All articles
Security · Guide

Incident response planning when you don't have a security team

7 min read

Most nonprofits, newsrooms, and small NGOs don't have a security team. Many don't even have a dedicated IT person. But they handle sensitive data — donor records, source materials, beneficiary information, legal files — and they face real threats.

When something goes wrong, the difference between a manageable incident and an organizational crisis often comes down to whether anyone had a plan. Here's how to build one that works for a small team with no dedicated security staff.

Why most incident response guides don't work for small organizations

Enterprise incident response frameworks assume you have a SOC, a CISO, an IR team, a legal department, and a communications team. They describe roles like "Incident Commander" and "Forensic Analyst" as if these are different people. For a 15-person nonprofit, they might all be the same person — and that person probably also manages the website and orders office supplies.

An effective IR plan for a small organization needs to be:

The five things your plan actually needs

1. A call list — who does what

During an incident, the first question is always "who do I call?" Your plan needs a short, current list:

This list needs to be printed and accessible offline. During a serious incident, your email and internal systems may be the thing that's compromised.

2. A detection checklist — how you'd notice

Small organizations often don't have monitoring tools that would alert them to a breach. That means detection usually comes from someone noticing something wrong. Give your team a checklist of warning signs to watch for:

Make it clear that reporting a concern is always the right call, even if it turns out to be nothing. The cost of investigating a false alarm is negligible compared to missing a real incident.

3. Containment steps — stop the bleeding

The first priority in any incident is to stop it from getting worse. For most small-organization incidents, this means:

4. Communication templates — what to say

During an incident, you will need to communicate with multiple audiences: staff, leadership, funders, affected individuals, possibly media. Writing these communications from scratch during a crisis leads to delays, errors, and inconsistent messaging.

Pre-draft templates for:

These don't need to be perfect — they need to exist so you're not starting from a blank page at the worst possible moment.

5. A post-incident review — learn from it

After the immediate crisis is handled, schedule a debrief within a week. Document:

This is the step most organizations skip. Don't. It's how a single incident makes you more resilient instead of just more stressed.

Test it before you need it

A tabletop exercise doesn't need to be elaborate. Spend an hour walking through a scenario: "A staff member clicked a phishing link and their email account is sending messages to your donor list. Go."

Watch what happens. Who does everyone call? Does anyone know the password reset process for your email provider? Can anyone access the call list? Does the decision maker know they're the decision maker?

The exercise will expose gaps. That's the point. Fix them before the scenario is real.

Related

Need help building an incident response plan?

We build lightweight, practical IR plans for small organizations — and run tabletop exercises so your team knows what to do before they need to.

Schedule a call