Free Cybersecurity for Nonprofits

Protect your nonprofit organisation against cyber threats

One click to

Connect to Protect

Free cybersecurity to better protect your beneficiaries, funds and data. 

Step 1: Register online

Let us know who you are and what you do!

Step 2: Eligibility check

Our team will confirm your nonprofit is eligible

Step 3: Connect to the platform

Set up your account to start engaging with our volunteers

Step 4: Create your first mission

Improve your cybersecurity one mission at a time!

Our Impact

We assist nonprofits with cybersecurity support through a proven and trusted program specifically adapted to each nonprofit. Our network of expert volunteers from local and international companies are matched with nonprofits needing cybersecurity assistance.

NGOs assisted
Corporate Partners
Satisfaction rate of NGOs

Services & Tools

Equipped with cybersecurity tools available to our network of nonprofits for free on behalf of our corporate partners. 

Discover Our Missions

Discover below some of the most liked missions our CyberPeace Builders conduct for nonprofits. More than 30 different missions are available for free to NGOs.

The Cybersecurity Awareness Training is a 1-hour and a half session dedicated to educating the NGO’s employees on the cyber threats they may face everyday in both their work and personal lives. Starting from an overview of the threat landscape and threat actors, the Builder will provide insights on basic cybersecurity hygiene practices (phishing emails, web surfing, password, public wifi,..) by providing practical tips and actionable recommendations. This training aims to interact with the audience and share concrete examples of cyberattacks, so that the participants can actively learn how to protect themselves from such threats. The CyberPeace Institute offers a presentation to the CyberPeace Builder to carry out this mission.

This mission aims to monitor the dark web to identify any leaked credentials related to the NGO’s employees that could threaten its security. The Builder will carry out a dark web monitoring of the NGO’s domain and relevant email addresses. After gathering intelligence in a report, the Builder will explain the findings to the NGO and will provide guidance on the remediation measures the NGO may need to take to prevent or restore its security and the safety of its employees.

The Phishing Exercise mission aims to simulate a phishing attack targeting the NGO network. In particular, this exercise is designed to test the NGO employees’ ability to identify a phishing email and report it internally. Regarding this mission, the Builder will be the creator of the entire simulated phishing campaign, and s/he will pick the most appropriate template and content, schedule the phishing attack, and deliver it. As an outcome, the Builder will share a detailed report of the phishing exercise and will present the results to the NGO, by also suggesting areas of improvement where needed. The CyberPeace Institute offers tools to the CyberPeace Builder to carry out this mission.

This mission requires Builders to provide advice on password manager solutions, by presenting them in a comprehensive manner. This mission aims to explain the difference between existing solutions (stand-alone products vs. online products), their characteristics and how user-friendly and easy to implement they can be. As for other missions, it is important to understand the NGO’s needs, present a summary of the advice in a report, and advise the NGO on the choice of the password manager solution when required. 

This mission requires Builders to perform a basic scan of the NGO’s website/s in order to ensure an adequate level of security. The Builder will scan websites, analyze their code to show what they are built and assess the security of integrated tools, utilities and plugins. Also, the Builder will scan and validate the SSL/TLS certificate, as well as report back DNS information and address/port combinations. For most of the cases, this mission requires a good knowledge of WordPress. Once the scan is completed, the Builder will assess the security of the NGO’s website/s, present the findings in a report and provide detailed recommendations on what to improve. 

Inspiring Impact: Stories of Change

Insecurity Insights
"They were holding our hand as we found our way through the crisis. Having someone available to advise was invaluable in what for us was a previously unknown situation."
Read More
Roots of Peace
“That was the gut-wrenching moment when we realized that our footsteps had been monitored, our emails with a trusted bank had been violated, and we were the victims of a series of sophisticated cyberattacks”
Read More
Union for International Cancer Control (UICC)
For almost a month, the digital trust that donors, beneficiaries, partners and close to 20,000 followers have invested in UICC and World Cancer Day was at risk.
Read More

They Trust Us

NGO Registration Criteria

Registered as a nonprofit or non-governmental organization (NGO)

Be registered as a nonprofit or non-governmental organization (NGO) in their respective country or region.

Individual & Independant

Be apolitical, independent, and not promote any religious institutions or beliefs.


Follow the registration process and provide supporting documents as requested.


Actively engage and collaborate by connecting to the cooperation platform to check for updates at least once per week.

Volunteer-led program

Acknowledge that the program operates on a volunteer basis, with experts offering their time according to their availability and interest.