Nonprofit Cybersecurity on a Budget: Protecting Donor Data
Posted: March 31, 2026 to Cybersecurity.
Nonprofit Cybersecurity on a Budget: Protecting Donor Data Without Breaking the Bank
Nonprofits hold some of the most sensitive data in any sector: donor names, home addresses, credit card numbers, employer information, giving histories, and sometimes health or social service records. Yet most nonprofit organizations operate with minimal IT budgets and no dedicated security staff. That gap between data sensitivity and defensive capability makes nonprofits a prime target for cybercriminals who understand exactly how to exploit it.
The 2024 Nonprofit Technology Enterprise Network (NTEN) report found that 27% of nonprofits experienced a cybersecurity incident in the prior year, up from 18% in 2021. The average cost of a data breach for small organizations (under 500 employees, which describes the vast majority of nonprofits) reached $3.31 million according to IBM's 2024 Cost of a Data Breach Report. For a community food bank or regional advocacy group, a breach of that magnitude is existential. Organizations investing in cybersecurity services understand this reality. But for nonprofits that cannot afford enterprise security budgets, the question is not whether to act but how to act effectively with limited resources.
This guide provides a practical, cost-conscious roadmap for nonprofit cybersecurity. Every recommendation includes free or low-cost options, and the priorities are ranked so organizations with the smallest budgets know where to start first.
Why Cybercriminals Target Nonprofits
Nonprofits are not attacked at random. They are targeted for specific reasons that make them more attractive to cybercriminals than many for-profit businesses of comparable size. Understanding these reasons is the first step toward building defenses that address real risks rather than theoretical ones.
Valuable Donor Data
A nonprofit's donor database is a concentrated store of personally identifiable information (PII) and financial data. Every online donation captures a donor's full name, email address, billing address, and credit or debit card number. Many nonprofits also collect employer information, phone numbers, birthdates (for planned giving and estate donors), and in some cases Social Security numbers for major gift tax receipts. This combination of identity data and payment information is exactly what criminals need for identity theft, credit card fraud, and account takeover attacks.
Unlike a retail business where customer relationships are transactional, nonprofits cultivate long-term donor relationships. A stolen donor database does not just expose a single transaction. It exposes years of giving history, personal correspondence, wealth screening data, and relationship notes that attackers can use to craft highly convincing phishing and social engineering attacks against the donors themselves.
Weaker Security Budgets and Less IT Staff
The typical nonprofit allocates 1-3% of its operating budget to technology, and most of that goes to basic infrastructure: email, CRM, accounting software, and website hosting. Dedicated cybersecurity spending is often zero. A 2025 survey by the Nonprofit Technology Network found that 59% of nonprofits have no full-time IT staff at all, relying instead on volunteers, part-time contractors, or staff members who handle technology alongside their primary responsibilities.
Attackers know this. Automated scanning tools make it trivial to identify organizations running outdated software, unpatched systems, and misconfigured cloud services. When attackers scan an IP range and find that a nonprofit is running a WordPress site with plugins that were last updated two years ago, an email server without proper authentication records, and a donation platform with a known vulnerability, they do not need sophisticated techniques. They use the same automated exploitation tools that work against any unpatched target, and nonprofits lack the security monitoring to detect the intrusion until the damage is done.
High-Profile Brand Value
Nonprofits often have outsized public trust and emotional resonance relative to their organizational size. A community health clinic, a children's charity, or a disaster relief organization carries a brand reputation built on mission and compassion. Attackers exploit this in several ways. Business email compromise (BEC) scams impersonate executive directors or finance staff because recipients are conditioned to trust communications from these organizations. Ransomware operators target nonprofits because the reputational damage of a public breach creates enormous pressure to pay. And hacktivists occasionally target nonprofits aligned with controversial causes, viewing them as high-visibility targets where website defacement or data exposure generates maximum media attention.
Volunteer and Seasonal Staff Turnover
Nonprofits rely heavily on volunteers and seasonal employees who access organizational systems, email accounts, shared drives, and donor databases. This revolving door of access creates persistent security gaps. Volunteers may use personal devices without security software. Seasonal staff may share login credentials to avoid the administrative overhead of creating individual accounts. Former volunteers may retain access to systems long after their engagement ends because no one remembers to revoke their credentials. Each of these patterns creates exploitable vulnerabilities that a well-staffed IT department would manage through formal onboarding and offboarding procedures, but that nonprofits with no IT staff routinely overlook.
