k

Iranian Internet Attacked Saturday, Knocked Partially Offline





k

Improve Your Fundraising Approach and Skills at NetSquared Meetups

Fall has arrived, and with it comes fundraising season. More than one-third of charitable giving happens in the last three months of the year, and the emergence of Giving Tuesday (on November 28 this year) makes the year's end even more critical for charities.

Feeling overwhelmed? Your local NetSquared group is here to help with free, in-person events being held across the U.S. and the globe.

Naples, Florida, is hosting a meetup on tools for effective email fundraising; Chippewa Falls, Wisconsin, is hosting a series of Giving Tuesday brainstorming sessions; and Chicago, Illinois, will explore how your CRM can save end-of-year fundraising plans.

With more than 75 events scheduled for October, there's probably an event scheduled for your community, so RSVP now for one of our meetups.

Join us!

Upcoming Tech4Good Events

This roundup of face-to-face nonprofit tech events includes meetups from NetSquared, NTEN's Tech Clubs, and other awesome organizations. If you're holding monthly events that gather the #nptech community, let me know, and I'll include you in the next community calendar, or apply today to start your own NetSquared group.

Jump to events in North America or go international with events in

North America

Monday, October 2, 2017

Tuesday, October 3, 2017

Wednesday, October 4, 2017

Thursday, October 5, 2017

Friday, October 6, 2017

Monday, October 9, 2017

Tuesday, October 10, 2017

Wednesday, October 11, 2017

Thursday, October 12, 2017

Saturday, October 14, 2017

Monday, October 16, 2017

Tuesday, October 17, 2017

Wednesday, October 18, 2017

Thursday, October 19, 2017

Friday, October 20, 2017

Monday, October 23, 2017

Tuesday, October 24, 2017

Wednesday, October 25, 2017

Monday, October 30, 2017

Tuesday, October 31, 2017

Central and South America

Wednesday, October 4, 2017

Africa and Middle East

Sunday, October 1, 2017

Monday, October 2, 2017

Saturday, October 7, 2017

Wednesday, October 11, 2017

Friday, October 13, 2017

Saturday, October 14, 2017

Sunday, October 15, 2017

Saturday, October 21, 2017

Saturday, October 28, 2017

Asia and Pacific Rim

Tuesday, October 3, 2017

Wednesday, October 4, 2017

Tuesday, October 10, 2017

Sunday, October 15, 2017

Europe and U.K.

Tuesday, October 3, 2017

Wednesday, October 4, 2017

Friday, October 6, 2017

Saturday, October 7, 2017

Wednesday, October 11, 2017

Thursday, October 12, 2017

Saturday, October 14, 2017

Monday, October 16, 2017

Tuesday, October 17, 2017

Wednesday, October 18, 2017

Thursday, October 19, 2017

Wednesday, October 25, 2017

Thursday, October 26, 2017

Tuesday, October 31, 2017

Left photo: Gregory Munyaneza / NetSquared Rwanda / CC BY

Center photo: Chrispin Okumu / NetSquared Kenya / CC BY

Right photo: Chrispin Okumu / NetSquared Kenya / CC BY




k

5 Data Security Risks for Nonprofits (and How to Fix Them)

 

Many nonprofits handle sensitive personal information belonging to community members — whether it's names or email addresses or payment information. But are you handling this data properly to prevent a data breach?

This post is by no means exhaustive — after all, every nonprofit handles different sorts of data, and each organization has different security needs. That said, these are some practical things to think about when you review your handling of sensitive personal information.

#1 Risk: Malware and Software Vulnerabilities

The Problem

This one may seem obvious, but with so many other security risks out there, it's easy to forget that malware still poses a major threat to your organization's data.

How You Can Mitigate It

To start, make sure you have antivirus software installed, and that it's up to date. In addition, you'll want to make sure your operating system and any software installed are also up to date, with all security patches installed.

Beyond that, be careful what you click on. Don't download and install software from sites you don't trust. Be careful of the email attachments and links you click on — even from people you know. If you aren't expecting a file or link, click with caution.

#2 Risk: Ransomware

The Problem

Ransomware is an especially insidious form of malware that holds your computer or data hostage unless you pay a sum of money to a criminal actor. Oftentimes, ransomware will encrypt your data, preventing you from accessing it. And according to Symantec's Director of Security Response Kevin Haley, some forms of ransomware will threaten to publicly release your data.

