Home/Guides/The Two Simple Steps That Could Save Your Nonprofit From a Security Nightmare

The Two Simple Steps That Could Save Your Nonprofit From a Security Nightmare

Why two-factor authentication and password managers aren't just for tech companies—they're essential tools for protecting your nonprofit's data, donors, and reputation.

November 12, 2025
10 min read• By Church Software DirectoryProductivity
securitynonprofitsaas2fapassword managerbest practices

The Two Simple Steps That Could Save Your Nonprofit From a Security Nightmare

Imagine this scenario: Pastor Jim got the call at 7:30 AM on a Sunday morning. His church's Facebook page was posting spam links. Their donor database had been accessed overnight. Worst of all, someone had sent an email to their entire mailing list—2,000 people—asking for emergency donations to a fraudulent account.

The culprit? A simple password: "Church2023!" that Jim had used for multiple accounts and written on a sticky note attached to his monitor.

The damage? Three weeks of cleanup, $8,000 in fraudulent charges, dozens of confused donors, and a serious hit to the church's credibility.

The preventable part? All of it.

Why Nonprofits Are Targets (Yes, Even Small Ones)

"We're too small for hackers to care about."

If you've thought this, you're not alone—and you're dangerously wrong.

Hackers love nonprofits and churches because:

1. You have valuable data. Donor credit card information, social security numbers for background checks, financial records, and personal details about vulnerable populations are all highly valuable on the black market.

2. You're often understaffed. Most nonprofits don't have IT departments. Security isn't anyone's full-time job, which means vulnerabilities slip through.

3. You trust easily. Nonprofit culture emphasizes openness and trust, making phishing attacks more effective. When an email appears to come from your executive director asking for urgent financial help, you want to believe it's real.

4. You use free or cheap tools. While budget-consciousness is admirable, it sometimes means using software without robust security features or skipping paid security upgrades.

5. You're connected to money. Whether it's direct access to bank accounts, payment processing systems, or donor credit cards, nonprofits handle financial transactions that criminals want to exploit.

The good news? You don't need a computer science degree or a big budget to dramatically improve your security. You need two things: two-factor authentication and a password manager.

Let's break down why these matter and how to implement them without making your team miserable.

Two-Factor Authentication (2FA): Your Digital Deadbolt

What Is 2FA and Why Does It Matter?

Think about your front door. A lock is good, but a lock plus a deadbolt is better. Two-factor authentication is the deadbolt for your online accounts.

Here's how it works:

Factor 1: Something you know (your password) Factor 2: Something you have (your phone) or something you are (your fingerprint)

Even if someone steals your password, they can't access your account without the second factor. This simple addition blocks an estimated 99.9% of automated attacks.

Real-World Scenario: How 2FA Saves the Day

Maria, a development director at a homeless shelter, received an urgent email from her "executive director" asking her to wire $15,000 for an emergency repair. The email looked legitimate—it came from an email address one letter different from the real one (micheIle@shelter.org instead of michelle@shelter.org—notice the capital I instead of lowercase L).

Fortunately, the shelter's accounting software required 2FA. When the attacker tried to log in with Maria's stolen password, the system sent a verification code to Maria's phone. She got the alert, immediately changed her passwords, and reported the phishing attempt.

Without 2FA, that $15,000 would have been gone forever.

The Different Types of 2FA (From Worst to Best)

Not all two-factor authentication is created equal:

SMS Text Messages (Good, but not great) You get a code via text message. Better than nothing, but text messages can be intercepted. Still, use this if it's your only option.

Authenticator Apps (Better) Apps like Google Authenticator, Microsoft Authenticator, or Authy generate time-based codes on your phone. More secure than SMS because the codes aren't transmitted over networks. This is the sweet spot for most nonprofits.

Hardware Keys (Best, but overkill for most) Physical USB devices like YubiKey that you plug into your computer. Maximum security but unnecessary unless you're handling highly sensitive data or have been specifically targeted by sophisticated attacks.

Biometrics (Convenient) Fingerprint or face recognition. Very convenient on phones, though technically this is replacing your password rather than adding a second factor. Still better than password-alone.

How to Enable 2FA on Your Critical Systems

Here's where to turn on 2FA immediately:

Your Email Account (Most Critical) Your email is the skeleton key to everything. If someone controls your email, they can reset passwords to every other account.

  • Gmail: Google Account → Security → 2-Step Verification
  • Outlook/Microsoft 365: Account → Security → Two-step verification
  • Other providers: Search "[your email provider] enable two factor authentication"

Your CRM/Donor Database Whether you use Salesforce, Bloomerang, DonorPerfect, or another system, enable 2FA immediately. This protects your most sensitive data.