Common Cyber Threats Targeting Nonprofits
Nonprofits face the same threat landscape as any other organization, but five attack types cause disproportionate damage in the nonprofit sector because they exploit the specific weaknesses described above.
Phishing Targeting Staff and Volunteers
Phishing is the most common attack vector for nonprofits by a wide margin. Attackers send emails impersonating board members, major donors, partner organizations, or software vendors to trick staff into revealing credentials, clicking malicious links, or opening infected attachments. Nonprofit staff are particularly susceptible because they frequently communicate with external stakeholders, respond to urgent requests with limited verification, and lack the security awareness training that corporate employees increasingly receive.
Spear phishing attacks against nonprofit executives are especially dangerous. An attacker who compromises an executive director's email account gains access to donor communications, board correspondence, financial information, and the authority to direct wire transfers. The FBI's Internet Crime Complaint Center reports that business email compromise losses exceeded $2.9 billion in 2023, and nonprofits are disproportionately represented among smaller organizations targeted by BEC schemes. Investing in security awareness training is one of the most effective defenses against phishing, and several programs offer free or discounted tiers for nonprofits.
Ransomware
Ransomware attacks against nonprofits have increased steadily as automated ransomware-as-a-service platforms make it easy for even unsophisticated attackers to deploy encryption malware. A ransomware attack that encrypts a nonprofit's donor database, financial records, and program files can halt operations entirely. Unlike large enterprises that maintain extensive backup infrastructure and incident response teams, many nonprofits have no tested backups, no incident response plan, and no cyber insurance to cover recovery costs.
The ransom demands targeting smaller organizations typically range from $10,000 to $250,000, which is calibrated to be painful but potentially payable. For a nonprofit with a $2 million annual budget, even a $25,000 ransom demand represents a significant diversion of donor funds from mission programs. And paying the ransom does not resolve the problem. Organizations that pay still face recovery costs, reputational damage, regulatory scrutiny, and the knowledge that attackers now consider them a proven payer likely to pay again.
Donor Database Breaches
Donor databases are high-value targets because they contain both PII and payment data. Breaches can occur through direct attacks on the database itself (SQL injection, credential theft), through compromised CRM platforms (Salesforce, Bloomerang, Little Green Light), or through third-party integrations that have access to donor data. When a donor database is breached, the nonprofit faces mandatory breach notification requirements in most states, potential PCI DSS penalties if payment card data was stored improperly, loss of donor trust that directly impacts future fundraising, and regulatory investigation costs that can exceed the direct costs of the breach itself.
Wire Transfer Fraud (BEC)
Business email compromise targeting nonprofits often takes the form of fraudulent wire transfer requests. An attacker who has compromised or spoofed an executive director's email sends an urgent wire transfer request to the finance team. The request mimics internal communication patterns and often references real events (an upcoming grant payment, a vendor invoice, a program expense) that the attacker learned about through prior email reconnaissance. Because many nonprofits have limited financial controls and a culture of trust-based approval, these requests frequently succeed on the first attempt.
BEC attacks targeting nonprofits also include vendor payment redirection (changing the bank routing information for a legitimate vendor), payroll diversion (redirecting an employee's direct deposit to an attacker-controlled account), and grant fund redirection (submitting fraudulent reports to funders with altered payment instructions). Each of these attacks exploits the same vulnerability: insufficient verification procedures for financial transactions.
Website Defacement
Nonprofits depend on their websites for fundraising, volunteer recruitment, and public communication. A defaced website that displays offensive content, political messages, or malware warnings immediately damages donor confidence and can disrupt active fundraising campaigns. Website defacement is often the most visible but least technically sophisticated attack a nonprofit faces. Attackers exploit known vulnerabilities in outdated CMS platforms (WordPress, Drupal, Joomla) or compromised admin credentials to modify website content. The fix is usually straightforward, but the reputational damage and the donor communications required to reassure stakeholders take far longer to resolve.