How You Can Mitigate It

Aside from up-to-date antivirus software and taking steps to avoid infection in the first place, there isn't a ton you can do to deal with a ransomware attack once your data's been encrypted.

In that case, according to Haley, keeping up-to-date backups of your data is your best bet. That way, you'll be able to get back up and running quickly with minimal data loss. (TechSoup offers backup and recovery solutions from Veritas.)

#3 Risk: Public Wi-Fi

The Problem

Public Wi-Fi is generally fine for some things, such as browsing cat videos on YouTube, or catching up on the headlines. However, for anything involving sensitive personal information, it's a security disaster waiting to happen. Bad actors could potentially eavesdrop on what you're doing while using public Wi-Fi, leaving your data and work open to prying eyes.

How You Can Mitigate It

First off, avoid using public, unsecured Wi-Fi when handling sensitive information — whether it's internal organizational data or your own personal banking information. Using a wireless hotspot, like those from Mobile Beacon (offered through TechSoup), instead of public Wi-Fi is an easy way to keep your data more secure.

If you can't avoid public Wi-Fi, a virtual private network (VPN) is a good option — VPNs secure data between your computer and the website you're visiting. Not all VPNs provide the same level of security, though, and you'll need to make sure your VPN of choice conforms to any data security regulations that your organization may be subject to. See our previous overview of VPNs for more.

#4 Risk: Inappropriate Sharing of Sensitive Information

The Problem

Sharing sensitive information via email, messaging apps, or similar means is a risky proposition.

Email is a notoriously insecure method of communication. Email accounts are often the target of data breaches and phishing attacks. (A phishing attack is where an attacker tries to steal your account information by tricking you to enter your account information on a phony login page.)

And whether it's through email or messaging app, it's all too easy to accidentally leak data by sharing it with the wrong person.

How You Can Mitigate It

Avoid sending sensitive information to colleagues via email. It's easier said than done, we know. Maybe you need to share a list of donor contact information with your marketing department, for example. Consider uploading it to a secure file server on your network that can only be accessed by others in the office.

If your organization uses a cloud storage service like Box, consider using that instead — so long as it meets your organization's security needs. These cloud storage services usually encrypt data you upload to prevent it from getting stolen. You may also want to consider using constituent relationship management (CRM) software, a tool designed specifically to store and manage your organization's contacts.

In addition, pay attention to access permissions. If you can, restrict access to sensitive information to only those who need it. Revisit your permissions settings regularly and update them as needed.

To prevent your user accounts from being compromised in the first place, practice good account security hygiene. Use strong passwords and require your staff to use two-factor authentication.

#5 Risk: Handling Credit Card Data

The Problem

A breach involving credit card data can be embarrassing for your organization, but it could wreak financial havoc on your members and supporters. All it takes is for hackers to grab a few pieces of information to rack up credit card debt in your supporters' names.

How You Can Mitigate It

Securing credit card information is important, but you don't have to make it up as you go. Make sure your organization conforms to payment card security standards. The Payment Card Industry Security Standards Council, as well as banks and credit card issuers, provide guidelines on how to best handle credit card information to prevent breaches.

Has your nonprofit recently encountered any other notable risks? Tell us about it in the comments!




k

TechSoup Member Little Brothers Friends of the Elderly Works to Alleviate Elder Isolation

 

(Please visit the site to view this video)

Older adults are at an increased risk of lacking company and being socially isolated. Recent studies prove that a lack of social relationships is as strong a risk factor for mortality as are smoking, obesity, or a lack of physical activity. Enter Little Brothers.

Little Brothers is an effort dedicated to spreading awareness and relieving isolation and loneliness in elders, a problem that often goes unseen. Little Brothers is in 7 U.S. cities and 10 countries worldwide. Its mission is carried out by more than one nonprofit organization.

Little Brothers Friends of the Elderly San Francisco facilitates more than 4,000 friendly visits a year. Volunteers are matched with elders in San Francisco, and they form and build a relationship through home visits, outings, or common interests.

We recently met with Andrew Butler, the program manager at Little Brothers Friends of the Elderly San Francisco. He explained that many volunteers form a relationship with an elder, and their stereotypes about older people are quickly broken down.

