Services and Tools
Exclusive to our NGO network to secure and train staff in cybersecurity
We help train your staff to keep your NGO data and systems secure.
Working in close collaboration with our beneficiaries, we have identified the specific functional and technical needs of NGOs. We help our beneficiaries secure and/or build robust and a resilient digital infrastructure.
We develop or deploy products, tools and services to address your needs – free of charge.
Discover below how we can help you.
What about your people
- Can we train our NGO staff against cyber threats?
- Are staff password in my NGO strong enough?
- What about the Dark Web?
NGOs are increasingly becoming targets for cybercriminals. Cybersecurity training helps educate NGO employees and volunteers about common cyber threats such as phishing, social engineering, malware, and ransomware. This empowers NGO staff to recognize and respond appropriately to potential risks.
The CyberPeace Builders are here to help your NGO with the Awareness training mission that was specifically designed for NGOs like yours.
A strong password acts as a barrier against unauthorized access to internal systems, databases, email accounts, and other digital assets belonging to your NGO. It reduces the risk of malicious actors gaining control over your NGO’s resources or stealing sensitive data. Implementing best practices for password can significantly improve your overall password security.
In addition to strong passwords, activating Multi-Factor Authentication (MFA) provides an additional layer of security beyond passwords. It requires users to provide multiple factors of authentication, typically a combination of something they know (password), something they have (a smartphone or token), or something they are (biometric data).
The CyberPeace Builders are here to help your NGO with various missions, such as Password manager advice and implementation, Training on password hygiene, as well as MFA advice and implementation.
The dark web is a part of the internet that is intentionally hidden and not indexed by search engines. It is often used as a marketplace for illicit activities, including the sale of stolen data, hacking tools, and compromised credentials. Dark web monitoring helps NGOs detect potential threats early by monitoring for mentions of the organization’s name, email addresses, passwords, or other sensitive information that may have been compromised or exposed.
The CyberPeace Builders are here to help your NGO with the Dark web monitoring mission.
What about your technologies
- Can cybercriminals access my NGOs systems and information remotely?
- How can my NGO secure key sensitive data?
- Is our NGO's website protected against cyber threats?
Cybercriminals can potentially access any system remotely, including those of your NGO, if proper security measures are not in place or if vulnerabilities exist. Remote access to systems can occur through various methods, such as exploiting software vulnerabilities, conducting phishing attacks, or using malware.
The CyberPeace Builders are ready to assist you with missions ranging from User management and access control and Best practices on updating assets.
Securing key sensitive data for an NGO requires a comprehensive approach to ensure the confidentiality, integrity, and availability of the data. Data security is an ongoing process, and it requires regular monitoring, updating, and adaptation to evolving threats.
Join the CyberPeace Builders program to receive assistance on securing your critical data through missions such as Data hygiene and security best practices or Advice on encryption methods for sensitive data. At the same time, your NGO can access the CyberPeace Cloud – a free data transfer and storage capability, helping your organization to safeguard its data and reduce the risk of digital disruption to critical operations.
Websites can be vulnerable to various cyber threats if proper security measures are not in place. Security your website helps safeguard sensitive information, maintain the organization’s reputation, and ensure the availability and integrity of digital resources offered to beneficiaries and the general public.
Through the CyberPeace Builders program you can get assistance to carry out a comprehensive Website vulnerability scan to identify and mitigate any security issues or vulnerabilities with your NGO’s website.
What about your processes
- Can my NGO develop a cybersecurity policy and incident response plan?
- Should access to sensitive data be controlled in our NGO?
- What can my NGO do against ransomware?
A cybersecurity policy is a formal document that outlines an organization’s approach to protecting its information systems, networks, and data from cyber threats. At the same time, an incident response plan (IRP) is a documented set of procedures that outlines the steps to be taken in the event of a cybersecurity incident or data breach. Both these documents form your NGO’s wider governance framework.
Through the CyberPeace Builders program your NGO can receive assistance to develop these policies through the Cybersecurity policy development and Incident response plan development missions. The program can also help you NGO with the Cybersecurity policy review and Incident response plan review missions for your existing policies.
Yes – access to sensitive data should be controlled in your NGO to ensure the confidentiality, integrity, availability, and security of the information. For example, a data protection policy outlines an organization’s commitment to protecting the privacy and confidentiality of sensitive data it handles. The policy defines the principles, procedures, and responsibilities for collecting, storing, processing, and sharing personal or sensitive information in compliance with applicable data protection laws and regulations.
The CyberPeace Builders program can help your NGO develop its own Data protection policy and equip it with our SEND web app that will allow your NGO to securely send or received data within the organization or with other pre-defined recipients.
Ransomware is a type of malicious software (malware) that encrypts or locks the victim’s files or entire computer system, rendering it inaccessible until a ransom is paid to the attackers. An NGO can significantly enhance its resilience against ransomware attacks and minimize the potential impact on its operations, data, and reputation by ensuring strong backup and recovery practices, awareness training, and robust network security.
By joining the CyberPeace Builders program, you will get more insights into this particular type of threat as well as acquire the knowledge on how to best protect your NGO.
Secure encrypted file transfer
SEND is a web app that allows our beneficiaries and partners to send or receive data securely within their organization or with pre-defined recipients. Data transferred via SEND is encrypted at rest and in transit with servers hosted in Switzerland and not subject to the Cloud Act.
Free data transfer and storage capabilities
Humanitarian NGOs in or responding to the humanitarian crisis in Ukraine can now access free data transfer and storage capabilities, and other cloud services, in order to safeguard their data and reduce the risk of digital disruption to their operations.
Portable stalkerware detection device
SpyGuard is a small, light and easy-to-use open-source solution to detect stalkerware. The CyberPeace Institute has built a number of these devices to help NGOs test their smartphones for malicious communications issued by stalkerware or any spyware.