SYS-CON MEDIA Authors: Zakia Bouachraoui, Liz McMillan, Carmen Gonzalez, Roger Strukhoff, David Linthicum

Blog Feed Post

The Cyber Threat to Non-Governmental Organizations

By

Editor’s note: In this guest post Paul Goldernberg brings more focus to the cyber security concerns facing many Non-Governmental Organizations (NGOs). NGO’s are typically non-profit organizations that pursue social aims. With over 1.5 million NGOs in the US alone, they present a very large target space to cyber attackers -bg 

Over the past year, cyber threats have emerged as a primary concern, particularly with regard to homeland security. Governments, corporations, houses of worship, and non-profit organizations large and small have been the target of cyber-attacks aimed at defacing websites, disrupting networks, stealing information and damaging systems and infrastructure. In outgoing remarks Homeland Security Secretary Napolitano has a warning for her successor: A massive and “serious” cyber-attack on the U.S. homeland is coming, — the likes of which the nation has never seen.

In today’s world, most faith based and non for profit organizations maintain their most valuable assets in digital form. Houses of worship and NGO organizations have a critical role in social service delivery and emergency management response and as such have more sensitive information invested in their technology than ever before. Examples could include employees’, clergy, congregants, recipients of social services, personal data, home addresses, monetary transfers, donor information, private materials about a faith based organization’s plans, etc. The dangers of the situation are further augmented when one factors in today’s increased interconnectivity, reliance on digital networks and web-based technology, and the broadened use of smart phones. This massive dependence on technology provides a perfect platform for groups and individuals who seek to cause severe damage to an organization’s infrastructure and operations. What is more, an institution’s private information is threatened with every download, every click on an internet link, and every opened email.

Mal-intentioned individuals or groups no longer require physical access to a house of worship or NGO to cause its community members harm, or to gather information to plan future terror or criminal attacks. Rather, a criminal, a hacker or a terrorist-related group from the other side of the globe can, with equal impunity, breach a house of worship or NGO network and silently gather its most vital information. Most troubling is that a theft or probing of this nature can go undetected for years—if not indefinitely. Where information once filled floors of locked filing cabinets under the careful watch of staff and volunteers, hackers and computer criminals now have the capacity to make digital copies of the original that fit easily onto concealed portable hard drives.

Not one year ago, a server that hosts around 50 Jewish congregational websites was attacked by a politically motivated hacker group called the Moroccan Ghosts. The group plastered the targeted websites with their logo and an hour-long video denying the Holocaust. According to the cyber experts, this one event was only part of a larger trend of hackings targeting the websites of groups for political and or ideological justification. The incident provides just a small glimpse into the damage that can result from breaches to an institution’s cyber-security. Of highest concern is when personal information such as the home addresses, names, schools attended by the children of faith based leaders and staff, become open source posts on hate filled or extremist websites and blogs. Jane Holl Lute, former Deputy Secretary of Homeland Security and nationally-regarded cybersecurity expert, advises:

“In cybersecurity, we are now experiencing what one noted expert has termed “the fog of more.” A welter of advisories, technology, tools, and checklists is being offered up in the service of protecting our networks. But part of the reason more enterprises are not better postured on cybersecurity is because it is not always clear what should be done first, or as a matter of priority, among the various means and ways that are suggested.”

“Cyber threats to houses of worship, faith based and NGO organizations pose significant security risks to their operations and include everything from surveillance and intelligence collection on leaders and members to accessing systems that can disrupt operations or be exploited for conducting a physical attack. The security operation needs to include complete security planning and implementation to counter both physical and cyber threats…” says Robert Liscouski, CEO of Axio Global, LLC (a cyber-enterprise risk firm) and former Assistant Secretary of Infrastructure Protection, Department of Homeland Security.

In terms of cyber threats on individuals, the 2012 Norton Cybercrime Report revealed that 556 million individuals are victims of consumer cybercrime every year. That’s 18 victims per second. Two out of every three adults use a mobile device with internet access, and 31% of mobile users that year received a text message from an unknown source asking them to click on a link, dial an unknown number, or retrieve a suspicious “voicemail.”

Due to the evolving nature of the risk to faith based and NGO affiliated facilities, the answer to who is responsible for addressing cyber-security concerns is somewhat vague. An administrator’s or a director’s fiduciary duties without a doubt extend to the protection of significant digital assets. What, then, are a director’s or an administrator’s specific responsibilities when it comes to cyber security? Can an administration simply rely upon its IT department or person to address cyber-security needs, or do faith based and NGO leaders have an obligation to educate themselves on the nature of their respective agency’s cyber technology? Will cyber-security be a topic of discussion only after an organization experiences a major security breach?

Cyber-security has become the new homeland security of the decade. It is imperative that we apply the same level of awareness and action as we have to the physical security of our facilities to ensure our security against this ever-evolving threat. Last year, then Defense Secretary Leon Panetta issued a call to arms against cyber-attacks, warning that sophisticated attacks against the U.S. could be America’s next “cyber Pearl Harbor.”

The threat of cyber-attack is more real than ever. Like the years leading up to 9/11, the clarion call has been sounded, and warnings have been made. Are we listening?

Preventative strategies in preventing cyber-attacks can be found here

Mr. Goldenberg is the President and CEO of Cardinal Point Strategies and is a member of the United States Department of Homeland Security Advisory Council and serves as Vice Chair of the DHS Faith Based Advisory Security Council. He provides counsel to government, faith based and NGO organizations in cyber security policy and information sharing, as well as strategic counsel on global national security affairs to international NGO, private sector, and government agencies. He also serves as a Senior Security Advisor to the County Executives of America, Counter Terrorism Adviser to the American Hotel and Lodging Associations Educational Institute, and National Director of the Secure Community Network, the nation’s first full time faith based threat and information sharing center.

