Got cybersecurity questions? 30-minute consults are always free. Schedule anytime.
We're a nonprofit program helping nonprofits secure their data
and online work environments.
Nonprofit Cyber News
Call 509-903-6253
help@501secure.org
Office Hours
Mon - Fri
9AM to 4PM
Cybersecurity Basics Toolkit
If you work at a nonprofit with a remote team, you may be asking, "Do we really need complex online security?"
You probably don't run servers or store millions of client or donor records. Instead, your team probably uses a small fleet of organization-owned laptops and personal devices to access MS365 or Google Workspace. Maybe your team also subscribes to a handful of cloud apps and maintains a couple social media accounts and a website.
Fifteen years ago, based on this online footprint, it was reasonable to assume your nonprofit was "under the radar." Back then, hackers were digital burglars who picked specific locks. They targeted companies with lots of loot like a massive vault of credit cards or a trove of trade secrets.
But criminal tactics have radically changed. The cybercrime landscape has become complex with large international criminal syndicates incentivizing small armies of independent "criminal entrepreneurs" or exploiting victims of human trafficking in large call centers to run internet scams. Criminals do prey on specific vulnerable individuals and organizations with millions of victims worldwide each year.
However, the majority of cyber attacks are now automated and indiscriminate. Instead of targeted cyber heists, which require higher risk and greater investment, criminals automate their work to accomplish the digital equivalent of trying every door. Bots scan the entire internet simultaneously, looking for any open door, regardless of the organization's size or mission. They don't care who you are; they only care if your door is unlocked. Once a bot finds an open door (like your website or a remote login page), it's added to a success list. Then it's "fingerprinted" to figure out exactly what it is. For example, are you running an old version of WordPress (e.g., v5.2)? Or does your website use a specific contact form plugin it can exploit?
Based on mass scan results, ransomware syndicates then target the most attractive organizations and individuals across all sectors, heavily focusing on healthcare, manufacturing, finance, government, and education, often using double extortion (encrypting and threatening to leak data). Their industry focus and what constitutes attractive targets for these syndicates changes year to year.
For a small remote team without adequate digital and human security controls, one compromised email account can lead to a fraudulent wire transfer or a total data wipe that could end an organization.
We've assembled this list of resources to help you imagine about what cybersecurity and data security could look like for your organization. Each nonprofit and its security needs are different. Every nonprofit must self-manage its cyber risk. While you can outsource services and planning to vendors and consultants, you cannot outsource the responsibility to identify, understand, and manage risk. There are minimum security actions that anyone who connects to the internet must take to ensure data, financial, and reputational safety.
Our nonprofit team specializes in helping organizations build and manage integrated cybersecurity, awareness, and compliance programs. We're here to answer questions or connect you with an experienced cybersecurity volunteer if you need it. Email us at help@501Secure.org.
Basic Cyber Safety Gear for Remote Teams
You wouldn't drive a car without a seatbelt or leave it parked with the keys in the ignition, your computers and personal devices shouldn't connect to the internet without the appropriate protective measures enabled to secure accounts, browsers, and data. Here is a list of bare minimum safety gear all remote teams should have in place in order of priority:
#1
MFA (The Second Lock)
Multi-factor Authentication (MFA) is second form of identity verification that ensures that it’s really you logging in. It could be a security code sent to your phone via text or email or an approval tap or rolling code from an app like Microsoft or Google Authenticator. Think of your password as the first lock and MFA as a second lock that requires a separate "key" to open. Even if someone steals your password, they still can’t access your account without this second step.
#2
Long, One of a Kind Passphrases for Every Account (The First Lock)
Think of these as super-strength deadbolts. Instead of short, hard-to-remember passwords like P@ssw0rd!, use a long string of random words (e.g., Correct-Horse-Battery-Staple). A 16-character minimum makes it nearly impossible for a computer to "guess" your key. Never reuse a password for multiple accounts, especially personal passwords for work accounts. Use the Pwned Passwords site to check if your password is a known vulnerable password (e.g., easy to guess or appeared in known data breaches).
