{"id":11453,"date":"2023-06-08T00:00:00","date_gmt":"2023-06-08T07:00:00","guid":{"rendered":"https:\/\/pro-migration.local\/blog\/updated-nonprofit-cybersecurity\/"},"modified":"2025-06-10T11:33:04","modified_gmt":"2025-06-10T18:33:04","slug":"updated-nonprofit-cybersecurity","status":"publish","type":"post","link":"https:\/\/gofundme.to\/__proxy\/pro.gofundme.com\/c\/blog\/updated-nonprofit-cybersecurity\/","title":{"rendered":"Why Cybersecurity Matters for Nonprofits and 6 Ways to Secure Fundraising"},"content":{"rendered":"<p><span style=\"color: #515358;\">Like any for-profit company,\u00a0<\/span><span style=\"color: #515358;\">nonprofits<\/span><span style=\"color: #515358;\">\u00a0aren\u2019t immune to the threat of being compromised.\u00a0<\/span><span style=\"color: #515358;\">Data breaches<\/span><span style=\"color: #515358;\">\u00a0are frequent across all industries, with a\u00a0<\/span><span style=\"color: #515358;\">cyberattack<\/span><span style=\"color: #515358;\"> occurring every 39 seconds.\u00b9<\/span><\/p>\n<p><span style=\"color: #515358;\">Security is essential on any platform, especially when dealing with payment data. As a result, a technology stack to protect your\u00a0<\/span><span style=\"color: #515358;\">nonprofit<\/span><span style=\"color: #515358;\">\u00a0and its loyal donors is non-negotiable. Today, we\u2019ll cover why proactive\u00a0<\/span><span style=\"color: #515358;\">security measures<\/span><span style=\"color: #515358;\">\u00a0are critical to sustaining your donors\u2019 trust.\u00a0<\/span><\/p>\n<p><span style=\"color: #515358;\">Read on to discover a few ways to improve your\u00a0<\/span><span style=\"color: #515358;\">nonprofit cybersecurity<\/span><span style=\"color: #515358;\">\u00a0hygiene and stay ahead of any potential risk. Hear exclusive insights from GoFundMe\u2019s Chief\u00a0<\/span><span style=\"color: #515358;\">Information Security<\/span><span style=\"color: #515358;\">\u00a0Officer,\u00a0<\/span><a href=\"https:\/\/www.linkedin.com\/in\/jtdowney\/\" target=\"_blank\" rel=\"noopener\">John Downey<\/a><span style=\"color: #515358;\">, on protecting your organization and its valuable supporters and simple lessons he\u2019s learned throughout his two-decade-long career in computer software and security.<\/span><\/p>\n<h2>What Is Cybersecurity?<\/h2>\n<p><span style=\"color: #515358;\">Cybersecurity<\/span><span style=\"color: #515358;\"> is the practice of protecting your systems, networks, and programs from digital attacks.\u00b2 Assessing <\/span><span style=\"color: #515358;\">nonprofit cybersecurity<\/span><span style=\"color: #515358;\">\u00a0expands beyond protecting your systems to safeguard the people who support your organization.<\/span><\/p>\n  <div class=\"classy-quote\">\n    <blockquote>\n      <p class=\"quote-content\"><span style=\"color: #515358;\"><strong><em>In our increasingly digital world, everything is connected. This is both good and bad for\u00a0<\/em><\/strong><\/span><span style=\"color: #515358;\"><strong><em>nonprofits<\/em><\/strong><\/span><span style=\"color: #515358;\"><strong><em>. It\u2019s great in that it makes online\u00a0<\/em><\/strong><\/span><span style=\"color: #515358;\"><strong><em>fundraising<\/em><\/strong><\/span><span style=\"color: #515358;\"><strong><em>\u00a0a much smoother experience for donors, but\u00a0<\/em><\/strong><\/span><span style=\"color: #515358;\"><strong><em>nonprofits<\/em><\/strong><\/span><span style=\"color: #515358;\"><strong><em>\u00a0are also more susceptible to\u00a0<\/em><\/strong><\/span><span style=\"color: #515358;\"><strong><em>security breaches<\/em><\/strong><\/span><span style=\"color: #515358;\"><strong><em>\u00a0due to the sheer volume of online activity. It\u2019s the responsibility of the\u00a0<\/em><\/strong><\/span><span style=\"color: #515358;\"><strong><em>nonprofit<\/em><\/strong><\/span><span style=\"color: #515358;\"><strong><em>\u00a0to create a safe online space for its supporters.<\/em><\/strong><\/span><\/p>\n\n      \n        <footer>\n                    <p class=\"cite-name\">John Downey<\/p>\n<p class=\"cite-role\">GoFundMe\u2019s Chief Information Security Officer<\/p>\n                  <\/footer>\n\n      \n      <\/blockquote>\n\n        <\/div>\n\n  \n<p><span style=\"color: #515358;\">There are several different\u00a0<\/span><span style=\"color: #515358;\">cyberattacks<\/span><span style=\"color: #515358;\">, but three of the most common include:<\/span><\/p>\n<ul>\n<li><span style=\"color: #2d2e31;\"><strong>Phishing<\/strong><\/span><span style=\"color: #2d2e31;\"><strong>\u00a0attacks:\u00a0<\/strong><\/span><span style=\"color: #2d2e31;\">Stealing\u00a0<\/span><span style=\"color: #2d2e31;\">sensitive information<\/span><span style=\"color: #2d2e31;\">\u00a0by sending fraudulent emails that resemble emails from trusted sources<\/span><\/li>\n<li><span style=\"color: #2d2e31;\"><strong>Denial of service (DoS) attacks:<\/strong><\/span><span style=\"color: #2d2e31;\">\u00a0Triggering a crash to make a network inaccessible to its intended users<\/span><\/li>\n<li><span style=\"color: #2d2e31;\"><strong>Malware<\/strong><\/span><span style=\"color: #2d2e31;\"><strong>\u00a0attacks:\u00a0<\/strong><\/span><span style=\"color: #2d2e31;\">Using\u00a0<\/span><span style=\"color: #2d2e31;\">malware<\/span><span style=\"color: #2d2e31;\">\u00a0software to gain unauthorized access or cause damage to a computer<\/span><\/li>\n<\/ul>\n<p><span style=\"color: #515358;\">The information in this post will help you protect your nonprofit against each of these types of attacks, which fall<\/span><span style=\"color: #515358;\">\u00a0under the larger umbrella of\u00a0<\/span><span style=\"color: #515358;\">cybersecurity<\/span><span style=\"color: #515358;\">.