Monday to Thursday, 10am-4pm, EST
1.855.281.5499 (toll free)


Disaster Planning and Recovery Toolkit

Resources to help you keep disasters from becoming disastrous

Disaster preparedness isn't just about being ready for a fire or earthquake; it’s a nimble, flexible approach to your organization’s day-to-day programs and operations.

Spam Prevention Toolkit

Spam Prevention Toolkit

Spam is more than simply a nuisance. Those unwanted ads for mortgages, pharmaceuticals, and unclaimed millions filling your inbox can inflict a variety of problems upon your organization, from lost time and correspondence to identity theft, viruses, and other forms of malware.

Online Security Measures For Nonprofit Organizations

Nonprofits collect a lot of data - from donation forms, research surveys, meeting records, mailing lists, to audio/video recordings. And without proper protection, your data is not only open to cyber criminals, but also to government surveillance and corporate hacks. Therefore, the more data you gather, the more it becomes a necessity to manage it safely.

5 Ways Nonprofits Can Minimize Cybercrime

According to the Hackmageddon site, the nonprofit sector compared with other sectors represented 19.5% of cyber attacks in 2015. In October 2016, they reported a jump to 42.9% for the nonprofit sector.

Privacy and Data Concerns for Nonprofits

We are awash in a sea of data, and we’re not handling it well.  Literally. Nonprofits, like every other organization or corporation, are taking in more information than ever before, and more than we know how to handle. 

Protect your Computer Systems with Horizon DataSys

TechSoup Canada is proud to announce Horizon DataSys as our newest donor partner! Horizon Datasys is a software development company that provides instant-recovery software that keeps computers in a preset state, which can help you instantly recover from any IT catastrophe.

A Nonprofit's Guide to Cloud Storage for Security and Productivity

"The cloud" refers to a computer concept whereby groups of large computers specializing in storing and processing information (known as "servers") work together to share information and workloads towards completing a specific task.

How to Tell if an Email is a Scam

The vast majority of security breaches are not caused by an astoundingly skilled hacker; they’re caused by scammers. These malicious social engineers try to trick people into giving them information that is valuable in itself (such as credit card information) or could lead to a treasure trove of data to be sold on the black market.

10 Easy Digital Security Tips

If you ask someone about digital security, it’s no surprise if that person immediately relates it to hacking. Currently, with widely publicized cases such as the iCloud leak and the Heartbleed virus, hacking has then become the buzzword for digital security. However, though hacking is the more common threat nowadays, digital security is actually more encompassing than just a threat on our virtual selves.

A Nonprofit's Guide to Identifying and Avoiding Email Threats

Technology and the Internet have revolutionized the way nonprofits communicate and work with their volunteers, donors and supporters. While this has proved extremely beneficial for nonprofits and charities alike, it can also make your organization vulnerable to online predators. The best defense against online threats  is to educate your nonprofit’s staff and volunteers on safe computer practices, starting with email protection.