This post will provide you with some written examples that will help you promote online giving to your donors. You are welcome to use these as they are, or wordsmith them and make them your own. The purpose of this post is to get you started. […]
This post will provide you with some written examples that will help you promote online giving to your donors. You are welcome to use these as they are, or wordsmith them and make them your own. The purpose of this post is to get you started. […]
As a nonprofit, you are fully aware of the importance of being able to do more with less. In this instance, we are talking more giving, with less effort in obtaining the donation. Having an online giving system is a great way to free up more of your time. […]
Ensuring that you develop and maintain secure systems and applications is critical to ensuring the security of cardholder data when transactions flow through your processing methods. It is also very important to remember that this requirement applies to ALL systems and applications within your card data environment…
You want to accept credit cards, but you don’t see your customers or donors in person, so card swipe devices do not seem like a plausible solution. This time, we will not only look at the options available for “keyed” transactions, but other important factors to processing in a card-not-present […]
It should come as no surprise that online giving is growing and nonprofits are turning to the web and social media to connect with donors and fundraising. M+R and NTEN released their annual study on nonprofits online activity, and it’s worth reading for anyone in the nonprofit fundraising space. 14% is the magic number with a 14% […]
To Swipe or not to swipe? A very important question. Why would you consider a swipe option versus a “virtual terminal”? The benefits of the swipe lie in the processing fees. If you are in an environment where the card is present at most of the time, then you should […]
We are moving into the third area of focus in the Data Security Standards, “Maintain a Vulnerability Management Program.” There are two requirements that must be met in order to successfully Maintain a Vulnerability Management Program, and this post aims to help you understand how to meet these requirements. […]
Currently, the obvious reason to update your terminals to be EMV capable is to better protect everyone who makes payments in person with their cards. As more and more merchants begin to utilize these EMV terminals, the amount of card present fraud drastically decreases. […]
As more and more companies and consumers begin contemplating the idea of mobile wallets, many are asking, ‘What are mobile wallets, how do they?’ In definition mobile wallet technology is the use of near-field communication (NFC) chips located inside smart phones and tablets to transmit payment information. […]
Modern day Non-Profits and charities have come to the conclusion that if they are not currently accepting credit cards online they are losing potential support and donations. They are correct. According to a recent poll Americans spent $252 billion online in 2013, and are expected to spend $327 billion in 2016. […]