Minimizing the Risk of Cybercrime

If it looks suspicious, pause and take these steps.

Nick B. Nicholaou, author of Church IT: Using Information Technology for the Mission of the Church, consults with churches about their IT needs and issues. Here, Nicholaou shares advice on how churches can avoid becoming victims of cybercrime.

What is a typical example of email fraud targeting a church?

We see churches targeted specifically with emails that look as if they’re legitimate, like, “Hey, the senior pastor told me to contact you and get a check for X amount of money.” Those kinds of things.

We also see a lot of fraudulent emails appearing to be from general vendors, like Microsoft and Apple. They look legit, asking you to update or confirm your profile information at places like LinkedIn or Facebook. And, of course, if you click the link, you’re taken to a site where your data can be collected or your identity stolen.

Is this a problem specific to churches or are churches getting caught up in something that happens to all businesses?

Everybody is being targeted, and many do not have appropriate spam filters that minimize exposure.

So spam filters will help prevent email scams?

A spam filter will prevent many of the emails that appear as if they’re from general vendors like Microsoft and Apple. A spam filter probably won’t block emails that appear to come from someone on staff. When this happens, the best approach would probably be to forward the email to the person that is referenced in it. They can then verify whether or not the request is legitimate.

What about verifying by making a phone call?

That would be wise. Sometimes you can reach them by phone; sometimes you can’t. But I would say to at least try calling them. Texting them on their smartphone is not as reliable since their phone may have fallen into someone else’s hands or been compromised. Public Wi-Fi is not always secure, and if they get the text via public Wi-Fi the verification is not solid. Someone could be “sniffing” the public Wi-Fi airwaves and reading the text and other data that people are transferring via that public Wi-Fi. In that case, it’s possible that someone could be picking up information that could compromise a system.

For a lot of pastors, coffee shops become a second office. So, it would seem that hackers would be more likely to be in those public settings.

Your observation is accurate. My recommendation is to not trust public Wi-Fi. Instead, turn on the Wi-Fi hotspot on your smartphone that turns it into a “MiFi.” Your connection will then go over your cellular data stream rather than over the public Wi-Fi. When using your notebook computer at Starbucks, for instance, connect via the hotspot (or MiFi) feature of your smartphone, even though MiFi is a little bit slower and it means you may be paying for data. But you’ll know that by doing it that way your data transfers—like text and email—are more secure.

One final piece of advice: never click links in emails asking you to verify your data.

This content is designed to provide accurate and authoritative information in regard to the subject matter covered. It is sold with the understanding that the publisher is not engaged in rendering legal, accounting, or other professional service. If legal advice or other expert assistance is required, the services of a competent professional person should be sought. "From a Declaration of Principles jointly adopted by a Committee of the American Bar Association and a Committee of Publishers and Associations." Due to the nature of the U.S. legal system, laws and regulations constantly change. The editors encourage readers to carefully search the site for all content related to the topic of interest and consult qualified local counsel to verify the status of specific statutes, laws, regulations, and precedential court holdings.

ajax-loader-largecaret-downcloseHamburger Menuicon_amazonApple PodcastsBio Iconicon_cards_grid_caretChild Abuse Reporting Laws by State IconChurchSalary Iconicon_facebookGoogle Podcastsicon_instagramLegal Library IconLegal Library Iconicon_linkedinLock IconMegaphone IconOnline Learning IconPodcast IconRecent Legal Developments IconRecommended Reading IconRSS IconSubmiticon_select-arrowSpotify IconAlaska State MapAlabama State MapArkansas State MapArizona State MapCalifornia State MapColorado State MapConnecticut State MapWashington DC State MapDelaware State MapFederal MapFlorida State MapGeorgia State MapHawaii State MapIowa State MapIdaho State MapIllinois State MapIndiana State MapKansas State MapKentucky State MapLouisiana State MapMassachusetts State MapMaryland State MapMaine State MapMichigan State MapMinnesota State MapMissouri State MapMississippi State MapMontana State MapMulti State MapNorth Carolina State MapNorth Dakota State MapNebraska State MapNew Hampshire State MapNew Jersey State MapNew Mexico IconNevada State MapNew York State MapOhio State MapOklahoma State MapOregon State MapPennsylvania State MapRhode Island State MapSouth Carolina State MapSouth Dakota State MapTennessee State MapTexas State MapUtah State MapVirginia State MapVermont State MapWashington State MapWisconsin State MapWest Virginia State MapWyoming State IconShopping Cart IconTax Calendar Iconicon_twitteryoutubepauseplay