article thumbnail

5 Reasons Why Your Nonprofit Should Care About Cloud Computing

TechImpact

Mail, and Google Docs are all examples of cloud-based applications, also known as software as a service (SaaS). When using a cloud-based email system from your laptop for example, your machine is not doing any of the raw computations, it is simply displaying the results of computations that are happening elsewhere. Gmail, Yahoo!

Doc 197
article thumbnail

Best Practices for Securing Data in Humanitarian Crisis Situations

Saleforce Nonprofit

We believe that technology systems intended to be used in fragile environments must be “protective by design,” and seek from the outset to minimize the risk of harm. The first step is to clearly understand why the system, application, or data collection ought to exist in the first place. Learn more.

Practice 120
professionals

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

4 Digestible Cloud Computing Facts

TechImpact

A cloud-based constituent relationship management (CRM) system is the modern way to run in-office donor databases. This level allows a user to customize certain functions allowing them to develop their own applications. This level of cloud computing means any internet-based software, application, and service.

Laptop 143
article thumbnail

PCI Compliance for Nonprofits Guide

Greater Giving

To be considered PCI compliant, you must: Ensure all systems that store, process or transmit cardholder data have been tested for vulnerability and remediated if necessary. Conduct an annual penetration test by a qualified third-party pen-test team against your critical systems on an ongoing basis.

Guide 40
article thumbnail

Cloud Integration Solutions – What’s the Deal?

Connection Cafe

These days, conversely, not only is there far more data to get into development database systems-of-record, but more and more systems, both data sources and data destinations, reside in the cloud. So that adds levels of safety but also of complexity in managing and exchanging data. Okay, so what exactly is ‘the cloud’?

article thumbnail

Top Cybersecurity Interview Questions

Connection Cafe

IPS is s/w or the h/w that prevents unauthorized and malicious intrusions to the private network, endpoint systems, or any other infrastructure systems. IPS stands for Intrusion Prevention System. IDS stands for the Intrusion Detection System. The activity is reported or alerted to the administration or SIEM system.

article thumbnail

17 Smart Ways To Protect Data At Your Nonprofit

Global Giving

This goes for laptops as well as any servers or databases. Always use systems in a professional manner and with good judgment. Make sure that your laptop’s hard drive is encrypted, and use encrypted devices whenever possible to minimize the risk of a data breach. Change your password periodically in accordance with your policy.

Data 52