Signature March/April 2015 - 19


I
Girl turns out to be a hacker and steals
boy's association membership password,
gains access to the organization's database, and makes off with a plethora of
personal and financial information.
OK - so perhaps it's the modern-day
version of an age-old story. It wasn't that
long ago when terms like cyberattack
and cybersecurity existed only in science
fiction. The term "cyber" as we think of
it today only showed up in English vernacular in the 1980s.
And now, we see the word
everywhere, especially in
the headlines. Recent data
breaches at corporations such
as Target and Home Depot
and nonfinancially motivated
hacks of groups like Sony are
popping up all over the news
- and it's not just the media
being overly dramatic.
A Washington think tank
- the Center for Strategic
and International Studies -
has estimated the annual cost
of cybercrime to the world
economy at more than $445
billion, or almost 1 percent
of global income. But it's not just corporate giants or businesses with giant bank
accounts that are at risk. On February 4,
for example, the University of Central
Florida announced that a January data
breach compromised the social security
numbers and names of about 63,000 students and employees. The university said

t 's an ag e -old s tory.
Boy me e ts g irl.
B oy fal ls for g irl.

the bulk of the data was on employees,
including former employees as far back
as the 1980s.
Cyberattacks like this raise the question
of what associations are doing to protect
themselves and their memberships.
Associations are creating and maintaining databases with a myriad array
of identification and financial information such as date of birth, marital status,
social security numbers, performance

Wes Trochlil, president of Effective
Database Management, says many associations' cyber preparedness is woefully
lacking. He points to a recent survey of
association leaders by the Washington,
DC-based SCIPP International, a nonprofit organization dedicated to information
security. While 85 percent of participants
said a data breach response plan was very
important or somewhat important, only
33 percent of the associations have one. In
addition, fewer than half of the
associations, 44 percent, had a
specific data security function
in their organizations.
"There is definitely a fear
of waking up one morning to
read a headline about yourself," Trochlil says. "But there
is a form of denial among
associations. 'We're just a
small organization. No one
is looking for our data.' We've
all heard about big breaches
like Target, Sony, but those are
easy to dismiss as big organizations with millions of records.
In truth, it doesn't matter who
you are. The people who are
hunting for data are just looking for weaknesses. It's a shotgun approach. By the law
of averages, they are going to find associations with weaknesses."
Sometimes, the association itself may
not be the target - it could be a particular member. For example, if a hacker is
trying to gather information on a specific

More and more Baby Boomers are
leaving, and more and more Millennial
leaders are coming in. Associations
have to transition to more sophisticated
web integration and that means more
sophisticated cybersecurity.
- Wendy Mann, NAIOP

evaluations, payroll, bank account
numbers, credit ratings, credentials,
donor information, and more. Is all this
information safe? Is any information
safe in this age of cyberattacks?
What are your members' security
expectations, and how would they react
to your organization if a breach occurred?

MARCH/APRIL 16

signature

19



Table of Contents for the Digital Edition of Signature March/April 2015

No label
Signature March/April 2015 - No label
Signature March/April 2015 - Cover2
Signature March/April 2015 - 1
Signature March/April 2015 - 2
Signature March/April 2015 - 3
Signature March/April 2015 - 4
Signature March/April 2015 - 5
Signature March/April 2015 - 6
Signature March/April 2015 - 7
Signature March/April 2015 - 8
Signature March/April 2015 - 9
Signature March/April 2015 - 10
Signature March/April 2015 - 11
Signature March/April 2015 - 12
Signature March/April 2015 - 13
Signature March/April 2015 - 14
Signature March/April 2015 - 15
Signature March/April 2015 - 16
Signature March/April 2015 - 17
Signature March/April 2015 - 18
Signature March/April 2015 - 19
Signature March/April 2015 - 20
Signature March/April 2015 - 21
Signature March/April 2015 - 22
Signature March/April 2015 - 23
Signature March/April 2015 - 24
Signature March/April 2015 - 25
Signature March/April 2015 - 26
Signature March/April 2015 - 27
Signature March/April 2015 - 28
Signature March/April 2015 - 29
Signature March/April 2015 - 30
Signature March/April 2015 - 31
Signature March/April 2015 - 32
Signature March/April 2015 - 33
Signature March/April 2015 - 34
Signature March/April 2015 - 35
Signature March/April 2015 - 36
Signature March/April 2015 - 37
Signature March/April 2015 - 38
Signature March/April 2015 - 39
Signature March/April 2015 - 40
Signature March/April 2015 - 41
Signature March/April 2015 - 42
Signature March/April 2015 - 43
Signature March/April 2015 - 44
Signature March/April 2015 - 45
Signature March/April 2015 - 46
Signature March/April 2015 - 47
Signature March/April 2015 - 48
Signature March/April 2015 - Cover3
Signature March/April 2015 - Cover4
http://www.brightcopy.net/allen/sign/2015-MayJune
http://www.brightcopy.net/allen/sign/2015-MarApr
http://www.brightcopy.net/allen/sign/2015-JanFeb
http://www.brightcopy.net/allen/sign/22-7
http://www.brightcopy.net/allen/sign/22-6
http://www.brightcopy.net/allen/sign/22-5
http://www.brightcopy.net/allen/sign/22-4
https://www.nxtbook.com/allen/sign/22-3
https://www.nxtbook.com/allen/sign/22-2
https://www.nxtbook.com/allen/sign/20-2
https://www.nxtbook.com/allen/sign/22-1
https://www.nxtbook.com/allen/sign/21-6
https://www.nxtbook.com/allen/sign/21-5
https://www.nxtbook.com/allen/sign/21-4
https://www.nxtbook.com/allen/sign/21-3
https://www.nxtbook.com/allen/sign/21-2
https://www.nxtbook.com/allen/sign/21-1
https://www.nxtbook.com/allen/sign/20-6
https://www.nxtbook.com/allen/sign/20-5
https://www.nxtbook.com/allen/sign/20-4
https://www.nxtbook.com/allen/sign/20-3
https://www.nxtbookmedia.com