#3
Anti-Malware Protection for Every Device (The "Inspector Inside")
Malware is the modern catch-all word for dangerous software—including ransomware, spyware, and traditional viruses. Anti-malware doesn't just watch the door; it watches everything already inside the building. It inspects the files you download, the apps you run, and the "behavior" of the computer. If you accidentally invite a "bad actor" in (like clicking a link in a fake email), a firewall might let it through because you asked for it. But anti-malware steps in to stop block the download or isolate malicious software once it’s on your system.
High-quality anti-malware suites offer all-in-one tools that act as a 24/7 security guard for Android devices, Windows PCs, and Mac computers, blocking suspicious behavior and "scam" links in real-time. (Note: Because of their design, iPhones and iPads are the only devices that do not require this additional software.) Bitdefender and Norton are examples of reputable brands that provide comprehensive safety kits that handle most malware threats in a single, easy-to-use package.
#4
3-2-1 Backups (The Safety Net)
This is your "undo" button if things go wrong. Keep 3 copies of your data, on 2 different types of media (like a hard drive and the cloud), with 1 copy kept in a completely different physical location. If a fire or a virus hits one, you have a spare.
#5
Enable Built-in Firewalls (Windows and Mac) (The "Security Guard at the Door")
A firewall sits at the entrance (your internet connection/router) and looks at traffic. It doesn't really care what is inside a package; it just looks at the "shipping label" to see if it’s coming from a trusted source. If a random computer from halfway across the world tries to connect to your laptop, the firewall sees that it wasn't invited and slams the door. It stops unauthorized access from the outside.
#6
Home Network Safety (The "Front Gate")
Since your home Wi-Fi is now part of your workspace, it’s important to treat your router like a secure front gate. The firewall on your internet router protects your entire home. It stands at the edge of your house and blocks random, uninvited probes from the internet before they can even reach your computer or smart gadgets.
Hackers often scan thousands of home internet connections at once looking for an "open door."
Most routers provided by your internet company allow you to make adjustments. Even if you aren't a tech expert, you can improve your home internet security by doing the following:
-
Change the default Wi-Fi password that came printed on your router to a unique passphrase. This prevents anyone from using "factory settings" to get onto your network.
-
Log in to your router settings and ensure your security type is set to WPA3 or WPA2. This acts like a high-end scrambler, making your internet traffic unreadable to neighbors or hackers.
-
If you rent your equipment from a cable company (like Xfinity, Spectrum, or Cox), a basic firewall is usually enabled by default. However, it’s always a good idea to double-check. You can typically find this by logging into your provider’s app or website and looking under "Security" or "Network Settings."
For most home users, setting the firewall to its "Medium" or "Typical" security level provides strong protection without accidentally blocking your ability to join a Zoom call or stream a movie.
#7
Emergency Team Contacts (The "In Case of Fire" Plan)
This is a communication life-raft. If the organization email become inaccessible, you need a pre-shared list of phone numbers or personal emails so the team can still coordinate and fix the problem.
#8
Emergency Technical Contacts (The "Digital Fire Department")
Think of your technical contacts as the digital fire department. If a "fire" breaks out e.g., your website is hacked, you’re locked out of a critical account, or a laptop is acting strangely, you don't want to be searching for a phone number in the middle of the smoke. It is vital to have a "break-glass-in-case-of-emergency" list that includes support numbers, account IDs, and the security codes needed to prove you’re the owner of your services.
Because digital emergencies can sometimes lock you out of your email or chat, you should print this list out or keep it in a physical safe. Work out your "fire drill" in advance:
-
Who is responsible for holding the master list?
-
How will the team alert them if the internet is down? (e.g., a phone call or a specific group text).
-
Which "firefighter" gets called first for each specific problem?
Having this plan ready means in a crisis you can limit the panick and start recovering.
#9
DNS Filtering (The "Bad Neighborhood" Blocker)
Free services like Quad9 act like a smart GPS for the internet. Before your computer visits a website, this tool checks it against a list of known "scam sites." If the site is dangerous, the tool simply refuses to go there, stopping the threat before it even loads.
#10
Password Manager (The Digital Vault)
Since you should never use the same password twice, a password manager (a secure digital vault) can remember them all for you. You only have to remember one master passphrase or access key. Password manager software easily stores hundreds of complex passphrases and other sensitive information. You can easily access your passwords across devices and browsers. Versions with enterprise-level features such as Single Sign On (SSO) make it easy to share passwords for your organization. You can easily add or remove users as needed.
