> Skip to content
FEATURED:
  • An Update for Readers on Our New Nonprofit Status
Sign In
  • Latest
  • Advice
  • Opinion
  • Webinars
  • Data
  • Grants
  • Magazine
  • Store
    • Featured Products
    • Data
    • Reports
    • Collections
    • Back Issues
    • Webinars
    • Featured Products
    • Data
    • Reports
    • Collections
    • Back Issues
    • Webinars
  • Jobs
    • Find a Job
    • Post a Job
    • Find a Job
    • Post a Job
Sign In
  • Latest
  • Advice
  • Opinion
  • Webinars
  • Data
  • Grants
  • Magazine
  • Store
    • Featured Products
    • Data
    • Reports
    • Collections
    • Back Issues
    • Webinars
    • Featured Products
    • Data
    • Reports
    • Collections
    • Back Issues
    • Webinars
  • Jobs
    • Find a Job
    • Post a Job
    • Find a Job
    • Post a Job
  • Latest
  • Advice
  • Opinion
  • Webinars
  • Data
  • Grants
  • Magazine
  • Store
    • Featured Products
    • Data
    • Reports
    • Collections
    • Back Issues
    • Webinars
    • Featured Products
    • Data
    • Reports
    • Collections
    • Back Issues
    • Webinars
  • Jobs
    • Find a Job
    • Post a Job
    • Find a Job
    • Post a Job
Sign In
ADVERTISEMENT
News
  • Twitter
  • LinkedIn
  • Show more sharing options
Share
  • Twitter
  • LinkedIn
  • Email
  • Facebook
  • Copy Link URLCopied!
  • Print

Simple Steps to Keep Hackers From Stealing Your Data

By  Scott Westcott
March 4, 2012
Keep Hackers Out: Simple Steps to Stay Secure 1

Michael Enos gets his daily reminder of the threat hackers pose to his organization from an unlikely place: his backyard chicken coop.

As chief technology officer at Second Harvest Food Bank of Santa Clara and San Mateo counties, in California, he says he “goes from operating a high-tech perimeter around data at work to overseeing a low-tech perimeter around the chickens at home.”

And one of his most lasting high-tech lessons came from the low-tech henhouse.

“I built what I thought was a very secure coop, but my mistake was assuming the hard ground was a sufficient and secure floor,” Mr. Enos says. “I failed to recognize the possibility of an animal digging underneath, and it cost me several chickens. I am constantly reminded in my professional role that you have to look at all your vulnerabilities and be constantly vigilant of security breaches.”

We’re sorry. Something went wrong.

We are unable to fully display the content of this page.

The most likely cause of this is a content blocker on your computer or network. Please make sure your computer, VPN, or network allows javascript and allows content to be delivered from v144.philanthropy.com and chronicle.blueconic.net.

Once javascript and access to those URLs are allowed, please refresh this page. You may then be asked to log in, create an account if you don't already have one, or subscribe.

If you continue to experience issues, contact us at 202-466-1032 or help@chronicle.com

Michael Enos gets his daily reminder of the threat hackers pose to his organization from an unlikely place: his backyard chicken coop.

As chief technology officer at Second Harvest Food Bank of Santa Clara and San Mateo counties, in California, he says he “goes from operating a high-tech perimeter around data at work to overseeing a low-tech perimeter around the chickens at home.”

And one of his most lasting high-tech lessons came from the low-tech henhouse.

“I built what I thought was a very secure coop, but my mistake was assuming the hard ground was a sufficient and secure floor,” Mr. Enos says. “I failed to recognize the possibility of an animal digging underneath, and it cost me several chickens. I am constantly reminded in my professional role that you have to look at all your vulnerabilities and be constantly vigilant of security breaches.”

Mr. Enos says many nonprofit organizations underestimate the threats to their networks, particularly donor data or client medical or personal information.

ADVERTISEMENT

He offers these tips for protecting your network and data.

Hire a friendly hacker

Nonprofits can hire good-guy hackers, known as “white hats,” to test their cyber security using the latest hacking techniques. White hats should test your internal systems as well as mobile devices and wireless security. “It’s a best practice to have someone do a security-vulnerability review periodically—quarterly, if possible,” Mr. Enos says. “That’s your best way to make sure you’re staying a step ahead of the hackers.”

Limit the risks from within

While the word “hacker” usually evokes an image of a sinister outsider hunched over a computer, organizations often face serious threats from inside the organization through intentional or careless breaches. Senior managers should be frequently briefed on the potential risks, and employees should clearly understand policies governing data security, including how it relates to laptop computers and mobile devices. Mr. Enos recommends frequent training sessions and updates to make sure employees keep information security top of mind, know how to spot suspicious activity, and understand the ever-evolving risks.

ADVERTISEMENT

Plan for a crises

Some recent high-profile data breaches, including an attack last spring that hijacked PBS’s Web site and replaced it with a cartoon image, make it clear that hackers can be one step ahead of the most high-tech and vigilant organizations. To Mr. Enos, that highlights the importance of evaluating potential risks and then determining how your organization would react, including developing a plan for dealing with questions from the media, communicating to those whose information was compromised, and assessing the costs associated with the breach. Mr. Enos recommends the PCI Security Standards Council as a useful resource for guidance in handling a breach.

Keep in mind the complexity of an information system

Mr. Enos advises not to think of security as an egg, which, once cracked, dumps all its contents at once. Rather, view it from the perspective of an artichoke that requires peeling many layers to get to the heart. “Look at your information security as being protected by many different layers so that if one layer is compromised, there is an alert in place to contain the problem,” Mr. Enos says. “If you have several levels of controls, it helps you minimize the risks.”

We welcome your thoughts and questions about this article. Please email the editors or submit a letter for publication.
Technology
ADVERTISEMENT
ADVERTISEMENT
  • Explore
    • Latest Articles
    • Get Newsletters
    • Advice
    • Webinars
    • Data & Research
    • Magazine
    • Chronicle Store
    • Find a Job
    Explore
    • Latest Articles
    • Get Newsletters
    • Advice
    • Webinars
    • Data & Research
    • Magazine
    • Chronicle Store
    • Find a Job
  • The Chronicle
    • About Us
    • Work at the Chronicle
    • User Agreement
    • Privacy Policy
    • California Privacy Policy
    • Gift-Acceptance Policy
    • Site Map
    • DEI Commitment Statement
    The Chronicle
    • About Us
    • Work at the Chronicle
    • User Agreement
    • Privacy Policy
    • California Privacy Policy
    • Gift-Acceptance Policy
    • Site Map
    • DEI Commitment Statement
  • Customer Assistance
    • Contact Us
    • Advertise With Us
    • Post a Job
    • Reprints & Permissions
    • Do Not Sell My Personal Information
    Customer Assistance
    • Contact Us
    • Advertise With Us
    • Post a Job
    • Reprints & Permissions
    • Do Not Sell My Personal Information
  • Subscribe
    • Individual Subscriptions
    • Organizational Subscriptions
    • Subscription & Account FAQ
    • Manage Newsletters
    • Manage Your Account
    Subscribe
    • Individual Subscriptions
    • Organizational Subscriptions
    • Subscription & Account FAQ
    • Manage Newsletters
    • Manage Your Account
1255 23rd Street, N.W. Washington, D.C. 20037
© 2023 The Chronicle of Philanthropy
  • twitter
  • youtube
  • pinterest
  • facebook
  • linkedin