nonprofit cybersecurity

A team discussing cybersecurity requirements for legal aid grantees

Cybersecurity Requirements for Legal Aid Grantees (What Funders Expect in Practice)

It’s 8:12 a.m. A program manager forwards a message that looks like it came from the ED. “Urgent, please review this invoice.” Someone clicked. Now intake is down, staff can’t reach case notes, and the board chair is asking the question nobody wants to answer out loud: Are we meeting our grant cybersecurity requirements? As […]

Cybersecurity Requirements for Legal Aid Grantees (What Funders Expect in Practice) Read More »

Remote Work Tools For Legal Services Teams That Protect Clients And Calm The Chaos

Remote work and hybrid arrangements are now standard for justice-focused organizations, much like in law firms. Legal professionals support advocates from home offices, co-working spaces, clinics, and sometimes from cars outside detention centers. In that mix, remote work tools for legal services teams are no longer nice-to-have. They are the backbone that keeps client stories,

Remote Work Tools For Legal Services Teams That Protect Clients And Calm The Chaos Read More »

Cross-Org Data Security Strategy for Justice Support Networks (Stopping Cascade Risk)

A justice support network is rarely one organization. It’s legal aid providers, court self-help centers, navigator programs, community partners, pro bono clinics, and the tech vendors that hold forms, files, and case notes. Under frameworks like Executive Order 14117, which underscores data protection amid national security concerns, work moves fast because people need help now.

Cross-Org Data Security Strategy for Justice Support Networks (Stopping Cascade Risk) Read More »

Featured data classification guide for justice nonprofits image of data being sorted into different categories.

A Practical Data Classification Guide for Justice Nonprofits (Public, Internal, Sensitive, Restricted)

If your organization supports legal advocates, you already know the feeling: information is everywhere. Case notes in shared drives. Training rosters in spreadsheets. Partner lists in email threads. A “final” report living in five versions. A data classification policy (which is a key part of our data classification guide for justice nonprofits) is the simple

A Practical Data Classification Guide for Justice Nonprofits (Public, Internal, Sensitive, Restricted) Read More »

A team reviewing a post incident public statement checklist.

Post Incident Public Statement Checklist: Truth Discipline for Credibility and Harm Reduction

After an incident, your first public statement, rather than a scripted public relations statement, is either a seatbelt or a spark. It can protect your security posture and reduce harm, or it can multiply it. Mission-driven orgs feel pressure from every direction at once following a cybersecurity incident. The board wants confidence. Funders want reassurance.

Post Incident Public Statement Checklist: Truth Discipline for Credibility and Harm Reduction Read More »

An image of Information Security Compliance for justice organizations

Information Security Compliance: A Practical Guide for Justice-Focused Leaders

Information security compliance, at its core, is about protecting your organization’s digital information by following established laws and industry standards. It's the set of controls and processes you build to stop data breaches, protect sensitive information, and prove to funders, regulators, and the communities you serve that you're a responsible steward of their data. For

Information Security Compliance: A Practical Guide for Justice-Focused Leaders Read More »

People taking part in board cyber risk briefings

Board Cyber Risk Briefings For CEOs Who Hate Tech Jargon

Do your eyes glaze over when the “cyber update” slide hits the board deck? You are not alone. Many CEOs and executive directors quietly dread those five minutes. Acronyms, charts, and fear-filled headlines, all wrapped in language that feels closer to an operating manual than a leadership decision. Yet you still sign the contracts, attest

Board Cyber Risk Briefings For CEOs Who Hate Tech Jargon Read More »

An image of a team building a data breach response plan for justice organizations

Building a Data Breach Response Plan for Justice Organizations

A data breach is simple to describe and hard to live through. It involves unauthorized access to information someone should not see, copy, or share. That could be a lost laptop, a compromised email account, or a system quietly siphoning data in the background. For justice organizations, a data breach response plan for justice organizations

Building a Data Breach Response Plan for Justice Organizations Read More »