Information Technology Services

Category: Tips (page 1 of 4)

Why Visitors to Your Website Don’t Donate

Why Visitors to Your Website Don’t Donate, and a Few Things You Can Do About It.

Getting visitors to your nonprofit’s online fundraising site isn’t as easy as it sounds, and then trying to convert those visitors into donors is even harder.

The M+R Benchmark Study found that, on average, only 1.1 percent of website visitors made a donation to a nonprofit. Couple that with the fact that for every 1,000 website visitors, a nonprofit raises $612, and you can see that the nonprofit sector is struggling with conversion.

Nonprofits need to start capitalizing on presence of the visitors they already have. By converting those visitors into donors, your nonprofit is bound to increase your donor base and income.

There are a number of reasons why visitors to your website don’t donate. Let’s discuss four of them in detail..

4 Reasons Visitors to Your Website Don’t Donate

Getting visitors to your nonprofit’s online fundraising site isn’t as easy as it sounds, and then trying to convert those visitors into donors is even harder. The M+R Benchmark Study found that, on average, only 1.1 percent of website visitors made a donation to a nonprofit.

Is Trying to Calculate Organic Reach on Facebook a Waste of Time?

Just because 4% of your friends/followers/customers were shown your posts in their News Feed over the last month, that doesn’t mean they actually saw and read them. That’s why organic reach is considered by many to be a nonsensical number.

A more useful metric to track is your “Engagement Rate.” Engagement is defined as people who liked/reacted, commented, clicked, or shared your posts.

Here’s how to do that..

HOW TO: Calculate Your Nonprofit’s Organic Reach on Facebook

According to Facebook , organic reach is the total number of unique people who are shown your post(s) in their News Feed through unpaid distribution and although Facebook Insights provide a lot of useful data about your fans and reach (organic and paid), the one critical piece of data not provided is your nonprofit’s weekly, monthly, or quarterly average organic reach.

10 New iOS 10 Settings You Should Change

10 New iOS 10 Settings You Should Change

iOS 10 is here, and it’s packing a number of very cool new features. To activate some of those features – like sending read receipts in Messages or having Siri announce calls – you’ll need to tweak a few settings. A few other new options will change how your device behaves with iOS 10.

12 Important Facts About the Internet of Things (IoT)

The Internet of Things (IoT), is the internetworking of physical devices, vehicles (also referred to as “connected devices” and “smart devices“), buildings and other items—embedded with electronics, software, sensors, actuators, and network connectivity that enable these objects to collect and exchange data. In 2013 the Global Standards Initiative on Internet of Things (IoT-GSI) defined the IoT as “the infrastructure of the information society.”  The IoT allows objects to be sensed and/or controlled remotely across existing network infrastructure, creating opportunities for more direct integration of the physical world into computer-based systems, and resulting in improved efficiency, accuracy and economic benefit. When IoT is augmented with sensors and actuators, the technology becomes an instance of the more general class of cyber-physical systems, which also encompasses technologies such as smart grids,smart homes, intelligent transportation and smart cities. Each thing is uniquely identifiable through its embedded computing system but is able to interoperate within the existing Internet infrastructure. Experts estimate that the IoT will consist of almost 50 billion objects by 2020.

12 Facts IoT

click to enlarge

Internet of things – Wikipedia, the free encyclopedia

The internet of things ( IoT), is the internetworking of physical devices, vehicles (also referred to as ” connected devices” and ” smart devices”), buildings and other items- embedded with electronics, software, sensors, actuators, and network connectivity that enable these objects to collect and exchange data.

Level Up with Blogging U. — WordPress.com News

Building a business website? Starting a blog? Working on your writing? Practicing photography? There’s a Blogging U. course for you.

via Level Up with Blogging U. — WordPress.com News

Is your website mobile-friendly?

Is your website mobile-friendly?

click to test your website

Close to 70 percent of Americans now own a smartphone, and two-thirds of all adults and a whopping 90 percent of young adults use social networking sites like Facebook. Both are experiencing massive amounts of online engagement outside traditional structures.

If your organization has a website (and especially if you engage in fundraising), it is imperative that your Internet presence look and work properly on mobile devices as well as on full-size displays.

As Google continues its quest to “make the web more mobile-friendly,” businesses with websites built only for desktop computer viewing are at risk of slipping in search rankings. In 2014 Google started using websites’ mobile performance in the algorithms that determine where a site places in search rankings. Websites that look just as good on smartphones as they do on desktop computers actually get a boost in search rankings.