Free and Low-Cost Security Tools for Nonprofits
One of the most significant advantages nonprofits have in cybersecurity is access to donated and discounted technology through programs designed specifically for the sector. Many enterprise-grade security tools are available to qualifying nonprofits at no cost or at substantial discounts.
Microsoft 365 for Nonprofits (Free)
Microsoft offers its Business Basic plan free to qualifying nonprofits through Microsoft Philanthropy. This includes Exchange Online email with built-in anti-phishing and anti-malware filtering, OneDrive and SharePoint with 1 TB of cloud storage per user, Microsoft Teams for secure internal communications, and Azure Active Directory with conditional access policies. The security features built into Microsoft 365 for Nonprofits are more robust than what most nonprofits could afford to purchase independently. Exchange Online Protection filters phishing emails before they reach user inboxes. Conditional access policies can enforce multi-factor authentication and block sign-ins from suspicious locations. Data Loss Prevention (DLP) policies can prevent donor PII from being shared outside the organization.
Google Workspace for Nonprofits (Free)
Google offers its Workspace Business Starter plan free to qualifying nonprofits through Google for Nonprofits. This includes Gmail with advanced phishing protection, Google Drive with cloud storage and sharing controls, Google Admin Console with security management features, and two-step verification built into every account. For nonprofits already using Google's ecosystem, enabling the advanced security features that come with the free nonprofit plan significantly improves their security posture without adding any cost.
Cloudflare Free Tier
Cloudflare's free tier provides DNS management, DDoS protection, free SSL/TLS certificates, and basic web application firewall (WAF) rules. For nonprofits whose websites are their primary public-facing asset, Cloudflare's free tier provides enterprise-grade protection against the most common web attacks. Setting up Cloudflare requires no security expertise and can be completed in under an hour.
Bitwarden (Free Tier)
Bitwarden offers a free password manager for individual users and a low-cost organizational plan. For nonprofits with staff sharing credentials for social media accounts, CRM platforms, and banking portals, a password manager eliminates the most common cause of credential-based breaches: password reuse. Bitwarden's free tier supports unlimited passwords, two-factor authentication, and secure password sharing between team members.
Open-Source Security Tools
Several enterprise-grade security tools are available as open-source software at no cost. Wazuh provides SIEM (Security Information and Event Management) capabilities including log analysis, intrusion detection, and compliance monitoring. ClamAV provides free antivirus scanning. Let's Encrypt provides free SSL certificates that auto-renew every 90 days. pfSense provides free firewall and VPN capabilities. These tools require some technical knowledge to deploy, but for nonprofits with even one technically capable staff member or volunteer, they provide security capabilities that would otherwise cost thousands of dollars annually.
Technology Grants and Nonprofit Discount Programs
Beyond free tools, several programs provide grants and deep discounts on commercial security products that nonprofits can leverage to build a security program at a fraction of retail cost.
TechSoup
TechSoup is the largest technology donation program for nonprofits, providing access to donated and discounted products from Microsoft, Adobe, Symantec, Cisco, Intuit, and dozens of other vendors. Qualifying nonprofits can access enterprise software at 60-95% discounts. TechSoup processes over $3 billion in technology donations annually and has served over 400,000 nonprofits worldwide. Every nonprofit should have an active TechSoup account regardless of current technology needs.
Microsoft Nonprofit Programs
Beyond the free Microsoft 365 licenses, Microsoft offers nonprofits $3,500 per year in Azure cloud credits, discounted pricing on Microsoft Defender for Endpoint, access to Microsoft's Security Copilot for qualifying organizations, and deeply discounted Windows and Office licenses through TechSoup. Azure credits can be used for cloud backup, virtual machines for security testing, or hosted security tools like Microsoft Sentinel (cloud SIEM).
Google Nonprofit Programs
Google for Nonprofits provides free Google Workspace, Google Ad Grants ($10,000/month in search advertising), YouTube Nonprofit Program benefits, and Google Earth and Maps platform credits. While not directly security-focused, the Google Ad Grant can be used to promote cybersecurity awareness content, and the free Workspace plan eliminates the excuse for using consumer-grade email that lacks enterprise security features.
AWS and Azure Credits
Both Amazon Web Services and Microsoft Azure offer cloud credits to qualifying nonprofits. AWS offers $1,000 in annual credits through its nonprofit program, and Azure provides $3,500 annually. These credits can fund cloud-hosted security tools, backup infrastructure, and development environments for testing security configurations before deploying them to production.
