Hacked, Infected or Phished?

“ We regret to inform you that our database has been compromised.” From UCLA no less. In other words, some invisible hackers out there have my social security number, address, birthday, mother’s maiden name and all the other identifiers that are used to confirm that I...

Return the Damn Call!

This is about communication: it only works if all parties participate.  Just as you can’t have an argument alone ( although I might dispute that), if you don’t bother to return the call or the email, it simply won’t work.  Yes, we are all way too busy, deluged by both...

No, YOU Be Chair

A nonprofit organization that has been around for quite some time is facing a crisis of leadership. Founded by a dynamic and charismatic woman in the early 1990’s, the organization’s mission was to distinguish itself among many others with a similar cause with a clear...

4 Steps to Asking for Money

A recurring theme in many nonprofit board rooms is the reluctance of many people to ask other people for money. There is generalized discomfort around asking for money anyway;  the fear of rejection or being seen as begging makes lots of us a bit nervous about...

7 Steps Toward Cyber Security

Nonprofit budgets are always stretched thin, and funds to cover operational expenses are often the hardest to find. As with any  ‘insurance’ kind of expenses, it often seems really expensive and not a lot to show for it. That is, until something goes wrong. Me, a...

I Know, Let's Have A Casino Night!

One of the main standbys for fundraising is the Gala evening event, whether it is a dinner, casino night, or theme party.  These things can be fun to attend, often with neat items at the auction, chances to see others who share the support for your work and to relax...