#11
Device Encryption (The Scrambler)
Encryption turns the data on your laptop into unreadable gibberish unless you are logged in. If a team member leaves their laptop in a coffee shop, whoever finds it can’t see any company files, even if they take the computer apart.
#12
Website Security (The Site Health Routine)
-
Does your organization maintain ownership of your domain registrar and hosting accounts? Are these registered to the organization rather than a volunteer’s or contractor's personal email?
-
Consider installing a Web Application Firewall (WAF) to protect data and web processes.
-
Limit admin user access and delete old user accounts.
-
Keep all plugins and software updated.
-
Do not use your website database to store restricted data.
-
Audit any API connections regularly, like those that send data from a webform to your CRM software.
-
Ensure off-site backups are automated, so you can recover if your site is compromised.
Foundational Policies
The following policies ensure that everyone on your team understands their role in keeping your data and remote work environment safe and your organization's reputation intact. These are the minimum policies you should strive to put in place, if you're at the beginning of building an online safety and awareness program.
Terms of Use
This policy defines the acceptable ways to use the organization's technology. It is essentially a code of conduct that specifies how resources are to be used for work purposes and identifies unacceptable behaviors that could expose a nonprofit organization to legal or security risks.
Cybersecurity and Data Safety Policy (Employee Safety Guide)
While the Terms of Use cover what you can do, this policy outlines how to stay safe while doing it. It clearly defines the daily habits and procedures employees must follow (cyber hygiene), such as how to handle sensitive data, how to verify suspicious requests, and how to report a potential threat. It’s a shared playbook for all team members to keep the organization's information secure.
Bring Your Own Device (BYOD)
In many nonprofits, staff use personal phones or laptops for work. A BYOD policy sets the safety standards for those devices, such as requiring a lock screen, an up-to-date OS, or encryption.
Identity and Access Management
This policy governs who has the keys to your digital "rooms." It ensures that people only have access to the applications and files they actually need to do their jobs and establishes a formal process for handing out and taking back those keys when someone joins or leaves the team.
Cybersecurity Awareness Training
The best security tools in the world can’t stop a person from accidentally clicking a deceptive link. Regular training helps team members spot scams, phishing emails, and "red flags" before they become an incident. A training policy should include basic curriculum for new hires and a calendar of role-based training for specialized teams such as accounting, IT, and leadership. It should incorporate accountability measures as well. For example, repeated failure to complete training in a timely manner may lead to loss of system privileges or access and a negative mention at performance review time.
IT Management & Security
This is the master blueprint for how your technology is handled. It sets standards for routine tasks, such as how often systems are updated, what intervals old hardware should be replaced, and the steps to be taken if a laptop is lost. A big aspect of online safety is completing maintenance tasks consistently as part of your daily operations.
Free & Low-cost Awareness Training Resources
No budget for training? You don’t need to start from scratch. Sharing a simple video, or a blog post, really can be an effective start. You can share via email or MS forms, SharePoint or create a Google Site. Other options include Adobe Express webpage or a simple recorded Powerpoint presentation.
Phishing Training
Try these free resources from the National Cybersecurity Alliance, TechTarget, and The National Cyber Security Centre tutorial, Phishing Attacks: Defending Your Organization.
Or check out this free Email and Phishing video tutorial from SANS.
If your organization has a subscription to Microsoft Defender, there is a library of phishing and security trainings that comes with the license.
Another free and well made option is Google's Phishing Quiz. It's a fun, browser-based interactive learning that lets you hover over suspicious links and explore simulated phishing emails that impersonate Coca-cola and PayPal. The quiz walks you through how to spot the phishing signs for each.
Password Security
Time it takes a hacker to brute force your password in 2025. Each year Hive Systems updates its "brute force" graphic, which illustrates how long it takes cyber criminals to crack passwords based on length and complexity. This is a useful tool to share in awareness trainings and a great way to challenge team members to check their password strength.
Test the Strength of Your Passwords
Experiment with various password lengths and complexities. Created by Cyber.org, a nonprofit dedicated to K-12 cyber education program. The free web tool is open to everyone.
