Nonprofit Resources
Good News for Stragglers: OMB Issues a Uniform Guidance Procurement Grace Period Extension
Good news for organizations that receive federal funding subject to Uniform Guidance (UG), 2 CFR 200: If you haven’t updated your procurement standards, you have a little more time.
For Sale – Your Data on the Dark Markets
Learn about the dark web, the risks it poses, and some simple steps you can take to protect your organization.
Retirement Plans Can Make Loans and Hardship Distributions to Hurricane Victims
The IRS announced that 401(k) plans and similar employer-sponsored retirement plans can make loans and hardship distributions to those affected by Hurricanes Harvey and Irma.
How the Equifax Breach Could Affect Your Organization
Breached information for individuals can be used to perpetrate social engineering attacks on the organizations where they are employed.
Part Three – A Deeper Dive into ASU 2016-14 Implementation Issues
Part three in this series looks at how ASU 2016-14 will impact the reclassification of assets after donor-imposed restrictions expire.
Death of the Complex Password
New password guidelines have been making headlines. Here’s what you need to know to help keep yourself and your organization secure.
Nonprofit Issues Newsletter, August 2017
Topics include critical privacy issues, employee retirement plan responsibilities, a board member’s perspective on board governance, and why sustainability metrics are smart for nonprofits.
Why Your Nonprofit Needs a Zero-Day Vulnerability Plan
New vulnerabilities — holes in software code that cyber criminals can use to gain unauthorized access to a system — are discovered every day. Creating and implementing a zero-day vulnerability plan will help your nonprofit respond quickly and effectively to each new threat.
Anatomy of a Phishing Attack
Phishing is one of the most common cybersecurity threats. Understanding how a basic phishing attack works will help you protect your organization.
3 Common Cybersecurity Threats
While cyber breaches can take many different forms, they typically occur when hackers target common technical weaknesses. Here are three of the most prevalent cybersecurity threats all nonprofits face.