Cybersecurity guide for a non profit organisation
When most people hear the word cybersecurity, they imagine hooded hackers and complex encryption. In reality, the biggest risks usually come from everyday human behavior weak passwords, clicking a suspicious link, or sharing documents without thinking.
Category:
Cybersecurity designing
Author:
Pavel Danyi
Read:
11 mins
Location:
Prague
Date:
Apr 21, 2025
A practical intervention in partnership with the Centre for Integration of Foreigners (CIC), created as part of the course “Cybersecurity, Design and People (ISKM97)”
Understanding the Problem In the spring of 2025, I had the chance to see this up close. As part of the course Cybersecurity, Design and People (ISKM97), I partnered with the Centre for Integration of Foreigners (CIC), a nonprofit that supports migrants living and working in the Czech Republic. My task was simple: design a practical intervention that could raise cybersecurity awareness in the organization. Before jumping into design, I carried out a short analysis of CIC’s needs. Through several online consultations with their staff, I asked how they currently deal with digital threats, what resources they already use, and where they feel unprepared. This revealed that while general guidelines exist, they are often too technical or overwhelming for everyday use. The staff needed something accessible, concrete, and relevant to their daily work. Co-Designing with the Organization To understand this better, I met with a CIC trainer responsible for onboarding new employees. Together, we discussed how cybersecurity topics are usually presented and what kind of material would actually be useful in training. Through these consultations, we iterated on both content and format of the brochure — what chapters to include, how to phrase advice, and how to make it visually approachable. Later in the process, questions of authorship and adaptation came up. I therefore reworked the draft thoroughly, tailoring the texts, examples, and layout so the final version matched CIC’s internal language and the specific needs of their staff. By the end, the brochure had truly become theirs — something they could immediately use in onboarding and volunteer education. Deliverables and Design Decisions The brochure was designed to be versatile and future-proof. I created several versions to meet different needs: A print-ready PDF with crop marks for professional printing A lightweight digital version for quick sharing Editable open-source files so CIC could update or translate the content later The content focused on the essentials — password hygiene, recognizing phishing attempts, safe email practices, and what to do if you suspect a problem. The layout emphasized clarity: bold icons, short sentences, and concise checklists to make the information easy to scan and digest. Everything was developed remotely, with regular online consultations. I shared drafts, collected feedback, and adjusted the tone to match the organization’s needs. Impact and Feedback When I delivered the final set of files, CIC’s reaction was very positive. They said the brochure finally filled a gap — a resource that was clear, practical, and immediately usable in onboarding new staff and training volunteers. They especially appreciated its simplicity. Their users don’t need technical language; they need direct, actionable advice. The brochure gave them exactly that. What made me especially happy was that the collaboration doesn’t end here. CIC expressed enthusiasm for continuing to work together on similar materials, and I left with a strong sense that this was not just a student project, but the beginning of a longer partnership. For me, it was incredibly rewarding — I learned how to adapt design methods to a real organization, how to navigate practical issues like authorship, and how to translate theory into tangible, useful outcomes. Lessons Learned and Recommendations This project proved that even a small intervention can have a big impact if it’s well-designed and tailored to the organization. The ISKM97 course was key here. Its goal is to develop a human-centered security mindset — to look at security through the lens of people, not just technology. That shift in perspective helped me turn theory into a tangible, useful outcome. If you’re planning a similar project, here are a few lessons I’d share: Start with people. Talk to them, understand what they really need. Keep it simple. Focus on clarity, visuals, and short actionable tips. Share openly. Providing editable files allows the organization to adapt and reuse the material. Add practice. Complement printed materials with interactive workshops or phishing simulations. Working with CIC showed me that cybersecurity doesn’t have to be complicated. Sometimes all it takes is a well-designed brochure to spark awareness and start building a culture of safer behavior. For me, it was proof that design and cybersecurity belong together — and that even small projects can make communities more resilient.
Creating interaction that feels intuitive, considered, and emotionally aligned:
When motion, structure, and design align, users don’t think—they feel. That’s the sweet spot where layout becomes a bridge. Interfaces should communicate tone as much as task. Even the simplest detail—a button’s curve or a heading’s weight—can influence how someone feels. Modular components give structure, but it’s the unexpected breaks—the asymmetry, the shift in rhythm, the quiet gesture—that introduce character. That’s where emotion sneaks in. That’s where the layout becomes a story, not just a scaffold. It’s in the relationship between repetition and surprise, clarity and contrast, that visual tension thrives. We often think of layouts as fixed, but the best ones are elastic. They stretch to fit diverse narratives, but never lose coherence. They allow variation without losing voice. When a layout becomes too stiff, it feels soulless. When it becomes too loose, it loses trust. The sweet spot lies in the in-between. That edge—that living edge—is where the work breathes. Know more about this through Akihiko Blogs.


