article thumbnail

Twitter Hacking and Cloud Security

Robert Weiner

The front-page headlines read " Hacker steals Twitter's confidential documents ," but the real story isn't about Twitter — it's that the stolen documents were stored online, "in the cloud." And anyone who gets access to the password of an employee with access to those online files gets access to all files shared with that employee.

Twitter 100
article thumbnail

[Book Interview] Nonprofit Example of Social Media Excellence: Big Cat Rescue

Nonprofit Tech for Good

We are also investing in a complete overhaul of our 17,000 file website at BigCatRescue.org that has taken 9 months and thousands of dollars, but will result in integrating social aspects that should improve our reach and influence. Tags: Social Media The Book. The site currently has 1.6 Related Links: Book Research & Interviews.

professionals

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Online Fundraising Ideas (7 Strategies & 63% More Donations)

Nonprofits Source

Then click the “Create Audience” drop-down and select “Customer File.” CSV file or MailChimp list to import. To add this code you’ll need access to place the script in the header or footer tags of your website. Pinterest Tag. ” Next, choose either a. Facebook Pixel. MaxTraffic.

Ideas 111
article thumbnail

SEO For Nonprofits: A Beginners Guide To Digital Marketing Success

Nonprofits Source

Heading Tags. Image Alt Tag. This is because the closer your keyword is to the title tag the more weight it carries with search engines. You won’t always be able to include your keyword at the beginning of the title, but at the very least you should include it within the <title> tag. SEO Friendly URL.

article thumbnail

Twitter Hacking and Cloud Security

Tech Soup

The front-page headlines read " Hacker steals Twitter's confidential documents ," but the real story isn't about Twitter — it's that the stolen documents were stored online, "in the cloud." And anyone who gets access to the password of an employee with access to those online files gets access to all files shared with that employee.

Twitter 43
article thumbnail

The Questions Every Nonprofit Should Ask About Sensitive Data

NTEN

These days, big data breach headlines are becoming almost blasé. Lastly, make certain those locations employ some access control measure such as a locked door or cabinet for mobile media and paper documents, or logical access controls such as network folder or file permissions. Jake Marcinko, Blackbaud. Eradication & Education.

Data 93
article thumbnail

Why Privacy Matters (or Should) to Nonprofits

NTEN

Imagine what your donors and constituents would say if they saw your name in that headline. Tags: Leadership Newsletter NPTech NTEN privacy. The BlueCross' original breach occurred in October 2009, but five months, $7 million and 110,000 work hours later, they are still dealing with the issue.

Hawaii 64