Remove Accessibility Remove Files Remove Laptop Remove System
article thumbnail

Best Practices for Securing Data in Humanitarian Crisis Situations

Saleforce Nonprofit

We believe that technology systems intended to be used in fragile environments must be “protective by design,” and seek from the outset to minimize the risk of harm. The first step is to clearly understand why the system, application, or data collection ought to exist in the first place. Learn more. Learn more in the MFA Guide.

Practice 120
article thumbnail

4 Digestible Cloud Computing Facts

TechImpact

When a cloud is accessed, your computations are occurring from a remote location and your computer screen is simply displaying the results of those computations that are taking place in an off-campus data center. A cloud-based constituent relationship management (CRM) system is the modern way to run in-office donor databases.

Laptop 143
professionals

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Keep Your Data Safe: The Joy of Locking Your Computer

Tech Soup

If you step away from your computer while it's on and unlocked, anyone passing by can access it. What's perhaps most insidious about someone gaining physical access to your computer is the fact that the attacker doesn't need any advanced technical know-how to steal sensitive information. Tips for Protecting Yourself.

Data 55
article thumbnail

Share Your Green Tech Story and Win a Laptop or Tablet!

Tech Soup

Interested in winning a free refurbished laptop or tablet? Dell Core Windows 7 Laptop from InterConnection. HP EliteBook 8440p Core i5 Windows 7 Laptop from PCRR. Both laptops come preloaded with Microsoft Office 2010, a Windows operating system, and Microsoft Security Essentials. Are you … A U.S.

Laptop 36
article thumbnail

Share Your Green Tech Story and Win a Laptop or Tablet!

Tech Soup

Interested in winning a free refurbished laptop or tablet? Dell Core Windows 7 Laptop from InterConnection. HP EliteBook 8440p Core i5 Windows 7 Laptop from PCRR. Both laptops come preloaded with Microsoft Office 2010, a Windows operating system, and Microsoft Security Essentials. Are you … A U.S.

Laptop 36
article thumbnail

17 Smart Ways To Protect Data At Your Nonprofit

Global Giving

Only access or knowingly attempt to access data that you are authorized to use as a part of your role and job responsibilities. Protect confidential information by encrypting it, limiting access to it, minimizing the number of copies of it, and deleting the data when it is no longer needed. See Tip #11 ).

Data 52
article thumbnail

Cloud Integration Solutions – What’s the Deal?

Connection Cafe

One thing that has not changed, however, is the need to have access to all of this data in a common location so that it can be analyzed, and then leveraged as effectively as possible to build the strongest relationships possible with donors, supporters, and other organizational constituents. Okay, so what exactly is ‘the cloud’?