Education and training. Education is the most powerful tool to prevent fraud and cybercrime. Unfortunately, it’s a tool that doesn’t always get adequate attention in the nonprofit world. The Association of Certified Fraud Examiners reports that among all types of organizations, NFPs are the least likely to implement fraud awareness training programs—despite the elevated risks they face.Disclosure 6
Leaders should prioritize ongoing training and awareness programs to educate staff and volunteers on fraud schemes and cybersecurity best practices, including how to recognize and respond to red flags, such as:
- Changes to wire instructions
- Impersonation of parties involved in transactions
- Communications—emails, phone calls, or texts—that exhibit potential risk signs and arouse suspicion, including those that:
- Demand immediate action
- Ask for sensitive information
- Occur outside of regular business hours
- Contain spelling or grammatical errors
Educate your staff about verifying changes to payment instructions before acting on them. Ensure that employees use only authenticated phone numbers and contacts to confirm changes and requests that arrive via email, text, or phone call.
Make fraud awareness and prevention a recurring topic of discussion and foster a culture of vigilance with an emphasis on identifying and reporting suspicious activity.
Strong internal controls. Institute the strongest internal controls possible within your organization’s structure. When feasible, segregate duties for financial transactions so a single individual isn’t responsible for approving, making, and recording payments. Make sure that multiple parties regularly review all financial activities and records.
Replace fraud-prone checks. Choose safer, electronic forms of payment like commercial credit cards, ACH, and Real Time Payments (RTP®) when possible.
Cybersecurity best practices. Many small and mid-sized nonprofits have budget and personnel constraints, but there are several effective risk-reduction strategies you can take—even with limited resources:
- Update technology systems, devices, and software with the most current security protections—apply all patches and updates as soon as they’re available.
- Back up data regularly, and store the backup in a secure, off-site location.
- Allow only authorized individuals to access devices and sensitive data.
- Use single sign-on (SSO) systems.
- Require strong passwords and two-factor authentication.
- Prohibit personal use of the organization’s devices and networks.
- Seek guidance from IT professionals to identify vulnerabilities.
- Establish a cyberattack response plan.
- Invest in cyber insurance.