Podcast: Making IT Governance Work for Your Nonprofit – Implementation

Jeff Gibson from Build Consulting and Nura Aboki from Community IT delve deeper into the barriers to implementation, and offer advice and tips on successfully rolling out new policies.

Blog: Free Resources for Building IT Policy at Nonprofits

Free templates do exist so you don’t have to start from a blank page.

Video: Making IT Governance Work for Your Nonprofit

Nura Aboki and Jeff Gibson in a webinar exploring what IT policy documents you need, and how to create or revise them for your nonprofit.

Template: Acceptable Use of AI Tools in the Nonprofit Workplace

This Community IT Innovators template to create an Acceptable Use of AI Tools policy document is now available online for download.

Podcast: Creating and Updating IT Policies

Nura Aboki, Community IT Senior Consultant, discusses barriers preventing good IT policies and gives tips on changing your mindset on these important documents.

Podcast: Crafting Nonprofit IT Security Policy

Community IT CEO Johan Hammerstrom has a conversation with cybersecurity expert and Community IT CTO Matt Eshleman about what policies you need, and where to find templates for them.

Video: Cyber Insurance for Nonprofits

Jenna Kirkpatrick Howard from Lockton Insurance talks with cybersecurity expert Matt Eshleman about ways the market is changing and how to learn what coverage you need.

Blog: How to Create a Nonprofit Incident Response Plan

How would your nonprofit respond to a cyber incident? How should you create a nonprofit incident response plan? Learn how to be prepared.

Video: Crafting a Nonprofit Cybersecurity Policy

Free video: learn how to create a nonprofit cybersecurity policy, how to dedicate leadership time and organization resources to preventing costly security incidents, and how to communicate policies with staff.

Video: IT Security Incident Response for Nonprofits

Join Community IT Innovators CTO Matt Eshleman and President and CEO Johan Hammerstrom for a worst-case scenario walk through. They discuss potential breaches such as email or Office 365 and share our experience responding to credential hacks and other situations. We outline a checklist you should include in your security policies.