Keeping Your Association Safe: 5 Critical Steps to Smart Information Management and Data Protection

How to Secure Your Data and Protect Your Members


An ounce of prevention is worth a pound of cure." – Benjamin Franklin
Image Description

Benita Lipps, Executive Director at dvie

Image Description

In the digital age, associations hold sensitive data that must be protected. This article delves into common myths surrounding data security and offers five practical strategies to safeguard your organization. 


Discover the risks of shared passwords, the importance of strong password management, and how to recognize phishing attempts. Learn why digital signatures can pose risks and how to handle sensitive information with care. Equip your team with the tools they need to navigate the complexities of information management and ensure compliance with regulations like GDPR.


Read on to find out how you can create a safer environment for your association.

Image Description

A Cautionary Tale: The Reality of Cyber Threats

Just the other day, I fell for a phishing test at work - I clicked on the line to a seemingly important shared document from a trusted colleague - and it turned out to be a security exercise.


As association professionals, we're all vulnerable to these increasingly sophisticated attacks, and this experience was a powerful reminder that hackers grow smarter every day. With associations handling sensitive member data, payment information, and confidential documents, strong information security isn't just nice to have - it's essential for survival. The cost of a data breach, both reputationally and financially, can be devastating for membership organizations—and unfortunately, these breaches happen more often than we may think.


❓ How do we equip associations to thwart these risks effectively? Here are five common myths about data protection, along with some proven and budget-friendly strategies you can implement today. 

Image Description

Myth 1: Shared Passwords = Simplicity

Many associations share login credentials among their secretariat teams or with multiple volunteers, often to reduce complexity or cut costs. Think of multiple users managing the same 'info@' mailbox or working group members accessing reports via a shared password-protected folder.


While this approach seems convenient, it creates significant vulnerabilities: 

  • How can you ensure requests are handled accurately when everyone uses the same login? 
  • What happens when the person with social media authentication is unreachable? 
  • How do you revoke folder access for selected past members?


I remember vividly talking to an association whose entire website was accidentally made illegible for a week by a well-meaning volunteer who changed the WordPress theme when they only wanted to update a news release. How could that happen? They logged in using a shared admin-level password.


As Clifford Stoll said, "Treat your password like your toothbrush. Don't let anybody else use it, and get a new one every six months."


💡 The Solution: Individual logins across all platforms

The solution lies in personalised logins to all digital services and file-sharing platforms. Implementing this not only enhances security but also accountability. When everyone has their unique logins, it becomes easier to define different access levels or revoke access altogether.


  • Use role-based access control (RBAC) to assign appropriate permission levels
  • Consider single sign-on (SSO) solutions to simplify secure access
  • Document login credentials securely by using a password manager
  • Create an off-boarding checklist to revoke access when team members leave


⏱️ Timeline: 2-4 weeks. 💳 Cost: From less than €5 per user/month if you ensure to take full advantage of the security features of your existing tools.

Image Description

Myth 2: "qwerty1234" Is Good Enough

With the evolution of AI and cyber threats, what once passed as a strong password now seems woefully inadequate. Combining a few letters, numbers, and special characters no longer provides enough protection. Instead, we are asked to create passwords that are long (up to 64 characters), complex, and unique.

Unfortunately, many of us choose passwords that are easy to type and remember. NordPass revealed that '123456' was the most popular password in 2024, with over 3 million users and a hack time of under one second. This was also the case in the infamous 2022 Intercontinental Hotels Group breach, where their booking and checking systems were down for over 24 hours due to the password "qwerty1234."

💡 The Solution: Smart Password management

Take advantage of password managers—digital vaults that create and securely store robust passwords while keeping them updated without needing your team to memorize multiple 64-character key phrases. Couple this with multifactor authentication (MFA) for an added layer of security. MFA requires multiple verification factors, such as a code sent to your phone. Most online services offer MFA—activate it!


  • Deploy an organisation-wide password manager
  • Enable Multi-Factor Authentication (MFA)
  • Establish minimum password requirements and schedule regular updates

⏱️ Timeline: 1-2 weeks; 💳 Cost: from  €2 per user/month for password management tools

Image Description

Myth 3: All Digital Signatures Are Safe

Digital signatures allow us to easily show the validity of a document or decision without needing a physical meeting. This is especially helpful for international associations where presidents and board members may be located in different places. So why not add a scan of your president's signature to your latest newsletter or speaker invitation letter?


It may come as a surprise that using photos of your physical signatures puts you at severe risk of identity theft. Forgers can easily use image-editing software to extract your signature and paste it onto any legal or contractual document they wish, leading to lengthy disputes and legal battles.


Real electronic signatures rely on identity verification and cryptography to ensure the signer is who they say they are while locking the document to prevent changes and ensuring that the signature cannot be reused after signing. They may not look as pretty but are legally valid and will keep you and your board safe.