<\/span><\/p>\n<h2>Why Cybersecurity Matters for Your Organization<\/h2>\n<h3>The Numbers in 2022\u00b3<\/h3>\n<ul>\n<li><span style=\"color: #2d2e31;\">1,802 total data compromises\u00a0<\/span><\/li>\n<li><span style=\"color: #2d2e31;\">422,143,312 total victims\u00a0<\/span><\/li>\n<\/ul>\n<h3>The Long-Term Value<\/h3>\n<p><span style=\"color: #515358;\">Security and stability lead to deeper donor trust, potentially resulting in\u00a0<\/span><a href=\"https:\/\/gofundme.to\/__proxy\/pro.gofundme.com\/blog\/top-5-reasons-to-invest-in-monthly-recurring-donations\/\" target=\"_blank\" rel=\"noopener\">recurring donations<\/a><span style=\"color: #515358;\">. When you consider retention, donor confidence also impacts their likelihood of returning and giving again. Preventing\u00a0<\/span><span style=\"color: #515358;\">data breaches<\/span><span style=\"color: #515358;\">\u00a0reduces the risk to your\u00a0<\/span><span style=\"color: #515358;\">nonprofit<\/span><span style=\"color: #515358;\">\u2019s reputation and the costs associated with a\u00a0<\/span><span style=\"color: #515358;\">data security breach<\/span><span style=\"color: #515358;\">.<\/span><\/p>\n<p><span style=\"color: #515358;\">Among the different costs of a breach in 2022, lost business represented the largest share at an average total cost of $1.42 million.<sup>4<\/sup> Keep reliability at the forefront of every organizational decision and consider how you can continue taking the necessary steps to uphold the highest security standards.<\/span><\/p>\n<h2>5 Actions to Protect Your Nonprofit Organization From Security Threats<\/h2>\n<p><span style=\"color: #515358;\">There are several\u00a0<\/span><span style=\"color: #515358;\">cybersecurity measures<\/span><span style=\"color: #515358;\">\u00a0your organization can take to protect its community. In our interview with John Downey, he shared a few simple recommendations to start with:<\/span><\/p>\n<h3>1. Be wary of unfamiliar emails or texts sent to your personal or work devices<\/h3>\n<p><span style=\"color: #515358;\">This is one of the most common ways that\u00a0<\/span><span style=\"color: #515358;\">phishing<\/span><span style=\"color: #515358;\">\u00a0attacks occur. An attacker pretends to be an executive or founder of your organization and asks for personal information, such as your\u00a0<\/span><span style=\"color: #515358;\">credit card<\/span><span style=\"color: #515358;\">, Social Security number, password, or protected company data.<\/span><\/p>\n<p><span style=\"color: #515358;\">One way to check if this is a\u00a0<\/span><span style=\"color: #515358;\">hacker<\/span><span style=\"color: #515358;\">\u00a0is to look at the sender\u2019s email address. Often, the email address will have the same prefix but not the same domain name as your organization.<\/span><\/p>\n<p><span style=\"color: #515358;\">For example, if your CEO\u2019s email address is jsmith@organization.org, the\u00a0<\/span><span style=\"color: #515358;\">hacker<\/span><span style=\"color: #515358;\">\u2019s email address may be\u00a0<\/span><a href=\"mailto:jsmith@1245.com\" target=\"_blank\" rel=\"noopener\">jsmith@1245.com<\/a><span style=\"color: #515358;\">.<\/span><\/p>\n  <div class=\"classy-quote\">\n    <blockquote>\n      <p class=\"quote-content\"><span style=\"color: #515358;\"><strong><em>Awareness of impersonation threats is critical to preventing these types of attacks. Educate your team, train your staff regularly on handling these situations, and always remind volunteers to be wary of messages coming directly from executives.<\/em><\/strong><\/span><\/p>\n\n      \n      <\/blockquote>\n\n        <\/div>\n\n  \n<h3>2. Do not click unknown links or download attachments in any personal or work communications<\/h3>\n<p><span style=\"color: #515358;\">Clicking links or downloading attachments in emails and text messages can lead to downloading\u00a0<\/span><span style=\"color: #515358;\">malware<\/span><span style=\"color: #515358;\">\u00a0on your computer or phone.\u00a0<\/span><\/p>\n<p><span style=\"color: #515358;\">One way to check if a link is trustworthy is to hover over it. The full link will pop up in the left corner of your browser. If the website\u2019s domain doesn\u2019t match your organization&#8217;s or the company allegedly reaching out to you, don\u2019t click the link.<\/span><\/p>\n<h3>3. Flag suspicious activity or phishing attempts that appear risky<\/h3>\n<p><span style=\"color: #515358;\">Sending suspicious emails to your IT team is another red flag. If you don\u2019t have an IT team, you can report the email as a\u00a0<\/span><span style=\"color: #515358;\">phishing<\/span><span style=\"color: #515358;\">\u00a0attack to your service provider. For example, with Gmail, you can mark the email as spam, which notifies Google that this is an unwanted email. You can also report the\u00a0<\/span><span style=\"color: #515358;\">phishing<\/span><span style=\"color: #515358;\">\u00a0email to Google.