Tag Archives: email

Nonprofit Radio for June 26, 2015: Get Your Emails Delivered & The Open Movement

Big Nonprofit Ideas for the Other 95%

Our Sponsor:

Opportunity Collaboration: This working meeting on poverty reduction is unlike any other event you have attended. No plenary speeches, no panels, no PowerPoints. I was there last year and I’m going this year. It will ruin you for every other conference! October 11-16, Ixtapa, Mexico.

Sign-up for show alerts!

Listen Live or Archive:

 

My Guests:

Harmony Eichsteadt, Brett Schenker & Laura PackardGet Your Emails Delivered

(l-r) Harmony Eichsteadt, Brett Schenker & Laura Packard at NTC 2015.

You probably don’t know if you have an email deliverability problem. You need to hear what Gmail preserves about your mail actions and how those impact what gets delivered. What’s a honey pot email? Harmony Eichsteadt was an evangelist at NationBuilder; Brett Schenker is email deliverability specialist with Every Action; and Laura Packard is a partner at PowerThru Consulting. We talked at NTC, the Nonprofit Technology Conference, hosted by NTEN, the Nonprofit Technology Network.

 

 

Carly Leinheiser &  Craig SinclairThe Open Movement

Carly Leinheiser & Craig Sinclair at NTC 2015.

Carly Leinheiser and Craig Sinclair reveal what this movement around Creative Commons, Open Source and Open Data is, and what it means to distribute or use content, code or data from an open source. Carly is an associate attorney at Perlman + Perlman. Craig is digital media manager at Manhattan Neighborhood Network. Also from NTC.

 

 


Top Trends. Sound Advice. Lively Conversation.

You’re on the air and on target as I delve into the big issues facing your nonprofit—and your career.

If you have big dreams but an average budget, tune in to Tony Martignetti Nonprofit Radio.

I interview the best in the business on every topic from board relations, fundraising, social media and compliance, to technology, accounting, volunteer management, finance, marketing and beyond. Always with you in mind.

Sign-up for show alerts!

Sponsored by:

oc_wb_logo_banner-resized
View Full Transcript

Nonprofit Radio for May 1, 2015: Multichannel Storytelling & Your DR Plan

Big Nonprofit Ideas for the Other 95%

Our Sponsor:

Opportunity Collaboration: This working meeting on poverty reduction is unlike any other event you have attended. No plenary speeches, no panels, no PowerPoints. I was there last year and I’m going this year. It will ruin you for every other conference! October 11-16, Ixtapa, Mexico.

Sign-up for show alerts!

Listen Live or Archive:

 

My Guests:

Jereme Bivens and Megan AnhaltMultichannel Storytelling

Once you have the best stories, make the most of them across the web, social media and email. Jereme Bivins is digital media manager for The Rockefeller Foundation and Megan Anhalt is strategy director at Purpose. We talked at the Nonprofit Technology Conference.

 

 

Dar Veverka: Your DR Plan

Disaster recovery: Ignore it at your own peril. What belongs in your DR plan? Dar Veverka is vice president of technology for LIFT. This is also from NTC.

 

 

 


Top Trends. Sound Advice. Lively Conversation.

You’re on the air and on target as I delve into the big issues facing your nonprofit—and your career.

If you have big dreams but an average budget, tune in to Tony Martignetti Nonprofit Radio.

I interview the best in the business on every topic from board relations, fundraising, social media and compliance, to technology, accounting, volunteer management, finance, marketing and beyond. Always with you in mind.

Sign-up for show alerts!

Sponsored by:

oc_wb_logo_banner-resized
View Full Transcript

Nonprofit Radio for October 7, 2011: Excel in Email Execution

Big Nonprofit Ideas for the Other 95%

You can subscribe on iTunes and listen anytime, anyplace on the device of your choice.

This is a rebroadcast of Nonprofit Radio from April 8, 2011.

Tony’s Guests:

Dave Poulos, Principal of Granite Partners, will share 5 Elements of Effective Email Marketing and have tips for list hygiene.

  • Are you getting the most out of email?
  • Is your list hygienic and only engaging in safe practices?


 
Claire Meyerhoff is Editorial Director at The Planned Giving Company. She will reveal how to write for email fundraising, so your messages get opened, read and responded to.

 

Top Trends. Sound Advice. Lively Conversation.

You’re on the air and on target as I delve into the big issues facing your nonprofit—and your career.

If you have big dreams but an average budget, tune in to Tony Martignetti Nonprofit Radio.

I interview the best in the business on every topic from board relations, fundraising, social media and compliance, to technology, accounting, volunteer management, finance, marketing and beyond. Always with you in mind.

