Share cybersecurity resources with non-profits in your community

Share This Page

Do you work for a non-profit? Or maybe you’re on the board of a charity or active in a professional or service organization in your community. If so, you know the group collects all sorts of private information, including details about members or people you serve and financial information related to donors. Your own personal information, too, is probably in the group’s records of employees and volunteers. Cyber criminals would love to get their hands on that data. You can help protect the organization by implementing the same common-sense principles that security-centric executives are using at businesses across the country. And a good source for to-the-point advice is at

At you’ll find resources on 12 different topics, including cyber scams like ransomware and phishing, key considerations like physical security and vendor security, and technical guidance on things like email authentication. The new materials reflect the FTC’s experience in the area of data security, privacy protection, and scam prevention, and also reflect the know-how of the SBA, NIST, and Department of Homeland Security. The resources are designed for small businesses, but the same tips and information apply to charities and other non-profits.

The bedrock principle is that if any group – including non-profits – collects information about people, they should protect it. Imagine if donors’ credit cards are exposed because of a phishing scheme, or if the network gets blocked by a ransomware attack. That can be devastating not just for the organization and leaders like you, but also for the communities that rely on the group’s services. To help protect the organization’s network and data, make cybersecurity part of the everyday routine.

You can start with these basic cybersecurity tips:

  • Use security software and set it to update automatically.
  • Back up important files offline, on an external drive or in the cloud.
  • Encourage the organization to have policies covering basic cybersecurity and to train employees and volunteers on those policies.
  • Visit and share the fact sheet, quizzes and videos with your colleagues.


My phone was monitored, listened to, recorded, and even opened corporate accounts with my identity and w-fi! I don't know how to fix it

You can report identity theft at You can describe what happened, create a report to law enforcement, and get letters and forms to send to businesses where your identity was mis-used.

My non-profit that I established just last year, was breached and it's using ATT accounts to monitored my contacts and voicemail, which I have no access.

The FTC has cybersecurity help for small businesses and non-profits. Read more about hiring a web host

that offers services to help you protect information on your website. Look at how people connect to your network. Do you have secure remote access? Know that if you use public wi-fi, you do not have a secure internet connection.

Add new comment

Comment Policy

Privacy Act Statement

It is your choice whether to submit a comment. If you do, you must create a user name, or we will not post your comment. The Federal Trade Commission Act authorizes this information collection for purposes of managing online comments. Comments and user names are part of the Federal Trade Commission’s (FTC) public records system (PDF), and user names also are part of the FTC’s computer user records system (PDF). We may routinely use these records as described in the FTC’s Privacy Act system notices. For more information on how the FTC handles information that we collect, please read our privacy policy.