<\/span><\/p>\n<h3>4. Update your password on any platforms you use, particularly ones that store sensitive information<\/h3>\n<p><span style=\"color: #515358;\">If you have the same password for all your work accounts, it\u2019s time to update them. Try a password management app or\u00a0<\/span><span style=\"color: #515358;\">implement<\/span><span style=\"color: #515358;\">\u00a0a single sign-on (SSO) tool for a more secure experience.<\/span><\/p>\n<p><span style=\"color: #515358;\">SSO is an\u00a0<\/span><span style=\"color: #515358;\">authentication<\/span><span style=\"color: #515358;\">\u00a0tool that allows users to sign into multiple applications with only one set of credentials. Typically, SSO software requires users to update their passwords regularly with more robust password qualifications. When paired with\u00a0<\/span><span style=\"color: #515358;\">multifactor authentication<\/span><span style=\"color: #515358;\">\u00a0(MFA), you see the best of both worlds regarding password security.<\/span><\/p>\n  <div class=\"classy-quote\">\n    <blockquote>\n      <p class=\"quote-content\"><span style=\"color: #515358;\"><strong><em>If there\u2019s an open door,\u00a0<\/em><\/strong><\/span><span style=\"color: #515358;\"><strong><em>hackers<\/em><\/strong><\/span><span style=\"color: #515358;\"><strong><em>\u00a0will take full advantage of it.\u00a0<\/em><\/strong><\/span><span style=\"color: #515358;\"><strong><em>Multifactor authentication<\/em><\/strong><\/span><span style=\"color: #515358;\"><strong><em>\u00a0is a metaphorical way to double-lock your data door. That additional barrier is critical when it comes to maintaining donors\u2019 trust and long-term support.<\/em><\/strong><\/span><\/p>\n\n      \n      <\/blockquote>\n\n        <\/div>\n\n  \n<h3>5. Ensure your fundraising platform follows security best practices<\/h3>\n<p><span style=\"color: #515358;\">While there are numerous actions your organization can take to improve security, your\u00a0<\/span><span style=\"color: #515358;\">fundraising<\/span><span style=\"color: #515358;\">\u00a0software should also prioritize and be proactive in its\u00a0<\/span><span style=\"color: #515358;\">security measures<\/span><span style=\"color: #515358;\">. We deep dive into those platform security considerations below.<\/span><\/p>\n<h2>6 Cybersecurity Considerations for Your Fundraising Platform<\/h2>\n<p><span style=\"color: #515358;\">Security should be a key consideration throughout your\u00a0<\/span><a href=\"https:\/\/gofundme.to\/__proxy\/pro.gofundme.com\/blog\/nonprofit-software-evaluation\/\" target=\"_blank\" rel=\"noopener\">fundraising software evaluation process<\/a><span style=\"color: #515358;\">. Here are six questions to ask when deciding which platform is best to protect your organization and its donors.<\/span><\/p>\n<h3>1. Does my fundraising platform have a data security team?<\/h3>\n<p><span style=\"color: #515358;\">Your days are busy at a\u00a0<\/span><span style=\"color: #515358;\">nonprofit<\/span><span style=\"color: #515358;\">, whether coordinating\u00a0<\/span><a href=\"https:\/\/gofundme.to\/__proxy\/pro.gofundme.com\/blog\/fundraising-event-ideas-raise-money-cause\/\" target=\"_blank\" rel=\"noopener\">fundraising events<\/a><span style=\"color: #515358;\">\u00a0or analyzing donor behavior. It\u2019s essential that you find a\u00a0<\/span><a href=\"https:\/\/gofundme.to\/__proxy\/pro.gofundme.com\/donation-websites\/\" target=\"_blank\" rel=\"noopener\">donation platform<\/a><span style=\"color: #515358;\">\u00a0that serves as an extension of your team to help get everything done.<\/span><\/p>\n<p><span style=\"color: #515358;\">When you evaluate different\u00a0<\/span><span style=\"color: #515358;\">fundraising<\/span><span style=\"color: #515358;\"> software providers, determine whether they have a department focused solely on platform security and policies. <span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Source Serif Pro';font-style:normal;text-decoration-skip-ink:none;\">Since it\u2019s unrealistic to monitor your <\/span><a href=\"https:\/\/gofundme.to\/__proxy\/pro.gofundme.com\/\"><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#ff0000;font-weight:normal;text-decoration:underline;font-family:''docs-Source Serif Pro'';font-style:normal;text-decoration-skip-ink:none;\">online fundraising platform<\/span><\/a><span data-sheets-formula-bar-text-style=\"font-size:15px;color:#000000;font-weight:normal;text-decoration:none;font-family:'docs-Source Serif Pro';font-style:normal;text-decoration-skip-ink:none;\"> 24\/7, finding the right people and tools to serve as your eyes and ears can provide much-needed peace of mind.<\/span><\/span><\/p>\n<h4>We Practice What We Preach<\/h4>\n<p><span style=\"color: #515358;\">Classy and GoFundMe have an\u00a0<\/span><span style=\"color: #515358;\">Information Security<\/span><span style=\"color: #515358;\"> and Privacy team in addition to a Risk and Compliance team. We prioritize having the technology and industry expertise to protect our global\u00a0<\/span><span style=\"color: #515358;\">nonprofit organizations<\/span><span style=\"color: #515358;\">\u00a0proactively. In addition, we know that supporting our customers behind the scenes allows them to focus on what matters most\u2014their mission.<\/span><\/p>\n<h3>2. What governance policies and security training does the platform have?<\/h3>\n<p><span style=\"color: #515358;\">Promising to respond and rebuild in the case of a\u00a0<\/span><span style=\"color: #515358;\">data breach<\/span><span style=\"color: #515358;\">\u00a0is not enough to gain donors\u2019 trust. Find a platform with proactive policies to protect your organization\u2019s information at all costs.