"A lot of what we do is creating awareness. I think a lot of the information that we share through training or events really inspires people," said Butler. He also suggested that we speak with a member of Little Brothers Friends of the Elderly San Francisco, Andy Morgan, to get a proper feel for the organization.

Andy Morgan is a highly spiritual 86-year-old who loves to read. Originally from Transylvania, Andy came to San Francisco in 1962 and has worked a variety of jobs throughout his life.

However, he stresses that he has never defined himself by what he did for a living. Aside from books and his spirituality, Andy values personal relationships and enjoys company.

Our conversation with Andy revealed why Little Brothers' impact matters so much.

I wanted to ask if you have any main visitors.

Andy Morgan: Yeah! I have one main visitor come every week. Rain or shine, he comes and sees me. He brings me food from Trader Joe's, and he does my laundry.

Wow, that's a sweet deal. Would you share a particular visit that has stuck with you over the years?

There's nothing that stands out; every visit is enjoyable. What we usually do is grab a spiritual book, you know, all those books over there are on spirituality, and we read from it and then we discuss it. I've been on the spiritual path since the 1960s, so if he has any questions, I can try and clarify.

I was wondering what makes you happy.

What makes me happy? Knowing that my within-ness, that which makes me breathe and which makes me exist, is pure joy and pure love. When you do a lot of meditation, something opens up within you, and I just feel, practically all the time, this feeling of love and joy and peace.

Of course no one can maintain that 24/7, but I can always come back. If something goes wrong, I can just remind myself of my true nature.

That's beautiful. Thank you so much for opening your home to us.

My pleasure; it's been a joy having you guys. Could I just read you one very short poem? It says …

Be as a Flower

Truth is very simple
A flower does not try to be beautiful.
Its True Nature is Beauty.
Just by its Very Being.

In the same way, when you Awaken
To your true nature,
You will naturally exude Love,
Compassion, Beauty.
It is all you.
For it is your True Self.

(poem by Robert Adams)

TechSoup is proud to support our member, Little Brothers Friends of the Elderly San Francisco, in its mission to spread awareness about and help elders at risk of loneliness and isolation. There are incredible people like Andy all over the world who are at risk of being forgotten. But they should never be. TechSoup provides technology and services to Little Brothers staff members to help run their nonprofit so that they can focus on fighting the effects of elder isolation.




k

The Future of Security Threats: New Risks, and an Old Threat Resurfaces

Computer and network security is an ever-evolving field. As technology advances, cybercriminals find new ways to exploit vulnerabilities in order to get at your personal, financial, or organizational data. We recently spoke with Symantec's Director of Security Response Kevin Haley to get an idea of what threats you'll face in the next year or two.

In short, expect a continuation of common threats like ransomware, as well as the emergence of new threats from connected devices and the so-called Internet of Things. Plus, keep an eye out for the resurgence of an old threat made new.

Ransomware with a Twist

Ransomware — malicious software that locks your data or otherwise compromises your computer in an attempt to extort money — is not a new threat. It's been around for a number of years in various forms. But according to Haley, a new form of ransomware doesn't just lock your files; instead, it threatens to publicly release your data unless you pay up.

For many individuals, this may simply mean an embarrassing leakage of personal data — browser history, emails, photos, and so on. For a nonprofit, especially one that deals with sensitive sociopolitical issues, the possibility of data leakage can have more serious ramifications. It could pose a threat to the community you serve.

Email That Looks Like It Came from a Co-worker

In traditional phishing attempts, scammers create an email that appears to be from a legitimate source — say, Google, Amazon, or Apple. Then they attempt to steal account information, such as usernames and passwords. But in an emerging form of phishing, hackers may use emails purportedly from co-workers or business associates to try to steal information from your organization.

For example, Haley says, you may receive an email from a vendor or a colleague asking for specific pieces of information (such as tax forms) or for money outright. The only problem is that these emails originate from scammers, not your colleagues. And once you email an important piece of information to these impersonators, there's no way to get it back.

With proper data handling, though, you can avoid these sorts of nightmares. See our recent post, 5 Data Security Risks for Nonprofits (and How to Fix Them), to learn more.

The Internet of Things Can Make People Vulnerable

From smart locks to Internet-connected appliances, the Internet of Things promises to change the way we interact with all sorts of items within our homes and offices. But with this comes the potential for security headaches.

