Nonprofit Data Encryption ranks among the most critical data security practices employed by not-for-profit organizations. Serving as stewards for their Stakeholders sensitive data, Nonprofits need to provide safeguards to protect that data. Failure to do this presents serious risks to Stakeholders:
Nonprofit Data Encryption Basics
Encryption translates data into a form that cannot be read. It can only be translated back into readable form if a password or key is provided. This way, if the Nonprofit’s system is breached, the hacker cannot read the stolen data.
There are two types of Nonprofit Data Encryption: at rest and in motion.
Data at rest means stored data is encrypted. A database represents a good example of data at rest.
The second type of Nonprofit Data Encryption is data in motion. This means data moving between resting states is encrypted. An example is data being downloaded from the internet to a computer’s hard drive. “End-to-End” data encryption describes protection of data during all stages of its transmission.
Issues with Nonprofit Data Encryption
There are numerous methods for encrypting data at rest and in motion. Here some issues to consider in sizing up the data encryption task.
Data at Rest
Data in Motion
Making Nonprofit Data Encryption Work
Except for very large organizations, most Nonprofits lack the technical knowledge to implement a coordinated Nonprofit Data Encryption program. Two ways to handle this are:
Nonprofit Data Encryption is just one aspect of a comprehensive technology security program. Nonprofits should become knowledgeable in this important area to the extent that they can competently evaluate vendor products and services.