Tag Archives: security

Nonprofit Radio for May 12, 2017: Your Cyber Risk & Beyond Online To IRL

I love our sponsors!

Do you want to find more prospects & raise more money? Pursuant is a full-service fundraising agency, leveraging data & technology.

It’s not your 7th grade spelling bee! We Bee Spelling produces charity fundraiser spelling bees with stand-up comedy, live music & dance. It’s all in the video!

Get Nonprofit Radio insider alerts!

Listen Live or Archive:

 

My Guests:

Marc Schein: Your Cyber Risk

Bad things can happen to all that data you store on donors, volunteers, employees, vendors and others. But, there are ways to minimize your risk and protect your nonprofit if a breach occurs. Marc Schein of Marsh & McLennan Agency shares his wisdom.

 

 

Maria Semple: Beyond Online To IRL

Maria Semple

Maria Semple, our prospect research contributor and The Prospect Finder, reminds you that real-life conversations (remember those?) can tell you so much more about your potential donors than online research. Book those meetings!

 


Top Trends. Sound Advice. Lively Conversation.

Board relations. Fundraising. Volunteer management. Prospect research. Legal compliance. Accounting. Finance. Investments. Donor relations. Public relations. Marketing. Technology. Social media.

Every nonprofit struggles with these issues. Big nonprofits hire experts. The other 95% listen to Tony Martignetti Nonprofit Radio. Trusted experts and leading thinkers join me each week to tackle the tough issues. If you have big dreams but a small budget, you have a home at Tony Martignetti Nonprofit Radio.

Get Nonprofit Radio insider alerts!

Sponsored by:

Vertical_Color

Nonprofit Radio for February 3, 2017: Grow Your Sustainer Revenue & Protect Your Donors’ Data

Big Nonprofit Ideas for the Other 95%

I love our sponsors!

Do you want to find more prospects & raise more money? Pursuant is a full-service fundraising agency, leveraging data & technology.

It’s not your 7th grade spelling bee! We Bee Spelling produces charity fundraiser spelling bees with stand-up comedy, live music & dance. It’s all in the video!

Get Nonprofit Radio insider alerts!

Listen Live or Archive:

 

My Guests:

Allison Weston, Chrissy Hyre & Sabra Lugthart: Grow Your Sustainer Revenue

(L to R) Hyre, West & Lugthart at 16NTC

You want more sustainers? We’ve got the formula: Multichannel. Upsell. Benchmark. Avoid attrition. The panel is Allison Weston & Chrissy Hyre, from Chapman Cubine Adams + Hussey, and Sabra Lugthart with The Trust for Public Land. This was recorded at the 2016 Nonprofit Technology Conference.

 

 

Tracey Lorts & Joshua Allen: Protect Your Donors’ Data
(L to R) Lorts & Allen at 16NTC

You don’t want to be the next headline. You don’t want a fight with a donor over whether you compromised their credit card number. We’ll keep you safe and in compliance. Also from 16NTC are Tracey Lorts and Joshua Allen, both with Greater Giving.

 

 


Top Trends. Sound Advice. Lively Conversation.

You’re on the air and on target as I delve into the big issues facing your nonprofit—and your career.

If you have big dreams but an average budget, tune in to Tony Martignetti Nonprofit Radio.

I interview the best in the business on every topic from board relations, fundraising, social media and compliance, to technology, accounting, volunteer management, finance, marketing and beyond. Always with you in mind.

Get Nonprofit Radio insider alerts!

Sponsored by:

Vertical_Color

Nonprofit Radio for December 9, 2016: Leveraging Expert Or Tech Volunteers & 7 IT Security Pitfalls

Big Nonprofit Ideas for the Other 95%

I love our sponsors!

Do you want to find more prospects & raise more money? Pursuant is a full-service fundraising agency, leveraging data & technology.

It’s not your 7th grade spelling bee! We Bee Spelling produces charity fundraiser spelling bees with stand-up comedy, live music & dance. It’s all in the video!

Get Nonprofit Radio insider alerts!

Listen Live or Archive:

 

My Guests:

Steve Heye, Erin Dieterich, & Princessa Bourelly: Leveraging Expert Or Tech Volunteers

(L to R) Steve Heye, Erin Dieterich & Princessa Bourelly

We’ve got what you need to know about managing volunteers with special expertise. Where do you find them? What about screening and scoping? Our panel is Steve Heye and Erin Dieterich from NetSuite and Princessa Bourelly from Juma Ventures. (Recorded at the 2016 Nonprofit Technology Conference)

 

 

 

Leon Wilson & Dan Rivas: 7 IT Security Pitfalls

(L to R) Leon Wilson & Dan Rivas at 16NTC

Not sexy but very important. Leon Wilson from The Cleveland Foundation and Dan Rivas from Idealware walk you through bad habits that you need to change so you don’t put your precious data at risk. (Also from the 2016 NTC)

 

 


Top Trends. Sound Advice. Lively Conversation.

