhoff. I’m your associate producer Kate Martignetti. The show’s social media is by Susan Chavez. Mark Silverman is our web guide, and this music is by Scott Stein. Thank you for that affirmation, Scotty. Be with us next week for nonprofit Radio, big nonprofit ideas for the other 95%. Go out and be great.

Nonprofit Radio for July 14, 2025: We’ve Been Hacked! & Smart Data Storage

 

Steve Sharer & Danielle Elizer: We’ve Been Hacked!

Our panel from the 2025 Nonprofit Technology Conference (#25NTC), helps you with actionable takeaways to strengthen your incident response plan. You do have an incident response plan, right? They reveal the right responses and responsibilities for your leadership, IT, communications, and other key roles. They’re Steve Sharer from RipRap Security and Danielle Eliser with Chef Ann Foundation.

Brian Cavanaugh & Tiffany Nyklickova: Smart Data Storage

Brian Cavanaugh and Tiffany Nyklickova want you to avoid common data pitfalls while ensuring your data is smart, secure and searchable. They consider the pros and cons of cloud versus onsite storage, and explain how folder structures, filenames and metadata make your data organized and easy to retrieve. Brian is at The Vilcek Foundation and Tiffany is from Services in Action. This is also part of our 25NTC coverage.

 

Listen to the podcast

Get Nonprofit Radio insider alerts

Apple Podcast button

 

 

 

We’re the #1 Podcast for Nonprofits, With 13,000+ Weekly Listeners

Board relations. Fundraising. Volunteer management. Prospect research. Legal compliance. Accounting. Finance. Investments. Donor relations. Public relations. Marketing. Technology. Social media.

Every nonprofit struggles with these issues. Big nonprofits hire experts. The other 95% listen to Tony Martignetti Nonprofit Radio. Trusted experts and leading thinkers join me each week to tackle the tough issues. If you have big dreams but a small budget, you have a home at Tony Martignetti Nonprofit Radio.
View Full Transcript

