Network endpoints such as end-user mobile devices, laptops, and desktops are common security Achilles heels. Thats because their operating systems and accompanying pieces of software almost always prioritize functionality over security. Attackers are very good at taking advantage of security holes in endpoints to take over your system. To minimize the risk, consider setting up devices that are used exclusively for your fundraising project and nothing else.