Risk Management

Business Continuity: Creating a Plan of Action During a Crisis

Reprinted with permission from Medicus IT (formerly MDcentric Technologies)

Life is full of ups and downs and twists and turns. And, when it comes to operating a nonprofit, expecting the unexpected is the best way to secure your organization for success down the line.

That's why it is paramount that every organization has a business continuity plan. These plans are designed to help an organization thrive even during an unpredictable event.

Data Protection: 7 Proactive Ways to Protect Your Organization

Guest article by MDcentric Technologies

It’s hard to imagine the worst-case scenario happening to you. But that doesn’t stop residents and millions of other people from purchasing homeowner’s, renters, or auto insurance, does it? Just like any other type of insurance you invest in for a rainy day, your organization's data protection and cybersecurity should be no different. By staying proactive with data security, you can prevent a business-ending disaster from happening to you.

Here are seven strategies to prevent a security breach in your organization.

Retooling Your Reserves

It's been a decade since the Great Recession gave way to the last wave of "best practice" regarding financial reserves. A lot of organizations had rebuilt their reserves, in many cases with increased sophistication. However, the COVID-19 pandemic has required organizations to lean on reserves in new ways to navigate otherwise impossible choices.

Global Study Finds Fraud Impacts Nonprofits - What Can Your Organization Do?

By Rob Zuengler and Jenny Dominguez, CliftonLarsonAllen
Reprinted with permission from CliftonLarsonAllen

Could your nonprofit afford to lose $639,000? According to a recent study, that amount of loss due to fraud is not out of the question. Occupational fraud is a real threat to nonprofits and it could be committed by anyone from an employee to an executive.

Ransomware Toolkit

"Ransomware" refers to any virus or malware that maliciously encrypts your computer, data, or network to hold it hostage and bring your organization to a standstill until a ransom is paid. During these attacks, your systems display messages prompting users to pay or take other actions that further compromise your organization's security, while promising to allegedly allow you to regain control over your systems or retrieve your data.