And welcome to Tony Martignetti Nonprofit Radio, big nonprofit ideas for the other 95%. I’m your aptly named host and the podfather of your favorite hebdominal podcast. And I’m glad you’re with us. I’d suffer the embarrassment of Salpingium fraxis if I had to hear that you missed this week’s show. Here’s our associate producer, Kate, with what’s coming. Hey Tony, this week we return to our 25 NTC coverage with. We’ve been hacked. Our panel from the 2025 nonprofit technology conference helps you with actionable takeaways to strengthen your incident response plan. You do have an incident response plan, right? They reveal the right responses and responsibilities for your leadership, IT, communications, and other key roles. They are Steve Scherer from a riprap Security and Danielle Ellizeer with Chef Anne Foundation. Then Smart data storage. Brian Kavanagh and Tiffany Nilikova want you to avoid common data pitfalls while ensuring your data is smart, secure, and searchable. They consider the pros and cons of cloud versus on-site storage and explain how folder structures, file names, and metadata make your data organized and easy to retrieve. Brian is at the Vilcek Foundation, and Tiffany is from Services in Action. On Tony’s take 2. Self-care. Here is, we’ve been hacked. Hello and welcome to Tony Martignetti nonprofit radio coverage of 25 NTC, the 2025 nonprofit Technology Conference at the Baltimore Convention Center. Our coverage is sponsored by Heller Consulting, technology consulting for nonprofits. With me now are Steve Scherer and Danielle Elliser. Steve is CEO and co-founder of Rip Riprap Security, and Danielle Elliser is senior director of technology at Chef and Foundation. Steve, Danielle, welcome. Thanks so much. Thanks. Thank you. Last year’s NTC as well. Um, your session topic. We’ve been hacked! exclamation mark an interactive incident response tabletop exercise workshop. It’s a lot there, yeah, but you did, yeah, there’s only one verb in all that, right? There is only one verb in all that in that in those two sentences. Um, Steve, our resident security expert, uh, why don’t you give us a High level view of what your session covered yesterday, yeah, yeah, so our session was all about how to prepare for a cybersecurity incident and how one of the main ways that you can prepare is by undergoing a tabletop exercise to simulate what an an incident is like uh with your staff before you actually have an incident so you get a chance of what it feels like and. And what you should be doing and if your plans are are set up in a way that’s actually gonna help you. All right, now we’re not gonna have the luxury of an exercise here on nonprofit radio, but I know you both have takeaways, uh, either from the strategies in general, but also maybe takeaways from yesterday’s session. Um, so let’s see, uh, Danielle, why don’t you, why don’t you start with some substance like what should we be thinking about? This is all in preparation. Uh, so we’re not gonna have, like I said, we’re not gonna be doing the exercise, but what should we be thinking about in advance so that when we do call Steve because we’ve been hacked, uh, his response can be, I guess, as as seamless as possible or at least we’re we’re best prepared as we can be for the for the what we hope never happens. Sure, um, I think the big thing we realized when we were putting this presentation together was that a a tabletop game is very similar to a cybersecurity incident and that. You have some rules but you don’t know all of the information and it’s going to change and you are not gonna be able to predict where you go um and so you really have to be flexible when an incident occurs I think the first step is calling someone trusted or having someone on your team to cover the security um and then just giving them as much information that you know. And working from there um it’s a really flexible process that you have to be able to pivot through um depending on what you find out. So you really would like to know who you’re gonna be calling. Maybe maybe it’s two different teams in case one is not available or something or. I step one is have somebody on your phone, yeah, um, because time is of the essence um and you don’t have a lot of time to spare so knowing who you’re gonna call is is probably the the first step, um. We were very fortunate that when we had an incident we had riprap um already contracted with us and they were my very first call and they jumped in right away um so knowing who you have on your team that’s gonna be able to help support you is gonna be such such an easier path than. Trying to figure it out when you’re in the crisis. Yeah, I mean you’d be interviewing firms in the midst of a crisis. Your head is not gonna be on the the interview process and you know what’s your timeline and what’s our budget? I mean, we need to, right, so these things all need to be in place should be having these conversations. Now unfortunately it’s very common to find somebody while you’re in the middle of a crisis. I know um Steve has mentioned that a little bit of they often get these panicked calls and you know everybody jumps on board and does the best they can but it’s so much easier to have somebody beforehand. Oh, they don’t know your platforms, they don’t know your user base. I mean, well, Steve is gonna tell us all the things that he wants to know when you make that call. Um, what can you share about the the chef Anne hacking? Yeah, so I’ll keep it general, um, we had actually started working with Rip rap a couple of months prior and so we had some things in place but not nearly we weren’t, you know, robust uh in the way that we had hoped and um you know we just started getting prepared and uh and an email came through to our accounting department they had they had the right form they had the right invoice they had everything looked good um I was like oh my gosh, we have to get this check out by the end of this week. Can you guys just make this happen? Everything looked good. Um, and somebody within our accounting platform just flagged it a little bit of like this is unusual usually I hear about this beforehand and pass it up to me or instinct instinct is Steve instinct for sure there’s a ton of value and instincts, yeah, for sure. I mean it’s that listen to your gut that if it looks weird, smells weird, it most likely is weird yeah yeah a flag like this person in accounting, and she was even apologetic too. She was like, I, I just don’t wanna bother you and I was like, oh no, no, no. You think this is weird? I think this is weird. Let’s go, um, and so we were able to bring in riprap immediately and resolve it, um, and thankfully there was no impact, um, we caught it early, but I I can’t overstate how quick it was, um, and how um unexpected it was, you know, it was a random Tuesday, you know, like nobody expects this on a Tuesday, um. And so it was really, really, really beneficial to have somebody on our side already um and just not something we ever expected even though we had already been preparing with them. So it can really happen to anyone. And after the fact that you rip wrap like maybe did forensic work for you or something. Did you figure out was it, was it uh based on artificial intelligence or had they penetrated part of your system to, to get the, you said it looked authentic, it had, it had the right data and what how did they how did they get what they needed to make it look so good? Yeah, um. I’m trying to remember, this is about a year ago. Yeah, so a lot of times the attackers will try to um Illicit like payment forms, invoice forms from organizations by pretending to be somebody that’s maybe in the world or in the network saying hey we’re a new vendor, and they’ll get some of this paperwork already um even if they haven’t conducted a breach of the actual nonprofit so that that wasn’t their case luckily they didn’t have the attackers did not have access to the Chef Anne Foundation computing resources, which is, which is great, um but you these these attackers, they don’t. Needed a lot of the times they can they can socially engineer and elicit a lot of this information from the finance staff and the other staff that are out there in the community. I have a panel coming up on the show, uh, yeah, later later today talking about the use of artificial intelligence in in in gathering personally personally identifiable information. So then not not again like to your point, not needing to go into the platform or the resources of the organization. But through artificial intelligence, putting it all together to make an invoice look real or you know whatever it is that they’re whatever they whatever their mechanism is for infiltrating making it look very authentic because it has so much personal data. Yeah right, right. So but that didn’t, that didn’t happen in your case, uh just before the explosion of large language models and BT a little ahead of a little ahead of that, yeah, OK. Oh, you said last year it was sometime last year. OK. Uh, so Steve, uh, all right, so hopefully, uh, folks have, uh, riprap security or another, uh, exemplary. It’s hard to imagine, uh, any other firm being as good as riprap Security, but, but, uh, you have, uh, you found one of the few that are, or you’re using riprap. What do you wanna know? Uh, first call, yeah, yeah, so I mean I, I think the, the first call we, we try to understand what are the timelines, who’s involved, like what are the broad sketches of the story, what’s happened to dates and what what systems are affected? What things are do we suspect that the attacker might have access to and that sort of starts to help us orient who in the organization that we’re working with we should talk to, what systems we should start focusing our forensics and technical experts on. And really start trying to work the problem and understand. I mean, um, a lot of the times our our customers when they have an incident they’re they have limited information they, they know that they had a weird email on a Tuesday and but they’re they’re looking to fill in the gaps, right? This is, this is as much of those kind of classic mysteries, you know, as it’s no longer, it’s not just a, you know, 22 minute like murder mystery on TV. It’s usually many days, but we, we try to sketch out and do that kind of. Investigative work to understand the timeline of that incident. I just thought of another reason why you’d want to have an agency lined up ahead of time for for you obviously need remote access immediately. Now we’ve got, you know, maybe we have to go through a hurdle to get that done. If it’s not lined up in advance, time is of the essence as you said, Danielle. And I, I think trust is a big area too, right? By the time the chef and staff had their incident, we had already spent much, a lot of time with Danielle and with the executive staff and other members that are, you know, doing the more hands-on work. So they knew me. They knew our team, they were comfortable with us. We didn’t have to build that rapport, you know, in a relatively short time. It’s just, it’s just a lot better and in the midst of a crisis in the midst of a crisis, right? I don’t know if I can trust these people, but he said something weird, but I don’t have time to worry about it, right? So I have a flag, but I can’t wave it. No. All that is resolved if you, I’ve already hopefully encouraged folks to have a relationship in advance. You know who you’re gonna call. OK, OK, um. All right, next step. I don’t know, Steve, you want to lead us through. All right, so you’ve gotten your preliminary information. Do you need the client to do something or what’s next? Yeah, yeah, so something we covered in the talk is how, how can you how can you best use the organization’s existing capabilities, tools and talents to help you with the incident. So we often talk a lot about engaging the communications and the marketing staff because they they know they already have a way that they communicate with their with their donors with their stakeholders with the with the the beneficiaries of the of the organization and by using their expertise you can craft really really clear transparent timely uh communications to the people that might be affected with the incident. We, we see that’s interesting so you’re you’re the guy you’re the you’re the tech guy, but you’re concerned about the, the outward communication. Absolutely, because I mean what what’s a nonprofit without a lot of trust, right? And, and we, we see a lot of examples in the tech industry in broader business world and nonprofits that. Organizations that have incidents that aren’t transparent about it that aren’t sharing the whole story they’re not being timely about sharing the information the trust in their reputation is severely damaged and so they get less interest they have you know if they’re a company they they lose a lot of customers um and. The instant response process is about trying to maintain that trust and that reputation and reduce the impact of the incident. Danielle, so what’s going on at the Chef Ann Foundation now in the 24 hours since you’ve called Steve, what’s happening. So Steve is doing, Steve and his team are doing all the investigative work of like, OK, what has truly gone wrong? Like what do we need to find what’s out there? What’s the scope of this because often it feels just like the tip of an icebergs are they. In the system, you know, um, and so he’s handling a lot of that also communicating to my team. My role at the time was to communicate to our internal team because I know Steve. I’ve been on a call with Steve every week for 3 months, but they may not know Steve as well, and now my board wants answers. So my role turned into very much that internal communication network of like, OK. C-suite, here’s what’s going on on the edge of the cliff. I know, I know the ending was I already know the ending, but I’m still intrigued by the by the time by the unfolding. Yeah, because everyone’s everyone’s concerned, everyone’s just here to do their job to make the world a better place. That’s what we’re here for. We’re not here to build like a Fort Knox system, so when something goes wrong, it’s like, oh no, have we been too focused on. The healthy meals for kids, it’s chef Anne for sake, it’s not we make lovely food. It’s not, uh, you know, it’s, it’s not nuclear nuclear arms negotiations. Does someone have a vendetta against whole grains? I don’t know. I really like quinoa, you know just not agree with my stomach. And I’m lashing out. She had a recipe on she had a quinoa pudding recipe on the website just last week and I was very annoyed. So let’s go ahead and, yeah, exactly. So it’s, it’s, it’s a big sea change for the organization, um, especially the teams that you work regularly with to shift and say, oh no, this is actually now a current crisis and something we have to worry about that presentation next week is no longer my priority. And so it’s often a lot of soothing the internal team and also trying to communicate in the easiest method possible to the internal team like they don’t care that it was a business email compromise with uh like an MFA concern like they don’t want to know all of that they just wanna know we’re safe, we’re OK, we’re working on it, keep doing your job, we’ll let you know when we need something from you. And same with the board. The board just wants to know we’ve got it covered, so it was a very easy thing to be able to call my CEO and say hey this is what’s going on. I have this update. I’m gonna send this to the board. I just want you in the loop. You can send it to the board. I don’t really care how this process works. I just need to communicate what I have, um, and so it really became more of a like a switchboard operator of trying to keep the organization. Calm and steady and on the right path while rip rap was able to like resolve and actually investigate a lot of these technical pieces. And how about with your uh your marketing communications team that Steve mentioned were you were you talking to them or did Steve talk to them directly or what we loop them in um Steve’s recommendation. Uh, we were very fortunate that we didn’t have a public, uh, kind of incident. Um, it was very internal, so we, we loop them in just in case there was a larger impact that we needed to involve them on, but, um, they were, they were ready they were right on board. I mean the marketing teams can spend on a dime, so they were prepped, they were ready they had some language already written up by the end of the first day just in case. So it was really a coordination between all of the parties in the first 24 hours you’re not sure what Steve’s. All I know is that all of my meetings have been canceled and my CEO was trying to buy me pizza and my husband was bringing me coffee and I was like, alright, we’re we’re in it now, you know, um, you’re still in the eye of the storm. Um, all right, what, uh, Steve, lead us to the timeline. So we’re outside the 24 hours now. You, you know more. What, what, what have you, what did you, were you, yeah, what are you able to uncover in the 1st 24 hours? Yeah, so it’s, it’s a lot of um timeline information, right? When is the, when is the email sent? When is it opened? How many people receive it? How many people looked at it in the organization, um, what can we learn about the the information that you don’t get to see in the body of the email but that’s attached to it so information about the email itself when it was sent who sent it doing that kind of deep forensics work to understand can we track down who was responsible for it. Um, and can we, can we report them right, and, and try to shut down the fraud. That’s good. All right, let’s keep that open. There’s a mystery that I don’t know the answer to, um, but there is, there’s a ton of email sometimes you see it when, uh, an email is undeliverable, then you see all this string of, I don’t know if it’s called metadata or