Salesforce Nonprofit Success Pack (NPSP)
Salesforce donates 10 free licenses of its CRM platform to qualifying nonprofits through the Power of Us program. While Salesforce is primarily a CRM tool, its security features (role-based access control, field-level security, audit trails, and login IP restrictions) provide a significantly more secure environment for donor data than the spreadsheets and consumer databases many nonprofits use as alternatives.
Petronella Technology Group works with nonprofit organizations to build security programs that protect donor data without exceeding limited budgets. From risk assessments to managed IT services, we tailor our approach to nonprofit realities. Schedule a free consultation or call 919-348-4912.
Priority Security Measures for Limited Budgets
When every dollar matters, nonprofits need to know where to invest first. The following six measures are ranked by impact-to-cost ratio. Start at number one and work down the list as budget and capacity allow. The first three cost nothing if you are using Microsoft 365 or Google Workspace for Nonprofits.
#1: Multi-Factor Authentication Everywhere (Free)
Multi-factor authentication (MFA) is the single most impactful security control any organization can implement, and it costs nothing. Microsoft reports that MFA blocks 99.9% of automated account compromise attacks. Enabling MFA on every account that supports it (email, CRM, banking, social media, cloud storage, website admin panels) eliminates the vast majority of credential-based attacks immediately.
For nonprofits using Microsoft 365 or Google Workspace, MFA is built into the platform and can be enforced organization-wide through the admin console in under 30 minutes. The most common objection from nonprofit staff is inconvenience, but modern MFA options (push notifications through authenticator apps, biometric verification on phones) add fewer than five seconds to the login process. That is a trivial cost for eliminating the most common attack vector in cybersecurity.
Prioritize MFA on these accounts first: email, financial systems (banking, payment processing, accounting software), donor CRM, website and social media admin accounts, and any system that stores PII or payment data.
#2: Email Security and Phishing Training (Low Cost)
Phishing is the primary attack vector for nonprofit breaches, and technical email filters alone cannot stop every malicious message. A two-pronged approach combines technical email security with human awareness training.
On the technical side, configure SPF, DKIM, and DMARC records for your organization's email domain. These DNS-based authentication protocols prevent attackers from spoofing your domain to send phishing emails to donors, partners, and staff. Configuration is free and takes a technically capable person approximately one hour. Microsoft 365 and Google Workspace both provide configuration guides specific to their platforms.
On the human side, invest in security awareness training that includes simulated phishing exercises. Several platforms offer free or discounted tiers for nonprofits. KnowBe4 offers free tools including a phishing security test and basic training modules. Petronella Technology Group offers a free phishing security test that shows your organization's susceptibility to phishing before you commit to a training program.
#3: Backup Strategy (Included in M365/Google)
Backups are your last line of defense against ransomware, accidental deletion, and system failure. If you are using Microsoft 365 or Google Workspace for Nonprofits, your email and cloud documents are already backed up in the cloud. However, your donor database, financial records, and website content may not be.
Implement the 3-2-1 backup rule: maintain three copies of critical data, on two different types of storage media, with one copy stored offsite or in the cloud. For nonprofits, this typically means local copies on your primary systems, cloud copies through your productivity platform (M365 or Google), and an additional cloud or external backup for systems not covered by your primary platform (donor CRM exports, website backups, financial system exports).
Test your backups quarterly by actually restoring data from backup to verify the process works. Untested backups are not backups. They are assumptions.
#4: Endpoint Protection (Low Cost to Moderate)
Every computer and mobile device that connects to organizational systems needs endpoint protection software. Windows Defender, which comes built into Windows 10 and 11 at no additional cost, provides solid baseline protection with real-time scanning, ransomware protection, and firewall management. For organizations that want more advanced protection, Microsoft Defender for Endpoint is available to nonprofits at discounted rates through TechSoup.
For Mac environments, Malwarebytes offers a free tier that provides on-demand scanning. Organizations with budget for a managed endpoint solution should consider working with a managed IT services provider that includes endpoint protection as part of a broader support package.