When and where: Talking Alternative Radio, Fridays, 1-2PM Eastern

Sign-up for show alerts!

“Like” the show’s Facebook page.

Don’t forget to subscribe to the show’s podcast on iTunes. Download and listen whenever and wherever you want.

Here is a link to the podcast: 062: Excel In Email Execution.
View Full Transcript

Nonprofit Radio for May 13, 2011: Event Sponsorships & Email Security

Big Nonprofit Ideas for the Other 95%

You can subscribe on iTunes and listen anytime, anyplace on the device of your choice.

Tony’s Guests:

Karen Perry

Karen Perry, president of EventJournal, shares her ideas about how to cultivate, solicit and steward corporate sponsors to raise big money for your events.

 

I have a couple of questions for this segment. You can answer them here or on the show’s Facebook page.

Q1: Who solicits companies for your event sponsorships?

  • Staff
  • Committee volunteer
  • Board member
  • A combination of those above

Q2: In your largest event, what percentage of revenue is from corporate sponsorships?

  • 0-25
  • 26-50
  • 51-75
  • 76-100
Definitely NOT Howard Globus

Howard Globus, president of IT On Demand and guest contributor on this blog, reveals his strategies to keep your email safe and sound and away from snoopers.

 

He’s got some great nonprofit discount sites for major league security!

Here is a question for this segment.

Q3: Do you feel you have strong security protecting your sensitive donor data?

  • Yes
  • No
  • Not sure

Top Trends. Sound Advice. Lively Conversation.

You’re on the air and on target as I delve into the big issues facing your nonprofit—and your career.

If you have big dreams but an average budget, tune in to Tony Martignetti Nonprofit Radio.

I interview the best in the business on every topic from board relations, fundraising, social media and compliance, to technology, accounting, volunteer management, finance, marketing and beyond. Always with you in mind.

When and where: Talking Alternative Radio, Fridays, 1-2PM Eastern

Sign-up for show alerts!

“Like” the show’s Facebook page.

Don’t forget to subscribe to the show’s podcast on iTunes. Download and listen whenever and wherever you want.

Here is a link to the podcast: 041: Event Sponsorships and Email Security.
View Full Transcript

Is Your Email Safe and Sound?

Information Security Wordle, courtesy of purpleslog on Flickr.

In early April, five companies I do business with informed me that my email address had been compromised by a company named Epsilon. Hilton, Marriott, 1-800-Flowers (thanks, mom) and two financial providers where I have amassed a combined balance approaching equivalence to my office area code, use the company for email marketing for their millions of addresses.

This Epsilon episode provokes me to ask you, “Is your email safe and sound?”

Whether you have hundreds, thousands or hundreds of thousands of addresses, they are a valuable asset. You need to keep them safe. I am not an email security expert, but Howard Globus, president of IT On Demand is. Here are Howard’s suggestions:

– Keep your computers and devices up to date – whether you use a Windows PC, an Apple computer, a Linux-flavored operating system or a smart phone, make sure that the software is up to date. New security holes are found, published and exploited every day, on ALL operating systems. Subscribe to your particular operating system’s alerts and apply updates regularly.

– Add a layer of protection between the public and private world – consider a firewall or security product to act as a buffer between your computer (or computers) and the Public Internet. A firewall, when properly monitored, kept up-to-date and sending regular alerts, will provide an early warning to potential security breaches.

– Your email password is not a luggage-lock. Your password for email (and on your computers and your firewall) should be more complex than “1234”. The most common password in use today is “123456”. Fourth on the list? “Password”. Without feeling too superior, ask yourself if you use a dictionary-based password, can your password be found in a dictionary? Or a dictionary word with a number? Jeremy12? Beach89? The more complex your password, the harder it is to crack. Consider using a password with a combination of alpha-numeric digits and an odd character thrown in. Need help coming up with a strong password? Take a look at this password generator. Remember to change your password periodically!

– Do not open attachments from unknown senders – Just like we were told when we were kids, talking to strangers may be bad. If you get an email from the USPS, UPS, Amazon or your bank with phrases like “There is a package we tried to deliver to you. Please see the attached document on how to claim your package”, pause. Services like PayPal, your credit card company or your bank will NEVER ask you to launch an attachment to put your information in. When in doubt, log on to the service through your web browser directly–not through the email attachment or link–and investigate the authenticity of the request sent.

– Don’t share your user account or password via email. Following up on the last tip, do not email your account or password in response to an email request. The vendors or institutions you are working with don’t need it – they know who you are – and they don’t want your password, as it may breach their internal security policy.

I’m guilty of at least one of these transgressions.  I will mend my ways.