Essential Security Resources for Nonprofits

A cyberattack can destroy, ransom, or leak an organization’s sensitive donor, program, and employee data. Protect your organization’s operations, constituents, donors, and employees with the following resources. 
Assess

Assessment Tools

Understand your security vulnerabilities so you can address them.

digital assesment

Digital Assessment Tool

Assess your organization’s general digital capability as well as the state of your digital security.

Assess here
cybersecurity

Cybersecurity Assessment Tool

Dive deeper into your cybersecurity strength and resilience with this assessment from the Ford Foundation.

Assess here
Global Cyber Alliance Logo 600x600

The GCA Cybersecurity Toolkit for Mission-Based Organizations

The GCA Cybersecurity Toolkit for Mission-Based Organizations is a collection of free tools, guidance, resources, and training designed to help organizations protect their online activities. Configure, strengthen, protect, and backup your devices and accounts.

Learn more
Detect

Create a Culture of Security

Ensure that your staff and systems are able to identify threats when they come knocking.

Cybersecurity Basics

Cybersecurity Basics You Need to Know

Kick-start your cybersecurity knowledge with these tips.

Read here
knowbe4-logo

KnowBe4 Cyber Security Training

Train your staff and volunteers to better spot phishing and ransomware attacks.

See offer
Data Security

Cybersecurity Training Bundle

Learn practical steps you can take to protect your organization from digital security threats — and protect its ability to make an impact.

See course
Keep Informed of Cybersecurity Threats

Keep Informed of Cybersecurity Threats

Read about the Common Vulnerabilities and Exposures (CVE) system and how to keep up to date with cybersecurity trends.

Learn how
Defending from Cybercrime

Defending from Cybercrime

Learn about the latest forms of cybercrime and ways to prevent your nonprofit from falling victim.

Defend yourself
Defend and Protect

Protect Your Data and Devices

Add an extra layer of protection to your data and devices to mitigate potential risks.

Avast CloudCare

Avast CloudCare

Avast CloudCare products protect against all forms of malware and other cyberthreats. Find solutions for nonprofits of all sizes.

See offers
Norton Security

Norton Security

Get trusted security for smaller nonprofits. Enhance the security of your devices with antivirus and security software.

See offers
Norton Secure VPN

Norton Secure VPN

Protect your data when using public, shared, or unsecured Wi-Fi networks. Protect up to 5 devices for a $10 admin fee.

See offers
bitdefender

Bitdefender

Antivirus and security for a wide range of devices, including Macs, Windows PCs, and Android phones.

See offers
3 Tips for Protecting Donor Data

3 Tips for Protecting Donor Data

Strong data security helps build trust with donors. Here are 3 things you can do to improve your data handling practices.

Read on
Prepared for Cyberattacks

Prepared for Cyberattacks? 

Learn how to protect your organization from common malware attacks, set up an effective cybersecurity strategy, and identify solutions to minimize cyberattack risks.

Watch here
Spotting Spam

How to Spot Spam

Learn email safety techniques to protect your organization from spam and phishing emails that could go under the radar.

Read here

Identity and Access Management (IAM)

Implement strong technology defenses and practices

Auth0

Auth0

Apply features like single sign-on (SSO), social sign-on, and multi-factor authentication (MFA) to your organization's websites and applications to streamline access for users internally and externally.

See offer
dashlane

Dashlane

Securely stores passwords, payment methods, and other private information.

See offer
Okta

Okta

Keep the right people in and the wrong people out. Manage access to your internal systems with features like single sign-on (SSO) and multi-factor authentication (MFA).

See offer
What is zero-trust security?

What Is Zero-Trust Security?

A "zero-trust" approach is the modern way to manage user identity. Learn what it is and how you and employ it at your organization.

Learn more
Do You Need an Identity Solution

Do You Need an Identity Solution?

Learn the benefits of identity management and how you can implement it at your organization.

Read here
Protecting Employee Data

5 Tips for Protecting Employee Data

Learn what your organization can do to safeguard your employee data from security breaches.

Read here

Secure Your Networks

Boost your network security with nonprofit trusted brands Cisco and Cisco Meraki.

Cisco

Cisco Security Appliances

Secure your organization with wired and wireless networking hardware to create a functioning network.

See offers
Cisco Meraki

Cisco Meraki

Protect against online threats and securely access your network with wireless security appliances.

See offers
Support Your Wireless Network

Support Your Wireless Network

Learn how you can use Cisco Meraki at your organization to improve your security measures.

Read here
Recover

Backup and Restore

When your defenses fail, make sure you have the ability to bounce back. 

Veritas

Veritas Data Recovery

Back up and restore your data and protect against data-loss disasters.
See offers
Ransomware: What It Is and How to Fight It

How to Fight Ransomware

Learn how to prevent and respond to ransomware attacks at your organization.
Read here
Reboot Restore and RollBack Rx

Reboot Restore and RollBack Rx

Protect your computers by reverting them to a previous state. Especially useful for public-access computers.

See offers

Move to the Cloud

Be flexible and resilient — work securely from anywhere with cloud-hosted systems.

box

Box Content Cloud

Secure cloud storage and digital content management.

 

See offer
Dropbox

Dropbox

Store and share files, collaborate on projects, and create new content in the cloud.

 

See offers
Dropbox Recovery Features

Dropbox Recovery Features

Learn how you can recover previous versions of files or entire files using Dropbox.

Learn more
Microsoft 365 Backup

Microsoft 365 Backup

Back up your email documents and other digital files, even those that are already in the cloud, because sometimes stuff happens. Part of Microsoft 365 offers available through TechSoup.

See options
webinars

Security Features Within Microsoft Cloud

Get the most out of the security features in Microsoft 365.

 

Watch here

Create Your Continuity of Operations Plan (COOP)

Plan ahead and make sure you can continue to serve your community even when disaster strikes.

managed-it-icon

TechSoup Managed IT

This service covers everything from urgent help desk support to complete day-to-day management of your IT systems and strategic technology planning.

Get started
Disaster Planning

Nonprofit Disaster Planning and Recovery

Prepare for the worst and plan ahead with this free holistic guide to IT disaster planning and recovery.

See Resources
IT Contingency Plan

How to Create an IT Contingency Plan

Learn how TechSoup and other organizations use IT contingency plans to support their operations

Read here