<\/span><\/p>\n<p><span style=\"color: #515358;\">Ask about the platform\u2019s level of compliance and explore its coding principles to ensure each platform feature is secure. In addition, make sure the platform\u2019s team receives regular training to remain up to date on the most effective security procedures.<\/span><\/p>\n<h4>We Practice What We Preach<\/h4>\n<p><span style=\"color: #515358;\">Independent auditors evaluated Classy and GoFundMe systems, which passed the highest\u00a0<\/span><span style=\"color: #515358;\">security protocols<\/span><span style=\"color: #515358;\">\u00a0set by\u00a0<\/span><a href=\"https:\/\/www.pcicomplianceguide.org\/faq\/\" target=\"_blank\" rel=\"noopener\">PCI DSS<\/a><span style=\"color: #515358;\">. In addition,<\/span><span style=\"color: #434343;\">\u00a0Classy<\/span><span style=\"color: #515358;\">\u00a0leverages industry standards, such as the Open Web Application Security Project\u00a0<\/span><a href=\"https:\/\/owasp.org\/www-project-top-ten\/\" target=\"_blank\" rel=\"noopener\">(OWASP) Top 10 Principles<\/a><span style=\"color: #515358;\">, in its software development lifecycle. The entire staff completes security training annually, and developers must undergo recurrent secure coding training.<\/span><\/p>\n<h3>3. How does security influence the platform\u2019s development?<\/h3>\n<p><span style=\"color: #515358;\">The infrastructure of a\u00a0<\/span><span style=\"color: #515358;\">fundraising<\/span><span style=\"color: #515358;\">\u00a0platform informs the security level of your organization\u2019s and\u00a0<\/span><span style=\"color: #515358;\">donors\u2019 data<\/span><span style=\"color: #515358;\">. You should look at the <\/span><span style=\"color: #515358;\">fundraising<\/span><span style=\"color: #515358;\">\u00a0platform\u2019s architecture and ask about it in conversations with any vendors you consider.<\/span><\/p>\n<p><span style=\"color: #515358;\">When you look at your\u00a0<\/span><span style=\"color: #515358;\">fundraising<\/span><span style=\"color: #515358;\">\u00a0platform\u2019s architecture, consider if it\u2019s hosted on-premise or in the cloud. If it\u2019s hosted on the cloud, you benefit from a software-as-a-service (SaaS) environment, which affords your\u00a0<\/span><span style=\"color: #515358;\">nonprofit<\/span><span style=\"color: #515358;\">\u00a0the latest technology without worrying about upgrades.<\/span><\/p>\n<h4>We Practice What We Preach<\/h4>\n<p><span style=\"color: #515358;\">Classy uses a secure cloud architecture and multiple\u00a0<\/span><span style=\"color: #515358;\">security measures<\/span><span style=\"color: #515358;\">\u00a0to protect\u00a0<\/span><span style=\"color: #515358;\">sensitive data<\/span><span style=\"color: #515358;\">. These include:<\/span><\/p>\n<ul>\n<li><span style=\"color: #2d2e31;\">Amazon Web Services (AWS) Virtual Private Cloud<\/span><\/li>\n<li><span style=\"color: #2d2e31;\">PCI Level 1 Certification<\/span><\/li>\n<li><span style=\"color: #2d2e31;\">24\/7\/365 security scanning and threat monitoring<\/span><\/li>\n<li><span style=\"color: #2d2e31;\">Network-level\u00a0<\/span><span style=\"color: #2d2e31;\">vulnerability<\/span><span style=\"color: #2d2e31;\">\u00a0scanning<\/span><\/li>\n<li><span style=\"color: #2d2e31;\">Annual penetration testing<\/span><\/li>\n<li><span style=\"color: #2d2e31;\">Web application\u00a0<\/span><span style=\"color: #2d2e31;\">firewall<\/span><span style=\"color: #2d2e31;\">\u00a0(WAF) and distributed denial-of-service (DDoS) protection<\/span><\/li>\n<\/ul>\n<p><span style=\"color: #515358;\">We also build security into the foundation of all our products and services. This includes load balancer-based compute isolation, role-based access control, secure logging, static and dynamic code analysis, and OWASP secure coding principles. Using tokenization, encryption, and key management, Classy never stores\u00a0<\/span><span style=\"color: #515358;\">credit card<\/span><span style=\"color: #515358;\">\u00a0information and always protects other\u00a0<\/span><span style=\"color: #515358;\">sensitive data<\/span><span style=\"color: #515358;\">.<\/span><\/p>\n<h3>4. How often is the platform scanned and monitored for potential issues?<\/h3>\n<p><span style=\"color: #515358;\">Regarding\u00a0<\/span><span style=\"color: #515358;\">sensitive data<\/span><span style=\"color: #515358;\">, you\u2019ll always want to know how it\u2019s stored, who can access it, and what protocols are in place to ensure no leaks. A\u00a0<\/span><span style=\"color: #515358;\">security breach<\/span><span style=\"color: #515358;\">\u00a0can happen quickly, so you\u2019ll want to be sure your\u00a0<\/span><span style=\"color: #515358;\">fundraising<\/span><span style=\"color: #515358;\">\u00a0platform monitors for issues constantly.<\/span><\/p>\n<h4>We Practice What We Preach<\/h4>\n<p><span style=\"color: #515358;\">Classy uses 24\/7\/365 monitoring, leveraging an intrusion detection system (IDS), network-level scanning, and WAF. We also know from Classy\u2019s\u00a0<\/span><a href=\"https:\/\/donationtrends.classy.org\/\" target=\"_blank\" rel=\"noopener\"><em>State of Modern Philanthropy<\/em><\/a><span style=\"color: #515358;\">\u00a0report that 30% of our platform\u2019s donation volume occurs between\u00a0<\/span><span style=\"color: #434343;\">Giving Tuesday<\/span><span style=\"color: #515358;\">\u00a0and New Year\u2019s Eve. This fuels our desire to take specific steps to deliver a secure, stable, and reliable giving platform for all our customers.