accompanying like emails fly all over the world instantaneously and, and sometimes you see this. This is just to me it’s just meaningless characters, but you can decipher a lot of information about an individual message. Exactly, yeah, so we we get a lot of information about how the email traveled across the internet from where it was sent, the computer that it was sent to where it was received. Uh, we can understand if the person sending the email uh is trying to hide their the the true email address of the um the person that sent it. Um, and we, we can use it to uncover all of these indicators that yes, it is a malicious email because a normal person isn’t sending an email with all these weird kind of factors in this metadata that you see. And so it it is um it is a lot, it is possible to. Um, understand a lot more by looking at this metadata and then to use that to pivot the investigation to say have we ever seen the same person try to attempt the same thing against the organization or other organizations that might be in the chef An network right partner organizations, um, you know, beneficiary organizations to say let’s just make sure that. Um, the attacker, if they really do hate quinoa that they’re not going into the quinoa Association and trying the same attack on them and so we, we look for these opportunities to say, hey, how can we help other people in the network or how can we make sure that other people in the network aren’t affected because we know nonprofits are so highly connected. Oh wow I’m I’m impressed by your uh. Holistic thinking like the marketing communications team, get them involved. I wouldn’t have expected the IT forensics, you know, expert to suggest get marketing involved and same thing with, you know, other agencies that we don’t even work with, you know, but can we support the network or at least, you know, inform the network about potential, should we? I’m impressed by your holistic approach we try because I think. So much of the risk is from third parties, right? It’s not always your organization that’s gonna get attacked. It’s maybe your vendor that gets attacked and that they the the attacker is able to gain access to that vendor’s email system and then the attacker is sending invoices from a legitimate vendor’s email address to you to try to get you to send money to a new bank account, right? That’s a very common thing we see. So it’s not even, you know, the chef and foundation can do everything right 100% of the time with security. But if their partner organizations aren’t doing the same thing, they’re they’re still potentially at risk for getting these, these kind of attacks. All right, take us through the timeline now. We’re beyond 24 hours. What’s unfolding? Sure, so we, we think we, we really understood after that 24 hour period that the incident was really limited, that there was, there was the funds were stopped. That’s, you know, of course the main thing. There was no access from the attacker into the organization. Danielle, what was the? I think they timed it perfectly. It was like 49,000. It was just under the cusp of that 50,000 where a lot of organizations want to review. OK, maybe require more signatures or or additional review. 9 999 car dealership. OK, I’m sorry, that’s OK. Yeah, so I think knowing being able to communicate that there that while there was the email that got sent, there wasn’t a true incident in that no money exchanged hands. There was no um breaching of chefan accounts or computer systems. And then being able to communicate that it just sort of brings down the stress level of everyone and says, OK, like this is, it was, it was an event, right? It’s not an incident because there’s no real impact because there’s no money changed hands. It’s very limited scope you can reassure the board, CEO, yeah, my accountant can stop hyper hyperventilating, uh, you know, like so everybody can just kind of calm a little bit and and we start, we start turning. We start moving towards closing out the incident, but and but it’s, it’s and this is where we say we like to use the phrase like never waste an incident. Right, never, never waste the opportunity to learn from what happened in the incident and make changes based of it. We see a lot of organizations that have these lesson learned sessions afterwards. Oh, we did this well, we didn’t do this well, but what we see the gap is nobody is assigned specific action items with due dates of things like, hey, we want you to go and turn on this technology or for any invoice over $5000 it needs to have a second set of eyes on it. And so taking these learnings and applying them to the organization and working it into the workflows, not just the IT and the technology side, but the finance side and the and the communication side just so that you’re more prepared next time and you’re you’re. You’re, you’re building some muscle memory for the Danielle, so in the session, uh, what did you see what shortcomings did you see that folks, you know, in their in their tabletop exercises were not, you know. Yeah, it was really interesting um so the way we structured the session was the 1st 20 minutes were like a quick. Slide show presentation of here’s what you need to know. He’s kind of the stuff that’s gonna come at you and then the incident that the exercise began and um it was really interesting because they wanted more information oftentimes they’re like, OK, so somebody sent you know somebody sent a bad invoice now what? and I was like, yeah, now what. You get to figure that out and they’re like, no, but the page is only like, yeah, that’s part of it like you only get like 3 touch points of information to lead your way into this process um and it was really interesting to see how that clicked on and they were like, oh this is this is like just like it would be, um, and they started asking the questions of like, well, could we do this? Could we do that? How, how did you handle this, Danielle and I was like yeah yeah. You’re gonna have Danielle’s expertise. Daniel’s wisdom from born from born of experience when you have your crisis. Right, right. I mean we do want to give them a little, a little nudge here and there, but there are no wrong answers, just trying to learn the process and I think the other thing was a lot of them saw um how stressful it can be um even in a purely hypothetical. You’re at a table with 5 strangers at a conference rolling a dice, you know, it’s still stressful, right, there’s this is, this is purely hypothetical, but still imagining your organization going through something like that or making it real of like who would I call? What would I say to the CEO who who’s the marketing head? Um, was a really good way for them to kind of envision and realize, oh this is just, this is at the lowest possible stake level, which means when this happens, if this happens, this is going to be so much more stressful and we really need a plan. Um, all right, so I don’t know who I should ask to, uh. Uh, we opened with you, Danielle, so I’ll give Steve the opportunity to bring closure to, uh, to our incident. Uh, what, what, who is it from? What were we able to find out? We were there any we able to point the finger at a person or an agency or a company or a country or and, and what, what was the. Yeah, yeah, yeah, so often times these things are the the sort of uh the the end of the story, sort of the the final uh solving of the mystery is is kind of anticlimactic. I I know I wish I could point to, oh yeah, that guy Paul in Saint Louis, like he was the guy that sent it. You often can’t get that level of information. Um, but we’re, we were able to understand, hey, these are the computers that send these emails we’re able to disclose them to entities like the FBI just to make it part of their larger cybercrime tracking domestic it was from inside the US it was from inside the US, um, and then what we, what we really spent a lot of time on is, hey, is the plan that we’ve made for cybersecurity in the road map we’ve worked on with Danielle and her team, what changes do we need to make? Uh, to that plan of how we’re gonna improve how we’re gonna work together to improve cybersecurity based on what we learned from the incident. There are certain projects that we, we pulled up, may may happen sooner, some we delayed, um, and it really, it really. Led to a situation where we’re just constantly able to update the, the strategy for the Chef Anne Foundation to say, hey, we have this thing we learned a lot from it and here’s how we’re gonna apply that in all the work that we do, uh, going forward. Danielle, I guess, uh, kind of epilogue, what made you contract with riprap three months in advance? What obviously not knowing what was coming. Well, what, what was the impetus for putting a relationship in place? Yeah, actually a little bit of a full full circle, um. I had attended the uh nonprofit tech conference in Denver and that’s where I met Riprap um at their presentation was just 2 years ago that was 2 years ago yeah and so um started working with them after that and I really really enjoyed our partnership. They completed a full road map assessment and so it’s um it’s pretty fun that we met at an NTC and now we’re presenting about this at an NTC. That’s great. I got chills synes. I got I got chills um so that’s. Good. The the epilogue is is excellent. All right, even if the, the outcome, so, uh, just going, Steve, going back to the uh what you were able to pinpoint like could you get to a county or a state? We have a rough like right we we get rough information, right? You get like, you know, rough geography here’s the the town or the city that they’re kind of by was, you know, I think Washington state based somewhere in in the Seattle area, but from there it’s a little hard to to to pinpoint beyond that. You have to really be law enforcement. or you know some spy agency that you can’t glean from from our side or while they’re doing all this incredible investigative work, you know, I’m trying to keep my people calm, having that final report to my board, to my C-suite to say, hey, here’s what we learned, here’s what we’re doing, here’s how we’ve processed this was really, really tremendously helpful. It gained a huge amount of trust from the board that our organization was taking this seriously and that we were prepared. Um, and we’ve gotten so many kudos from them on that incident, so it was, it was truly a learning opportunity that we were able to grow into something more. Yeah, and I appreciate the trust building too that they know that you’re on top of, well, you are the senior senior director of technology that they know technology is secure. It’s something that, you know, maybe you’ll report once a year or something, you know, but they don’t have to be concerned about as a board or even the CEO, you know, all right. Outstanding. It’s a good story. It’s a good story. It’s a good story with a good ending. Yeah, yeah, I’m glad we got the epilogue out. That was very good. Uh, they are Steve Scherer, CEO and co-founder of Riprap Security, and Danielle Eller, senior director of technology at the Chef and Foundation. Steve and Danielle, thanks. Thanks very much for sharing that story. Thanks for having us. Good to see you again. Thank you so much. Thank you and thank you for being with nonprofit Radio’s coverage of 25 NTC, the 2025 nonprofit technology conference where we are sponsored by Heller Consulting. It’s time for Tony’s take two. Thank you, Kate. Self-care. We just had the long holiday weekend, 4th of July. I hope you took care of yourself as well as family or friend obligations. Hope you’re taking care of yourself this summer with time. With the sort of chaos that’s uh emerged from the, the budget bill that passed and it’s bad impacts in a lot of areas including Our community. I it’s just so important for you to be thinking about yourself. It’s not selfish to do self-care. That is not selfish. That’s the best way. For you to care for others. You have to take care of yourself first on an airplane, you put your oxygen mask on first, then you help them, then you help the children who are with you, right? You put your mask on first. You gotta take care of yourself first, then you can be your best person bringing your best self to taking care of others, helping others, even working, just working with others. So please, uh, several weeks ago, I reminded you about your meds from Mico Marquette Whitlock, taking care of mindset, exercise, diet, and sleep, the meds. And I would also refer you to an episode from March, March 31st. It was with Jennifer Walter, the social worker. That episode was Mental Wellness Among the chaos, March 31st. Please Take care of yourself this summer. It’s essential. That’s Tony’s take too. Kate Though I was gonna miss my cue, didn’t. You thought I was gonna miss my cue again. You set you up I set you up. People can’t see obviously as when we, when we speak as a podcast, but Uncle Tony kind of, he leaned in and then like took it back and then he went for it. Yeah, set you up. led you in, led you in thinking, oh my God, 2 weeks in a row, he’s gonna miss his cue or miss the queue, miss my cue, I should say. Well, at least you’re not forgetting my name. Yes, right, we’re improving. It’s, it’s an upward slope. Things are getting better. I remembered your name this week. We’ve got Beu but loads more time. Now it’s time for smart data storage. Hello and welcome to Tony Martignetti nonprofit radio coverage of 25 NTC, the 2025 nonprofit Technology Conference at the Baltimore Convention Center. We’re sponsored here by Heller Consulting. Our topic right now is data disasters, smart storage for nonprofits. Bringing that to us are, uh, Brian Cavanaugh, director of digital at the Vilcek Foundation, and Tiffany Nilikova, the information specialist at Services in Action. Welcome, Brian, welcome Tiffany. Thank you for having us. Thank you pleasure, pleasure. Um, let’s start with an overview. Uh, why don’t we start with you, uh, Brian, just as we have plenty of time together, but if you could just give, uh, an overview of the Amy, he’s gonna do an overview of his session and, uh, what, uh, why, why you, you all believe this is important for, uh, for our, for our nonprofit community. Well, we’re using data disasters that nonprofits face, uh, the hardware failures, natural disasters, uh, staff turnover, funding cuts, etc. uh, as ways to talk about data resilience and how data resilience can make organizations information more smart, secure and accessible, uh, to deliver programs, uh, and mission critical work. OK, now you did not put data resilience in your session topic. Maybe that was, uh, maybe I was gonna turn people off like data resilience. Oh my God, I can’t imagine anything duller than the data disaster. Now we’ve got, now we’ve got an alliteration. We’ve got disasters, we’ve got crisis like there’s tornadoes whirling around us. There’s a sense of urgency, yeah, right, um. uh, but you, Tiffany, please, uh, why don’t you define data resilience for us? Data resilience is about taking care of your data in a way that protects the organization’s, uh, integrity. It’s uh. Data resilience is about um building a structure where you can rely on it we talked about how you can manage your information in a way that it’s faster it’s quicker you can respond to things a lot better when you manage your data and the resilience of it. Um, so I imagine there are some things that we’re not doing quite right about, uh, data, data management, and you specifically say data storage. Uh, I think we want to talk about, uh, cloud versus uh local. Why don’t you keep going for the time being, Tiffany, um, lead us into like some, some of the pitfall. What, what’s some things we should be doing smarter? So like you said, there are local storage solutions and their cloud-based storage solutions, and they offer a lot of pros and. Cons and it really depends on what you’re looking for. So with the cloud obviously you can work collaborative collaboratively with your colleagues you can access your data from anywhere. It’s a very robust system it can grow with your organization the fees are fairly low, uh, but you do have the risk of unauthorized access. uh, you know there are cyber threats that are much more real. Um, also you have authorized access so one of the things that we were discussing is when you click I agree, what are you exactly agreeing to? That nobody reads all that, right? I mean there’s 19 pages scroll to the bottom to say I agree. Absolutely sometimes I think it’s a game to see how fast, well, you know, no I don’t, not every time but before this session I specifically do sometimes, but you know what, this is a great way to use chat uh use AI Chat GPT can read it for you now and you can ask the chat GPT questions. What do I care about? What stands out for me? How does this compare against other companies? Uh, and one of the things that I care a lot about is the authorized access. So when I click I agree, I’m giving, let’s say Google Drive access to my data. They scan it for their own compliance with uh policies, but also, um, they might use it in their marketing. How do I feel about that? Is my community vulnerable or are they up against discrimination possibly? So what are my responsibilities with that and when, when I expose my data. I’m exposing a lot of people, so your local solutions are, you know, uh, external hard drive or network attached storage or a solid state drive, uh, external hard drives, there’s all sorts of ways that you can move your data from when you’re working on it to storing it that doesn’t involve the Internet. So the pitfalls of that are you can’t just access it from everywhere. You don’t work collaboratively, so you might end up with tons of drafts of the same document. Uh, but you also have much more control because it remains within a physical space. Uh, you are, it is, um, vulnerable to attacks to, uh, sorry to inadvertent loss