According to Haley, these "smart" devices are rarely protected properly, and are easy to infect with malware. And this isn't just an issue that may cause problems some years down the line. Last year, as CNET reported, a network of malware-infected DVRs and webcams overloaded a number of popular websites and online services, temporarily knocking them offline.

Word Macro Viruses Make a Comeback

Perhaps the most surprising threat Haley warned about was the revival of Word macro viruses.

Macro viruses use Microsoft Word's macro programming feature — typically used to automate certain tasks within Word — to infect your computer. Macro viruses have been around for many, many years. And Word disables macros by default: If you open a Word document with a macro, you'll have to click a button to tell Word to turn on any macros within that document.

With this new wave of macro viruses, however, criminals employ social engineering trickery to goad you into turning on macros, allowing the macro virus to do its thing.

Fortunately, you can easily protect yourself from getting infected. First, don't open file attachments from people you don't know. If you receive a Word document with macros from someone you do know, confirm with that person to make sure that they intended to send the macros and that they are safe to run.

As Always, Vigilance Is Key

Although specific threats may evolve over time, good security practices never go out of style. Use a security software package and keep it updated. Enforce good account security practices within your organization.

Don't open file attachments from people you don't know, and don't open unexpected file downloads. Secure all your devices as best you can. And if something seems fishy — perhaps that email from your boss doesn't seem quite right — don't be afraid to question it.

By taking small steps like these, you might save yourself — and your organization — some serious pain.




k

Keep Your Data Safe: The Joy of Locking Your Computer

Here's a simple way to keep your data safe from potential bad actors in one easy step. Are you ready? Here it is: Log out and lock your computer whenever you're not in front of it.

That's right, it's so simple it can almost be seen as an analog approach to cybersecurity. But make no mistake, all those in-depth disk encryption efforts can be rendered pointless. If you step away from your computer while it's on and unlocked, anyone passing by can access it.

Working Remotely Promotes Data Vulnerability

What's perhaps most insidious about someone gaining physical access to your computer is the fact that the attacker doesn't need any advanced technical know-how to steal sensitive information. A momentary lapse in vigilance at work or a coffee shop can result in a data breach of epic proportions.

Let's say you're working remotely at your favorite café down the street from your apartment and you get up to put in an order for a late breakfast, forgetting to lock your laptop. During that brief moment, a low-key cybervillian could easily stick a USB drive into your computer and copy any sensitive files about you — or your organization — and leave undetected.

Furthermore, if you were logged in to Gmail, your medical records, or your bank account, that malefactor could wreak havoc on your personal and professional life in a matter of minutes.

Tips for Protecting Yourself

The good news about all of this is that warding off these types of would-be data plunderers is really, really easy — it's simply a matter of using your operating system's screen locking functionality. If you don't want to do this, then at the very least you should log out of any sensitive online accounts whenever you step away from your machine.

For each of the following options, be sure you are aware of the password connected to your user login before locking yourself (or anyone else) out.

Screen Locking in Microsoft Windows

  • Press Ctrl+Alt+Delete and select Lock this computer
  • Press Windows+L

Either of these will lock your computer and require a password to log back in. You can choose Control Panel > Personalization > Screen Saver Settings and set up a screen saver that provides a login screen to get back in once it's been initiated.

Screen Locking in macOS

  • On an external keyboard or older laptops, press Ctrl+Shift+Eject
  • On a MacBook Air or Pro Retina, press Ctrl+Shift+Power

You can also go to System Preferences > Security & Privacy > General and select Require password immediately after sleep or screen saver begins (provided you have already set up a screen saver by clicking System Preferences > Desktop & Screen Saver).

Additional Cybersecurity Resources

Get more security tips from the National Cyber Security Alliance. National Cyber Security Awareness Month — observed every October — was created as a collaborative effort between government and industry to ensure that all Americans have the resources they need to stay safer and more secure online. Find out how you can get involved.

