Nonprofit Resources
For Sale – Your Data on the Dark Markets
Learn about the dark web, the risks it poses, and some simple steps you can take to protect your organization.
Retirement Plans Can Make Loans and Hardship Distributions to Hurricane Victims
The IRS announced that 401(k) plans and similar employer-sponsored retirement plans can make loans and hardship distributions to those affected by Hurricanes Harvey and Irma.
How the Equifax Breach Could Affect Your Organization
Breached information for individuals can be used to perpetrate social engineering attacks on the organizations where they are employed.
Cybersecurity Best Practices for Churches
Cybersecurity is no longer an “IT issue.” It’s a critical operational issue. Church leaders need to understand the risk and ensure they are devoting the proper resources to addressing it.
Part Three – A Deeper Dive into ASU 2016-14 Implementation Issues
Part three in this series looks at how ASU 2016-14 will impact the reclassification of assets after donor-imposed restrictions expire.
Death of the Complex Password
New password guidelines have been making headlines. Here’s what you need to know to help keep yourself and your organization secure.
Nonprofit Issues Newsletter, August 2017
Topics include critical privacy issues, employee retirement plan responsibilities, a board member’s perspective on board governance, and why sustainability metrics are smart for nonprofits.
Why Your Nonprofit Needs a Zero-Day Vulnerability Plan
New vulnerabilities — holes in software code that cyber criminals can use to gain unauthorized access to a system — are discovered every day. Creating and implementing a zero-day vulnerability plan will help your nonprofit respond quickly and effectively to each new threat.
5 Steps to Strengthen Your Church’s Cybersecurity Defenses
Hacking has been receiving a great deal of attention lately in the political arena, but many church leaders may not realize the severity and scope of the threat to their own ministry.
Anatomy of a Phishing Attack
Phishing is one of the most common cybersecurity threats. Understanding how a basic phishing attack works will help you protect your organization.