<\/span><\/p>\n<p><span style=\"color: #515358;\">In addition to maintaining reliability, readiness, and security throughout the year on the Classy platform, we take the following preemptive measures heading into the peak giving season:<\/span><\/p>\n<ul>\n<li><span style=\"color: #2d2e31;\">Completing an annual audit for PCI Level 1 Certification for the highest accuracy and readiness<\/span><\/li>\n<li><span style=\"color: #2d2e31;\">Partnering with a team of AWS solutions engineers who maintain an all-day, live-mission control room to monitor platform activity in real-time on Giving Tuesday and other major giving days\u00a0<\/span><\/li>\n<li><span style=\"color: #2d2e31;\">Scaling of our infrastructure preemptively for Giving Tuesday to add servers to our cluster, which helps to support our best-in-class infrastructure security and highly available architecture with automatic scale protocols<\/span><\/li>\n<li><span style=\"color: #2d2e31;\">Pausing on product development between October and January proactively to recognize the critical period for\u00a0<\/span><span style=\"color: #2d2e31;\">fundraising<\/span><span style=\"color: #2d2e31;\">\u00a0and ensure all products and features work as expected<\/span><\/li>\n<\/ul>\n<h3>5. Are there any audits in place to ensure continued compliance?<\/h3>\n<p><span style=\"color: #515358;\">It\u2019s critical to consistently reevaluate your protocols to ensure compliance with the highest standards. That starts with understanding how your\u00a0<\/span><span style=\"color: #515358;\">fundraising<\/span><span style=\"color: #515358;\">\u00a0platform addresses audits and stays up to date with the latest compliance measures as the world of security technology continues to evolve.<\/span><\/p>\n<h4>We Practice What We Preach<\/h4>\n<p><span style=\"color: #515358;\">By implementing and adhering to procedures and standards, Classy and GoFundMe ensure that our platform and systems keep the data of our partner organizations safe and secure.\u00a0<\/span><\/p>\n<p><span style=\"color: #515358;\">As mentioned, we conduct regular audit reviews that adhere to the OWASP Top 10 Principles when developing and\u00a0<\/span><span style=\"color: #515358;\">implementing<\/span><span style=\"color: #515358;\">\u00a0features and security controls. Our development and engineering teams also undergo recurrent secure coding training.<\/span><\/p>\n<p><span style=\"color: #515358;\">Leading up to Giving Tuesday, Classy also conducts a well-architected audit of best practices in\u00a0<\/span><span style=\"color: #515358;\">partnership<\/span><span style=\"color: #515358;\">\u00a0with AWS and Cloudflare.<\/span><\/p>\n<h3>6. What technology does the fundraising platform use to ensure secure payments?<\/h3>\n<p><span style=\"color: #515358;\">Security on any platform is essential, especially when dealing with personally identifiable information and payment data. Donors want to know that their payment information is secure, regardless of which method they find easiest to make a donation.<\/span><\/p>\n<p><span style=\"color: #515358;\">As more\u00a0<\/span><span style=\"color: #515358;\">nonprofit organizations<\/span><span style=\"color: #515358;\">\u00a0offer\u00a0<\/span><a href=\"https:\/\/gofundme.to\/__proxy\/pro.gofundme.com\/blog\/nonprofit-online-payment-processing\/\" target=\"_blank\" rel=\"noopener\">diversified online payment processing<\/a><span style=\"color: #515358;\">\u00a0options for supporters, it\u2019s essential to ask how vendors transfer that data and emphasize security regularly.<\/span><\/p>\n<h4>We Practice What We Preach<\/h4>\n<p><span style=\"color: #515358;\">Regarding\u00a0<\/span><a href=\"https:\/\/gofundme.to\/__proxy\/pro.gofundme.com\/fundraising-solutions\/classy-pay\/\" target=\"_blank\" rel=\"noopener\">nonprofit payment processing<\/a><span style=\"color: #515358;\">, Classy Pay offers the secure and trusted payment options of PayPal, Venmo, and cryptocurrency through Coinbase. We\u2019re also preparing to launch SSO this summer so users can eliminate weak passwords and increase security.\u00a0<\/span><\/p>\n<p><span style=\"color: #515358;\">We select best-in-class payment processing vendors to integrate into our payment solution, then thoroughly evaluate their\u00a0<\/span><span style=\"color: #515358;\">security measures<\/span><span style=\"color: #515358;\">. In addition, Stripe Radar\u00a0<\/span><span style=\"color: #515358;\">implements<\/span><span style=\"color: #515358;\">\u00a0blocking and reviews rules for fraud protection, while the Classy team audits suspicious and fraudulent activity regularly. We also prioritize a timely response to any incidents, internally and externally.<\/span><\/p>\n<h2>Raise More, Do More With Secure Software<\/h2>\n<p><span style=\"color: #515358;\">Balance\u00a0<\/span><a href=\"https:\/\/gofundme.to\/__proxy\/pro.gofundme.com\/blog\/nonprofit-transparency\/\" target=\"_blank\" rel=\"noopener\">nonprofit transparency<\/a><span style=\"color: #515358;\">\u00a0and security, maintain trust with your donors, and feel confident in the stability and reliability of your platform.\u00a0<\/span><\/p>\n<p><span style=\"color: #515358;\">Whether your organization is evaluating new technology or exploring proactive ways to uplevel its policies, take the proper steps to protect your community and safeguard its mission.