Get Cybility Savvy with...

Cybility's Cybersecurity

Ring of Resources 

Charities Edition

We are frequently asked if there are any free resources we recommend for charities.  In answer to this we created 'Cybility's Cybersecurity Ring of Resources - Charities Edition'.  

We used the NIST Cyber Security Framework functions of Identify, Protect, Detect, Respond and Recover to make it easier to see when you might use the different tools (although much of 'respond' you will want to prepare before an incident happens!).
Enter your contact details below to gain access to your free interactive PDF.

If you find this resource useful, please share it with your charity sector colleagues on social media using the hashtag #cybilityring4charities.

Infographic titled 'Cybility's Cybersecurity Ring of Resources: Charities Edition.' The graphic is a circular diagram divided into five colored segments labeled 'Identify,' 'Protect,' 'Detect,' 'Respond,' and 'Recover,' with a central segment labeled 'Govern.' Each segment lists various resources:  Identify: NCSC Small Charity Guide, Checklist for Minimising Cyber Threats from Volunteers, IASME Supplier security, NCSC Weekly threat reports. Protect: Cybility Free resources, NCSC training, Cybersecurity Cyber Security for small organisations, IASME Cyber Essentials Readiness Tool, MyNCSC, SANS OUCH! Newsletter. Detect: Have I been pwned, NCSC Early Warning Service, NCSC IP Check, NCSC Web Check, NCSC Mail Check. Respond: Action Fraud, What does a good incident response plan look like?, SECRC cyber security incident response template, NCSC Incident management guidance, NCSC Suspicious email reporting service (SERS), NCSC Takedown Service, NCSC Exercise in a box. Recover: NCSC Small business guide, response and recovery. The outer ring mentions Cybility Services, Security and IT management diagnostics, and Compliance gap analysis. The infographic also features the Cybility logo and a call to action to get in touch for more information on how Cybility can help with organizational cybersecurity efforts. The links were checked as of June 2024.
June 2024 edition

Your information

📧 We promise we won't spam you. 

💂🏾‍♂️ We promise we will protect your information.

We will only use your information for the following purposes:

  • email you content that you have requested from us;
  • with your consent, occasionally email you with targeted information regarding our service offerings and/or events;
  • invite your views on cybersecurity in your industry sector;
  • continually honour any opt-out request you submit in the future;
  • comply with our legal and/or regulatory obligations.

Further information about how we use and protect your information in in our privacy policy


Enter the name of the organisation you work for
How do you hope this resource will help you/your organisation?