article thumbnail

6 Generations of Giving: Who Gives the Most and How They Prefer to Give

Nonprofit Tech for Good

Below is a breakdown of overall giving behaviors, some statistics about each generation’s giving, how they like to be contacted, and their preferred giving method. With unprecedented access to information, they are more aware of the world’s challenges at a younger age. organizations** 11.8% organizations** 23.6%

article thumbnail

What to Do When Your Fundraising Methods Fall Flat

Get Fully Funded

It’s a horrible feeling when the tried-and-true fundraising methods that have worked in the past stop working. Even experienced fundraisers sometimes use fundraising methods that just don’t work for a particular organization or audience. Let’s back up and look at your methods of fundraising through the eyes of your donor.

Method 75
professionals

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Don’t Let Staff Turnover Affect Your Grantmaking Data Quality

sgEngage

Here are some best practices for effectively managing staff turnover and onboarding with your grantmaking software, including some methods of reassigning existing records to new staff members, establishing clear security roles, and building a comprehensive policies and procedures guide to keep everyone on the same page. Likely no.

Data 74
article thumbnail

The Top 9 Nonprofit Credit Card Processing Solutions

Bloomerang

Leveraging a secure payment solution throughout the donation process strengthens donor trust and allows them to use a convenient payment method. Other payment processors integrate Stripe and Paypal, so nonprofits may not be able to access nonprofit-specific giving methods and may be charged additional fees. per transaction.

Process 82
article thumbnail

Cybersecurity: 5 Ways to Better Protect Your Nonprofit Data

Volunteer Hub

Phishing: According to phishing.org, phishing is a cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data. Establish Access Control Policies and Procedures. Here are 5. Create password requirements.

Data 90
article thumbnail

Nonprofit Volunteer Management: Three Tips to Increase and Maintain Engagement

Nonprofit Tech for Good

Some nonprofits may only require basic contact and background information, while others may require extensive background checks due to sensitive work. The information is stored securely and is easily accessible. The best tools offer access through a mobile app so volunteers can self-check-in and out.

Volunteer 276
article thumbnail

4 Easy ways to recruit for your virtual lobby day

EveryAction

Virtual lobby days may be accessible to more people than in-person events; new supporters may be looking for a lower-barrier way to get involved; and virtual events can help you build the power in numbers that any organization needs for a successful advocacy effort. Before you get too far, don’t forget about a marketing plan!

Virtual 163