\u00a0<\/span><\/p>\n<p><span style=\"color: #515358;\">We\u2019d love to help you get started with more information about the\u00a0<\/span><a href=\"https:\/\/gofundme.to\/__proxy\/pro.gofundme.com\/why-classy\/security\/\" target=\"_blank\" rel=\"noopener\">Classy and GoFundMe policies<\/a><span style=\"color: #515358;\">. Plus, our\u00a0<\/span><a href=\"https:\/\/support.classy.org\/s\/contactcare\" target=\"_blank\" rel=\"noopener\">customer care<\/a><span style=\"color: #515358;\">\u00a0team can answer any other questions that come to mind.<\/span><\/p>\n<p><span style=\"color: #515358;\"><strong>Article Sources<\/strong><\/span><\/p>\n<ol>\n<li>\u201cHow Many Cyber Attacks Happen Per Day in 2023?\u201d Techjury, last modified February 27, 2023, <a href=\"https:\/\/techjury.net\/blog\/how-many-cyber-attacks-per-day\/#gref\" target=\"_blank\" rel=\"noopener\">https:\/\/techjury.net\/blog\/how-many-cyber-attacks-per-day\/#gref<\/a><span style=\"color: #4169e1;\">.<\/span><\/li>\n<li>&#8220;What Is Cybersecurity?&#8221; Cisco, accessed June 8, 2023, <a href=\"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/what-is-cybersecurity.html\" target=\"_blank\" rel=\"noopener\">https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/what-is-cybersecurity.html<\/a><span style=\"color: #4169e1;\">.<\/span><\/li>\n<li>&#8220;2022 Data Breach Report,&#8221; Identity Theft Resource Center, accessed June 8, 2023,\u00a0<span style=\"color: #4169e1;\">\u00a0<\/span><a href=\"https:\/\/www.idtheftcenter.org\/wp-content\/uploads\/2023\/01\/ITRC_2022-Data-Breach-Report_Final-1.pdf\" target=\"_blank\" rel=\"noopener\">https:\/\/www.idtheftcenter.org\/wp-content\/uploads\/2023\/01\/ITRC_2022-Data-Breach-Report_Final-1.pdf<\/a><span style=\"color: #4169e1;\">.<\/span><\/li>\n<li>\u201cGive.org Donor Trust Report | 2021,\u201d Profiles in Charity Trust and Giving, Give, accessed May 31, 2023,\u00a0<a href=\"https:\/\/give.org\/docs\/default-source\/donor-trust-library\/2021-donor-trust-report.pdf\" target=\"_blank\" rel=\"noopener\">https:\/\/give.org\/docs\/default-source\/donor-trust-library\/2021-donor-trust-report.pdf<\/a><span style=\"color: #4169e1;\">.<\/span><\/li>\n<li style=\"list-style-type: none;\"><\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>In order to prevent data and security breaches, you need to implement and maintain the right infrastructure. Learn why you can&#8217;t afford to overlook your security and how you can stay prepared.<\/p>\n","protected":false},"author":3,"featured_media":24204,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[11],"tags":[],"class_list":["post-11453","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-fundraising"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.5 (Yoast SEO v25.3) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Why Cybersecurity Matters for Nonprofits and 6 Ways to Secure Fundraising - GoFundMe Pro<\/title>\n<meta name=\"description\" content=\"Interested in nonprofit cybersecurity? Read on to learn why it matters and how to utilize cybersecurity to protect your fundraising.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/gofundme.to\/__proxy\/pro.gofundme.com\/c\/blog\/updated-nonprofit-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why Cybersecurity Matters for Nonprofits and 6 Ways to Secure Fundraising\" \/>\n<meta property=\"og:description\" content=\"Interested in nonprofit cybersecurity? Read on to learn why it matters and how to utilize cybersecurity to protect your fundraising.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/gofundme.to\/__proxy\/pro.gofundme.com\/c\/blog\/updated-nonprofit-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"GoFundMe Pro\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/classy.org\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-06-08T07:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-10T18:33:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/gofundme.to\/__proxy\/pro.gofundme.com\/wp-content\/uploads\/2017\/09\/blog_nonprofit-cyber-security_header-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1224\" \/>\n\t<meta property=\"og:image:height\" content=\"612\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Hannah Kindler\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@classy\" \/>\n<meta name=\"twitter:site\" content=\"@classy\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Hannah Kindler\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/gofundme.to\/__proxy\/pro.gofundme.com\/c\/blog\/updated-nonprofit-cybersecurity\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/gofundme.to\/__proxy\/pro.gofundme.com\/c\/blog\/updated-nonprofit-cybersecurity\/\"},\"author\":{\"name\":\"Hannah Kindler\",\"@id\":\"https:\/\/gofundme.to\/__proxy\/pro.gofundme.com\/#\/schema\/person\/742b6a0ac4197e3bcfd456b7a8849564\"},\"headline\":\"Why Cybersecurity Matters for Nonprofits and 6 Ways to Secure Fundraising\",\"datePublished\":\"2023-06-08T07:00:00+00:00\",\"dateModified\":\"2025-06-10T18:33:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/gofundme.to\/__proxy\/pro.gofundme.com\/c\/blog\/updated-nonprofit-cybersecurity\/\"},\"wordCount\":2212,\"publisher\":{\"@id\":\"https:\/\/gofundme.to\/__proxy\/pro.gofundme.