article thumbnail

Your Nonprofit Should be Using Public Service Announcements (PSAs)

Nonprofit Tech for Good

By Peyton Leisner, Content Strategist at UncommonGood – an all-inclusive platform for nonprofits to manage their operations, marketing, and fundraising efforts. . This message is going to be different from any other advertising or marketing message as PSAs have stipulations. . Include PSAs in Your Nonprofit Marketing Strategy.

Public 325
article thumbnail

Phonathons: The Fundraiser’s Ultimate Guide & 15+ Top Tips

Double the Donation

Create a standardized script. Include matching gifts in call scripts. To illustrate our point, take a look at two possible phonathon script introductions: Phonathon Script Introduction #1: “I’m calling on behalf of University X to raise money for our annual phonathon campaign. Create a standardized script.

Guide 98
professionals

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

A Quick Guide to Creating a Nonprofit Podcast: 5 Steps

Achieve

While your audience probably receives marketing materials and updates from your organization, these communications aren’t always the most effective at fostering close relationships. You’ll use your computer to record, edit, and publish your podcast files. People tend to rush through their scripts when they’re feeling nervous.

Podcast 52
article thumbnail

SEO For Nonprofits: A Beginners Guide To Digital Marketing Success

Nonprofits Source

In the last step of this digital marketing plan, we’re going to share SEO strategies and tactics we use to increase search rankings on Google. The top 13 on page SEO factors for content marketing. How to measure and track digital marketing success. Digital Marketing Plan Chapters. Chapter 1: Digital Marketing Plan.

article thumbnail

Finding The Best Board Retreat Facilitator – 9 Things To Look For

Kindful

They don’t follow a script. They use online surveys, analyze metrics, review marketing collateral, assess board culture, and review key information about an organization. Why spend a bunch of money on a retreat if the outcomes sit in a file and collect dust? Anyone can ask canned questions that lead to canned responses.

article thumbnail

10 Best Practices for Email Security

Tech Soup

In order to protect against these unknown threats, email attachments should be "sanitized" by converting to a different file format and removing any possible embedded threats. For instance, by converting a Word file to PDF, any potentially harmful scripts can be removed. Check Internal Emails. Archive Emails.

email 65
article thumbnail

Top Cybersecurity Interview Questions

Connection Cafe

The cybersecurity job market is in the super-niche skills areas. For example, a user can copy the organization’s sensitive data from the private network by transferring the files to his pen drive or DVD or send it across to a public network through email or upload to public sites. Linux Edit the file /etc/resolv.conf.