or to, um, to, you know, damage it can be, you know, fire, fire damage we talked about, uh, just going kind of extinct some, you know, like floppy disks where are they? No’s using those anymore, you know, so that can happen in the future. So like I said, there’s pros and cons to both. Um, what else in terms of, uh, pitfalls, what, what else, Brian, could we be doing smarter besides uh storage? Uh, well, we need to think about antigrated file types. Uh, so we’re talking about the WordPerfects and the quark files and the floppy disks and all the type of data that may not be as accessible as it once was. And so we need to think about futureproofing that data by using recommended and preferred file types. Um, which is something that that the Library of Congress does very well, uh, by researching and publishing, uh, those recommended file formats in a statement, um, and so you can, you know, think about your data, uh, as a long term investment. Um, by using those recommended file types so that you can have access, you know, long into the future. What are the preferred formats? Are you able to name the top two or three? Sure, so for digital text-based formats, um, you’re gonna look at PDF, uh, PDFA, uh, for digital images, you’re gonna be looking at TIFS primarily, uh, JPEG 2000s, um, and for video you’re looking at IMF. What is um what is PDFA? What does that mean? There are different types of uh coding uh in in the PDF, uh, and oftentimes if you’re using a solution like Acrobat or some of the other free tools, um, you can save the PDF in in multiple different formats and they go back into the early 2000s. Uh, it’s just different layers of uh options and features and functionality. Um, that are built in and every year they advance, um, so the most, you know, the most common has, you know, a wider set of features um than it once did. OK, so there are preferred formats for files and why, why is this? Oh, just so they don’t get out outdated for one. OK, yeah, exactly, yeah, otherwise. You’re stuck, um, you know, using an emulator or a very old machine that may not be secure in the first place to try to open up, you know, some type of file that you haven’t needed or wanted access to for, you know, 15 years, but now you need it and you can’t can’t open it. Yeah, OK, or you’ve got some legacy machine to do it and has its own vulnerabilities, right? OK. I could be a data data storage scientist, aren’t you? That’s not true at all, um. Uh, searchable so we need to be able to get our data, right, Tiffany, let’s talk about accessing the data. I mean, yeah, let’s talk about you gotta get the data out. You gotta be able to find your data so you have to be able to to categorize it and label it in ways that make sense to you. I mean we can get deep into a database structure system, but I’m gonna talk a little bit more about just the files that people use every day. Uh, you know, how do you know that the file you’re looking for is the most recent version, or, uh, you know, let’s say you have an opportunity to write a grant application, but it’s due at 5 o’clock and you know you’ve written a document before that would apply to this. Where is it? So that’s when what you label your document is particularly important. I used to label documents, Tony. I used to label them by the mood of my day and I never could find things again and that is a terrible way to name documents. There’s a lot of swear words in it, but and so it’s cathartic, but it’s not very helpful when you’re looking for things. So the analogy to that is having on your desktop. Oh my goodness, I sometimes I go and I see someone’s desktop. I think my heart rate starts increasing. Yeah, I feel how can you like the desktop is just loaded with folders and files. I feel that way when I see an inbox with like thousands of unread messages. Yeah, you learned you’ve you’ve come to the bright side now from your, from your archaic dark dark days of file naming. So there now there’s two ways of doing things now you might surprise you, but I’m a bit type A, so I prefer a deep hierarchy where you have things, you know, in general, and they get narrow and narrow and narrow and it’s really important when you label a document that it doesn’t duplicate any of the naming. Sure that you’ve used in the folders before that so you don’t have to repeat the year again and again and again um some people prefer to leave everything on like a flat surface on their desktop and then use their search that’s one way not my preferred method so what I’m gonna say when you’re labeling things you use descriptors that everybody agrees on is it a letter or is it um a document or is it communication you have to agree on the terms you’re using as a group. It’s got to go deeper than that. That that’s just, that sounds like a very basic policy place to start. By the way, I love the hierarchy. I mean, I’m very hierarchical thinking you look, uh, look, I use Apple, uh, laptops and, you know, I don’t repeat. I I don’t say that client name, you know, contract. I just say contract because it’s in the file for legal for the. For that, for that client, which is in clients current, exactly not clients historical, that’s a different. I move them from clients current to I hardly ever have any clients leave, of course, not so much client current file is loaded clients historical is is infinitely small. It’s like 2 now there are 2. I mean, I’ve been in business for 28 years, so I haven’t, you know, a couple have just ended, uh, very amicable, but now so anyway. The hierarchy, very, I, I just, I, but that’s the way I think. But suppose somebody doesn’t think that way. That’s not you suppose the organization thinks that way, but you don’t personally. You gotta be dragged along, right? You do. So when you use descriptive words, people who prefer to search and leave everything flat now know the terms in which to search. Things have changed over the years because now. We have AI embedded into our own databases so for example if you use Google Drive, Gemini is within there. Now the policy say because I read them, uh, that it doesn’t share your database with its own it doesn’t teach it’s own AI based on your data, but who’s to say that’s gonna change so you can search now within Gemini of your own database to find things so your naming structures a little less particular. But I’m still gonna say the more descriptive you can be, the more you can match both those type A and type B people. OK, OK, um. What else? So this has to be a written, written policy in terms of file naming. Now what about folder naming? How is that different than file naming or is basically the same regimen? Yeah, I would say the same thing same with what you just described like legal contract. I would say it’s the same thing. Yeah, OK, so hierarchical is preferred we’re not using the Dewey decimal system. OK. Oh, I love the DDS. Oh, the DDS. I never heard I gee I didn’t you go to the library you have a degree in library, it’s like, yes, I did library. Does anybody still use the library still use Dewey Decimal or that that that. The spine of the books suggested they have card catalogs in libraries? No, no, no, I haven’t seen in ages ages. Thank you very much, Tiffany. OK, um, we should talk maybe about cost, cost, uh, let’s go to you, Brian. Uh, I mean, we spend a lot. I guess we can get the ultimate in security and storage and cutting edge, but we got to spend a lot, right? Where do we find our balance? Yeah, and the reality is that a lot of nonprofits don’t have the budgets to spend a whole lot. Um, the good thing is that, you know, a lot of the solutions that we’re looking at in the session um are low cost and and free. Um, you know, a lot of the solutions like Google Drive and Dropbox, Box, etc. um, they provide discounts to nonprofits, uh, free and low cost solutions, um, but to your point, uh, the more features and security that you’re looking for data loss prevention, data classification tools, they may be at a higher tier and so you may have to, you know, be paying for uh some additional things like that, um. That said though, um, you know, you need to be considering your backup solutions and other types of costs as as a holistic view of your organization’s data practices and security and so it may not just be enough to consider the cost for storage, but you also need to consider the cost of your backup and other policies and tools that your governance policy dictates. Let’s talk about doing some sample retrievals, right, so let’s say we use the cloud. I think most, most nonprofits probably use the cloud now. I mean, is it? Yeah 100%. There are some people who have local storage, I guess, but let’s let’s go with a cloud-based example. Should you be testing your, your retrieval every once in a while, make sure this, this structure is working like I’m trying to find this, maybe I know exactly what I’m looking for, but I’m gonna try to find it without going right to it. Yes, uh, yeah, OK, absolutely. Like any policy, uh, or protocol that the nonprofit has in place, you need to be testing it regularly. Um, so that includes going into your storage, uh, platform solution, um, finding and retrieving things, downloading them, um, and you know some advanced tools will do data verification checksums for you, um, but more often than not, um, just having that one on one experience of finding something, retrieving it, understanding what your users will be going through. Um, and simulating that action for them to understand, are there any pitfalls, are there any difficulties in doing this, and also just making sure the data is valid, um, that the file is working, it’s not corrupt, um, and, uh, that, you know, it will set your users up for success. Uh, we have jargon jail on the nonprofit radio. You mentioned, uh, data verification and checksums. You need to flesh that out to get yourself on probation parole, parole. You’re already in jail. Uh, so, uh, when, when you’re validating data, uh, you’re looking at, you know, things like file size, um, all the different types of metadata that are embedded within that file. Um, and some solutions will check over time, uh, if they have changed, um, and if there’s something that goes awry. Uh, you know, a check some verification or data valification can send up a red flag and and alert someone. OK, so it’s a way of verifying data integrity that happens automatically. It can, yeah, OK, OK. um, Tiffany, you asked a rhetorical question earlier about making sure, how do you know whether you have the most recent version of a file. Uh, right, we’re in the cloud. I see, or some, some, somebody did not or some, let’s just one person, uh, 11. Scofflaw, the word I was looking for. One scofflaw did not follow the policy. And now we’ve got, I see multiple versions. I see multiple files with the exact same file name. What do I do? I used to work with this guy. Oh my goodness, he was such a treat. He had, he was, oh, he was, but he was the boss was he was actually a felon, not just a scofflaw, and to me a scofflaw is like turnstile jump right but this guy sounds like a felon. Yeah, somewhere in there he had master document. I was looking for something. I was helping him organize his uh information management system, and I found what I what what was called the master file. And I thought well that’s gotta be it, right? That’s gotta be it. And then I found Master File too. And then master file 3 and then master file 4 and I don’t know the end number so I don’t know how many master files I’m looking for so that was like that was a whole day of like finding all the master files I could when you, when you have that you have to well, ensure that the last one is the best one and then delete just delete them, get rid of them, move them off maybe you want to store them in a secret spot from the scuff law so he doesn’t keep make I’m referring to him you know because this guy’s in my mind. Um, but you, you know, maybe move them to the side for a little while, yeah, in the archive, your secret one, so it’s not lost forever, but it can’t be part of your system because it’s just gonna clutter it. uh, I’m a big fan when you’re working on a project, have like the whole story complete when you’re done, put everything in one file and it’s all complete and it’s all there and you know where it is and you don’t have those extra drafts because they’re gonna get confusing even if it’s just. Copy and paste or cut and paste put it all into one thing and then follow the naming convention exactly and then you always know where it is and then you have your cultural posterity. Like your your cultural, your organization’s culture, you’ve got your, um, but, you know, do I need this file name can I just use keyword searches? I know the I know the word that’s in there, at least I, I believe I do until my search is unsuccessful. I’m screwed. Mhm. Yeah, we have to accommodate them don’t we? We do we do because we expect them to get up and running right away and if you know if they come in and there’s all these names that don’t mean anything, they’re not going to be able to do that not gonna be able to find things and they’re gonna start doing things from the very beginning, writing that grant proposal from the very beginning, yeah, and they don’t, you know. They’re just redoing work and it’s just a waste of time and energy. Logarithmic, uh, file, file creation, right? I mean, I guess it just plateau eventually, but it could be, it could go crazy with new, a couple of new employees recreating everything and now we’ve got duplicate files and and half of them aren’t named right and you’ve lost your donors. you’ve lost your volunteers along the way. See, this is all motivation maybe we should talk about this. Well, you have a lackluster host, not scofflaw, but lackluster, um, you know, we should talk about in the beginning, but these folks have been with us for 19 minutes, so hopefully they’re seeing now why these things are important. You have to pay attention to data integrity, data management, right, um. What haven’t we talked about user friendliness. There’s something else from your, from your session, uh, description, user friendliness. We’ve got these policies, but, uh, people don’t, you know, they’re not adhering because they’re too technical or something, you know, again, balancing, right? Brian, uh, balancing Brian, what, you know, what are we gonna do? Uh, we now we got trouble, people are not using them, uh. You need to be able to show why there’s value in doing things like file naming conventions, folder name conventions, um, so to your point about, you know, using keyword searching it works until it doesn’t work, uh, and so show people the value, uh, in, you know, adhering to the policies, um, and working through a lot of the steps that may feel like extra work to be honest, um. And then once you demonstrate that value, it begins to sink in that you can then take it to the next step, provide more training and resources and education. Um, it might take a crisis to make the point. It it might because we have the grant deadline that you hypothesized before and, uh, Tiffany, and we don’t have it. We haven’t found it. We blew the deadline. That’s a disaster. That’s disasters. All right, now we all learned a lesson. OK, sorry. It’s OK, um, uh, or you know, let’s say someone accidentally deleted a file or misplaced it or overwritten it, it’s, it’s gone. Um, and that keyword search no longer works because you’re trying to recover something that’s based on either a piece of metadata or a file name, um, and so, you know, in that instance, uh, you may not be able to recover that data and you know it’s lost and it impacts someone’s job. Yeah. All right. Uh, we can wrap up. Let’s see, uh, who opened? Tiffany, did you open? I think I did. Let’s give Brian a chance to close. Leave us some with some, uh, not motivation, we just did motivation. We just spent 10 minutes on motivation, but, uh, some promising words. Yeah, some promise for our for our future. Let’s look forward to a bright future with no data disasters. Bring us, bring us to this nirvana. Thank you. Uh, let me recognize, uh, Mark Topher, uh, the Vilcek Foundation’s archivist, uh, who, who’s not joining us here today, but, but joined us for the session here at NTC, um, and to, to his point and to in using his words, you know, consistency is key. Uh, and so making sure that everyone in the organization is on board, um, they’re using the best practices, um, and they’re making sure that they’re taking proactive steps to make sure the information that they are, um, good stewards of, um, is smart and secure and in doing so, um, we’re going to be protecting, um, the, the people that matter most to our organizations because at the end of the day. Um, we’re here to serve people and um all those people, whether they are in vulnerable, um, populations, um, or you know just in tricky situations these days, um, that’s what matters most and we want to be good stewards of data um and and make sure that you know nothing bad happens um to those communities. That’s Brian Cavanaugh, director of digital at the Vilcheck Foundation. With Brian is Tiffany Nicklichkova, information specialist at Services in Action. All right, Brian, Tiffany, thank you very much for sharing. Thanks for having us. Thank you. Thank you. My pleasure and thank you for being with Tony Martignetti nonprofit radio coverage of 25 NTC, where we are sponsored by Heller Consulting. Next week, our 25 NTC coverage continues with your intergenerational people pipeline. If you missed any part of this week’s show. I beseech you. Find it at Tony Martignetti.com. Our creative producer is Claire Meyerhoff. I’m your associate producer Kate Martignetti. The show’s social media is by Susan Chavez. Mark Silverman is our web guy, and this music is by Scott Stone. Thank you for that affirmation, Scotty. Be with us next week for nonprofit Radio, big nonprofit ideas for the other 95%. Go out and be great.