#5: Patch Management (Free with Discipline)
Unpatched software is one of the most exploited attack vectors in cybersecurity, and patching costs nothing but time and attention. Enable automatic updates on every system possible: operating systems, web browsers, email clients, CRM platforms, WordPress and plugins, and any other internet-facing software.
For nonprofits running WordPress websites, plugin and theme vulnerabilities are the most common cause of website compromise. Enable automatic updates for minor WordPress releases and plugins. Check for major updates monthly. Remove any plugins or themes you are not actively using, as abandoned plugins with known vulnerabilities are one of the easiest entry points for attackers.
#6: Incident Response Plan (Free to Create)
Every nonprofit needs a documented plan for what to do when a security incident occurs. The plan does not need to be complex. At minimum, it should answer these questions: Who is the primary contact when an incident is suspected? What systems get shut down immediately to contain the damage? Who notifies affected donors and stakeholders? What are the legal notification requirements in your state? Who handles communications with media and the public?
Write down the answers, store them somewhere accessible even if your primary systems are offline (a printed copy in the executive director's office works), and review the plan annually. Organizations that have a plan before an incident occurs recover faster, spend less on response costs, and suffer less reputational damage than organizations that improvise during a crisis.
Donor Data Protection: PCI DSS and Secure Donation Processing
Every nonprofit that accepts credit or debit card donations must comply with the Payment Card Industry Data Security Standard (PCI DSS). The scope of your PCI DSS obligations depends on how you process donations.
Secure Donation Forms
The most effective way to minimize PCI DSS scope is to use a hosted payment page provided by your payment processor (Stripe, PayPal, Square, Authorize.Net). When donors enter card information directly into the processor's hosted form, the card data never touches your systems. This dramatically reduces your PCI compliance obligations because you never store, process, or transmit cardholder data on your own infrastructure.
If your donation page uses an embedded payment form that collects card data on your website before transmitting it to the processor, your PCI compliance scope is significantly larger. Switch to a hosted or redirect-based payment model if at all possible. The security improvement is substantial, and the user experience difference is negligible with modern hosted payment forms.
Encrypted Databases
Donor data stored in your CRM, database, or file systems should be encrypted at rest (stored data) and in transit (data moving between systems). Most modern CRM platforms (Salesforce, Bloomerang, Little Green Light) encrypt data at rest by default. Verify this by checking your vendor's security documentation or asking them directly.
For nonprofits storing donor data in spreadsheets or local databases (which is more common than it should be), encrypt the files using built-in operating system tools. BitLocker (Windows) and FileVault (Mac) encrypt entire drives at no additional cost. At minimum, password-protect any files containing donor PII and never email unencrypted spreadsheets containing donor data.
Data Minimization
The most effective way to protect donor data is to not collect or store data you do not need. Review what information your donation forms collect and eliminate any fields that are not strictly necessary for processing the donation and issuing a tax receipt. Do not store full credit card numbers anywhere in your systems. Do not retain Social Security numbers unless legally required for planned giving documentation. Purge donor data for individuals who have not engaged with your organization in a defined period. Less data means less risk, less compliance burden, and less damage if a breach occurs.
Volunteer and Remote Worker Security
Nonprofits depend on volunteers and increasingly on remote workers. Both populations introduce security risks that require specific policies and controls.
Device Policies
Establish clear expectations for any personal device used to access organizational systems. At minimum, require that personal devices used for nonprofit work have an active operating system that receives security updates, endpoint protection software installed and running, device encryption enabled, and a screen lock with a PIN, password, or biometric requirement. You do not need a formal mobile device management (MDM) platform to enforce these basics. A simple written policy that staff and volunteers acknowledge when they begin working with the organization establishes expectations and creates accountability.
Access Controls
Apply the principle of least privilege: every person should have access only to the systems and data required for their specific role. Volunteers helping with event planning do not need access to the donor database. Seasonal fundraising staff do not need access to financial systems beyond their specific function. Board members reviewing financial reports do not need admin access to the CRM.
Create separate accounts for each individual rather than sharing credentials. Shared accounts make it impossible to identify who performed any given action, which is critical for both security and accountability. Microsoft 365 and Google Workspace for Nonprofits include enough licenses for most small organizations to provide individual accounts to every staff member and active volunteer.
