Monday to Wednesday, 10am - 4pm, EST
1.855.281.5499 (toll free)

Security

Disaster Planning and Recovery Toolkit

Resources to help you keep disasters from becoming disastrous

Disaster preparedness isn't just about being ready for a fire or earthquake; it’s a nimble, flexible approach to your organization’s day-to-day programs and operations.

Spam Prevention Toolkit

Spam Prevention Toolkit

Spam is more than simply a nuisance. Those unwanted ads for mortgages, pharmaceuticals, and unclaimed millions filling your inbox can inflict a variety of problems upon your organization, from lost time and correspondence to identity theft, viruses, and other forms of malware.

What's Cloud Computing and How it's Different to a VPN

 Cloud Computing VS VPN Nonprofit organizations have many of the same needs as for-profit businesses, from data storage to digital security. However, because so many nonprofits are strapped for resources, such basic needs are often viewed as unaffordable luxury items. For example, for many nonprofits, the cost of paying an IT consultant to host their email servers and to manage their data encryption can be prohibitive.

TechSoup Canada Case Study: North Kootenay Lake Community Services Society

North Kootenay Lake Community Services SocietyNorth Kootenay Lake Community Services Society is a nonprofit, multi-service organization that responds to local needs, serving members of the community at all ages and stages. Their programs and services range from activities for kids to parent support, outreach and counselling, a food cupboard and an emergency call button for elderly or ill people living alone. For the Society, keeping technology up to date is more than a matter of efficiency; it’s an important part of protecting their clients.

6 Recommendations to Ensure Your Nonprofit is CASL and GDPR Compliant

 Many articles have been written about the impact of the GDPR and CASL on nonprofit organizations and how they operate. But most of those articles are pretty technical and you need to be an expert on legal matters to truly understand all the subtleties. Here are 6 recommendations that will help you be in compliance with the GDPR and CASL, all in simple English with none of the legal jargon.

How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy (Part 2)

 This webinar is Part 2 of a 2-part series on cybersecurity and nonprofits. In this webinar, Imran Ahmad of Miller Thomson, LLP provides an overview of how to create your own cybersecurity plan and implement best practices. Ahmad also explains the upcoming mandatory breach notification requirements in case of a breach.

Protect Yourself: 3 Workplace Cybersecurity Tips All Nonprofits Should Follow

In part one, we established that understanding your own data and risks is the first step. You always have to know what data is sensitive and in need of protocols and protection. Here are three actionable tips that all nonprofits should follow to ensure workplace cybersecurity is always up to par. 

Protect Yourself: Preparing Your Nonprofit’s Workplace For Cybersecurity

Nonprofits are coming to realize the importance of cybersecurity. But not quickly enough. Nonprofits are at risk of suffering a cyber attack, and over 58% of all attacks are against smaller organizations according to Verizon’s 2018 Data Breach Investigations Report. Here are the ways to prepare and protect your organization to prevent this from happening.

How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy

Webinar data privacy In this webinar, Imran Ahmad of Miller Thomson, LLP explains what cybersecurity is, and the cyber risks and legislation affecting nonprofits. Ahmad also explains how nonprofits can implement best practices from a pre-breach standpoint that go a long way to mitigate the negative consequences of a cyber-attack.

Data Privacy and the Law: Saving and Destroying Information

In our last article, we briefly addressed the obligations of non-profit organizations in relation to the collection and use of personal information. We also provided an overview of information safeguards, noting that you have a duty to keep your records secure and up to date. But what exactly does all this involve? We will see this by examining the principles set out in the Personal Information Protection and Electronic Documents Act (PIPEDA), which applies at the federal level, to the storage and destruction of information.