Your Financial Systems Accounting software, payroll systems, and payment processors should all require 2FA. No exceptions.

Your Social Media Accounts Compromised social media accounts can damage your reputation instantly.

  • Facebook: Settings → Security → Two-factor authentication
  • Instagram: Settings → Security → Two-factor authentication
  • Twitter/X: Settings → Security → Two-factor authentication

Your Website Admin Panel If you use WordPress, install a 2FA plugin. For other platforms, check their security settings.

Getting Your Team On Board With 2FA

The biggest objection you'll hear: "But it's so inconvenient!"

Here's how to address it:

1. Frame it properly: "This adds five seconds to login, but it prevents five weeks of cleanup if we're hacked."

2. Use trusted devices: Most systems let you mark trusted devices that won't require 2FA every single time—only when logging in from new devices or after 30 days.

3. Start with critical accounts: Don't make everyone enable 2FA on everything immediately. Start with admin accounts and financial systems, then expand.

4. Provide clear instructions: Create a simple one-page guide with screenshots showing exactly how to enable 2FA for your key systems.

5. Lead by example: Executive leadership should enable 2FA first and talk about how easy it is.

6. Share the horror stories: Sometimes people need to hear about what happens when security fails before they'll take it seriously.

Password Managers: Because Your Memory Isn't Good Enough

The Password Problem Nobody Wants to Admit

Let's be honest about how most people handle passwords:

  • They use the same password for everything
  • That password is something simple like "Spring2024!"
  • They write passwords on sticky notes
  • They email passwords to themselves
  • They store passwords in a Word document called "Passwords.doc"
  • When forced to change passwords, they just increment the number (Spring2024! becomes Spring2025!)

All of these are security disasters waiting to happen.

The problem is, good security advice seems impossible to follow:

  • Use different passwords for every account
  • Make passwords long and random
  • Change them regularly
  • Never write them down
  • Never share them

No human can remember 50+ unique, complex passwords. This is where password managers come in.

What Password Managers Do

A password manager is a secure vault for all your passwords. You remember one master password, and it remembers everything else.

But it does much more than remember:

Generates strong passwords - Random strings like "xK9$mP2nQ7@wL5zT" that would take millions of years to crack

Auto-fills credentials - You don't have to type passwords, reducing the risk of keyloggers stealing them

Stores secure notes - Keep emergency access codes, security questions, and other sensitive info safe

Shares passwords securely - Grant temporary access to team members without revealing the actual password

Audits your security - Alerts you to weak, reused, or compromised passwords

Works everywhere - Desktop, mobile, browser extensions—your passwords are always available

Popular Password Managers for Nonprofits

1Password for Teams ($7.99/user/month)

  • Beautiful interface, very user-friendly
  • Excellent team sharing features
  • "Travel Mode" to hide sensitive vaults when crossing borders
  • Best for: Teams that want polished, intuitive software

LastPass ($4/user/month for teams)

  • Strong free individual plan
  • Affordable team plans
  • Browser-focused experience
  • Best for: Budget-conscious organizations

Bitwarden ($3/user/month for organizations)

  • Open-source, very affordable
  • Strong security focus
  • Less polished interface than competitors
  • Best for: Tech-comfortable teams that prioritize cost and transparency

Dashlane ($5/user/month for teams)

  • VPN included
  • Dark web monitoring
  • Excellent mobile apps
  • Best for: Organizations wanting extra security features

For individuals/small teams: Many people successfully use free versions of these tools. The paid team plans add sharing features, admin controls, and better support.

How to Implement a Password Manager (Without Rebellion)

Phase 1: Leadership First (Week 1)

  • Executive director and key staff start using password manager
  • Test it for two weeks
  • Share experiences at staff meeting

Phase 2: Critical Accounts (Week 3-4)

  • Move all shared accounts into password manager
  • Social media, donor database, financial systems
  • Delete the spreadsheet or document where you stored passwords

Phase 3: Individual Adoption (Week 5-8)

  • Roll out to all staff
  • Provide training (30 minutes is enough)
  • Set deadline for everyone to have it installed

Phase 4: Enforcement (Week 9+)

  • Require password manager for all shared accounts
  • Regular security audits
  • Celebrate the team for improved security

The Master Password: Your Last Password Ever

Your master password is the one password you still need to remember. Make it strong, but memorable.

Bad master password: "Nonprofit2024!"

