Is Your Nonprofit Already Hacked? The Truth About Pen Testing Podcast Por  arte de portada

Is Your Nonprofit Already Hacked? The Truth About Pen Testing

Is Your Nonprofit Already Hacked? The Truth About Pen Testing

Escúchala gratis

Ver detalles del espectáculo

Has your nonprofit ever had a simulated break-in to test your digital defenses? If not, you may already have an intruder inside!

Cyberattacks aren’t just happening to big corporations—they’re happening to nonprofits every day. And far too many organizations have no idea they’ve been breached until months later. Cybersecurity expert Michael Nouguier, Partner of Cybersecurity Services at Richey May, pulls back the curtain on the urgent, often-overlooked practice of penetration testing—known as “pen testing.” His message is blunt: if your nonprofit hasn’t done one, you may already be compromised.

Michael explains that a pen test is essentially a real-world simulation of a cyberattack, conducted by ethical hackers to expose weaknesses before malicious actors exploit them. “It’s like hiring a home inspector before you buy a house,” he says, “but instead of finding leaky pipes, we’re finding the digital doors and windows you’ve accidentally left wide open.” These gaps can exist in email, donor databases, websites, payment systems—anywhere sensitive information lives.

The process starts with scoping—identifying your organization’s tech environment, third-party tools, and data flows. From there, ethical hackers gather open-source intelligence (OSINT) to see what information about your nonprofit is publicly available, then attempt to exploit any vulnerabilities found. This may involve phishing attempts, network access attempts, or probing for weaknesses in online applications. Post-exploitation, the team determines how far they can move within your systems—accessing donor records, financial data, or confidential client files.

The findings are compiled into a detailed report, along with a letter of assessment that can be shared with insurers or contractual partners. In many industries, including healthcare, justice, and education, annual pen testing isn’t optional—it’s required by regulation or by contract. Yet, as Michael warns in this episode, many nonprofits sign agreements without realizing they’re agreeing to perform such tests.

Waiting too long is costly. IBM research shows that proactive security measures can save organizations over $200,000 per breach. On the flip side, skipping pen testing can raise your cyber insurance premiums—or get your coverage denied entirely. And because updates, new software, and staffing changes continually introduce new risks, pen testing isn’t a one-and-done task—it’s an annual checkup for your organization’s digital health.

Michael also touches on the human factor. When testing social engineering risks, you often don’t alert staff in advance—because real attackers certainly won’t. The goal is to create realistic conditions, not staged ones.

This conversation should serve as a wake-up call: penetration testing is not an optional luxury—it’s a frontline defense. Whether you hold donor payment information, confidential case files, or sensitive program data, you can’t afford to leave your cybersecurity to chance.


Find us Live daily on YouTube!

Find us Live daily on LinkedIn!

Find us Live daily on X: @Nonprofit_Show

Our national co-hosts and amazing guests discuss management, money and missions of nonprofits!
12:30pm ET 11:30am CT 10:30am MT 9:30am PT

Send us your ideas for Show Guests or Topics: HelpDesk@AmericanNonprofitAcademy.com
Visit us on the web:The Nonprofit Show

Todavía no hay opiniones