Top Tech Challenges for Nonprofits: Training staff (and board) on new technologies

While the benefits of the new technologies may be evident to you, they are not always immediately embraced by the team and can cause disruption if proper training is not part of the roll-out. Before rolling out any new technology, it’s good to be aware of some of the top reasons employees may resist the change:

Enterprise Wi-Fi technology comes home

As the Internet of Things continues to evolve, most people would agree, the one key ingredient left out of this recipe for Jetson’s bliss has been a smart Wi-Fi router. Typically, we have one router in our home. Many have tried extenders to increase coverage and speed, with little success. The challenge lies in the fact that Wi-Fi signals are, at their core, just radio signals. And, radio signals are not good at passing through hard surfaces like walls, ceilings and floors. As one gets further away from the router, the signal gets weaker.

Top Tech Challenges for Nonprofits: Migrating to appropriate cloud solutions

Look for opportunities to immediately mitigate the risk of data loss and potential downtime. For nonprofits with fewer than 1,000 employees, we suggest moving at least 80 percent of your basic infrastructure into the cloud over the next three years. Email and backup are critical and should be migrated immediately. Payroll is another critical application that can be moved to the cloud to help avoid disruption of compensation for employees even during local outages or disasters. 

Trying to compete in enterprise market, Apple to bring iWork to the cloud

Apple announced they were taking iWork to the iCloud to attempt to compete with Microsoft 365 and Google Docs for office product market share. 

Four Clear Signs You Absolutely Need an Office Manager (or another one)

Check out some telltale signs that your office could benefit from some office management help below; if these sound like what your company is experiencing, it’s probably time to take the leap. 

Top Tech Challenges for Nonprofits: Creating and enforcing IT policies

When developing a comprehensive IT Management and Security Policy, be sure that it is easy for staff to understand and follow – finding the balance between policies and procedures that support physical and virtual security while ensuring employees have access to the data when and where they need it to stay productive is key.

Top Nonprofit Tech Challenges: Data backup and continuity solutions

Business continuity planning includes developing policies and procedures your organization can use to mitigate risk and ensure that your operational work can continue should there be disruption to your technology solutions, whether it's caused by human error or natural disaster. An important part of business continuity planning is identifying which operations are essential and to map out what technologies must be set up through back-up plans or redundant systems to enable your work to continue.

The New Language of Data Security: From Passwords to Passphrases

Now, a new standard is emerging for passwords, backed by a growing number of businesses and government agencies — to the relief of computer users everywhere. No longer must passwords be changed so often, or include an incomprehensible string of special characters. The new direction is one that champions less complexity in favor of length.”

“Design Thinking” results in products that customers want

The Internet is challenging the very way companies think about their product design. In the rush to bring the Internet of Things (IoT) to, well… everything, companies are discovering that being connected for the sake of being part of IoT isn’t enough. Savvy consumers are looking for products that are functional and make their lives easier in addition to the convenience of connectivity.

Data Security: Steps you can take today to protect your data

Stolen data from the Democratic National Committee was carefully timed to be leaked during the Convention last month and consequently shared the media stage with the candidates. This latest data breach sent a chill down the spines of many organizations as they question their own information security policies.

Top Nonprofit Tech Challenges: Mobility Solutions

With a mobility solutions in place, nonprofits can realize benefits like cost savings, improved employee morale, and more efficient use of time and resources. Here are some quick tips to ensure your technology is mobile-ready and secure, as well as some suggestions for mobile services that may aid in your productivity.

Top Tech Challenges of Nonprofits: Obsolete Technology

Knowing when to upgrade and install updates is critical to keeping your data secure, but it can be challenging to keep up with it all. Sinu takes care of these updates automatically, but if you are managing your IT in-house, here are a few tips on avoiding obsolete technology.

Malware on Android Apps Targets Bank Account Info

Sitting innocently on Google Play are about a dozen apps imitating banking and payment apps, and designed to get you to download them. The mobile banking applications targeted by the malware include those from Commonwealth Bank and Wells Fargo. The issue of hacker apps isn’t new (at least in tech years). The issue is that Android consumers generally expect Google Play to be a safe location to download apps from, making them that much more dangerous.

Privacy and convenience: Is it a CLEAR choice?

Whether it’s convenience-oriented apps, electronic tolls, or even pre-ordering your latte at Starbucks, consumers are seeking solutions that moves them through their day faster and easier. People want to think as little as possible about basic tasks, and companies are leapfrogging through technology to be that “frictionless” solution.

Social engineering: Bad people tricking good people

Social engineering: Bad people tricking good people

Social engineering is the psychological manipulation of people into performing actions or divulging confidential or sensitive data for the purpose of fraud and/or system access. It is often difficult to identify the attacker because it is just one layer in a sophisticated hacking scheme.