Good master password: "Coffee-Keeps-Our-Mission-Alive-74"

The good one is:

  • Long (30+ characters)
  • Contains different word types
  • Includes numbers and symbols
  • Creates a mental image you can remember
  • Unique to you

Write it down and keep it somewhere secure (like a safe or locked drawer), just in case you forget. Yes, I said write it down. This is the exception to the "never write passwords down" rule—but only for your master password, and only stored securely at home.

The Common Objections (And Why They're Wrong)

"What if the password manager gets hacked?"

This is the most common concern, and it's valid to ask. Here's the reality:

Password manager companies use bank-level encryption. Your data is encrypted on your device before it's uploaded to their servers. Even if their servers were compromised, the attackers would get encrypted gibberish without your master password.

Compare this to your current system:

  • Passwords in a spreadsheet: Completely unencrypted
  • Same password everywhere: One breach exposes everything
  • Written on sticky notes: Anyone who walks by your desk can see them

A password manager is exponentially more secure than any alternative.

"This seems too complicated for our volunteers."

Start with staff only. Volunteers who need system access can use 2FA without necessarily needing the password manager.

That said, password managers are easier than you think. My 70-year-old mother uses one and says it's "like having a personal assistant for passwords."

"We can't afford another subscription."

Security breaches are far more expensive:

  • Average cost of a data breach: $4.45 million
  • Average nonprofit budget: Much less than $4.45 million
  • Cost of password manager: $3-8 per user per month
  • Cost of 2FA: Usually free

You literally cannot afford NOT to do this.

"We'll get to it after [busy season/event/campaign]."

Bad actors don't wait for your slow season. In fact, they often strike during busy times when you're distracted.

The time investment is minimal:

  • Enabling 2FA: 10 minutes per account
  • Setting up password manager: 1 hour for initial setup, 30 minutes for team training

That's 3-4 hours total to prevent potentially catastrophic problems.

Beyond the Basics: Other Security Habits to Build

Once you've implemented 2FA and a password manager, these additional practices will further protect your organization:

1. Regular Software Updates Those update notifications aren't just annoying—they often include critical security patches. Update promptly.

2. Phishing Awareness Train staff to recognize suspicious emails:

  • Unexpected urgent requests
  • Generic greetings ("Dear User")
  • Spelling and grammar mistakes
  • Suspicious links or attachments
  • Requests for passwords or financial information

3. Access Control Not everyone needs access to everything. Grant permissions based on actual job requirements.

4. Regular Security Audits Quarterly, review:

  • Who has access to what
  • Whether former staff still have active accounts
  • Password strength across your organization
  • Recent login activity for anomalies

5. Backup Everything Use automated backups for critical data. The 3-2-1 rule: 3 copies, on 2 different media types, with 1 offsite.

6. Secure Your Wi-Fi Change default router passwords, use WPA3 encryption, and create a guest network for visitors.

7. Educate Your Board Board members often have high-level access but may not think about security. Include it in board orientation.

Creating a Simple Security Policy

You don't need a 50-page document. Here's a basic policy you can implement immediately:

[Your Organization] Security Policy

All staff, volunteers, and board members must:

  1. Use two-factor authentication on all organizational accounts
  2. Use the organization's password manager for all shared accounts
  3. Create strong, unique passwords for individual accounts
  4. Never share passwords via email, text, or chat
  5. Report suspicious emails immediately
  6. Update software and devices promptly
  7. Lock computers when stepping away
  8. Use organizational accounts (not personal) for work
  9. Report lost devices within 24 hours
  10. Complete annual security awareness training

Violations may result in disciplinary action, up to and including termination.

Simple, clear, enforceable.

The Bottom Line: Security Is Not Optional

When Pastor Jim's church got hacked, he told me: "I thought we were being responsible by having passwords at all. I had no idea how vulnerable we were."

You don't have to learn this lesson the hard way.

Two-factor authentication and password managers aren't perfect, but they're like wearing seatbelts—they don't prevent all accidents, but they dramatically improve your chances of survival.

The cost is minimal. The time investment is small. The protection is enormous.

Here's your action plan for this week:

Monday: Enable 2FA on your organizational email account (15 minutes)

Tuesday: Enable 2FA on your donor database and financial systems (20 minutes)

Wednesday: Research and choose a password manager (30 minutes)

Thursday: Set up your password manager and move 5 critical passwords into it (30 minutes)

Friday: Enable 2FA on social media accounts (15 minutes)

That's less than 2 hours total spread across a week. Two hours to potentially save your organization from disaster.

Your donors trust you with their information. Your staff trust you to protect their work. Your community trusts you to safeguard their data.

Earn that trust. Enable 2FA and get a password manager this week.

Because the best time to fix a security problem is before it becomes a security disaster.