7 min read
If you're a nonprofit or NGO and your latest grant report included a section on "cybersecurity controls" or "data protection measures" that wasn't there last year — you're not imagining things. Funders are asking these questions more frequently, more specifically, and with higher expectations for the answers.
This isn't a trend that's going away. Here's why it's happening, what funders actually want to hear, and how to build a response you can stand behind.
Several forces are converging at once:
The questions vary in specificity, but they generally fall into a few categories:
This is the baseline question. Funders want to know you've thought about security at an organizational level — not just that individual staff members are "being careful." A cybersecurity policy doesn't need to be a 40-page document. It needs to cover how you handle sensitive data, who has access to what, what happens when someone leaves, and what you do if something goes wrong.
This is where it gets more pointed. Funders are increasingly asking not just whether you have policies, but whether anyone has verified that your controls actually work. A security assessment — even a focused one scaled to your organization's size — is the most direct way to answer this question with evidence rather than assumptions.
Data residency is becoming a real concern, especially for organizations working internationally or handling sensitive population data. Funders want to know: which cloud provider, which jurisdiction, who has access, and what your data retention practices look like. "We use Google Drive" is no longer a sufficient answer.
Incident response capability is the area where most nonprofits struggle the most — and where funders are pushing the hardest. They want to know you have a plan, that someone is responsible for executing it, and that you've at least walked through it once. The honest answer for most organizations is "we don't know," which is exactly why the question is being asked.
Funders aren't expecting you to have a Fortune 500 security program. They're expecting you to have thought about this seriously and taken proportionate action. A strong response typically includes:
The gap between "we haven't done anything formal" and "we have a credible security posture" is smaller than most organizations think. It doesn't require a full-time security hire or a six-figure budget.
A focused security assessment, basic hardening of your existing tools, practical staff training, and a documented response plan can typically be completed in a few weeks. If your data handling practices need attention — moving sensitive files to infrastructure with clear residency and access controls — that can often be addressed in the same engagement.
The key is starting with your actual risk profile and your funders' specific expectations, rather than trying to implement a generic security framework designed for organizations ten times your size.
"The organizations we work with are often surprised by how achievable a credible security posture is once you strip away the enterprise complexity and focus on what actually matters for their size and threat model."
Facing funder security questions for the first time?
We help nonprofits and NGOs build a security posture they can document, defend, and actually maintain — scoped to your budget and your real risks.
Schedule a call