IT Expertise You Can Trust

If you are looking for a trusted IT partner to outsource your IT department,  supplement your in-house team, or provide you technology consulting services, we believe our expertise, proven approach, and focus on nonprofit technology make us a very strong choice.

We are a Washington, D.C. based IT consultancy providing technical staff and strategic technology support to nonprofit organizations. We commit to long-term, collaborative partnerships with our customers.

Managed IT Services »
Supplemental IT Support »
Technology Consulting »

Success Stories

  • logo-cis
  • Community IT’s considerable non-profit experience and information technology vision helped Communities in Schools to make future-thinking decisions that will continue to produce ROI well into the future.

  • Read More »

Latest Resource

Webinar: October 23, 2014 – IT Security – New and Emerging Best Practices


As recent hacks and security breaches have demonstrated, organizations can never let their guard down when it comes to keeping their information secure. Most of us are familiar with basic security best practices, such as strong passwords and careful clicking, but the next generation of threats are going to require even more vigilance. Join Matthew Eshleman and Steve Longenecker with Community IT Innovators as we discuss the next generation of security best practices. Whether your data is on your laptop, on your server or in the cloud, we will review what you can do to keep it confidential and available.

Read More »

Latest Blog Post

Better Security through 2FA

Security Code 2FA

Security breach…yet again. This one is notable for involving personal (in many cases intimate) photos of celebrities being hacked and stolen from iCloud. Apple has released a statement indicating that the hacked accounts were subject to a brute force attack in which a hacker knew the email address and relentlessly tested passwords and secret answers until the correct ones were identified. Regardless of the details, the immediate lesson is that our data and information systems are always at risk of breach. Many of the photos in the celebrity hacking incident date back over 3 years, suggesting that the hacker(s) had access for at least that long.

Read more »