Technology Management

IT security: a Q&A with expert Leon Wilson

April 19, 2017
What is IT security, exactly, and what's the worst that can happen? Most pressingly: How can often cash-strapped nonprofit organizations keep their information—and their clients' or donors' information—safe and sound? IT expert Leon Wilson answers some questions.

Refurbished technology: an insider’s guide

April 18, 2017
There is a way to connect clients to the digital tools they need without spending thousands of dollars on new technology. Tech refurbishers—often nonprofits themselves—are repurposing unwanted electronics for digital inclusion programs, aiming to lower the cost to clients and curb the environmental impact of e-waste.
3 people meeting: 1 person drawing a diagram on a white board and 2 people seated at a table, one with an open laptop in front of her.

Let’s Talk Accidental & Intentional Nonprofit Tech Careers

January 5, 2017
Organizations, their mission goals, their workers, and the nonprofit sector as a whole are best served when accidental techies advocate for themselves, formalize their job functions, and grow in their careers.
closeup of laptop with code/numbers in background and a large pink padlock image in the foreground

Seven Deadly Weaknesses of Nonprofit Security

November 28, 2016
Good security doesn't have to be expensive or complicated. Here are some tools and tips on the most common security weaknesses—and how nonprofit leaders can address them.
B&W photo of hands in the air, some recording video with their cell phones

4 Ways To Save Live Video Broadcasts

October 26, 2016
Human rights organizations and individual activists increasingly rely on live video streaming to raise awareness about injustice. But the downside to live streaming is that there may be no permanent record, which complicates your ability to use the video later in legal proceedings, for awareness campaigns, or calls to action.
A close-up shot of a padlock among numerous padlocks on a chainlink fence

Yes, Nonprofits Get Scammed, Too

October 17, 2016
With social engineering, you can’t avoid being a target, but you can avoid being a victim.
The Unicorn of Technical Difficulties

How to Use Your Database to Ruin Productivity in 5 Easy Steps!

September 26, 2016
For a good time in non-productivity, recreate all the wheels and silo all your data. Hilarity ensues!
Clouds tied up like umbrellas.

Best Practices for Document Management in the Cloud

September 19, 2016
While various document management tools are different and have their own strengths and weaknesses, a lot of the overarching best practices are tool-agnostic and apply across the board.
Two shadows on train tracks with "Let Go" caption

Open Up to Working Less

September 9, 2016
I believe that embracing open knowledge practices can actually make us more productive while working less. Here’s how.

Are You Creating a Culture of Philanthropy Among Your IT Staff?

July 26, 2016
Creating a strong culture of philanthropy requires everyone on the team to participate—including your IT staff.