Offboarding Procedures
When a volunteer completes their engagement or a staff member leaves, immediately revoke their access to all organizational systems. This means disabling their email account, removing them from shared drives and collaboration platforms, changing any shared passwords they may have known (social media accounts, shared admin credentials), revoking access to donor databases and financial systems, and collecting any organizational devices or materials in their possession.
Create a written offboarding checklist and assign someone to execute it within 24 hours of any departure. Delayed offboarding is one of the most common security gaps in nonprofit organizations, and it is entirely preventable with a simple process.
Board Governance: Cybersecurity as a Fiduciary Duty
Nonprofit board members have a fiduciary duty to protect the organization's assets, and that duty increasingly extends to digital assets and data protection. Several recent state attorney general enforcement actions have cited board-level failures to oversee cybersecurity as a factor in assessing penalties against nonprofits that suffered data breaches.
What Boards Need to Know
Board members do not need to become cybersecurity experts. They need to ask the right questions and ensure that staff provides credible answers. At minimum, the board should receive a cybersecurity status report at least annually (quarterly is better). The report should cover the organization's top cybersecurity risks, what controls are in place to mitigate those risks, whether the organization carries cyber insurance, the status of staff security awareness training, whether the organization has a tested incident response plan, and any cybersecurity incidents that occurred since the last report.
If the executive director or IT contact cannot answer these questions, that is itself a finding that requires action. The board should direct resources toward answering them, even if the initial assessment reveals gaps. Knowing where you stand is always better than operating with false confidence.
Cyber Risk as Organizational Risk
A data breach at a nonprofit is not just a technology problem. It is a fundraising problem (donors lose trust and reduce giving), a legal problem (breach notification and regulatory response), a financial problem (direct costs of investigation, remediation, and legal fees), and a reputational problem (media coverage, partner concerns, loss of public confidence). The board should treat cybersecurity risk with the same seriousness it gives financial risk, programmatic risk, and compliance risk. That means dedicating board meeting time to cybersecurity oversight, allocating budget even when it competes with program spending, and holding leadership accountable for implementing reasonable security measures.
Cyber Insurance
Cyber insurance policies for nonprofits typically cost $1,000 to $5,000 annually for organizations with budgets under $10 million and basic security controls in place. A cyber insurance policy covers breach notification costs, legal fees, forensic investigation, credit monitoring for affected donors, and in some cases ransomware payments and business interruption losses. For the cost of a single donor event, a nonprofit can transfer substantial cyber risk to an insurance carrier. Many insurers require MFA, endpoint protection, and regular backups as conditions for coverage, which provides additional motivation to implement the priority measures described above.
Petronella Technology Group provides cybersecurity services and managed IT support tailored to nonprofit budgets and requirements. From free phishing tests to full security assessments, we help nonprofits protect the donor data their mission depends on. Contact us for a free consultation or call 919-348-4912.
Key Takeaways
Nonprofit cybersecurity does not require an enterprise budget. It requires focused action on the controls that matter most, disciplined use of the free and discounted tools available to the sector, and organizational commitment from the board level down. The six priority measures outlined in this guide (MFA, phishing training, backups, endpoint protection, patching, and incident response planning) address the threats most likely to hit nonprofits and cost little or nothing to implement.
The tools exist. Microsoft 365 for Nonprofits, Google Workspace for Nonprofits, Cloudflare free tier, Bitwarden, and TechSoup discounts put enterprise-grade security capabilities within reach of any qualifying organization. The technology grants from Microsoft, Google, AWS, and Salesforce provide cloud infrastructure and platform access that eliminates the cost barrier for all but the most advanced security needs.
What nonprofits cannot afford is inaction. A single data breach can cost more than a decade of security spending would have. Donor trust, once lost, does not return quickly. Regulatory penalties consume funds that should be advancing your mission. And the operational disruption of ransomware or a compromised donor database can set programs back months or years.
Start with MFA today. It is free, it takes 30 minutes, and it eliminates the most common attack. Then work through the priority list as capacity allows. If your organization needs help assessing its current security posture, identifying gaps, or implementing the measures described in this guide, contact Petronella Technology Group to discuss how we can help your nonprofit protect donor data and focus on what matters most: your mission. Call 919-348-4912 to get started.