A new, powerful Citizen Portal experience is ready. Switch now

Community IT urges nonprofits to prioritize fraud defenses, phish‑resistant MFA and incident plans

January 30, 2026 | Legal Services Corporation, Independent Federal Agency, Executive, Federal


This article was created by AI summarizing key points discussed. AI makes mistakes, so for full details and context, please refer to the video of the full meeting. Please report any errors so we can fix them. Report an error »

Community IT urges nonprofits to prioritize fraud defenses, phish‑resistant MFA and incident plans
Matthew Eshelman, chief technology officer at Community IT, told nonprofit IT professionals that the “biggest financial risk to nonprofits is ... wire fraud specifically,” and urged organizations to focus on preventing account compromise and spear‑phishing attacks.

Eshelman and Anna Zambrano, a tier‑2 cybersecurity analyst at Community IT, framed their session as a step‑by‑step roadmap for nonprofits: establish clear IT and data‑privacy policies (including an AI acceptable‑use policy), run ongoing security‑awareness training, protect digital identities, ensure reliable backups and deploy basic perimeter and endpoint protections.

Why it matters: Eshelman said small and mid‑sized nonprofits are attractive targets because attackers can monetize account compromise through gift‑card scams, payroll fraud and fraudulent ACH updates. He cited 2023 fraud figures discussed in the session (transcript: a large global figure given as “1000000000000 dollars” and U.S. consumer losses cited as $8,800,000,000) and urged rapid reporting to the FBI’s IC3 unit, which he said can sometimes recover funds if notified promptly.

Training and reporting: Anna described the Legal Services Corporation (LSC) training available to grantees under the LSC contract: an annual 45‑minute required module, monthly phishing tests and monthly aggregated reports that Community IT sends to organizational admins (and to LSC). She noted a technical limitation with the KnowBe4 platform: enrolled accounts generally must use the organization’s primary domain, which can complicate adding third‑party board email addresses.

Practical controls recommended: Eshelman emphasized phish‑resistant multifactor authentication (FIDO keys or platform passkeys) for executive and finance accounts, use of a centrally managed password manager for unique credentials, regular device patching and cloud‑managed endpoint protection (e.g., Microsoft Defender or SentinelOne), and robust email controls (spam/anti‑phishing gateways plus DMARC and DKIM for outbound mail validation).

Remediation and measurement: Presenters recommended monthly phishing tests with targeted remedial training for repeat clickers, and described an escalation of short, interactive remediation modules. Anna introduced a simple decision aid she called the "fake factor" framework (Freeze, Analyze, Investigate, Know/No) to help staff evaluate suspicious messages.

Resources and next steps: Community IT made a downloadable "cybersecurity readiness for nonprofits" playbook available via QR code, and promoted a follow‑up tabletop workshop to test incident‑response plans. Eshelman advised organizations to align backup retention to legal and operational needs (noting default cloud retention windows cited in the session: Office 365 ~90 days; Google ~30 days) and to assign executive ownership of IT risk even when operations are outsourced.

The presenters closed by encouraging attendees to prioritize high‑impact, low‑complexity fixes first (for example, disk encryption and basic email controls) and to progress toward more complex changes such as organization‑wide phish‑resistant MFA.

View the Full Meeting & All Its Details

This article offers just a summary. Unlock complete video, transcripts, and insights as a Founder Member.

Watch full, unedited meeting videos
Search every word spoken in unlimited transcripts
AI summaries & real-time alerts (all government levels)
Permanent access to expanding government content
Access Full Meeting

30-day money-back guarantee