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/gofundme.to\/__proxy\/pro.gofundme.com\/c\/blog\/updated-nonprofit-cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/gofundme.to\/__proxy\/pro.gofundme.com\/wp-content\/uploads\/2017\/09\/blog_nonprofit-cyber-security_header-1.jpg\",\"articleSection\":[\"Fundraising\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/gofundme.to\/__proxy\/pro.gofundme.com\/c\/blog\/updated-nonprofit-cybersecurity\/\",\"url\":\"https:\/\/gofundme.to\/__proxy\/pro.gofundme.com\/c\/blog\/updated-nonprofit-cybersecurity\/\",\"name\":\"Why Cybersecurity Matters for Nonprofits and 6 Ways to Secure Fundraising - GoFundMe Pro\",\"isPartOf\":{\"@id\":\"https:\/\/gofundme.to\/__proxy\/pro.gofundme.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/gofundme.to\/__proxy\/pro.gofundme.com\/c\/blog\/updated-nonprofit-cybersecurity\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/gofundme.to\/__proxy\/pro.gofundme.com\/c\/blog\/updated-nonprofit-cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/gofundme.to\/__proxy\/pro.gofundme.com\/wp-content\/uploads\/2017\/09\/blog_nonprofit-cyber-security_header-1.jpg\",\"datePublished\":\"2023-06-08T07:00:00+00:00\",\"dateModified\":\"2025-06-10T18:33:04+00:00\",\"description\":\"Interested in nonprofit cybersecurity? Read on to learn why it matters and how to utilize cybersecurity to protect your fundraising.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/gofundme.to\/__proxy\/pro.gofundme.com\/c\/blog\/updated-nonprofit-cybersecurity\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/gofundme.to\/__proxy\/pro.gofundme.com\/c\/blog\/updated-nonprofit-cybersecurity\/#primaryimage\",\"url\":\"https:\/\/gofundme.to\/__proxy\/pro.gofundme.com\/wp-content\/uploads\/2017\/09\/blog_nonprofit-cyber-security_header-1.jpg\",\"contentUrl\":\"https:\/\/gofundme.to\/__proxy\/pro.gofundme.com\/wp-content\/uploads\/2017\/09\/blog_nonprofit-cyber-security_header-1.jpg\",\"width\":1224,\"height\":612,\"caption\":\"nonprofit-cybersecurity\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/gofundme.to\/__proxy\/pro.gofundme.com\/#website\",\"url\":\"https:\/\/gofundme.to\/__proxy\/pro.gofundme.com\/\",\"name\":\"GoFundMe Pro\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/gofundme.to\/__proxy\/pro.gofundme.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/gofundme.to\/__proxy\/pro.gofundme.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/gofundme.to\/__proxy\/pro.gofundme.com\/#organization\",\"name\":\"GoFundMe Pro\",\"url\":\"https:\/\/gofundme.to\/__proxy\/pro.gofundme.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/gofundme.to\/__proxy\/pro.gofundme.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/gofundme.to\/__proxy\/pro.gofundme.com\/wp-content\/uploads\/2025\/05\/cropped-cropped-ray-dark.png\",\"contentUrl\":\"https:\/\/gofundme.to\/__proxy\/pro.gofundme.com\/wp-content\/uploads\/2025\/05\/cropped-cropped-ray-dark.png\",\"width\":534,\"height\":534,\"caption\":\"GoFundMe Pro\"},\"image\":{\"@id\":\"https:\/\/gofundme.to\/__proxy\/pro.gofundme.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/classy.org\/\",\"https:\/\/x.com\/classy\",\"https:\/\/www.instagram.com\/gofundmepro\",\"https:\/\/www.linkedin.com\/company\/gofundme-pro\/\",\"https:\/\/en.wikipedia.org\/wiki\/Classy_(company)\",\"https:\/\/www.facebook.com\/gofundmepro\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/gofundme.to\/__proxy\/pro.gofundme.com\/#\/schema\/person\/742b6a0ac4197e3bcfd456b7a8849564\",\"name\":\"Hannah Kindler\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/gofundme.to\/__proxy\/pro.gofundme.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/gofundme.to\/__proxy\/pro.gofundme.com\/wp-content\/uploads\/2023\/10\/Headshot-copy-96x96.jpeg\",\"contentUrl\":\"https:\/\/gofundme.to\/__proxy\/pro.gofundme.com\/wp-content\/uploads\/2023\/10\/Headshot-copy-96x96.jpeg\",\"caption\":\"Hannah Kindler\"},\"url\":\"https:\/\/gofundme.to\/__proxy\/pro.gofundme.com\/c\/blog-author\/hdurbin-2\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Why Cybersecurity Matters for Nonprofits and 6 Ways to Secure Fundraising - GoFundMe Pro","description":"Interested in nonprofit cybersecurity? Read on to learn why it matters and how to utilize cybersecurity to protect your fundraising.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/gofundme.to\/__proxy\/pro.gofundme.com\/c\/blog\/updated-nonprofit-cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"Why Cybersecurity Matters for Nonprofits and 6 Ways to Secure Fundraising","og_description":"Interested in nonprofit cybersecurity? Read on to learn why it matters and how to utilize cybersecurity to protect your fundraising.","og_url":"https:\/\/gofundme.to\/__proxy\/pro.gofundme.com\/c\/blog\/updated-nonprofit-cybersecurity\/","og_site_name":"GoFundMe Pro","article_publisher":"https:\/\/www.facebook.com\/classy.org\/","article_published_time":"2023-06-08T07:00:00+00:00","article_modified_time":"2025-06-10T18:33:04+00:00","og_image":[{"width":1224,"height":612,"url":"https:\/\/gofundme.to\/__proxy\/pro.gofundme.com\/wp-content\/uploads\/2017\/09\/blog_nonprofit-cyber-security_header-1.jpg","type":"image\/jpeg"}],"author":"Hannah Kindler","twitter_card":"summary_large_image","twitter_creator":"@classy","twitter_site":"@classy","twitter_misc":{"Written by":"Hannah Kindler","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/gofundme.to\/__proxy\/pro.gofundme.com\/c\/blog\/updated-nonprofit-cybersecurity\/#article","isPartOf":{"@id":"https:\/\/gofundme.to\/__proxy\/pro.gofundme.com\/c\/blog\/updated-nonprofit-cybersecurity\/"},"author":{"name":"Hannah