Remember that your signature is one of the most common representations of your legal identity and needs thorough protection. Avoid using it lightly or publicly; dissuade your president from doing so.


💡 The Solution: Understanding the Power of Signing

  • Create an association-wide policy on the use of physical, scanned, and e-signatures
  • Adopt a compliant e-signature solution with clear signature authorization protocols


⏱️ Timeline: 1-2 weeks. 💳 Cost: €5-25 per month for e-signature platforms

Image Description

Myth 3: Urgent Requests Need Immediate Action

Did you ever receive an urgent email from your cloud storage provider, IT department, or even your boss asking you to confirm your login credentials within 12 hours due to an "urgent security update?" Do not respond. Legitimate organizations will never ask for your password, and any urgency should act as a red flag.


Such requests are typical examples of phishing—targeted hacker attacks that exploit your trust relationships. While most of us have learned to avoid obvious scams like "you've just won the lottery—click here," today's sophisticated spear phishing uses the very information you've shared online to set perfect traps. It relies on psychological manipulation rather than technical errors, making it particularly hard to spot. According to KnowBe4, more than 90% of all data breaches start with a successful phishing attack.


Associations are not excluded from such attacks. In 2022, the American Dental Association was hit by a well-publicized ransomware attack that disclosed 2.8GB of data and disrupted their entire operation. I have spoken with an association that was locked out of their own member management systems for over a week and only regained access after paying a hefty ransom. Unsurprisingly, they preferred not to have their name exposed.


"Trust, but verify," as Ronald Reagan once said.


💡 The solution: Phishing Protection

To protect ourselves from phishing attacks, clear guidelines on handling access requests and periodic reminders are essential. Consider running simulated phishing exercises (like the one I fell for) to empower your team to identify and block phishing attempts effectively.

  • Include security awareness training in your onboarding
  • Install secure email filtering solutions and use email authentication protocols (SPF, DKIM, DMARC)
  • Run simulated phishing exercises quarterly


⏱️ Timeline: 4-6 weeks for setup. 💳 Cost: €10-30 per user/year for security training.

Image Description

Myth 5: Sharing Is Always Caring

As associations, we aim to be inclusive and transparent. While transparency is important, carelessly sharing commercially sensitive information, contact details, and other protected data can have serious consequences, including violations of data privacy laws and antitrust regulations.


Not complying with Europe's General Data Protection Regulation (GDPR) can prove costly for associations: In 2019, the Royal Dutch Tennis Association was fined more than half a million euros for non-compliance with GDPR data processing rules. Last year, an Italian bar association faced a €200,000 fine for similar violations. 


When it comes to ignoring antitrust laws, the stakes are even higher, and violations may affect both associations and their members. According to European law, any collaboration is deemed anti-competitive if it limits or controls production, markets, technical development, or investment. Association initiatives aiming for joint innovation or tackling climate change can easily come under investigation. In sustainability alone, 57% of leaders no longer risk investing in joint projects due to competition lawAt the time of publication, the industrial battery trade association 'Eurobat' and five of its members are involved in a legal case with the European Commission over price fixing. If convicted, fines could reach up to 10% of each company's annual worldwide turnover. Other associations have taken notice: "We have an army of lawyers at every meeting to ensure we do not break any competition regulations." said Fabrice Rivet, Director for Environment, Health and Safety Director at FEVE, the European Container Glass Federation.


These examples show that we cannot promote sharing information at the expense of data protection and antitrust regulations. Associations need clear policies and protocols in place to manage, control, and track data sharing. Implementing GDPR-compliant mailing and file-sharing systems is always a worthwhile investment. Establishing a detailed antitrust policy ensures that every team member is briefed on its purpose and the consequences of infringement.


💡 The Solution: Get Smart on Association Compliance 

  • Implement GDPR-compliant emailing and secure file-sharing platforms
  • Establish and regularly communicate your antitrust policy and compliance protocols
  • Know when to involve legal experts


⏱️ Timeline: 6-8 weeks. 💳 Cost: €5-40 per user/month for compliant mailing, secure sharing platforms and compliance tools

Image Description

Moving Forward: Creating a Security-First Association Culture

Keeping your members' data safe while protecting them from financial and reputational damage through non-compliant practices is a key responsibility for every association. Start by adopting strategies like individualized logins, robust password management, phishing defense training, and strict data regulation compliance to minimize vulnerability.


💡 By empowering your team with the knowledge and tools they need, you can stop worrying about data security. Ultimately, the path to information security is an ongoing journey where protecting data becomes a collective responsibility shared by all team members and volunteers. Encouraging questions, celebrating security victories, and openly discussing setbacks will cultivate an environment of security awareness and resilience.