It’s Not All or Nothing: How Nonprofits Can Secure Google Workspace

“Should we just leave Google?”  

It’s a question we hear again and again. 

For many nonprofits, Google Workspace is mission‑critical. It’s where staff email, collaborate on grant proposals, manage sensitive documents, and share information with partners and communities. And because of this, it’s also where a growing amount of organizational risk lives. 

It’s an understandable question, especially for organizations doing advocacy work, supporting vulnerable populations, or operating in politically sensitive environments. But for most nonprofits, a full exit from major platforms like Google Workspace isn’t possible or realistic. In many cases, departing from Google products can make an organization’s security posture worse. 

What is realistic is what we call the happy middle: staying on Google Workspace while significantly reducing risk from hackers and limiting exposure to government overreach. 

Why Leaving Google Often Backfires

In theory, moving entirely to self‑hosted or privacy‑focused tools offers maximum control. In reality, it usually introduces new problems: 

  • Self‑hosting requires infrastructure, maintenance, and constant patching 

  • Under‑resourced teams struggle to keep systems secure over time 

  • Staff bypass clunky tools by creating extra personal Gmail or Dropbox accounts 

  • Sensitive data spreads into areas IT can’t see or protect 

This phenomenon, called shadow IT, is one of the fastest ways to lose control of organizational data, and it is a mess to clean up and control. A poorly secured self‑hosted platform, coupled with widespread workarounds is almost always riskier than a hardened, well‑managed Google Workspace.  

Cyber Security Is a Spectrum

Think of your options on a spectrum. On one end, we have the status quo where the organization continues to operate with no changes. Though this is the cheapest option, it’s also leaves data completely exposed. On the other end, we have full migration to a self-hosted solution, but this requires significant IT know-how and ongoing support. This option may be the best for large organizations with substantial funding that handle extremely sensitive information. It’s generally not achievable or advisable for small organizations without budget. 

For most organizations, staying on Google Workspace is realistic. It’s what staff knows. The Happy Middle offers impactful protections are achievable today, often without disrupting staff workflows. 


Status Quo The Happy Middle Full Migration
Stay on Google Workspace and make no security improvements
Harden Google Workspace to reduce risk from attackers and government access Move entirely to self-hosted or privacy-focused alternatives
Cheapest and easiest, but most exposed Practical, impactful, achievable   Most private in theory, but also expensive and complex. This move often backfires without significant internal support

Start With Easy Wins 

Start here. These changes can help dramatically reduce the organization’s risk from common cyber attacks. Staff won’t feel these admin-side changes in their day-to-day work. 

1. Mandate MultiFactor Authentication

This is the single biggest security improvement your organization can make. 

Mandating multi-factor authentication (MFA) for all users makes accounts vastly harder to compromise. In fact, accounts with MFA enabled are 99% less likely to be compromised, according to CISA.  

Start by setting up MFA for account admins, which are the most important accounts to protect. If a hacker compromises an admin account, they have the keys to the entire organization. 

Here’s how to set up MFA

  1. Go to the Admin Console > Security > Authentication > 2-Step Verification 

  2. You can enforce (not just allow, which can be turned off) MFA for the entire organization. 

One thing to note: Push notifications, passkeys, or hardware security keys are far stronger than SMS codes and should be prioritized. Turn off SMS. 

Next, prepare the entire organization. Communicate clearly with staff about how to use MFA through a straightforward how-to guide or a 15-minute help session, and give them a date for when MFA will be officially rolled out. 

Mandating MFA takes minutes to configure and is available on all Google Workspace plans, including the free nonprofit membership. Most people already use MFA on their banking apps or websites, so this transition should be relatively smooth. 

2. Lock Down Email Impersonation with SPF, DKIM, and DMARC

Without proper email authentication, attackers can send messages that look like they came from your organization to donors, partners, or staff. Implementing these protocols is a proactive step towards safeguarding the organization’s email domain, protecting your reputation, and ensuring trustworthiness of its email correspondence.  

What does that look like in practice? Configuring SPF, DKIM, and DMARC

  • Prevents domain impersonation and phishing 

  • Protects donor trust 

  • Improves newsletter and fundraising email deliverability 

This is admin‑only work and does not affect the workflow of staff. Staff won’t notice, except when emails stop landing in spam. 

3. Close Quiet Backdoors

These changes reduce unseen entry points attackers frequently exploit. A few quick checks go a long way: 

  1. Disable Less Secure App Access: Blocks apps that bypass modern authentication. Admin Console > Security > Access and Data Control > Less Secure Apps 

  2. Review third-party app OAuth permissions: See which apps your staff have granted access to your org’s data. Admin Console > Security > API Controls > App Access Control 

  3. Disable POP and IMAP access: Unless your org specifically needs it, turn it off. Reduces credential-based attack surface 

  4. Subscribe to the Google Workspace Alert Center: Admin Console > Security > Alert Center. Review regularly 

MediumEffort Changes With Big Payoffs

Let’s move on to the next level of cyber security changes. These steps require some staff communication, but the impact is manageable, and most importantly, and worth it. 

