Choose a name for your non-profit and register it with the state (and municipality if required) in which your organization operates. The name of your non-profit should reflect what your non-profit stands for.
Develop a Mission Statement and Strategic Plan. These two documents are extremely important, as they will determine the focus and direction of you non-profit now and in the future.
Consult with an accountant familiar with non-profit organizations. This is crucial due to the different set of tax laws that are involved in establishing and maintaining a non-profit organization.
Determine whether you are eligible for 501(c) status. This is the all-important IRS tax designation that allows you to obtain private and public grants, low-cost postage rates and exemption from income, sales and property taxes. Most importantly, it allows individuals to donate money to you tax-free.
To quality, your organization must be formed to benefit the public, a specific group of individuals or the membership of the nonprofit. Examples include religious organizations, charitable organizations, political organizations, credit unions and membership clubs (such as the Elk’s Club or a country club).
Establish and adopt by-laws for your non-profit organization. Bylaws are the “rules” that govern your non-profit and are necessary to ensure that your organization qualifies for state and federal tax exemption.
Create and file the Articles of Incorporation and by-laws for your organization.
Set up a Board of Directors. Consider choosing individuals who are both passionate about your cause and carry some weight in your community. An impressive Board of Directors serves as a tremendous resource to a non-profit organization and can often be a “make or break” factor in your success.
Set up a bank account under the name of your non-profit organization and that is separate from your personal bank account or from any other business accounts you have.
Establish an annual budget for your non-profit based on operating expenses including salaries. Once the budget is created, it is possible to determine the amount of money required to run the non-profit.
Develop a funding plan that includes funding resources such as grants, corporate and private donations, in-kind contributions, and volunteer hours.
With the help of your accountant, set up record keeping and accounting processes. This is particularly important in the eyes of the IRS and key to maintaining your non-profit and tax-exempt status.
File any necessary local, state and federal tax, licensing, and permits that are required such as obtaining a federal EIN (employee identification number) by filing IRS Form SS-4, applying for a business license from the city and/or state, obtaining a certificate of occupancy for a building, or building permits if you are planning on renovating any part of the building in which your non-profit agency is located.
Develop human resource related policies and procedures manuals if you are planning on hiring additional employees.
New Non-HTTPS Websites Blacklisted for Phishy Password Practices
On May 26, 2017Source: Sucuri Blog
We submit hundreds of blacklist review requests every day after cleaning our clients’ websites. Google’s Deceptive Content warning applies when Google detects dangerous code that attempts to trick users into revealing sensitive information. For the past couple of months we have noticed that the number of websites blacklisted with Deceptive Content warnings has increased for no apparent reason. The sites were clean, and there was no external resources loading on the website. Contin… Read more
Personal Security Guide – Online Accounts
On May 23, 2017Source: Sucuri Blog
In our last post on browser security, we talked about how developing a broader security mindset can help keep your website safe. By taking steps to secure your online accounts you can prevent hackers from gaining unauthorized access to your website. There are a number of ways that compromised accounts can leave you exposed to a website security incident – including but not limited to – your email, registrar, hosting company, repositories, and even social media accounts. Continue r… Read more
Personal Security Guide – Web Browsers
On May 19, 2017Source: Sucuri Blog
If your computer is infected, malware can spread to your website through text editors and FTP clients. Weak passwords are also vulnerable to brute force attacks, and using unsecured networks to access the internet can leave you exposed to hackers. As a website owner, you have to consider the broader impacts of your overall security posture. Practicing security in every aspect of digital communication will ultimately protect you, your website and visitors. This post is the first in a series of… Read more
SQL Injection Vulnerability in Joomla! 3.7
On May 17, 2017Source: Sucuri Blog
During regular research audits for our Sucuri Firewall (WAF), we discovered a SQL Injection vulnerability affecting Joomla! 3.7 – CVE-2017-8917. The vulnerability is easy to exploit and doesn’t require a privileged account on the victim’s site. Are You at Risk? The vulnerability is caused by a new component, com_fields, which was introduced in version 3.7. If you use this version, you are affected and should update as soon as possible. This vulnerable component is publicly accessible, w… Read more
Website Availability and Security When Migrating Hosts
On May 12, 2017Source: Sucuri Blog
Website security is a continuous process. It’s not something that should be turned on when the time is right; rather integrated into the full scope of how you deploy a website, maintain it, and ensure the safety of your visitors. At Sucuri, we protect websites with a wide range of website configurations, including business owners with a single website, multi-site WordPress installations, and web agencies who work with a number of clients. One of the biggest concerns for all of them… Read more
Fake WordPrssAPI Stealing Cookies and Hijacking Sessions
On May 9, 2017Source: Sucuri Blog
Cookies are stored in the user’s browser to track behavior on a specific website. They also keep a user logged in during the active browsing session. Without cookies a user would need to log in, in order to authenticate every action they take. Essentially, cookies keep a user logged in until they either log out or the cookie expires. Cookie Stealing and Session Hijacking If an attacker is able to steal active cookies, the attacker can pretend to be that user and perform any actions the… Read more
Introducing the New Sucuri Customer Dashboard
On May 4, 2017Source: Sucuri Blog
Over the course of the last year, our teams have been getting creative and making a collaborative effort to improve the experience of our customer dashboard. Website security is multifaceted and we understand the logistical complexities of managing multiple sites. That’s why we are continually brainstorming ways to make the management of your website security tools more streamlined. As always, your suggestions are greatly appreciated. Thank you for helping us create a better product each day.… Read more
Labs Notes Recap – Apr/2017
On May 2, 2017Source: Sucuri Blog
This month, our Malware Research and Incident Response teams wrote about several malware techniques that attempt to evade detection by focusing on small changes that website owners might miss. Examples include typos in domain names, unused top-level domains (i.e. .com, .solutions), and delayed banner ads. Sucuri Labs provides website malware research updates directly from our teams on the front line. You can read past-monthly recaps to catch up on trends we look at every month. Continue readi… Read more
Sucuri Firewall Dashboard Update
On April 27, 2017Source: Sucuri Blog
If you are a customer of ours, you may have noticed the recent updates we’ve made to our dashboard. These changes enhance your ability to manage the Sucuri Firewall and view detailed reports on the attacks being blocked from accessing your site. The dashboard has a new layout that improves both navigatio, clarity and usability of the product. If you’re not familiar with our firewall, it’s a cloud-based Website Application Firewall (WAF) and Intrusion Prevention System (IPS). Continue reading… Read more
How to Use Splunk with Sucuri Audit Trails
On April 25, 2017Source: Sucuri Blog
The Sucuri Firewall dashboard provides a rich set of API functions that can be used to control your firewall settings remotely. In addition, there is an API function to download your Audit Trails in JSON format. The audit trail is a list of blocked requests that the firewall performed on your behalf to keep your site safe. While it’s possible to view your audit trails in your Sucuri dashboard, you can get even more powerful analysis and comparison when you load them into Splunk. Continu… Read more