In person instruction with question period and customization for your Canadian non-profit for a group of your staff. Available in person in Metro Vancouver, over zoom throughout Canada or live for keynotes at an hourly rate. I can licence a recording of your zoom training session for internal use for a small additional fee. A recorded version of this course for self-led study will be available to individuals or teams at an affordable price soon.
How long is the course?
The course content takes an hour to deliver and is aimed at an end user or non-profit leader audience. A question period of a half hour to an hour is also useful. After the course there is an online guide of curated additional resources to provide support.
What is taught?
The course provides cyber security training and policies for your Canadian non-profit to fulfil the requirements of cyber security liability insurance and Canadian and provincial law. It provides guidance and training on PIPEDA (and PIPA) compliant cybersecurity practices for your business email, phones, computers and website. See below for the outline.
Who is the instructor?
Taught by Sophia Kelly, an IT and web consultant with 25+ years of experience helping non-profits do good things better online. She has been providing user support and training, programming, design and management services since 1999. She also provides maintenance, technical oversight and security services for her clients.
Sophia has a pragmatic, easy to understand training style that centres individual learning needs and organizational goals, and uses non-specialist language whenever possible.
Cyber Security for Canadian Non-Profits Course Outline – Live Delivery
- Cyber Security for Canadian Non-Profits
- Introduction
- What we will cover
- Why Pay Attention to Cyber Security?
- Cyber Security Risks
- Canadian and Intra-provincial Legislation
- PIPEDA (Canada) & PIPA (BC, AB) Require – can be customized for your province
- Electronic Privacy Law
- PIPA (BC)
- Cyber Security Principles
- Physical Protection and Barriers
- Passwords and Biometrics
- Biometrics
- ‘Key’ Recommendations
- What I use – Password Manager
- Passwords without a Manager
- Encryption
- Encryption Uses
- Backups
- What I use – Backup #1
- What I use – Online file storage– Backup #2 & #3
- Data Destruction
- (More) Secure Email
- Email Encryption and Signature
- What I use – Email
- Antivirus and Ransomware Protection
- Protecting Your Website
- Services that can be made secure
- Secure Examples
- Fraud Literacy
- Cyber Security Policies (PIPEDA)
- Cyber Security Policies – Breach
- Overwhelmed? Here’s where to start
- Next Steps
- Final Reminders & Takeaways
- How to Resources and More Information