4. Control How Data Leaves Your Org

We know that many nonprofits share Google Docs and other files externally to coordinate volunteers, share information across coalitions, and other tasks that are essential to day-to-day operations. We suggest making this one change to tighten security when data leaves your organization to prevent accidental exposure: 

  • Google Drive sharing: Set the default permission to “your organization only.” Staff can still share externally when needed, they just have to be intentional about it 

  • Email auto-forwarding: Disable automatic forwarding to external addresses. This is a common data exfiltration vector 

  • Link sharing defaults: Change from “Anyone with the link” to “Restricted” or “People in your organization” 

5. Use Google’s Advanced Protection for HighRisk Roles

The strongest account security Google offers is free for all Google Workspace users, including the nonprofit plan. Google’s Advanced Protection Program protects against targeted attacks by sophisticated hackers and state-sponsored actors. It’s ideal for: 

  • Executive directors or individuals at the highest levels of leadership 

  • Finance and HR staff 

  • Advocacy and organizing roles 

  • Anyone handling sensitive data which, if exposed, could result in identity theft, impersonation, financial loss, regulatory penalties, or reputational data 

It requires passkeys or hardware security keys and blocks high‑risk third‑party apps. If your organization needs hardware security keys, check out Defending Digital Campaigns, which provides free Titan Security Keys to qualifying organizations

Enrollment is voluntary and cannot be mandated, so buy-in from leadership matters, but the protection is substantial. 

6. Delete Data Automatically and Aggressively

Here’s the reality: data that does not exist cannot be seized.  

By default, Google retains deleted emails and files indefinitely. Automating data deletion protects organizations against government overreach. 

Google Vault allows organizations on Business Plus or higher to set automated retention rules that permanently delete data after a defined period on Gmail, Drive, Chat, Meet recordings, and Voice data. Google Vault requires Google Workspace Business Plus or higher and is not available on the free nonprofit plan. 

Important: We strongly recommend being as aggressive as possible; set the shortest retention periods your operations and legal obligations allow. Shorter retention windows mean: 

  • Less data to hand over if served with legal process 

  • Lower long‑term risk 

  • Cleaner, more efficient systems overall 

When determining retention periods, we find that nonprofit professionals often feel they need to retain historical records longer than they need to. While it might be nerve-wracking at first to determine when data will be deleted, you may be surprised just how easy it is to acclimate to the new retention rules after they are implemented. 

Pair automation with a one‑time cleanup of old shared drives. Many nonprofit professionals are shocked by how much sensitive data they’ve kept “just in case.” You will also be surprised how easy it is to acclimate to new retention windows once they’re in place. 

The Hardest (but Strongest Option

For organizations facing serious government surveillance risk and sophisticated attackers, Google Workspace Client-Side Encryption (CSE) is a game‑changer. It is the most powerful tool for protecting data from Google. With CSE,  

  • Data is encrypted in the browser before reaching Google 

  • Google cannot decrypt it, even if legally compelled 

  • Encryption keys are held by an external provider you control 

  • Covers Google Drive, Docs, Sheets, Slides, Calendar, Meet, and Gmail 

  • Needs external key management (e.g., FlowCrypt, a provider based in France) 

  • Needs an identity provider (IdP) that supports OpenID Connect 

But this power comes with real trade‑offs that will affect staff directly: 

  • Eliminates real‑time collaborative editing on encrypted files, though multiple users can edit a CSE-encrypted file 

  • No shared inboxes or email aliases 

  • Some file types are blocked as encrypted attachments 

  • Limited mobile support for encrypted Drive files 

  • Requires Google Workspace Enterprise Plus licensing, which is the highest and most expensive tier 

  • Introduces workflow friction staff must be trained on to determine when to encrypt and when not to 

CSE requires the highest and most expensive tier of Google Workspace. Because of the cost and collaboration impact, CSE works best when used selectively for an organization’s most sensitive work. It also requires a subscription to a key provider service which increases the cost of this approach. 

You don’t have to choose between “do nothing” and “burn it all down.” Nonprofit cyber security works best when we approach it as an intentional reduction of risk, aligned with your organization’s needs and how staff actually work. 

What This All Adds Up To: The Happy Middle

When it comes to securing your nonprofit’s Google Workspace against hackers and government overreach, we don’t believe it’s all-or-nothing. We recommend a measured, happy middle approach. 

Working through this chart from top to bottom, prioritizing the easy category in the next week and medium category in the next month. These improvements have little to no staff impact, though these infrastructure investments will fundamentally change the organization’s security posture. 

Then, think seriously about whether CSE is right for your organization. For some, the impact to staff workflow is worth it. For others, the cost and complexity may not be justified given your specific threat model. The happy middle isn’t one-size-fits-all. It’s about making intentional, informed decisions about what level of protection you need and what trade-offs you’re willing to accept. 


Tier Action Staff Impact
Easy
Mandate MFA Minimal (one-time setup)
Easy Configure SPF/DKIM/DMARC  None
Easy Disable Less Secure Apps, review OAuth apps  None
Medium Restrict external sharing & forwarding  Low (intentional sharing still possible) 
Medium Advanced Protection for high-risk staff  Moderate (enrollment + security keys) 
Medium Automated data deletion via Vault  Low-Moderate (policy + cleanup) 
Hard Client-Side Encryption (Enterprise Plus + FlowCrypt)  High (cost, infrastructure, loss of real-time collaboration) 
Next
Next

How to Get Cross-Departmental Buy-in for Cyber Security Work