Read the original blog entry...

More Stories By Bob Gourley

Bob Gourley writes on enterprise IT. He is a founder of Crucial Point and publisher of CTOvision.com

Latest Stories
Moroccanoil®, the global leader in oil-infused beauty, is thrilled to announce the NEW Moroccanoil Color Depositing Masks, a collection of dual-benefit hair masks that deposit pure pigments while providing the treatment benefits of a deep conditioning mask. The collection consists of seven curated shades for commitment-free, beautifully-colored hair that looks and feels healthy.
The textured-hair category is inarguably the hottest in the haircare space today. This has been driven by the proliferation of founder brands started by curly and coily consumers and savvy consumers who increasingly want products specifically for their texture type. This trend is underscored by the latest insights from NaturallyCurly's 2018 TextureTrends report, released today. According to the 2018 TextureTrends Report, more than 80 percent of women with curly and coily hair say they purcha...
The textured-hair category is inarguably the hottest in the haircare space today. This has been driven by the proliferation of founder brands started by curly and coily consumers and savvy consumers who increasingly want products specifically for their texture type. This trend is underscored by the latest insights from NaturallyCurly's 2018 TextureTrends report, released today. According to the 2018 TextureTrends Report, more than 80 percent of women with curly and coily hair say they purcha...
We all love the many benefits of natural plant oils, used as a deap treatment before shampooing, at home or at the beach, but is there an all-in-one solution for everyday intensive nutrition and modern styling?I am passionate about the benefits of natural extracts with tried-and-tested results, which I have used to develop my own brand (lemon for its acid ph, wheat germ for its fortifying action…). I wanted a product which combined caring and styling effects, and which could be used after shampo...
The precious oil is extracted from the seeds of prickly pear cactus plant. After taking out the seeds from the fruits, they are adequately dried and then cold pressed to obtain the oil. Indeed, the prickly seed oil is quite expensive. Well, that is understandable when you consider the fact that the seeds are really tiny and each seed contain only about 5% of oil in it at most, plus the seeds are usually handpicked from the fruits. This means it will take tons of these seeds to produce just one b...
Steaz, the nation's top-selling organic and fair trade green-tea-based beverage company, announces its 2017 "Mind. Body. Soul." tour, which will bring authentic experiences inspired by the brand's signature Mind. Body. Soul. tagline to life across the country. The tour will inform, educate, inspire and entertain through events, digital activations and partner-curated experiences developed to support the three pillars of complete health and wellness.
The platform combines the strengths of Singtel's extensive, intelligent network capabilities with Microsoft's cloud expertise to create a unique solution that sets new standards for IoT applications," said Mr Diomedes Kastanis, Head of IoT at Singtel. "Our solution provides speed, transparency and flexibility, paving the way for a more pervasive use of IoT to accelerate enterprises' digitalisation efforts. AI-powered intelligent connectivity over Microsoft Azure will be the fastest connected pat...
There are many examples of disruption in consumer space – Uber disrupting the cab industry, Airbnb disrupting the hospitality industry and so on; but have you wondered who is disrupting support and operations? AISERA helps make businesses and customers successful by offering consumer-like user experience for support and operations. We have built the world’s first AI-driven IT / HR / Cloud / Customer Support and Operations solution.
ScaleMP is presenting at CloudEXPO 2019, held June 24-26 in Santa Clara, and we’d love to see you there. At the conference, we’ll demonstrate how ScaleMP is solving one of the most vexing challenges for cloud — memory cost and limit of scale — and how our innovative vSMP MemoryONE solution provides affordable larger server memory for the private and public cloud. Please visit us at Booth No. 519 to connect with our experts and learn more about vSMP MemoryONE and how it is already serving some of...
Darktrace is the world's leading AI company for cyber security. Created by mathematicians from the University of Cambridge, Darktrace's Enterprise Immune System is the first non-consumer application of machine learning to work at scale, across all network types, from physical, virtualized, and cloud, through to IoT and industrial control systems. Installed as a self-configuring cyber defense platform, Darktrace continuously learns what is ‘normal' for all devices and users, updating its understa...
Codete accelerates their clients growth through technological expertise and experience. Codite team works with organizations to meet the challenges that digitalization presents. Their clients include digital start-ups as well as established enterprises in the IT industry. To stay competitive in a highly innovative IT industry, strong R&D departments and bold spin-off initiatives is a must. Codete Data Science and Software Architects teams help corporate clients to stay up to date with the mod...
As you know, enterprise IT conversation over the past year have often centered upon the open-source Kubernetes container orchestration system. In fact, Kubernetes has emerged as the key technology -- and even primary platform -- of cloud migrations for a wide variety of organizations. Kubernetes is critical to forward-looking enterprises that continue to push their IT infrastructures toward maximum functionality, scalability, and flexibility. As they do so, IT professionals are also embr...
Platform9, the leader in SaaS-managed hybrid cloud, has announced it will present five sessions at four upcoming industry conferences in June: BCS in London, DevOpsCon in Berlin, HPE Discover and Cloud Computing Expo 2019.
At CloudEXPO Silicon Valley, June 24-26, 2019, Digital Transformation (DX) is a major focus with expanded DevOpsSUMMIT and FinTechEXPO programs within the DXWorldEXPO agenda. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of business. Only 12% still survive. Similar percentages are found throug...
When you're operating multiple services in production, building out forensics tools such as monitoring and observability becomes essential. Unfortunately, it is a real challenge balancing priorities between building new features and tools to help pinpoint root causes. Linkerd provides many of the tools you need to tame the chaos of operating microservices in a cloud native world. Because Linkerd is a transparent proxy that runs alongside your application, there are no code changes required. I...