Nonprofit Radio for March 13, 2023: Beat Back Cyberattack

 

Michael EnosBeat Back Cyberattack

Cyberattacks against nonprofits are on the rise. While you cannot avoid them, you can make them a lot less likely to cost you big money, your data, your reputation, your donors, and your employees. Michael Enos from TechSoup helps us out.

 

 

Listen to the podcast

Get Nonprofit Radio insider alerts!

 

 

Apple Podcast button

 

 

 

We’re the #1 Podcast for Nonprofits, With 13,000+ Weekly Listeners

Board relations. Fundraising. Volunteer management. Prospect research. Legal compliance. Accounting. Finance. Investments. Donor relations. Public relations. Marketing. Technology. Social media.

Every nonprofit struggles with these issues. Big nonprofits hire experts. The other 95% listen to Tony Martignetti Nonprofit Radio. Trusted experts and leading thinkers join me each week to tackle the tough issues. If you have big dreams but a small budget, you have a home at Tony Martignetti Nonprofit Radio.
View Full Transcript

Transcript for 631_tony_martignetti_nonprofit_radio_20230313.mp3

Processed on: 2023-03-11T01:00:20.020Z
S3 bucket containing transcription results: transcript.results
Link to bucket: s3.console.aws.amazon.com/s3/buckets/transcript.results
Path to JSON: 2023…03…631_tony_martignetti_nonprofit_radio_20230313.mp3.38068433.json
Path to text: transcripts/2023/03/631_tony_martignetti_nonprofit_radio_20230313.txt

[00:01:26.42] spk_0:
And welcome to Tony-Martignetti non profit radio big, non profit ideas for the other 95%. I’m your Aptly named host of your favorite abdominal podcast. Oh, I’m glad you’re with me. I’d suffer the embarrassment of a phone. Yah. If I had to speak the words you missed this week’s show, beat back, cyber attack, cyberattacks against non profits are on the rise while you cannot avoid them, you can make them a lot less likely to cost you big money, your data, your reputation, your donors and your employees, Michael Enos from Techsoup Global helps us out on tony steak too. Get in people’s faces again. It’s a pleasure to welcome Michael Enos to non profit radio He is senior director of community and platform for Techsoup Global. He began his professional career in technology in 1996 and has since led team, tech teams at the national and individual office levels in increasing responsibilities on Mastodon. He’s at Michael underscore Enos at public good dot social and tech soup is where you’d expect them to be at techsoup dot org. Michael, welcome to non profit radio

[00:01:42.03] spk_1:
It’s great to be here. Tony Thank you for having me.

[00:01:46.69] spk_0:
My pleasure. My pleasure. Let’s please explain the work of tech soup. I think it’s so valuable, so many billions of dollars of software and hardware transferred to nonprofits. Make sure, let’s make sure everybody knows what techsoup is doing,

[00:02:52.57] spk_1:
you know? Absolutely. I mean, essentially our, our mission is to help civil society, organizations worldwide um better leverage technology to create impact in the missions um that they serve and to build communities. Um You know, that, that then can then foster that, that, that, that impact globally. Um We do that through a number of different ways. We do that by facilitating philanthropy from large tech donors. Um And you know, most of which are the ones that are just, you know, household names. Um We also do it through uh courses, services, consultations, um and through connecting organizations with each other and through also through engagements like this where we try to really uh to blogs, webinars and other facets where we help organizations understand how they could use tech um and protect their tech to uh enable uh and further have impact for their, their communities. They serve,

[00:03:17.12] spk_0:
I saw on tech soups website today, Microsoft Office or Microsoft 3 65 for a dollar. So

[00:03:18.55] spk_1:
that’s an example, right? And if you were to go to uh you know, Microsoft for nonprofits or Google for nonprofits, for example, um you know, the data validation platform that validates organizations worldwide is managed by Texas So, ultimately, we, we, we do many things but we’re also sort of a, I guess, data leading partner for, for a lot of these organizations that want to understand and make sure that their philanthropy is going into the right hands.

[00:03:48.25] spk_0:
You have, you have local uh connect groups to techsoup, connects groups.

[00:03:54.10] spk_1:
That’s great. That’s right.

[00:03:56.21] spk_0:
Yeah. You know, I know, I know you’re, well, you’re director of community and platform. So is that, is that part of your work

[00:04:42.76] spk_1:
director? I mean, you know, you know, I support that, that organization that we um we have, we have lots of different um areas and, you know, and, and in my role, I support them all um platform is a lot of the, you know, I oversee our enterprise, infrastructure and security as one of my fundamental sort of roles. I mean, obviously with the, with their expansive amount of technology that we have, that runs our platforms that, that consumes a lot of my time, but also the community side because of my background working in the tech for good space, you know, since, you know, for the length of my vocation, um you know, I have, I’ve accessed as a resource for a lot of other groups, including the connect group for when they need, you know, to understand, you know, how to, you know, for, for things like this and for, for other things um to help our communities um better leverage to the tech that they use. I mean, it’s one thing to, to uh provide the technology. It’s another thing to actually help people, you know, provide them the enablement to be able to use it and optimize it.

[00:05:08.91] spk_0:
Are there local meetups are the group’s going back

[00:05:50.06] spk_1:
to? Exactly. There are, there, there are, you know, communities within the regional and our, and that’s part of our connect program. Um And eli, the guy who runs that and, and the group that runs that are very, very energetic and it’s very community driven, which, which is fantastic and we’re sort of an enabler and facilitator in that work, which is wonderful. And that stems from the early days of us being part of the early groups that were involved with the, you know, tech for good space way back when technology was first getting launched, you know, and the internet was first launching different

[00:05:51.33] spk_0:
types of work. I mean, you know, n 10 doesn’t do consulting, which I wanted to ask you about very shortly. But, you know, they don’t do tech grants necessarily, but all, all very parallel with, with N 10.

[00:06:26.73] spk_1:
Yeah. Correct. And, and we, we have a close partner to put 10, 10 and, and we attend the events and such and we’ve long been sort of affiliated with that demand and other and other groups like like 10, 10. Um and we have partnerships that sort of expand throughout the different communities. Um And, and we try to be involved globally as well. You know, so there’s this sort of, you know, there’s the U S side of it, but then there’s also the everything that we’re doing outside of the U S and abroad because, you know, it’s um civil society is international and so, and tech soup is really involved with, with things not just within our own borders but, but outside of them um globally.

[00:06:50.58] spk_0:
Are you going to 23 NTCC the conference?

[00:06:51.42] spk_1:
Um myself. No, I’m not the, I know we have some, some other representatives that are there. I’ve been to many of those uh this year. I’m not specifically going, but we will have some representative from Texas there. I’m

[00:07:03.64] spk_0:
sure. Yeah. And non profit radio will be there as well. We’ll be on the exhibit floor.

[00:07:07.67] spk_1:
Excellent. That’s fantastic. Yeah. Yeah. Well, I’m sorry, I’m not going to be there to be in person to meet

[00:07:12.61] spk_0:
you. That’s all right. There. There are others every, every spring and

[00:07:17.31] spk_1:
virtually, by the way,

[00:07:18.97] spk_0:
that’s true. There is hybrid this year. That’s right. Um And, and texture is also consultants to consultants to nonprofits. Let’s make sure folks understand that too.

