πŸ‡ΊπŸ‡ΈMiamiπŸ‡ΊπŸ‡ΈOrlandoπŸ‡ΊπŸ‡ΈLos AngelesπŸ‡¨πŸ‡¦VancouverπŸ‡¨πŸ‡¦Toronto
1-855-KOO-TECH
KootechnikelKootechnikel
Insights Β· Field notes from the SOC
Plain-language briefings from the people watching the alerts.
Weekly Β· No spam
NONPROFIT IT Β· GRANT-ELIGIBLE PRICING

Nonprofits & NGOs

Donor data protection, volunteer-grade security training, grant-compliance reporting β€” all on a budget that fits the funder's expectations.

Cost-effective cybersecurity solutions for nonprofit organizations with limited budgets but critical data protection needs.

SOC2GDPR

Nonprofits across all 5 metros β€” registered charities (Canadian + US 501(c)(3)), foundations, advocacy organizations, and arts + cultural institutions.

60% offMicrosoft 365 nonprofit pricing β€” we manage the eligibility paperwork
100%Of our nonprofit clients pass the cyber-section of major grant applications
FreeInitial 90-minute IT health check + grant-readiness assessment
What you can count on

93% of tickets touched within 15 minutes. 100% of after-hours messages acknowledged the same business day. Every engagement staffed by a named senior engineer.

What we see in nonprofits & ngos

Pain you're probably already feeling.

Donors trust you with personal AND financial data, and you don't have a CISO.

Donor breaches are the fastest way to lose a recurring giver. The Wisconsin nonprofit breach of 2022 cost over $200K in remediation and notification β€” for an organization with a $4M operating budget. Cyber-budget-as-percentage-of-revenue is a fundraising metric, not just an IT one.

Volunteers turn over fast, and most have IT access nobody revokes.

The intern who built your event database in 2022 still has admin. The board member who left in 2023 still has 365 access. Volunteer offboarding is the single most-skipped IT process in nonprofits. We automate it on Day 1.

Grant funders increasingly require security attestations.

Federal grants (US + Canadian), large foundations (Gates, Mellon, MacKenzie Scott team), and most government contracts now require documented information-security posture. Nonprofits without it are losing grants to organizations that have it, regardless of mission alignment.

What we install on day one.

Advanced Email Security

AI-powered phishing protection and email filtering

Included
Email & Communication SecurityAISecurity

Why this matters for nonprofits

  • Phishing attacks targeting employees
  • Malware distribution via email
  • Business email compromise (BEC)
Learn more

Enterprise VPN Management

Secure remote access and site-to-site connectivity

Included
Network & Infrastructure SecurityVPNRemote Access

Why this matters for nonprofits

  • Insecure remote access
  • Complex multi-site connectivity
  • VPN performance issues
Learn more

Automated Patch Management

Comprehensive vulnerability and patch management

Included
Endpoint & Device SecurityPatch ManagementVulnerability Management

Why this matters for nonprofits

  • Unpatched security vulnerabilities
  • Manual patching complexity
  • System downtime from patches
Learn more

Backup & Disaster Recovery

Comprehensive data protection and business continuity

Included
Business Continuity & BackupBackupDisaster Recovery

Why this matters for nonprofits

  • Data loss from various causes
  • Long recovery times
  • Untested backup systems
Learn more

Multi-Factor Authentication

Advanced authentication security and access control

Included
Identity & Access ManagementMFA2FA

Why this matters for nonprofits

  • Password-based security risks
  • Account takeover attacks
  • Compliance authentication requirements
Learn more
Compliance, line by line

What each framework actually asks for β€” and what we do about it.

Donor data protection (PIPEDA, CCPA, GDPR by audience)

What it requires

Lawful basis for collection, breach notification timelines (72 hours for GDPR), DSAR workflow, retention limits.

How we help

Donor data inventory; consent + preference management integrated with your CRM (Salesforce NPSP, Bloomerang, DonorPerfect); breach runbook tied to your board chair + executive director.

Federal + provincial grant cyber requirements

What it requires

Varies by grant β€” increasingly common: documented info-security policy, MFA, encryption in transit, breach notification procedures.

How we help

We maintain a grant-cyber-questionnaire library (US federal, Ontario, BC, EU) so applications take days, not weeks. Past clients have cited security posture as a competitive differentiator in grant decisions.

PCI DSS (for organizations accepting donations online)

What it requires

12 requirements; most nonprofits qualify for SAQ A (full outsourcing to Stripe / Donorbox / Classy) which dramatically reduces scope.

How we help

Configure your donation flow to maximize SAQ A eligibility; quarterly attestation; documented separation between donor processing and operational systems.

Additional compliance services

Phishing Simulation & Training

Realistic phishing tests and employee education

Details β†’

Secure Email Encryption

End-to-end email encryption and digital signatures

Details β†’

Secure Business Messaging

Encrypted instant messaging and file sharing

Details β†’
Free self-serve tools

Score your risk. Price your downtime. No call required.

Two short diagnostics built by our senior engineers. Answer a handful of questions, get a scored report with next steps β€” yours to keep either way.

Questions we always get

Before the call.

Straight answers so the health-check call can skip the basics.

Can you work within a nonprofit IT budget?

Yes. We size engagements to nonprofit budgets and capture every available discount: Microsoft 365 nonprofit (60% off Business Premium), Google for Nonprofits (free Workspace), TechSoup partner discounts, and our own NPO-tier pricing. Most nonprofits get more security for less spend than they were running on volunteer IT.

Do you support our nonprofit CRM (Salesforce NPSP, Bloomerang, DonorPerfect, NeonOne, Raiser's Edge)?

Yes β€” all major nonprofit CRMs. We don't replace them; we secure the access layer, manage user provisioning, integrate with your finance system, and coordinate vendor support during incidents.

How do you handle volunteer onboarding and offboarding?

Automated provisioning workflow tied to your volunteer-management system (whether that's a custom DB, Better Impact, Galaxy Digital, or spreadsheet-driven). Same-day deprovisioning when someone leaves. The lingering-volunteer-account problem is solved on Day 1.

Can you help us prepare for grant cybersecurity questionnaires?

Yes β€” this is one of our most-requested nonprofit services. We maintain pre-mapped responses to the major grant cyber questionnaires (US federal, Canadian federal, BC, Ontario, common EU foundations) so applications take days instead of weeks.

What happens if we're breached?

Documented incident-response activates: containment within 30 minutes, board chair + ED notified within 1 hour, donor notification queue prepared per applicable law, and we coordinate with your major-gift officer on donor communication. We've done this for nonprofit clients β€” the reputational tail matters as much as the technical fix.

Ready for nonprofits & ngosIT that doesn't surprise you?

Free 90-minute health check. Scored roadmap. A real senior engineer. No sales maze.