Image: National Cyber Security Alliance




k

EBRD president looks to African expansion

The EU is considering a broader mandate for the EBRD, and its president, Sir Suma Chakrabarti, believes its model would work in sub-Saharan Africa.




k

Kenya Treasury chief ramps up reforms to grow investment

Kenya’s cabinet secretary for the national treasury and planning, Ukur Yatani, discusses the country’s agenda of fiscal reforms and the importance of constructing an east-west Africa highway.




k

Hackers Are Taking Over Twitter Accounts To Sell Face Masks








k

Low-Orbit Internet Banking Fraud Claim Alleged To Be Space Junk

















k

Bradford ‘most improved UK city for growth’

Bradford has been rated as the most improved city by the Good Growth for Cities 2019 index, while Oxford remained the highest performing UK city.




k

FDI into Togo peaks in 2019

Togo won a record number of greenfield investment projects last year.




k

Emerging markets predicted to spearhead GDP growth over next decade

Lower fertility rates will boost economic growth, according to a demographic model developed by Renaissance Capital. 




k

Kyiv seeks amusement park investors

$73.8m mega-project will be the first of its kind in the city.




k

Verisk Maplecroft report predicts civil unrest to continue in 2020

Escalation in protests across the globe in 2019 are forecast to persist into the new decade, according to Verisk Maplecroft report.




k

Climate concerns top long-term WEF risks for first time

Severe threats to the environment accounted for all of the five most likely long-term risks in the WEF’s Global Risks Report 2020.




k

Tokyo world’s most talked about city online

ING Media names Tokyo, New York, London and Paris as global super brands for digital visibility.




k

US tops global soft power ranking

The US has the world’s strongest soft power, while China and Russia are rising in influence, according to a recent ranking from Brand Finance.




k

fDi Index: investors carried weak sentiment into January as coronavirus threat emerged

Announced greenfield projects into China plummeted in early 2020 with the US and Europe taking the lion's share of global foreign investment. 




k

UK regions fight for a share of inward investment

The UK’s prime minister has pledged to rebalance the UK economy away from a dominant London. However, this might require greater incentives for foreign investment in the regions outside of the capital, which are underperforming. 




k

FDI screening moves to the fore as protectionism takes hold

Authorities in the US, the EU and across the developed world are stepping up efforts to scrutinise foreign investment on the grounds of both national security and tech sovereignty.




k

CEE ‘key for automotive R&D’

Western European carmakers should consider an R&D footprint in CEE, says McKinsey.




k

Finance minister seeks to keep Serbia in FDI spotlight

Serbia’s minister of finance, Siniša Mali, explains why the country is one of Europe's economic stars, and how its FDI levels have risen on the back of this.




k

fDi's European Cities and Regions of the Future 2020/21 - FDI Strategy: London and Glasgow take major prizes

London is crowned best major city in Europe in fDi's FDI Strategy category, with Glasgow, Vilnius, Reykjavik and Galway also winning out.




k

fDi's European Cities and Regions of the Future 2020/21 - FDI Strategy: North Rhine-Westphalia takes regional crown

North Rhine-Westphalia is fDi's top large region for FDI Strategy, with the Basque Country topping the table for mid-sized regions and Ireland South East first among small regions. 




k

fDi’s European Cities and Regions of the Future 2020/21 - London leads LEP ranking while Oxfordshire makes rapid rise

London LEP and Thames Valley Berkshire LEP hold on to their respective first and second places in the Local Enterprise Partnership rankings, while Oxfordshire LEP jumps up eight places to third. 




k

UK strengthens ties to Africa

London event hears how the UK export credit agency is increasing its focus on trade with African countries. Jason Mitchell reports.




k

Safari Webkit Proxy Object Type Confusion

This Metasploit module exploits a type confusion bug in the Javascript Proxy object in WebKit. The DFG JIT does not take into account that, through the use of a Proxy, it is possible to run arbitrary JS code during the execution of a CreateThis operation. This makes it possible to change the structure of e.g. an argument without causing a bailout, leading to a type confusion (CVE-2018-4233). The type confusion leads to the ability to allocate fake Javascript objects, as well as the ability to find the address in memory of a Javascript object. This allows us to construct a fake JSCell object that can be used to read and write arbitrary memory from Javascript. The module then uses a ROP chain to write the first stage shellcode into executable memory within the Safari process and kick off its execution. The first stage maps the second stage macho (containing CVE-2017-13861) into executable memory, and jumps to its entrypoint. The CVE-2017-13861 async_wake exploit leads to a kernel task port (TFP0) that can read and write arbitrary kernel memory. The processes credential and sandbox structure in the kernel is overwritten and the meterpreter payloads code signature hash is added to the kernels trust cache, allowing Safari to load and execute the (self-signed) meterpreter payload.