[00:08:46.84] spk_1:
Yeah, I mean, we, we provide, essentially, we help organizations connect with other organizations that then provide consultant services. We do some ourselves, but it’s very specific to some of the um because we, we provide a lot of, you know, what we’re doing to, to skills. So to speak what we, what we have is we’ve partnered with other organizations through our platforms to, to align organizations depending on exactly what type of consultation they need to inappropriate sort of resource for them. Um And that’s more uh our, our model in terms of we’re sort of a connector. So for example, if somebody needs, you know, specific sort of technology assessment uh for implementing uh Microsoft, we may do some, but then if it’s more advanced, we may work for them to, to impact or an organization that we partner with and then they provide that as a service to that organization. So, and we have other partners like that, who provide those similar sorts of services that are more hands on and direct than what tech soup can provide at this moment. And we may may expand that more and do some of that um more, more stuff ourselves and, and we are developing that and some of our customers success programs. Um and we do run a lot of sort of in the office programs where people could have webinars. And I’ve spoken in a few of those where we do it in in depth dive of a particular technology so that organizations can learn how to use them.

[00:09:00.19] spk_0:
I’ve always considered the big three to be Tech Soup N 10 and tech impact in terms of technology for nonprofits and, and all three of those of course, are nonprofits themselves. Right.

[00:09:12.87] spk_1:
Exactly. Yeah. All right,

[00:09:15.44] spk_0:
let’s talk about cyber attacks. Uh They are on the rise against nonprofits. What, what, what are you, what are you seeing? We’re going to get into the details, of course, but overall general, you know, kick us off. What are you seeing on this front?

[00:11:31.28] spk_1:
What, what we’re seeing is a lot more, um, targeted attacks, which, which is, which is unique because there’s, you know, speaking broadly about cyber activity, you know, there’s a lot of noise on the internet. There’s, you know, just all these robotic sort of in these bots that are flying around trying to find targets, right? And they’re sort of just, you know, you know, I guess, you know, they’re, they’re doing drive by sort of evaluations to see of anything, you know, just to see if there’s anything that they could get a finger in or, you know, just to explore and see if there’s sort of a, you know, something that they could find in there. What we’re seeing now is more targeted attacks, meaning there’s a specific purpose to it. Like somebody’s like, well, you know what we think that, you know, this is a, you know, a specific type of organization, they’re involved with a particular type of activity and we’re interested in knowing who’s donating to that activity and whether or not we could possibly have access to that information because that might be valuable or perhaps to the constituents that they’re serving because maybe that information is valuable as well, maybe for either financial reasons or, or, or or political reasons. And so we’re seeing a little bit more of that or, or perhaps because we really want to cause disruption in critical infrastructure. And one thing that um this is sort of a broader trend in cyber security around targets towards critical infrastructure and myself and and others in this space believe that civil society, organization data is part of critical infrastructure and critical infrastructure. So I mean, people are targeting things like, you know, we’ve we’ve heard about the target on power grids and uh gas pipelines and such. And you know, if you think about data that’s relative to communities that are specifically vulnerable in certain context or, or have access to information about others, then that’s critical infrastructure because we need these organizations to function in society. And so, you know, there could be other actors who say we want to disrupt that particular critical infrastructure for some reason and that reason could be varied just like it is for why people would disrupt any sort of critical infrastructure.

[00:12:55.08] spk_0:
I have an example that is pretty close to home. I I I own two homes in North Carolina. One of them was affected by that shooting at uh at the electrical substation in that was, that was in Moore County, North Carolina. Um And there’s a, there’s a possible correlation that, that that attack was to prevent a drag queen show from going on in the little town of Southern Pines, North Carolina, which is served by that substation that got shot at. Um So, I mean, it sounds like you’re saying, it’s not that far a leap like, you know, 11 cadre of bad actors uses guns. Another cadre of miscreants could be hackers that are looking for data at that maybe at that theater or, uh you know, among a nonprofit that may have been involved with

[00:13:45.30] spk_1:
maybe maybe the intent at the attendance list or the people who are donating to that event. And so, you know, this is the type of data and like I said, there’s, there’s different reasons why somebody might be targeting certain data. But this, these are the, this is, you know, this is like bingo on the nose, this is the kind of stuff that, that we’re seeing more and more and we’re very concerned about and why we’re really like soup is really sort of launching this um effort to help educate organizations on how to improve uh and understand what cyber security means in this space and how to prioritize it, but also how to um sort of get through the sort of complexity of it and, and, and find simple ways to knock off low hanging fruit to make it sort of actually, you know, doable for them with given their budgets and given their constraints that we a lot of smaller organizations in the, in the space you know, have, generally,

[00:14:39.67] spk_0:
it feels like in our polarized culture that there isn’t a nonprofit mission category that would be exempt from, from possible attack. I mean, you know, even feeding, feeding the hungry, you know, I could conceive of that being objectionable to some group of people that feels like why do those folks get food and, and I don’t get food or why are they entitled? And I’m not, or, you know, something that seems innocuous and purely beneficial. I, I can imagine, uh, another cadre of bad actors deciding that it’s, it’s, it’s worthless or worth worse than worthless. It’s detrimental to our culture for some reason and wanting to attack it. It doesn’t, it doesn’t feel like any particular mission would be more vulnerable or less than, than any other.

[00:15:59.15] spk_1:
Um, you’re correct. And one of the other things that is, has changed in, in this, in this sort of, you know, over time that I’ve seen is the availability of the tools to be able to perform exploits before you would actually have to be, you know, pretty well versed in hacking to be able to do any harm right now. It’s, you can, you can buy the service. I mean, you could just go to the market on the dark web and just say, hey, you know, I want to buy this, you know, uh, this hacking kit, you know, and, and, and, and there’s youtube tutorials on how to do it. I mean, it’s becoming, and, and these are, the tools are free and readily available. So what we’re seeing more of is not only just this trend of people wanting to and, you know, and maybe that hasn’t changed, it’s just that it’s more accessible, right? But, you know, people wanting to, you know, target communities and, and, and, and also try to find valuable data within these communities, but also their ability to do so it’s become easier and there, you know, and, and so you combine those things together and that’s why we’re seeing the trends we’re seeing. That’s one of the reasons

[00:16:21.11] spk_0:
you no longer have to be a sophisticated computer user. It doesn’t take a lot of study, you’re saying these things are available for cost or free to cause harm. All

[00:16:29.81] spk_1:
right.

[00:16:39.80] spk_0:
Alright. So how do we, how do we break this down for folks in small and mid sized nonprofits, you know, that, that they can sort of prioritize? I mean, is it as simple as let’s start having universal two factor authentication for everybody on your teams or maybe that’s passe maybe, maybe we’re past that now. I don’t know, how should

[00:19:30.66] spk_1:
we, you know, you, you make a good point. So for example, like the first thing I think people should do is, you know, or, or what you know, uh would be recommended and to think about it is to do the basics. Okay. What things like what you mentioned is like like multifactor authentication, um you know, anti malware on their clients, keeping things up to date and, and making sure you have backups of your data, these are sort of the basics, right? And so apart from the basics, though, you know, the next step above that is to then start looking at what we call privileged access management or role based security, not everybody needs to have access to everything, right? So, so, so let’s say, for example, a system was compromised with somebody’s permissions or credentials, depending on what they have access to, they could only do so much. And so there’s a, there’s a, there’s an important concept in cybersecurity that we call the privilege, the principle of least privilege. So, and that sort of dictates that a person really only needs access to the information that they need to do the role that they’re trained to do in their specific function. So if, if, if somebody is, you know, in I T, somebody who’s familiar with I T systems, uh they understand sort of the complexity involved and they may have access to privileged systems where they can perform things and have access to that sensitive data, but not the entire organization, right? And so we call that privileged access management. And sometimes, especially with today’s as we’ve moved into the cloud more when things get fired up and somebody spins up an app in the cloud, the cloud as well, generally have some basic role based permissions like the admin, you know, maybe a super user and then maybe some groups and then, and then just the regular users, right? You don’t want to give everybody admin rights. And so because then if somebody, if that just, that just provides more exposure and so these are small things that don’t take a lot of time or effort really to just sort of that, that’s a little bit beyond the basics though because um you know, and you know, for, you know, tech soup, for example, provides, you know, office 65 or 65 go for, for, for work space organizations. And once we, they provision, the next step is to really go in there and sort of harden them a little bit and lock them down and to go through that steps and understand what that looks like. So that um as people start doing things like maybe downloading spreadsheets that contain donor data or customer data that it’s not, somebody can’t accidentally just share that with somebody, you know, outside the organization or, or that becomes available on the general public internet.

[00:20:02.06] spk_0:
So how do we execute some of these things that are, that are more advanced, you know, beyond the backing up the multi factor authentication. Alright. So if you move into privileged access management, we need a, we, we either have a C T O which most listeners probably don’t or we need some outside help.

[00:21:13.19] spk_1:
No, actually, I think that a lot of these, you know, cloud based applications will provide guidance. The good news is is that they have an interest in protecting and wanting you as a, as a customer as well as, you know, the fact that it’s a shared data model. And so the the better that they do in terms of providing information about how this works, the better, you know, the, the the, you know, the people who use that product is going to benefit from it. And so generally in these, you know, you know, and these things aren’t if you have somebody who is at least responsible for the deployment of the technology and they don’t have to be an advanced, you know, computer scientists to do the work of the cloud app then. But somebody should be sort of designated within the organization to ensure some of the basics about the way data is handled. And, you know, getting to one of the export points, I wanted to bring up one of the most important things to understand for an organization is what data do they have? Where does it live and what is the value of it? And what is the value of Michael before we, before

[00:21:22.02] spk_0:
before we move to what, what’s our data inventory? I want to emphasize this, I wanna emphasize the value of being in the cloud. So there is there is value to using uh CRM databases that are cloud based versus server based at, in your office anymore.

