This document provides an overview of cyber security issues for not-for-profit organizations and recommendations for developing a cyber security plan. It discusses understanding risks, protecting systems and data, and reacting to potential breaches. Key components of a security plan include inventorying hardware, software, data and policies; assessing risks; and developing breach response and ongoing maintenance procedures. The document provides examples of security best practices and recommendations such as encrypting laptops, implementing intrusion detection, and purchasing data breach insurance.