Assess your organization’s general digital capability as well as the state of your digital security.
Dive deeper into your cybersecurity strength and resilience with this assessment from the Ford Foundation.
The GCA Cybersecurity Toolkit for Mission-Based Organizations is a collection of free tools, guidance, resources, and training designed to help organizations protect their online activities. Configure, strengthen, protect, and backup your devices and accounts.
Ensure that your staff and systems are able to identify threats when they come knocking.
Kick-start your cybersecurity knowledge with these tips.
Train your staff and volunteers to better spot phishing and ransomware attacks.
Learn practical steps you can take to protect your organization from digital security threats — and protect its ability to make an impact.
Read about the Common Vulnerabilities and Exposures (CVE) system and how to keep up to date with cybersecurity trends.
Learn about the latest forms of cybercrime and ways to prevent your nonprofit from falling victim.
Add an extra layer of protection to your data and devices to mitigate potential risks.
Avast CloudCare products protect against all forms of malware and other cyberthreats. Find solutions for nonprofits of all sizes.
Get trusted security for smaller nonprofits. Enhance the security of your devices with antivirus and security software.
Protect your data when using public, shared, or unsecured Wi-Fi networks. Protect up to 5 devices for a $10 admin fee.
Antivirus and security for a wide range of devices, including Macs, Windows PCs, and Android phones.
Strong data security helps build trust with donors. Here are 3 things you can do to improve your data handling practices.
Learn how to protect your organization from common malware attacks, set up an effective cybersecurity strategy, and identify solutions to minimize cyberattack risks.
Learn email safety techniques to protect your organization from spam and phishing emails that could go under the radar.
Implement strong technology defenses and practices
A "zero-trust" approach is the modern way to manage user identity. Learn what it is and how you and employ it at your organization.
Learn the benefits of identity management and how you can implement it at your organization.
Learn what your organization can do to safeguard your employee data from security breaches.
Boost your network security with nonprofit trusted brands Cisco and Cisco Meraki.
Secure your organization with wired and wireless networking hardware to create a functioning network.
Protect against online threats and securely access your network with wireless security appliances.
Learn how you can use Cisco Meraki at your organization to improve your security measures.
When your defenses fail, make sure you have the ability to bounce back.
Protect your computers by reverting them to a previous state. Especially useful for public-access computers.
Be flexible and resilient — work securely from anywhere with cloud-hosted systems.
Learn how you can recover previous versions of files or entire files using Dropbox.
Back up your email documents and other digital files, even those that are already in the cloud, because sometimes stuff happens. Part of Microsoft 365 offers available through TechSoup.
Get the most out of the security features in Microsoft 365.
Plan ahead and make sure you can continue to serve your community even when disaster strikes.
This service covers everything from urgent help desk support to complete day-to-day management of your IT systems and strategic technology planning.
Prepare for the worst and plan ahead with this free holistic guide to IT disaster planning and recovery.
Learn how TechSoup and other organizations use IT contingency plans to support their operations
Get technology news and updates on exciting new offers from TechSoup.
SubscribeCopyright © 2024, TechSoup Global. All Rights Reserved.