[00:22:47.49] spk_1:
Correct. And for so many reasons and, you know, uh, and, and moving to that topic because a lot of the ways that systems are oftentimes breached is because what things we mentioned earlier, such as they’re not patched, there’s, um, not, not very good perimeter security on them. These things are taken care of for you, um, and they’re not backed up regularly. Um, those things, these things are taken care of for you in a sassy application. Um If it’s, if it’s a robust SAS application, like the kind that takes provides. And so when we, when we go to, you know, vet an offer that’s going to be in our marketplace, we we, we go through the list to ensure that this is gonna be a product that will serve the pole, the test of time and actually will, will be robust in, in the requirements necessary for our organization to protect their data. And so, and, and so that leads to, you know, also that making it more but maybe a little bit easier for organizations to then lock down their cybersecurity because they don’t have to have experts come into their closet or their data center and, and do this configuration and do all these updates are very technical on their firewalls and all the hardware and everything all the time in their own infrastructure, it can be managed within the cloud by people who are not necessarily have that sort of, you know, the Cisco CCN a sort of certification? Alright,

[00:23:07.85] spk_0:
thank you. I just, I wanted to drill down absolutely. Very

[00:23:11.75] spk_1:
good point.

[00:23:15.98] spk_0:
The value of from a security perspective, the value of the cloud. Alright, so let’s go to what you were, you were headed to what your data inventory, what what do you have? What what do we need to be? What do you want us to think about their?

[00:23:32.71] spk_1:
Yeah, so no data is not all data is not created equal, so to speak, right? So we have, we have data that it’s just things like, you know, my notes when I’m, you know, talking in a meeting or something like that. Okay. There’s nothing valuable with that. It’s, you know, generally not containing anything that’s sensitive. It’s sort of my notes from a meeting. Okay. Now, if that is something that, you know, maybe I don’t want to share, but it’s not something that, you know, if a hacker birds look at that so I can’t sell this and it doesn’t contain anything that’s gonna, I can do any harm with. Right.

[00:24:09.30] spk_0:
Well, it might depend, it might depend who’s leading the meeting. You might have different, you might have different sets of notes depending on who’s leading your meeting. You know, you might be commenting on the commenting on their uh I don’t know their, their capacity. I mean, not to suggest

[00:24:16.36] spk_1:
that people

[00:24:30.71] spk_0:
know, I’m actually, I’m actually having fun with you like, if somebody at tech soup was not a very good, not a very good speaker or supervisor, you know, then those notes you might not want in the public domain. But if the person is carrying their weight and they’re generally a good, good employee, you know, you have a brighter set of notes that you wouldn’t feel bad about getting exposed. That was my, my point. I guess I wasn’t, I wasn’t coming, I was coming across so dry. It was, it was desert, it was desert dry.

[00:27:18.46] spk_1:
No, I’m glad you brought into it. The, the, yeah, the types of data that you know, we think about when we think about the difference between data privacy and data protection to me, they’re very linked, right? So we, we have a responsibility to protect people’s data and the privacy of their data, but also to protect the security of that data. And so, you know, fundamentally speaking, generally in organizations in the sector, there’s gonna be some, you know, information that’s sensitive or may have some value and if we identify that and identify where that lives and then focus our energy on securing that, making sure that that data is backed up. Um and, and testing access to it, that’s, that’s, you know, if you have limited resources, that’s the place to really focus your attention. And then the other stuff is great. I mean, and use using robust tools like we provide um in our marketplace such as box for document repositories or even sharepoint, those can all be really configured for. So any type of theater, like even my notes from, you know that, you know, or my supervisor notes about me or your notes about me can be secured, you know, um you know, in a very robust way or shared. And one of the things we’re seeing, for example, especially the document collaboration software, it’s very easy to share things. They make it very easy to share with anybody, right? Just click and it always says like share with anybody with link, you know, you know, and so if you, if it’s something like, oh, you know, um uh oh somebody just sent me, you know, or they told me to put in my, you know, take a picture of my passport or something and, and stick it in here, right? And, and I, and the somebody has in the human resources once said, oh, I’m just gonna share this link and make it copied everybody. Now everybody has access to your past potential, everybody has access to your passport photo and I D so, you know, these are the things that we just have to sort of like start thinking twice, which brings me up to my next point. Um Security awareness within organizations, cybersecurity awareness, I cannot stress enough how important it is for organizations to have a cyber security awareness program within the organization. This these programs don’t cost a lot of money. They don’t take a lot of time and they go a long ways to prevent Uh an internal mistake that could lead to something 80% of cyber attacks happen from the inside.

[00:27:27.33] spk_0:
What does this cyber security awareness program look like?

[00:28:34.34] spk_1:
So essentially, so for example, um they’re usually conducted on point of like orientation for an employee that comes into an organization and they go through a video, you know, provided by a platform like no before which is in our marketplace. And, and what they do is they sort of go through this, this methodical sort of, you know, force to teach somebody about fishing about sensitive data about ways that people try to get access to information, either through cell phone, fishing through text fishing through um email phishing or through other means to or even on Slack to say, to try to fool you into providing some information um that they, that they can use a huge trend in this arena is what we call impersonation fishing. It’s a specifically targeted phishing email that looks like it’s coming from somebody within your organization such as your CEO, your CFO or uh the human resources director asking you to provide or update your banking information. And it’s very carefully crafted, crafted, it looks just like that and you really have to do a lot of due diligence to really go through there and say, oh, did this really come from our CEO having

[00:29:03.26] spk_0:
Haven’t there been cases where like a spoof email like this says, you know, wire $50,000 to this vendor account. You know, we’re, the payment is overdue. We need to wire this payment ASAP. And of course, it goes to the Bad Actors account. Isn’t there? Stuff like that? It looks like it’s like the treasurer saying, send a wire or the CEO saying, send, make a payment.

[00:29:40.35] spk_1:
That’s right. Exactly. And, and, and we’ve, um, and if you have an organization and people haven’t been trained to recognize that, you know, if somebody’s asking you for something and it’s something of value, double check it, you know, and, and to contact that individual in a different channel and say, did you really need me to send $50,000 in this wire transfer? I just want to check is this actually came from you? There’s other ways that they teach you in these orientation platforms or in these um security awareness platforms to check the email headers and, and the simple things, but essentially that’s the gist of it. And that’s why security awareness training is so important. So, so people are on their toes when they’re actually doing their work,

[00:30:03.43] spk_0:
do you recommend then ongoing training? You talked about orientation,

[00:30:51.51] spk_1:
there’s, there’s an orientation training and then, you know, most organizations will have it mandatory that they do an annual training and, and this just as a refresher course and also things change. So, you know, the space changes. Sometimes people are doing it now because of the trends more often like every six months. And then specifically for people who are in jobs where they’re doing data handling for, let’s say they’re doing data processing, they work in the donor uh services program or something where they’re managing sensitive data all day long. They’ll be specialized courses for people who are, are actually dealing with data on a day to day basis. So that’s a little bit more involved in terms of actually how to understand and, and that goes into things like, don’t download, you know, a C S V file on your computer and stick it onto a, you know, um, a thumb drive on your computer or transported or, you know, don’t, you know, send out, you know, via email to, to a coworker and, and these sorts of things that are specific to handling sensitive data.

[00:31:04.59] spk_0:
Okay. Interesting. Yeah. So even, even just emailing internally from employee to employee can be risky,

[00:31:37.20] spk_1:
yes, it can be stiff. It’s, and, and there’s because, for example, if, because that’s actually it’s going to stay within that email store wherever that is located. And it’s, um, if it’s unencrypted, it’s gonna be, it’s gonna be encrypted during transit, for example. Um, and, and encrypted at rest. But if somebody else had access to that access to your email server or a privileged access in your system, they could potentially go in and, you know, take over that account, log in as the CEO and have access to the deed and actually browse emails for, you know, and actually do queries and look for credit card information or, or look for email addresses and then they could potentially find information about donors or, or, or, or constituents that sensitive.

[00:35:08.08] spk_0:
It’s time for Tony’s take two. It’s time to get back in people’s faces. Again. Last month, I did a in person live face to face in person training on Long Island. I was in New York City for several days. What a joy. What a pleasure. What a difference, an improvement, you know, over virtual trainings. I mean, look zoom is, I’m all flustered. Zoom is, is necessary and I’m not saying necessary evil. It’s, it’s, it’s a part of the culture, whether it’s zoom or teams or Google meet, you know, whatever virtual meetings, they’re just a part of our lives now. No question about it. But don’t make those the default if you have the option to get back in front of people in person, I urge you choose that option. Uh You know, I could have passed on the opportunity to do the in person training, but I didn’t want to, I didn’t want to donor meetings to while I was in the city face to face meetings again, coffee lunches. It’s just so much better, so much more real than anything virtual can offer. Um I had a meeting, lunch meeting just about 10 days ago or so with someone from Heller consulting, which is gonna be Team Heller. They’re going to be our 23 NTC sponsors at the nonprofit technology conference coming up in Denver And the woman who works for Heller happens to live within 45 minutes of where I live in North Carolina. So we got together for a, a real lunch. We had lunch together over the same table. Remarkable. You know, it’s yeah, more real authentic. I urge you if you can meet someone in person instead of virtual, do it, do it. It makes the world of difference. It’s time to get back in people’s faces again. Don’t make virtual your your default. If there’s another way first, I urge you to do it. That is Tony’s take two. We’ve got Boo Koo but loads more time for beat back cyber attack with Michael Enos. Talk about not preserving data that you don’t need to preserve. Like credit card numbers, full numbers for instance, or dates of birth or other things that aren’t necessary for you to preserve. Isn’t there, isn’t there value in trimming down sensitive data that you don’t really need?

