Cortavo Blogs

The CFO's Case for Zero Trust: Protecting Mission, Money, and Donor Data

Written by Team Cortavo | Apr 28, 2026 2:49:03 PM

Cyber risks exist, for all practical purposes, for every single organization nowadays. From IT and hospitality to health and finance, none are truly safe from this threat. It is no longer a problem for the IT sector alone. A single breach can freeze operations, drain funds, and inflict damage to the trust of your customers, investors, and donors, which is irreparable once broken. A stronger cybersecurity framework is clearly needed.

For years, risk management in the boardroom primarily centered around financial compliance, market volatility, and operational sustainability. Today, however, the most unpredictable and potentially devastating risk to your balance sheet sits squarely in the digital dimension, i.e, cybersecurity.

This guide explains why old cybersecurity methods are falling short, what zero trust really means, and how to make a strong financial case for updating your digital defenses without overspending.

 

Why Nonprofits Are Becoming Prime Targets

You might assume that since you’re working in the nonprofit sector and doing good, non-greed-driven work, the hackers won’t target you. Besides, even if someone were to stoop that low, a “we-don’t-really-have-corporate-levels-of-profits” mentality might lead you into a false sense of security.

Cybercriminals are agnostic to your organization’s goal. Their goal, however, is to get any sort of monetary benefit they can by exploiting vulnerabilities in your IT system. As opposed to conventional thought, nonprofits are actively and intently being targeted for several reasons. These reasons are:

  • A Goldmine of Data: Nonprofits have information the hackers want. Payment method details, donor information, wealth screening data, personally identifiable information, and so on and so forth. This data is quite lucrative on the dark web, where hackers sell this data.
  • Perceived Security Deficits: Attackers believe nonprofits, due to the moral work they do, think they’re safe from attacks, which results in them relying on outdated technology and a negligent IT department with a limited budget. Unfortunately, their belief stands true. This makes nonprofits easy targets, often categorized as a “soft target”.
  • Giving into Ransom Pressure: As stated earlier, a cyberattack can halt operations, which for a non-profit often means the inability to process donations. Say an attack breaks the organization's access to its logistics, and everything comes to a standstill. A situation of immense pressure, exploited by bad characters and nonprofits giving in to the demands.
  • Vendor and Supply Chain Links: Many nonprofits are deeply integrated with larger entities such as government agencies, massive philanthropic foundations, or corporate partners. Hackers often use a smaller, less secure nonprofit as a stepping stone to breach a larger partner network. A mere step stool.

 

Why Traditional Security Models No Longer Work

We propose the adoption of a ‘zero trust’ model because the traditional way of doing things, the “Castle and Moat” model historically used for IT security, is no longer keeping you safe.

The idea was simple. Your organization’s network, which contains all your data, is the castle. To protect it, you build a strong moat that includes things like antivirus software and firewalls to keep the bad guys out. Everyone inside the castle, your organization’s network, was trusted. They are considered members who belong in the castle. To prove their loyalty, they had to utter a secret phrase, which was the right password. Get that correct, and you are good to go.

The modern workplace has completely torn down the castle. Today, your staff works from home, coffee shops, and airports. You rely on cloud-based donor management systems, cloud storage, and third-party SaaS applications. There is no longer a single, defined perimeter to defend. The castle has now expanded to the size of a kingdom.

Now, there is identity theft. Hackers, if they can steal an employee’s credentials, the traditional model will automatically trust them and give them a free pass to roam around. In more technical terms, the hacker can now move laterally, accessing financial records, donor databases, and critical infrastructure with practically zero resistance. Relying on perimeter defense in a cloud-first, distributed world is like locking the front door of the castle but having no walls.

 

What Zero Trust Actually Means

The nature of the term “zero trust” may seem a bit excessive, but that’s merely IT professionals having some fun with words. The zero-trust model is very practical and logical. It operates on a simple principle, which is: Want my trust? Prove it to me.

No one, no device, no application, and no user is inherently trusted by default, even if they’re inside your organization’s network. Trust is never granted blindly based on location or a single password. Instead, a zero-trust model demands continuous authentication and strict access controls.

For example, imagine your organization is a school. Kids who belong in class 5-A would have the ID and access for that class. They cannot go to 5-C just because they’re in the same grade. They need to have access to that specific classroom.

