Tools of the Trade (Free Resources)
Securing your organisation doesn't have to bankrupt your mission.
What To Do If You Get Hacked (Incident Response)
No matter how good your locks are, sometimes a window gets broken.
Governance for Non-Techies
The biggest risk in many organisations is the "Ghost User." This is the account of a volunteer who left two years ago but still has access to the database.
The Safety Net (Backups)
You don't need a complex server room. You just need to follow the Rule of Redundancy.
Digital Hygiene (Updates & Devices)
We all hate that little pop-up box. "Updates Available." It always appears when you are busiest. It is tempting to click "Remind me tomorrow" indefinitely. But software updates are not just about new features; they are about patching holes.
The Art of Spotting a Fake (Phishing)
It looks real. The name is right. But the request feels... odd. Welcome to the world of Phishing.
Locking the Front Door (Passwords & MFA)
The vast majority of cyber breaches aren't caused by sophisticated hackers typing green code into a black screen like in the movies. They happen because someone guessed a weak password or used a password stolen from another site.
Why Cybersecurity Is Modern Stewardship
In 2025, our "buildings" are digital. Our filing cabinets are in the cloud, and our conversations happen over email. Yet, many leaders still view cybersecurity as a technical headache best left to "the IT person" (who is often just a willing volunteer).