[00:35:40.17] spk_1:
Yes. And and one of the principal aspects of data handling is an optimization of data. So you know, there’s there’s transactional data that happens. And oftentimes, for example, with credit card things are processed nowadays, you’ll usually use a payment processor. So, you know, hopefully you’re not actually you know that server that actually storing that information is not on your box anymore because there’s, you know, you know, you can use an API and a web site and then it happened somewhere else and they take care of all that stuff for you. So, if your systems were hacked, they wouldn’t have access to the credit card data

[00:35:55.19] spk_0:
or,

[00:39:00.73] spk_1:
or Braintree or one of these sorts of services, you know? Exactly. And, and, and so those go to those payment processors and they manage all that, um, which is great because then you, it reduces the amount of exposure on your e commerce site or fundraising donor donation site. And if you’re using a donation software program, like, you know, donor perfect or one of these sites, that’s what they’re doing as well. You know. So they, you know, because, because they, they want to use because that you really have to have the best of breed technology to be able to make sure that that stuff gets that, that’s really super secure and they have higher standards and compliance standards by which they attest to the. Um, and so however though, let’s say you’re, you’re doing an email list to your constituents, right? Um You know, you’re gonna need some marketing data, you’re gonna, you know who to send this, this information to, but you don’t need everything about that individual. You don’t need things like that really. I mean, you may need the basics but you should be using a marketing provider that is secure and you should, you should transfer, get that information to them in a secure way and you should ensure that if that individual wants to opt out. Um and they, all these things should be an organization’s privacy policy so that people understand how their data is being used if they sign up for a newsletter or things of that nature. However, you know, I think your point specifically um oftentimes reports about, you know, activities, engagement, you know, that go into reports for executive or for things that are put into a PDF or in another format, the data should be anonymized. So the only thing that’s there is, you know, aggregated information about, you know, the engagement and not all they shouldn’t be able to drill down and see, oh who is this exact individual? Now if they need to know if it, if they want a donor report about, you know, I want to know exactly to see who um are the top donors and, and such, you know, there should only be limited people within the organization who have access to that data, to be able to see that information that goes back to my other point about um privileged access management. There are gonna be some, there’s gonna be some reason why people aren’t gonna wanna know specifically about, you know, who’s engaging with the community. And also oftentimes on the client level, we need to know that the people who are providing services to communities need to know exactly who these individuals are and more sense of information. And that’s why I was talking about earlier about, you know, understanding where that data lives and, and only having as much as you need to fulfill the function of that, you know, whatever you’re doing. Um and, and having that, you know, and making sure that’s really locked down when I worked in the food down. When I worked in the food and security sector, we had people going out in the communities and helping sign them up for, you know, um cal fresh, you know, essentially benefits, you know, for people to get, you know, you know, government assistance and they had to collect really sensitive information. But what they did is they had ways to you securely transmit that information to the local human resources agencies so that it was all encrypted, it was protected and then once we transmitted that we didn’t have access to it,

[00:39:44.68] spk_0:
what about vetting vendors? You know, if, if you’re offices using a male house, uh you know, some of the data that you just talked about for, for mailing? Um I can’t, I can’t think of other examples of vendors that could be. Well, events, events could have, could event management might have some sensitive data. What, how do you vet your vendors to make sure that they’re taking appropriate actions to prevent theft, fishing, you know, to, to defeat defeat, or at least you can’t defeat them, but at least minimize the threats. How do you, how do you check these third parties that you’re working

[00:41:16.80] spk_1:
with? Well, you know, that’s a big part of my roller tech soup. So whenever we, whenever we work with, with, whenever we’re going to be using a new product or app or something like that, it’s my job to go in and actually check and organizations, these, you know, these application providers will provide um on their site or they should and if they don’t, you shouldn’t use them, but most of them will provide on their site access to their information security program and what they do where their data is located, what they do to protect it, their compliance levels, their certification levels, um whether they do audits, whether or not they do penetration tests And what type of and, and, and everything to that order and that should be vetted by, by somebody before they onboard an aunt. And we do this all the time. We use a lot of different apps to Texas north of 100. And so we, every time we were on board one for some utility within the organization, we make sure that they meet this standard. There’s, and we actually, since we’re a third party vendor for other people, they have the same for us so that a lot of the work I do as well as to, you know, report out periodically to all the people who are using our, our platform to facilitate their data to organizations and you know, what sex, what tech soups information security program like. So this is, you know, because creates transparency, but it also helps people understand what the risks are, which helps when you’re in a situation where I needed to go and advocate for resources to institute a cybersecurity program.

[00:41:47.96] spk_0:
I want to ask you about the board’s role in all this. But, but is there anything more that you want before we get to the board? Anything more you want to talk about threat minimization policies? Anything we haven’t covered that you want folks to know about?

[00:44:14.11] spk_1:
Yeah, I think that one of the things that is, you know, that we haven’t mentioned yet is preparedness for an incident, essentially a security incident, incident response plan. This, you know, is another thing in that sort of list of five that an organization should understand. Um if you have a situation where your data’s been um breached. And, and one thing I do want to do is to describe quickly, even this kind of a dry topic is there is a difference between a security incident and a security data breach. A security incident is could be something as innocuous as somebody just knocking off your website and taking it down with a DDOS attack. Now that sounds in Oculus because it’s just, it doesn’t sound innocuous because it’s disruptive because nobody can get your website, but nobody’s taking the data. And as soon as that denial of service attack is stopped, your website maybe still functioning. Um But that’s an incident and a data breach is different because now you’ve got to do a couple different things. You’ve got to number one, find out how the breach occurred, which you should also do in case of the DDOS attack. Um But above that, you also need to then understand how to respond to, you know, what data was breached. What’s the scope of that data and who are the individuals and, and what’s our plan to reach out to those individuals and notify them about the breach? And was our policy around that? And who do we have to include in terms of communications internally and legally and, and to provide that transparency because for a number of different reasons, number one, it’s the right thing to do. Um and number two, because it actually helps build trust within, within communities because if people understand that, you know, these things happen and they happen to some very, very large organizations, right? We, we know about these, these really large breaches, but the more transparent they are the more the consumers or the constituents who used those products. Think gosh, they really responded well to this and they acted immediately, they communicated appropriately and they remediated, you know what happened and, and that was the responsible thing to do and you don’t wanna be doing that in the middle of a breach. So, having a plan up front helps during that process because otherwise it’s just too much at one time, everything and

[00:44:21.00] spk_0:
the plan is gonna lay out who’s in charge, who makes, what kinds of decisions, um,

[00:44:27.43] spk_1:
notify. Right. And what’s the playbook essentially? Yeah.

[00:44:52.19] spk_0:
Like, I mean, it could even, it could even break down to needing a remote place to work. I mean, go go that far or because we’re because we’re hopefully in the cloud we don’t like like if our physical infrastructure gets um compromised, do we need to go off site? And, and what’s the technology, the technology capabilities in our, in our off site work location?

[00:45:17.93] spk_1:
Well, that’s actually a little different. Um so we usually talk about that in terms of business continuity plan. So and, and that would be the same sort of plan you would enact case of a natural disaster or something like that. I mean, is a business continuity and, and that’s far exceeding the scope of what we can discussed today, although I’d be happy to discuss that. Let’s not let’s not

[00:45:22.65] spk_0:
I don’t want to panic folks. Okay. Alright.

[00:45:25.60] spk_1:
Alright. Alright,

[00:45:27.20] spk_0:
you got me focused on, you got me focused on like I don’t know, natural disasters and terrorism. All right, let’s

[00:48:44.52] spk_1:
go to the board. Okay. Alright. So, so one of the things that boards were all right. So organizations nowadays are let’s put cybersecurity is becoming and, and is becoming as important as sort of financial security with an organization. The two are becoming linked together An organization. And so for many years, as we all know, uh 501 C3 organizations in the us are generally bound to having a financial audit annually. Right. And then they report to the board and the board will make sure that, you know, there’s a financial audit to ensure that the funds are used judiciously. Um there’s oversight and governance over these matters. Cyber security is becoming as important as financial security because the two are linked together. If there’s a because it could affect it. If you have a ransomware attack, it could affect the viability and the business sustainability of an organization. So it’s a very serious matter. It’s becoming a very, very serious matter for organizations to then think about cybersecurity as a compliance issue, not just nice to have. And so helping the board’s understand that this has shifted from a situation where, oh, well, you know, there’s nobody’s going to attack a nonprofit and uh you know, and if they do, you know, it’s, our data isn’t very important. Um It’s things have shifted, right. So I think recently there was a community, um it’s one of these cities, for example, was an entire city was, has been locked down for days because our grants were attacked and so nothing can function within the city because, you know, um that’s going to affect everything within the city, not just their continuity and safety of people, but also um it’s gonna have a financial impact. So cyber security is becoming more like a compliance issue and a governance issue. And so I think if boards understood that, then they would understand the need to prioritize and to provide funding and resources for those within the organization. Whether that if a small organization that the CFO or the C 00 or even the CEO to then say, look, we need to carve out some resources to be able to understand our risk and the best way to do that would be to do a third party risk assessment and with, with somebody to come in and actually do an evaluation and say, because they’ll come in and do, you know and come in and say, hey, look, these are the, you know, we come in and, and these people are vetted, their, this is their job and you know, they’re safe to work with and go in and say this is where you really need to. These are the critical things, these are, you know, not important things and these are the nice to have and they’ll, they’ll lay it out for you and then you can develop as part of your strategic plan as an organization just like it should be part of your business plan and should be linked to the business plan because the strategic plan for the organization and then the funding, the budget resources, the resource planning and all these things should be baked into the operational strategic plan for an organization. That’s where we’re going in the sector.

[00:49:03.09] spk_0:
Okay. It belongs as part of your strategic plan, your business plan. Alright.

[00:49:50.46] spk_1:
Yeah, and, and that’s where I think that it’s um uh it’s just like I said, I think where a board comes in is to helps understand that so that they could then authorize and, and oversee and ensure that an organization is doing this work and it’s hard work because, you know, you may have limited resources where we’re gonna carve where we’re gonna carve this out. And however, the good news is that there are people who want to fund this, there are grantmakers who are super would be super happy to be able to say, look, I’m gonna help, I’m gonna capacity impact um grant to this organization to help improve their cybersecurity because of these trends that we’re seeing. And so, and then you can use that as a mechanism to possibly help fundraise to offset some of the funny. So it doesn’t have to come out necessarily of your operational costs.

[00:50:23.28] spk_0:
Okay. There are foundations that will fund fund this. Yeah. Alright. All right, we’re gonna leave it there, Michael. Thank you, Michael from Montana, Michael Eno’s Senior Director of Community.

[00:50:26.28] spk_1:
And it’s

[00:51:30.65] spk_0:
my pleasure to thank you, senior director of Community and platform for Techsoup Global he’s on Mastodon at Michael underscore Eno’s at public Good dot Social and Tech soup where you’d expect them to be techsoup dot org. Next week, I’m working on it. Uh, and I assure you that there will be a show next week because this is show number 630. And I’ve been producing a show every week for 13 years close to. So I assure you there will be a show next week. I just don’t know what it’ll be about, but don’t bet against me because there is gonna be a show. You know, you’re gonna lose if you bet against there being a show next week. If you missed any part of this week’s show, I beseech you find it at tony-martignetti dot com. Our creative producer is Claire Meyerhoff shows. Social media is by Susan Chavez, Mark Silverman is our web guy and this music is by Scott Stein. Thank you for that affirmation. Scotty B with me next week for nonprofit radio big nonprofit ideas for the other 95% go out and be great.