You can use this free, highly-respected website to check if your email address has appeared in recent or past data breaches.
For the non-believers on your team, this website can be an enlightening activity.
Cybersecurity 101 Training
LinkedIn Learning is available for free remote access in many public library systems. In the State of Washington, anyone with a library card can access its full library of courses without charge from home. WA residents can obtain a library card online, if they don't already have one. This can be a good option for basic cybersecurity 101 trainings. Curate a learning path and send your learners the links.
Not in Washington State? Many state library systems offer access to LinkedIn Learning. Check your state for availability.
CISA Secure Our World free training resources created by a federal agency. Also check out the Federal Trade Commission's Cybersecurity Basics, including their Cybersecurity Basics Quiz.
Public domain content from the National Institute for Standards and Technology (NIST)
Free IBM videos on YouTube. These range from advanced technical and to the basics of phishing, social engineering, MFA, and how to secure your home IoT devices like your smart thermostat or refrigerator. It is a treasure trove of high quality videos offering reliable information. Use a video as source information when building awareness materials for your team, or share or embed a specific video as training.
Remote Work and Home Office Security
For free resources that you can use to educate remote team members about work from home safety, download the SANS Security Awareness Work-from-Home Deployment Kit . SANS states that you are free to use these materials in your awareness program.
Here's an example of a video included. Note videos cannot be downloaded or embedded. They must be viewed on the SANS website.
Cyber Threat Information
Websites and newsletters provide current information about new kinds of attacks and ways to protect against them. If a vendor you use provides product notifications or has a security-related blog, subscribe to those to keep up to date on product updates and vulnerabilities.
Published Daily or Weekly
Cybersecurity and Infrastructure Security Agency (CISA) Cyber Threats and Advisories
https://www.cisa.gov/topics/cyber-threats-and-advisories
High Risk Communities
https://www.cisa.gov/audiences/high-risk-communities
Microsoft Threat Intelligence Blog
Published Annually
Big software companies with millions of customers compile insights on trends broken down by sector, region, and type of attack into free annual threat reports that are widely read by cybersecurity professionals.
IBM Cost of a Data Breach Report 2025 (Annual)
Crowdstrike 2025 Global Threat Report (Annual)
Microsoft Digital Defense Report (Annual)
2024 Cisco Cybersecurity Readiness Index (Annual)
Google Cybersecurity Forecast 2024 Report
Additional Annual Insights
Nonprofit Cybersecurity Incident Report by Community IT
Regularly Updated Threat Lists
Becoming familiar with common internet threats reduces the mystery around cybersecurity. Fortunately there are several international lists that experts regularly use to track threats. Here are a few to explore.
CVE (Common Vulnerabilities and Exposures)
The CVE is the industry-standard list of publicly disclosed security flaws found in software and hardware. When a researcher discovers a "hole" in a web browser or an operating system, it is assigned a unique CVE identification number. This system provides a universal language for technology providers and users to track, discuss, and fix specific technical weaknesses before they can be exploited.
KEV (Known Exploited Vulnerabilities)
While the CVE list includes thousands of potential flaws, the KEV Catalog (managed by CISA) identifies the "highest priority" threats. This database specifically tracks vulnerabilities that are currently being used by attackers in the real world. By monitoring the KEV list, organizations can prioritize their security updates, focusing first on the "broken windows" that digital burglars are actively using to enter systems today.
National Vulnerability Database (NVD)
The NVD is the U.S. government repository of standards based vulnerability data and includes databases of security checklist references, security-related software flaws, product names, and impact metrics.
MITRE ATT&CK®
MITRE is a comprehensive, globally accessible knowledge base of cyber criminal tactics based on real-world observations. Unlike a simple list of software flaws, MITRE focuses on cyber attacker behavior and tracking the specific methods hackers use to achieve their goals.
Importantly, MITRE is an invaluable educational tool for learning the basics of different attack types and, more importantly, the specific ways to prevent them. For example, the entry for Phishing (Technique T1566) explains the various ways attackers send malicious links or attachments and provides a detailed list of mitigations to stop the attack, such as software filtering and user training.