Key components of zero trust for nonprofits include:

  • Identity and Access Management (IAM): It constantly verifies who is trying to access your system and requires them to go through Multi-Factor Authentication (MFA) every time.
  • Device Verification: Checking the health and security status of the device being used. (e.g., Is this laptop running the latest security patch? Is this an unauthorized personal smartphone?)
  • Least Privilege Access: Giving employees access only to the specific data and applications they need to do their job, and nothing more. The marketing team doesn't need access to HR files and vice versa, so on and so forth.
  • Micro-segmentation: Breaking the network into smaller, isolated zones so that if a breach occurs in one area, the attacker is contained and cannot move laterally to other parts of the system.

Zero trust for nonprofits makes sure every user and device is verified, keeping your data safe wherever it goes.

 

Why Nonprofits are Behind on Zero Trust (And Why That’s Risky)

So, why are nonprofits so behind on adopting this newer and clearly better security framework? Well, it's as the hackers predicted, they are notoriously tied to a structural and low budget. Security isn’t given a major priority. The usage of aging, legacy servers and softwares put organization in a technical debt, and they can never adopt zero trust protocols with these restrictions.

On top of that, there is:

  • Lack of Dedicated IT Expertise: A single “IT person” cannot implement a zero-trust architecture. A team is needed that has the skill and bandwidth to design, implement, and monitor a holistic, modern security framework.

  • The Friction Fear: Some believe that strict security protocols are a nuisance and create friction in daily work. This is like saying riding a motorcycle without a helmet is fine because it feels uncomfortable. A little inconvenience, if we may call it that, is worth the safety it provides. With the right training, these security measures for staff and volunteers would take only a few seconds of their time. The protection gained from this updated security model is worth the hassle.

  • The Risk of Doing Nothing: Sticking with old security methods is dangerous. Hackers using advanced AI can bypass traditional firewalls, leaving organizations vulnerable. The cost of a breach in both money and reputation can be much higher than the cost of modernizing your security.

 

The CFO’s Lens: Making the Financial Case for Zero Trust

For the protection of extremely valuable data, CFOs and finance teams must look beyond the upfront price tag and think of it like an investment. To understand why zero-trust models are worth the investment, we are making a case for them.

 

The Cost of a Breach

In our heavily tech-dependent world, a cybersecurity lapse like a breach costs far, far more than one initially assumes. It is such a catastrophic financial event that it dwarfs the amount that getting the right safety protocols would’ve cost. These are some of the costs an organization would have to bear:

  • Direct Costs: After a breach, you’ll hire experts to get the attackers out, restoring your systems, perhaps paying any ransomware demands (which, by the way, does not guarantee data recovery), and then potentially trying to catch the attackers.

  • Legal and Regulatory Fines: If donor data or personally identifiable information is compromised, you face legal liabilities, mandatory notification costs, and potential fines for failing to meet compliance standards like HIPAA, GDPR, or state-level data privacy laws.

  • Operation Downtime: Every second your systems are down, work isn’t being done. Productivity goes down, and so everything comes to a halt. Employees and volunteers cannot work, grants don’t get submitted, research isn’t being done, payroll cannot be processed, and services are rendered useless.

  • Damage to Reputation: This, perhaps, is the most devastating blow because a nonprofit, even if it loses everything, if it has trust, it can run. Once trust is gone, say, because a major donor discovers their financial data has been compromised because of your nonprofit’s lackluster IT security policies and inability to implement basic security measures, that is a relationship soured forever, and word spreads fast.

 

The Cost of Prevention

IT can be complicated, and historically speaking, CFOs have disliked it. It is understandable why, as from the outside it can appear to be a black hole of unpredictable costs. Servers break, licenses expire, and emergency IT costs so much. The list goes on.

All businesses optimize with time, and IT has done the same. When it is managed by one partner, the costs are predictable.

Zero trust for nonprofits can be implemented through a predictable, flat fee monthly operational expenditure (OPEX). This allows finance teams to budget accurately for 24/7 support, proactive cybersecurity monitoring, and cloud infrastructure without fearing surprise bills. When prevention comes as a predictable, managed service, it becomes much more cost-effective to invest proactively.

 

ROI Isn’t Just Cost Savings

ROI here isn’t just avoiding a disaster, it is:

  • Cyber Insurance Viability: Cyber insurance premiums are skyrocketing, and underwriters are enforcing stringent requirements. Without proving you have zero trust elements like MFA and Endpoint Detection in place, you may be denied coverage entirely or face crippling premium hikes.

  • Operational Efficiency: A well-implemented zero trust system utilizing modern cloud infrastructure and single sign-on (SSO) actually reduces friction as staff spend less time dealing with locked accounts or VPNs, increasing overall productivity.

  • Competitive Advantage in Fundraising: Donors are aware of IT threats and won’t invest where they feel their data is unsafe. Before making a contribution, they evaluate the operational maturity of the organization, and if it is unable to showcase its security, the trust and confidence the donor needs to make their contribution remains unattained.