Kindler","@id":"https:\/\/gofundme.to\/__proxy\/pro.gofundme.com\/#\/schema\/person\/742b6a0ac4197e3bcfd456b7a8849564"},"headline":"Why Cybersecurity Matters for Nonprofits and 6 Ways to Secure Fundraising","datePublished":"2023-06-08T07:00:00+00:00","dateModified":"2025-06-10T18:33:04+00:00","mainEntityOfPage":{"@id":"https:\/\/gofundme.to\/__proxy\/pro.gofundme.com\/c\/blog\/updated-nonprofit-cybersecurity\/"},"wordCount":2212,"publisher":{"@id":"https:\/\/gofundme.to\/__proxy\/pro.gofundme.com\/#organization"},"image":{"@id":"https:\/\/gofundme.to\/__proxy\/pro.gofundme.com\/c\/blog\/updated-nonprofit-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/gofundme.to\/__proxy\/pro.gofundme.com\/wp-content\/uploads\/2017\/09\/blog_nonprofit-cyber-security_header-1.jpg","articleSection":["Fundraising"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/gofundme.to\/__proxy\/pro.gofundme.com\/c\/blog\/updated-nonprofit-cybersecurity\/","url":"https:\/\/gofundme.to\/__proxy\/pro.gofundme.com\/c\/blog\/updated-nonprofit-cybersecurity\/","name":"Why Cybersecurity Matters for Nonprofits and 6 Ways to Secure Fundraising - GoFundMe Pro","isPartOf":{"@id":"https:\/\/gofundme.to\/__proxy\/pro.gofundme.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/gofundme.to\/__proxy\/pro.gofundme.com\/c\/blog\/updated-nonprofit-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/gofundme.to\/__proxy\/pro.gofundme.com\/c\/blog\/updated-nonprofit-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/gofundme.to\/__proxy\/pro.gofundme.com\/wp-content\/uploads\/2017\/09\/blog_nonprofit-cyber-security_header-1.jpg","datePublished":"2023-06-08T07:00:00+00:00","dateModified":"2025-06-10T18:33:04+00:00","description":"Interested in nonprofit cybersecurity? Read on to learn why it matters and how to utilize cybersecurity to protect your fundraising.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/gofundme.to\/__proxy\/pro.gofundme.com\/c\/blog\/updated-nonprofit-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/gofundme.to\/__proxy\/pro.gofundme.com\/c\/blog\/updated-nonprofit-cybersecurity\/#primaryimage","url":"https:\/\/gofundme.to\/__proxy\/pro.gofundme.com\/wp-content\/uploads\/2017\/09\/blog_nonprofit-cyber-security_header-1.jpg","contentUrl":"https:\/\/gofundme.to\/__proxy\/pro.gofundme.com\/wp-content\/uploads\/2017\/09\/blog_nonprofit-cyber-security_header-1.jpg","width":1224,"height":612,"caption":"nonprofit-cybersecurity"},{"@type":"WebSite","@id":"https:\/\/gofundme.to\/__proxy\/pro.gofundme.com\/#website","url":"https:\/\/gofundme.to\/__proxy\/pro.gofundme.com\/","name":"GoFundMe Pro","description":"","publisher":{"@id":"https:\/\/gofundme.to\/__proxy\/pro.gofundme.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/gofundme.to\/__proxy\/pro.gofundme.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/gofundme.to\/__proxy\/pro.gofundme.com\/#organization","name":"GoFundMe Pro","url":"https:\/\/gofundme.to\/__proxy\/pro.gofundme.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/gofundme.to\/__proxy\/pro.gofundme.com\/#\/schema\/logo\/image\/","url":"https:\/\/gofundme.to\/__proxy\/pro.gofundme.com\/wp-content\/uploads\/2025\/05\/cropped-cropped-ray-dark.png","contentUrl":"https:\/\/gofundme.to\/__proxy\/pro.gofundme.com\/wp-content\/uploads\/2025\/05\/cropped-cropped-ray-dark.png","width":534,"height":534,"caption":"GoFundMe Pro"},"image":{"@id":"https:\/\/gofundme.to\/__proxy\/pro.gofundme.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/classy.org\/","https:\/\/x.com\/classy","https:\/\/www.instagram.com\/gofundmepro","https:\/\/www.linkedin.com\/company\/gofundme-pro\/","https:\/\/en.wikipedia.org\/wiki\/Classy_(company)","https:\/\/www.facebook.com\/gofundmepro"]},{"@type":"Person","@id":"https:\/\/gofundme.to\/__proxy\/pro.gofundme.com\/#\/schema\/person\/742b6a0ac4197e3bcfd456b7a8849564","name":"Hannah Kindler","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/gofundme.to\/__proxy\/pro.gofundme.com\/#\/schema\/person\/image\/","url":"https:\/\/gofundme.to\/__proxy\/pro.gofundme.com\/wp-content\/uploads\/2023\/10\/Headshot-copy-96x96.jpeg","contentUrl":"https:\/\/gofundme.to\/__proxy\/pro.gofundme.com\/wp-content\/uploads\/2023\/10\/Headshot-copy-96x96.jpeg","caption":"Hannah Kindler"},"url":"https:\/\/gofundme.to\/__proxy\/pro.gofundme.com\/c\/blog-author\/hdurbin-2\/"}]}},"_links":{"self":[{"href":"https:\/\/gofundme.to\/__proxy\/pro.gofundme.com\/wp-json\/wp\/v2\/posts\/11453","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gofundme.to\/__proxy\/pro.gofundme.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gofundme.to\/__proxy\/pro.gofundme.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gofundme.to\/__proxy\/pro.gofundme.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/gofundme.to\/__proxy\/pro.gofundme.com\/wp-json\/wp\/v2\/comments?post=11453"}],"version-history":[{"count":0,"href":"https:\/\/gofundme.to\/__proxy\/pro.gofundme.com\/wp-json\/wp\/v2\/posts\/11453\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gofundme.to\/__proxy\/pro.gofundme.com\/wp-json\/wp\/v2\/media\/24204"}],"wp:attachment":[{"href":"https:\/\/gofundme.to\/__proxy\/pro.gofundme.com\/wp-json\/wp\/v2\/media?parent=11453"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gofundme.to\/__proxy\/pro.gofundme.com\/wp-json\/wp\/v2\/categories?post=11453"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gofundme.to\/__proxy\/pro.gofundme.com\/wp-json\/wp\/v2\/tags?post=11453"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}