Laptop, coffee mug, notepad with pen, and smartphone on wooden desk in a cozy workspace near window.

Cybersecurity Best Practices for Nonprofits

Your development coordinator gets an email that looks like it's from your bank asking her to confirm wire transfer instructions for an upcoming grant disbursement. She follows the link, enters her credentials, and approves the transfer. The money goes straight to an account controlled by cybercriminals.

Scenarios like this play out at nonprofits every day. And it's not just large organizations. Attackers specifically target small and mid-sized nonprofits because they hold valuable donor and beneficiary data, process financial transactions, and typically operate without dedicated IT security staff.

The good news is that most attacks succeed because of basic, preventable mistakes. You don't need a corporate IT budget to protect your organization and the people you serve. You just need the right defenses in place.

Why Hackers Target Nonprofits

Think about what moves through your organization every day: donor names, addresses, and credit card information; grant agreements and financial records; beneficiary data that can include Social Security numbers, health information, or immigration status; employee payroll and HR files; and years of donor relationship history stored in your CRM.

Cybercriminals know nonprofits are focused on their mission, not on monitoring network security. Tight budgets, heavy reliance on volunteers, and frequent staff turnover create exactly the kind of gaps attackers exploit. And because many nonprofits process online donations and wire transfers, there's real money to steal alongside the data.

The average cost of a cyberattack is around $200,000. For a nonprofit, that figure doesn't include the loss of donor trust, interrupted programs and services, regulatory penalties, and the long-term reputational damage that makes fundraising harder for years afterward.

What You're Up Against

Phishing Attacks

Phishing emails cause 90% of security breaches. They look legitimate: an urgent message from your bank, a grant portal login request from a foundation, a vendor invoice, or even an email that appears to come from your own executive director. One click from a volunteer or staff member and attackers are inside your system.

Ransomware Attacks

Hackers encrypt all of your files from donor records and grant reports to program data and financial files, then demand $35,000 to $84,000 to unlock them. You lose access to everything right when you need it most, and even if you pay the ransom, there's no guarantee you'll recover your data.

Business Email Compromise and Grant Fraud

Nonprofits regularly send and receive wire transfers for grants, payroll, and vendor payments. Attackers compromise email accounts or spoof executive addresses to redirect payments to accounts they control. By the time anyone notices, the funds are gone and often unrecoverable.

Donor Database and CRM Vulnerabilities

Platforms like Salesforce Nonprofit, Bloomerang, DonorPerfect, and Raiser's Edge store your most valuable relationship data. Outdated software with unpatched vulnerabilities is one of the most common ways attackers gain access. A breach here doesn't just expose data, but can permanently damage the donor relationships you've spent years building.

Weak Passwords and Volunteer Account Management

Volunteers and short-term staff are given system access and then leave without accounts being deactivated. Staff reuse the same password across email, your donor database, and your accounting system. Hackers steal it once and try it everywhere. Suddenly they have access to your entire operation.

Online Donation Processing Risks

If your website or donation platform isn't properly secured, donors' credit card information can be compromised in transit. A payment processing breach doesn't just expose donor data, but can trigger PCI compliance violations and erode the trust that drives your fundraising.

Security Steps That Actually Work

Lock Down Every Account with Multi-Factor Authentication

This is the single most important thing you can do. Set up multi-factor authentication (MFA) on your email, donor database, accounting software, cloud storage, and any other system that holds sensitive data. It stops the overwhelming majority of account takeover attacks cold because a stolen password alone won't get attackers in.

Get Everyone on Password Managers

Stop asking staff and volunteers to remember dozens of passwords. Password managers generate strong, unique passwords for every account and store them securely. Your team logs in once to the password manager, and it handles the rest.

Train Your Entire Team and Volunteers

Your staff and volunteers don't need to become cybersecurity experts. They just need to know the basics:

  • Never click links or open attachments in unexpected emails, even from familiar senders
  • Never share login credentials with coworkers or volunteers
  • Verify unusual payment or wire transfer requests by phone before acting, every time
  • Report suspicious emails or activity immediately, without fear of getting in trouble
  • Report lost or stolen devices the moment they go missing

Regular, practical training is one of the highest-return investments your organization can make in security.

Manage Access for Staff and Volunteers

Every person should have their own unique login credentials with access limited to what their role requires. Your program staff don't need access to donor financial records, and volunteers shouldn't have access to your full CRM. When someone leaves revoke their access the same day.

Keep Every System Updated

Software updates patch the exact security holes that attackers exploit. Enable automatic updates for Windows, your donor database, accounting software, and every other business system. This includes browser plugins and website CMS platforms like WordPress, which are frequently targeted and frequently left unpatched.

Back Up Your Data Daily and Test the Backups

Automated, encrypted daily backups are your best defense against ransomware. Follow the 3-2-1 rule: three copies of your data, on two different types of media, with one copy stored offsite or in a secure cloud environment. Test your backups quarterly to confirm they actually restore. Backups you've never tested are backups you can't rely on.

Secure Your Network

Change default router passwords and use WPA3 encryption on your Wi-Fi. Set up a separate guest network for visitors and volunteers so they're isolated from your administrative systems. For staff who access donor or financial records remotely, require VPN connections to keep data encrypted in transit.

Secure Your Donation Processing

Ensure your donation platform and website use SSL/TLS encryption (look for HTTPS). Work with a PCI-compliant payment processor and avoid storing donor credit card data directly on your servers. If your website runs on WordPress or a similar platform, keep all plugins and themes updated and remove anything you're no longer using.

Put Financial Controls in Place

Require dual authorization for wire transfers and payments above a set threshold. Establish a clear phone-based verification protocol for any changes to payment instructions, especially for grants, vendor payments, or payroll. These controls cost nothing to implement and can stop business email compromise fraud entirely.

Run Real Security Software on Every Device

Deploy antivirus, anti-malware, and firewall protection on every device that accesses organizational data, including personal devices used by staff or volunteers for work. Set everything to scan automatically and keep definitions updated.

How Vieth Consulting LLC. Helps Nonprofits Stay Protected

You started your organization to serve your community, not to manage firewalls and chase software patches. But the threat to your donors, your beneficiaries, and your mission is real, and it's growing.

That's where we come in. We handle the security monitoring, the patch management, the backup testing, and everything else that needs to happen behind the scenes so you can focus on your mission.

What we do for Madison nonprofits:

  • Identify vulnerabilities in your current setup before attackers find them
  • Monitor your network 24/7 and respond immediately when something looks wrong
  • Train your staff and volunteers on practical, memorable security habits
  • Set up and test encrypted backups so your donor and program data is always recoverable
  • Layer in firewalls, antivirus, and endpoint protection that work together
  • Secure your website and online donation platform
  • Manage access controls and help you offboard departing staff and volunteers securely
  • Help you implement financial controls that prevent wire fraud and business email compromise

No jargon. No complexity. Just solid protection that works while you focus on your mission.

How Secure Is Your Organization?

Cybersecurity isn't about perfection. It's about making your organization harder to attack than the next target.

Most successful attacks on nonprofits happen because of small, preventable gaps: shared passwords, unpatched software, untrained volunteers, and missing financial controls. Fix those basics and you're already better protected than the majority of organizations out there.

Click Here or give us a call at 608-416-2400 to Book a FREE 10-Minute Discovery Call