Cybersecurity for Synagogues and Chabads
Faith-based organizations, both large and small, are increasingly reliant on the internet for daily operations, creating attractive and potentially lucrative targets for cyber criminals.
With such heavy use of and reliance on computers and the internet by both large and small organizations, protecting these resources has become increasingly important. Learning about cyberattacks and how to prevent them can help you protect your company from security breaches.
Cyberattacks Compromise Your Congregation
Cyberattacks include many types of attempted or successful breaches of computer security. These threats come in different forms, including phishing, viruses, Trojans, keylogging, spyware, and spam. Once hackers have gained access to the computer system, they can accomplish any of several malicious goals, typically stealing information or financial assets, corrupting data, or causing operational disruption or shutdown.
Both third parties and insiders can use a variety of techniques to carry out cyberattacks. These techniques range from highly sophisticated efforts to electronically circumvent network security or overwhelm websites to more traditional intelligence gathering and social engineering aimed at gaining network access.
Cyberattacks can result directly from the deliberate actions of hackers, or attacks can be unintentionally facilitated by employees—for example, if they click on a malicious link. According to historical claim data analyzed by Willis Towers Watson, 90 percent of all cyber claims stemmed from some type of employee error or behavior. The high-profile Equifax, Snapchat, and Chipotle data breaches were all caused by employee error or behavior.
A breach in cyber security can lead to unauthorized usage through tactics such as the following:
Installing spyware that allows the hacker to track Internet activity and steal information and passwords
Deceiving recipients of phishing emails into disclosing personal information
Tricking recipients of spam email into giving hackers access to the computer system
Installing viruses that allow hackers to steal, corrupt, or delete information or even crash the entire system
Hijacking your website and rerouting visitors to a fraudulent look-alike site and subsequently stealing personal information from clients or consumers
Cyberattacks may also be carried out in a manner that does not require gaining unauthorized access, such as denial-of-service (DoS) attacks on websites in which the site is overloaded by the attacker and legitimate users are then denied access.
The Vulnerable Become the Victims
The majority of cyber criminals are indiscriminate when choosing their victims. The Department of Homeland Security (DHS) asserts that cyber criminals will target vulnerable computer systems regardless of whether the systems belong to a Fortune 500 company, a small business or a home user. Cyber criminals look for weak spots and attack there, no matter how large or small the organization.
Simple Steps to Stay Secure
With cyberattacks posing such a prominent threat to your congregation, it is essential to create a plan to deal with this problem. Implementing and adhering to basic preventive and safety procedures will help protect your congregation from cyber threats.
Following are suggestions from a Federal Communications Commission (FCC) roundtable and the DHS’s Stop.Think.Connect. program for easily implemented security procedures to help ward off cyber criminals. These suggestions include guidelines for the congregation as well as possible rules and procedures that can be shared with employees.
Security Tips for your Synagogue and Chabad
Cybersecurity should be an organization-wide effort. Consider implementing the following suggestions:
Install, use, and regularly update anti-virus and anti-spyware software on all computers.
Download and install software updates for your operating systems and applications as they become available.
Change the manufacturer’s default passwords on all software.
Use a firewall for your internet connection.
Regularly make backup copies of important business data.
Control who can physically access your computers and other network components.
Secure any Wi-Fi networks.
Require individual user accounts for each employee.
Limit employee access to data and information, and limit authority for software installation.
Monitor, log, and analyze all attempted and successful attacks on systems and networks.
Establish a mobile device policy and keep them updated with the most current software and anti-virus programs.
Security Tips for Staff
Use strong passwords, change them periodically, and never share them with anyone. Never repeat a password across accounts.
Protect private information by not disclosing it unless necessary, and always verify the source if asked to input sensitive data for a website or email.
Don’t open suspicious links and emails; an indication that the site is safe is if the URL begins with HTTPS://.
Scan all external devices, such as USB flash drives, for viruses and malicious software (malware) before using the device.
Securing Your Mobile Devices
Gone are the days when contact names and phone numbers were the most sensitive pieces of information on an employee’s phone. Now a smartphone or tablet can be used to gain access to anything from emails to stored passwords to proprietary company data. Depending on how your organization uses such devices, unauthorized access to the information on a smartphone or tablet could be just as damaging as a data breach involving a more traditional computer system.
The need for proper mobile device security is no different from the need for a well-protected computer network. Untrusted app stores will continue to be a major source of mobile malware that drives traffic to these stores. This type of “malvertising” continues to grow quickly on mobile platforms.
Most importantly, stay informed about cyber security and continue to discuss internet safety with employees.
Don’t Let it Happen to You
According to the DHS, 96 percent of cyber security breaches could have been avoided with simple or intermediate controls. Strengthening passwords, installing anti-virus software, and not opening suspicious emails and links are the first steps toward cybersecurity.
A data breach could cripple your organization, costing you thousands or millions of dollars in lost revenue, sales, damages and reputation. Contact Anchor Insurance Agencies today. We have the tools necessary to ensure you have the proper coverage to protect your company against losses from cyberattacks.
Brought to you by the insurance professionals at Anchor Insurance Agencies.
This article is not intended to be exhaustive nor should any discussion or opinions be construed as professional advice. © 2016, 2018-2019 Zywave, Inc. All rights reserved.
-
January 2021
- Jan 4, 2021 Insuring Torahs – Why your Inland Marine coverage may not be enough
- Jan 4, 2021 COVID-19 Reopening Considerations for Synagogues and Chabad Houses
- Jan 4, 2021 Avoiding Sexual Abuse Liability
- Jan 4, 2021 Addressing Abuse and Molestation Liability for Synagogues and Chabad Houses through Insurance
- Jan 4, 2021 Screening Applicants Using Background Checks
- Jan 4, 2021 Cybersecurity for Synagogues and Chabads
- Jan 4, 2021 Cybersecurity Glossary
- Jan 4, 2021 Religious Expression Insurance Coverage for Synagogues and Chabads
- Jan 4, 2021 How to Prepare Your Synagogue or Chabad for an Active Shooter
- Jan 4, 2021 Improving Security and Disaster Response at your Synagogue and Chabad
- Jan 4, 2021 Managing Volunteers
- Jan 4, 2021 Premises Liability Risks for Faith-based Organizations
- Jan 4, 2021 Safe Steps for Accident Prevention
- Jan 4, 2021 Techniques to Ensure Safe Lifting
- Jan 4, 2021 Rise Above Ladder Injuries