You’re on the air and on target as I delve into the big issues facing your nonprofit—and your career.

If you have big dreams but an average budget, tune in to Tony Martignetti Nonprofit Radio.

I interview the best in the business on every topic from board relations, fundraising, social media and compliance, to technology, accounting, volunteer management, finance, marketing and beyond. Always with you in mind.

Get Nonprofit Radio insider alerts!

Sponsored by:

Vertical_Color

Nonprofit Radio for November 30, 2012: The Bequesting Brain & Donor Database Dungeon

Big Nonprofit Ideas for the Other 95%

Listen live or archive:

Tony’s Guests:

Russell James
Russell James: The Bequesting Brain

Professor Russell James at Texas Tech University does neuro imaging research to see subjects’ brains light up when they elect to put a charitable gift in their will. This former Planned Giving fundraiser and director of the Graduate Certificate in Charitable Financial Planning has research-based advice for your cultivation and recognition of bequest gifts.

 

Scott Koegler
Scott Koegler: Donor Database Dungeon

Scott Koegler, the editor of Nonprofit Technology News and our tech contributor, wants you to keep your donor database secure, so nothing can escape. We’ll talk about inappropriate use, SQL, inference and overloads.

 
 

 


Top Trends. Sound Advice. Lively Conversation.

You’re on the air and on target as I delve into the big issues facing your nonprofit—and your career.

If you have big dreams but an average budget, tune in to Tony Martignetti Nonprofit Radio.

I interview the best in the business on every topic from board relations, fundraising, social media and compliance, to technology, accounting, volunteer management, finance, marketing and beyond. Always with you in mind.

When and where: Talking Alternative Radio, Fridays, 1-2PM Eastern

Sign-up for show alerts!

Here is a link to the audio: 119: The Bequesting Brain and Donor Database Dungeon. You can also subscribe on iTunes to get the podcast automatically.

Is Your Email Safe and Sound?

Information Security Wordle, courtesy of purpleslog on Flickr.

In early April, five companies I do business with informed me that my email address had been compromised by a company named Epsilon. Hilton, Marriott, 1-800-Flowers (thanks, mom) and two financial providers where I have amassed a combined balance approaching equivalence to my office area code, use the company for email marketing for their millions of addresses.

This Epsilon episode provokes me to ask you, “Is your email safe and sound?”

Whether you have hundreds, thousands or hundreds of thousands of addresses, they are a valuable asset. You need to keep them safe. I am not an email security expert, but Howard Globus, president of IT On Demand is. Here are Howard’s suggestions:

– Keep your computers and devices up to date – whether you use a Windows PC, an Apple computer, a Linux-flavored operating system or a smart phone, make sure that the software is up to date. New security holes are found, published and exploited every day, on ALL operating systems. Subscribe to your particular operating system’s alerts and apply updates regularly.

– Add a layer of protection between the public and private world – consider a firewall or security product to act as a buffer between your computer (or computers) and the Public Internet. A firewall, when properly monitored, kept up-to-date and sending regular alerts, will provide an early warning to potential security breaches.

– Your email password is not a luggage-lock. Your password for email (and on your computers and your firewall) should be more complex than “1234”. The most common password in use today is “123456”. Fourth on the list? “Password”. Without feeling too superior, ask yourself if you use a dictionary-based password, can your password be found in a dictionary? Or a dictionary word with a number? Jeremy12? Beach89? The more complex your password, the harder it is to crack. Consider using a password with a combination of alpha-numeric digits and an odd character thrown in. Need help coming up with a strong password? Take a look at this password generator. Remember to change your password periodically!

– Do not open attachments from unknown senders – Just like we were told when we were kids, talking to strangers may be bad. If you get an email from the USPS, UPS, Amazon or your bank with phrases like “There is a package we tried to deliver to you. Please see the attached document on how to claim your package”, pause. Services like PayPal, your credit card company or your bank will NEVER ask you to launch an attachment to put your information in. When in doubt, log on to the service through your web browser directly–not through the email attachment or link–and investigate the authenticity of the request sent.

– Don’t share your user account or password via email. Following up on the last tip, do not email your account or password in response to an email request. The vendors or institutions you are working with don’t need it – they know who you are – and they don’t want your password, as it may breach their internal security policy.

I’m guilty of at least one of these transgressions.  I will mend my ways.