 

What “Good” Looks Like in a Nonprofit Budget

So, how much should a nonprofit be spending to achieve this level of security? While percentages vary based on size and complexity, industry benchmarks suggest that organizations should allocate between 5% to 8% of their total operating budget to IT and cybersecurity.

"Good" budgeting for IT no longer looks like huge, sporadic capital outlays for physical servers every five years. A mature, financially sound approach involves having an all-in-one managed IT service provider, a flat monthly fee set for predictable OPEX, and having proper lifecycle management.

By partnering with an all-inclusive managed service provider, CFOs can secure zero trust capabilities, 24/7 support, and necessary hardware under one unified, predictable line item.

 

Common CFO Objections and How to Reframe Them

CFOs are naturally skeptical of new spending. Here are typical objections to zero trust and ways to rethink them:

Objection 1: "It’s too expensive."

Reframe it: The financial strain caused by a breach, the downtime, and the loss of donors and trust are what make it expensive. Prevention is actually far more affordable than recovery and damage control.

Objection 2: "We already have an IT guy and a firewall."

Reframe it: A single IT staffer with limited and outdated resources cannot do the job. Zero trust requires the upgradation of tools and continuous monitoring.

Objection 3: "Tight security will frustrate staff."

Reframe it: That is largely a myth. Zero Trust, implemented correctly and with proper training for staff, does not lead to such friction while keeping your data secure. Biometric logins, Single Sign-On, and conditional access are all super quick and super safe security measures that take barely a couple of seconds to pass through for the authorized individual.

 

Getting Started Without Breaking the Budget

Zero trust isn’t implemented overnight and takes some time. It's best implemented in phasing.

Phase 1: Secure Identities (High Impact, Low Cost)

It is best to do the easy and quick tasks first, especially if their impact far outweighs the amount of effort it takes to implement them. For example, enforcing company-wide multi-factor authentication and single sign-on can almost always be done super quickly. Despite this quickness of implementation, it is the most effective way to stop credentials-based attacks. This should almost always be part of the phase 1 plan.

Phase 2: Secure Endpoints

Endpoints are the devices that connect to your network and can access your organization’s data. This includes laptops, phones, printers, and other connected hardware. Using traditional antivirus plus AI-driven endpoint detection and response (EDR) is the most complete approach.

Phase 3: Restrict Access

Audit user permissions, apply least privilege, remove admin rights from standard users, and instantly revoke access for former staff or volunteers. No one should have any “extra” or unnecessary access.

Phase 4: Find the Right Partner

Instead of doing it all in-house, work with a strategic IT partner who offers flat-fee services. They can manage cloud storage, provide 24/7 support, supply managed hardware, and wrap it all in a strong cybersecurity framework, making zero trust achievable without unpredictable costs.

 

Why This Matters Now (Especially for Finance Leaders)

The window for viewing cybersecurity as a "nice-to-have" has permanently closed. We are operating in an environment where ransomware attacks are automated, regulatory compliance is tightening, and the stakes for a data breach are existential.

As a finance leader, you are the final line of defense for your organization’s sustainability. Embracing zero trust is a profound act of risk mitigation. It protects the financial assets you manage, safeguards the sensitive data entrusted to you by your community, and ensures that your organization's mission can continue uninterrupted, regardless of the digital threats lurking outside (or inside) your network.

 

Learn More: Zero Trust in Action at INNOVATE

Understanding the theory of zero trust is the first step. Seeing how it practically applies to nonprofit financial management is the next step.

If you are evaluating how to better align your IT investments with your organizational risk strategy, we invite you to join us at JMT Consulting's INNOVATE conference.

Be sure to attend the Tuesday session led by Peter Miles, The Fiduciary of the Future: Balancing Data Privacy Compliance with High-Tech Protection. This session is designed specifically for financial and operational leaders. Peter will strip away the technical jargon and provide practical insights and real-world applications for securing your organization.

It is an excellent opportunity to go deeper into implementation strategies, ask questions about budgeting for IT, and discover how modern security frameworks seamlessly integrate with nonprofit financial stewardship.

 

Closing Thoughts

Your mission is too important to be derailed by a preventable cyber incident. By shifting your perspective from the outdated "castle and moat" to a resilient zero trust architecture, you are doing more than just upgrading your technology.

You are making a strategic financial decision that protects your organization's reputation, secures your donor data, and guarantees that your resources remain dedicated to the people and causes you serve. Secure your data, secure your mission, and lead your organization into a safer digital future.