Paykwik gebze evden eve nakliyat agario real okey okey

Help | Français | Login | Create an Account
seksi kalmak icin cabalar Fakat her ne kadar spor yaparsa http://www.kaderi.info yapsin genc bir erkekle yasadigi seks heyecani kadar hic bir http://www.hazirlan.info seyin kendisini genclestiremeyecegini cok iyi bilir Bunun http://www.cavapsiz.info icin oglunun universiteden genc bir arkadasini kendisine secer http://www.kafadan.info ve ogluna onu eve davet etmesini ister cok fazla ilgilendigi http://www.makatdan.info genc oglani kalici misafir olarak evde kalmasini saglayan milf oglu http://www.gelirsin.info isten evden ayrilip markete kadar gittiginde genc oglanin http://www.incirli.info yanina oturur ve sikini memelerini arasina alip bosaltir ve http://www.uluslararasi.info dusta temizlenmek icin banyoya geldiklerinde banyoda http://www.bendir.info da bir posta kendini siktirip yoga yaparken yanina cagirir
|
menu close

Welcome to the CSAE Blog

Click here to return to the CSAE Blog main feed.

Top Application Security Threats, and the Best Ways to Counter Them

Top Application Security Threats, and the Best Ways to Counter Them

To drive effective outreach and improve donor targets each year, not-for-profits must be willing to live -- and work -- in the 21st century. This means relying on both web- and cloud-based applications to streamline social campaigns, align donor objectives and communicate organizational goals among executives. Also critical is managing the publicity, timing, and scheduling of large-scale events such as conferences, presentations, or Q&A sessions.

Not-for-profits must also recognize the potential risk of these same web and cloud applications -- motivated "hacktivists" and cybercriminals looking to test their latest malware creation often target small businesses or not-for-profits because these organizations typically don't spend as much on robust and reliable digital security. And with so many applications re-using open source code, it's easy for attackers to find and exploit common flaws, then compromise not-for-profits networks.

Here's a look at some of the top risks to not-for-profits, how they impact applications, and what steps your organization can take to improve digital defense.

 

Threat Vectors

It's easy to consider yourself uninteresting to hackers -- what do they want with your marketing materials, fundraising plans, and conference details? But you're sitting on valuable data such as donor information and histories, and often represent a low-risk attack vector for cybercriminals since you're not on the lookout for suspicious activity.

Consider the sheer number of applications used by not-for-profits for day-to-day business, everything from social media tools, such as RiteTag to track the effectiveness of hashtags, to video editing tools such as Replay for marketing campaigns, to Humanity, an HR app designed to help track employee hours and manage scheduling. In addition, not-for-profits may turn to small developers when they need an app to handle conference or event scheduling -- development teams are often willing to provide their services at a reduced rate for the right cause.

The result? While these applications form the foundation of not-for-profit digital efforts, they're also prone to compromise or failure when targeted by malicious actors.

 

Top Tactics

How are hackers gaining access to your applications?

First is user insecurity. Familiar with smartphones and social tools, employees and volunteers may accidentally share confidential information over social sites, or log in to corporate networks while on insecure connections. Application security education is essential to help limit the chance for compromise.

Another potential path to compromise is apps that haven't been properly tested. Consider this: you hire a developer to create a mobile-native conference scheduling app. The developer offers a reduction on its usual rate, and delivers the finished product ahead of schedule -- but how was the app tested? Did developers take the time to break, fix and break the app again? If not, it's worth hiring a third-party testing provider to ensure your application isn't rolling out the red carpet for hackers.

Hackers may also leverage more advanced techniques including:

  • Distributed Denial of Service (DDoS) -- Here, attackers flood your applications with access requests or random traffic, and force them to shut down. While there's not much you can do to prevent these attacks, it's critical to recognize the signs of sudden network traffic spikes, shut down apps immediately and assess the damage.
  • SQL Injection and XSS Attacks -- SQL stands for "structured query language" and is a popular way to retrieve information from databases. If request parameters aren't limited, it's possible for attackers to exploit common weaknesses and compromise your database. XSS, meanwhile, is shorthand for cross-site scripting, which sees hackers trying to "inject" new commands into websites or applications, and take control. Security policies that limit Web script permissions can help mitigate this issue.
  • Stock APIs -- Application programming interfaces (APIs) govern how apps communicate and interact with each other. The problem is 65 percent of companies say they have no process for API control. If your app is built with stock APIs that hackers can exploit, you may be at risk.

Not-for-profits aren't immune to cybersecurity attacks. Every web application and every cloud service represents a potential point of compromise -- limit your risk by learning more about the top application threats and how to counter their impact.

 

Top Application Security Threats created by Column Information Security

 


 

Being prepared to fight off hackers means having appropriate processes and policies in place. In his book, The Complementary Model of Board Governance, Tom Abbott with policy-based management and governance in not-for-profit organizations. The insight provided will help not-for-profits roll-out policies that enable them to work with contracted resources addressing their security threats.

Related

Tags

Apps, Cybersecurity

Categories

Guest Contributor, Web / Technology

Share

Rating

0 ( 0 reviews)

Subscribe to Blog
Name

Subscribe to receive blog notifications and other CSAE communications. Whitelist info@csae.com to ensure subscription notices arrive in your inbox.

Want to Contribute?

CSAE is looking for people from the Association Community who want to share their passion, interest, and advice with their peers via CSAE content channels.

This is an opportunity to help others and increase exposure for yourself and your association.

Categories
  • Uncategorized
  • CSAE Speaks
  • Education
  • Events
  • Membership
  • Op-Ed
  • Marketing
  • Publications
  • Guest Contributor
  • Web / Technology
Tags