Blog

Developing Dialogue: Making the Most of Your WordPress Comments Section

Developing Dialogue-.png

 

Your website is a wealth of knowledge for your donors and potential donors, alike. For many, it’s the first place they look for answers to their questions, industry news and company updates.

While you have a lot to offer your target market, this doesn’t mean information should flow solely from your site to your audience.

Read more: Developing Dialogue: Making the Most of Your WordPress Comments Section

3 Easy Steps to Manage Outlook Email

Picture For Blog Post OutlookTips

3 Easy Steps to Manage Your Outlook Email

Email is one of the primary methods of communication at work. You discuss everything from grant proposals and event details, to lunch for the monthly staff meeting through a back and forth game of email ping-pong in your inbox.

Read more: 3 Easy Steps to Manage Outlook Email

Mobile Fundraising: A Beginner's Guide

By Eric Griego

 

Mobile giving1 is one of the most useful technological advancements of the 21st century –– if you’re in the business of raising money for a nonprofit or faith-based organization, that is!

 

Regardless of whether or not you think mobile fundraising is the best thing since sliced bread, it’s important to have a basic understanding of what mobile giving really is.

 

For that very reason, we’re going to explore the top 6 questions that comprise the beginner’s guide to mobile giving:

 

Read more: Mobile Fundraising: A Beginner's Guide

4 Steps to Protect Against Email Spoofing

 laptop eyes technology computer large

Most of us know spam when we see it, but seeing a strange email from a friend—or worse, from ourselves—in our inbox is pretty disconcerting.   

Email spoofing is the creation of email messages with a forged sender address. If you've seen an email that looks like it's from a friend or company, it doesn't mean they've been hacked, but spoofed by spammers. Spammers and phishers want you click on the links or open attachments in these emails so that they can gain access to your computer.

Read more: 4 Steps to Protect Against Email Spoofing