There are many ways to manage your website’s content. Some site owners completely build their own website from scratch. Others may use an existing software package from a company like WordPress, Drupal, or Joomla, which can provide a theme, design, and templates. When using existing website software, the site owner doesn’t build the whole site by creating code, style sheets and scripts, but only provides the content (such as photos, images, and text).

At LocalCause, we build websites using content management systems that automatically detect the device being used to view your site and optimize the layout on the fly to deliver the optimal experience regardless of whether your visitor is using a smartphone, tablet, laptop or desktop computer.

Ready to get started?

Why you should delete the online accounts you don’t use anymore — right now

Despite falling out of vogue years ago, MySpace — that old precursor to Facebook — still has details on more user accounts than the United States has people. And now a hefty chunk of those account credentials has been leaked to the entire Internet, in a humbling reminder that the Matchbox Twenty-inspired username you probably made in high school is still worth a heck of a lot to companies and criminals.

As many as 360 million MySpace accounts turned up for sale Friday in a 33-gigabyte dump online, according to reports that were confirmed Monday by MySpace’s parent, Time Inc.

A directory of direct links to delete your account from web services.

Ready to get started?

In that light, it seems there’s a strong case for deleting your old, unused accounts — or at least creating a throwaway email address to associate with the services you don’t use so that they’re insulated from the email addresses you use for more important things. Not only does it potentially cut down on the number of credentials you have to remember (although hopefully you’re solving that by using a password manager, right?), but it helps limit your exposure to hackers. By changing the credentials on your old accounts and disassociating them from online services that you use in the present-day, you can help make sure none of your other Internet identities are put at risk.

Read the rest at the WASHINGTON POST

You Should Learn Regular Expressions

Regular Expressions, or RegEx, are used for searching patterns in text. For instance, a RegEx like iP(hone|ad|od)s? will find mentions of any iOS device in a document. Knowledge of Regular Expressions is essential for programmers but they can be a great skill to have for non-developers as well – people who use Microsoft Word or spend hours inside Google Spreadsheets.

Learn Regular Expressions

Regular Expressions are extremely powerful, and no less intimidating, but even basic understanding of RegEx will save you time and make your everyday computing tasks easier.

How do you learn Regular Expressions? Or, if you are already familiar, how do you take your RegEx skills to the next level? You will obviously learn by doing but there are some excellent tools and learning resources on the Internet that will take make your journey to knowing Regular Expressions more pleasant.

Beginning April 21 Google Search Will Prioritize Mobile Content

Mobile-Friendly TestGoogle’s mobile-friendly ranking algorithm that is launching on April 21st will be on a page-by-page and real-time basis but how long will it take to roll out and how do you know if your page qualifies to benefit from it?

Since we know this algorithm will be significantly larger in impact compared to the Panda and Penguin algorithms, webmasters are kind of anxious about the release.

Yesterday, Google answered a series of questions in a Google+ hangout on the topic of this new mobile-friendly ranking algorithm. The three things we learned were:

(1) The algorithm will start rolling out on April 21st and will take a few days to a week to completely and globally.

(2) You are either mobile-friendly or not, there are no degrees of mobile-friendliness in this algorithm.

(3) The fastest way to see if your web pages are mobile-friendly is to see if you have the mobile-friendly label in the live mobile search results now. If not, check the mobile-friendly testing tool, which should match the live Google search results, whereas the mobile usability reports in Google Webmaster Tools can be delayed based on crawl time.

Q&A session for mobile-friendly ranking change

Update: check the comments section for answers to questions we weren’t able to get to during the live event→http://goo.gl/VB9qPT In this live Q&A session, we’ll answer your questions about the upcoming mobile-friendly ranking change (http://goo.gl/WEAZcX). Post your questions to the Q&A panel or in the comments below.

Need help getting your website mobile-friendly? Drop us a line!

[contact-form-7 404 "Not Found"]

Tech Support Scams

Scams Swindles And Fraud

via http://www.onguardonline.gov/

In a recent twist, scam artists are using the phone to try to break into your computer. They call, claiming to be computer techs associated with well-known companies like Microsoft. They say that they’ve detected viruses or other malware on your computer to trick you into giving them remote access or paying for software you don’t need.

These scammers take advantage of your reasonable concerns about viruses and other threats. They know that computer users have heard time and again that it’s important to install security software. But the purpose behind their elaborate scheme isn’t to protect your computer; it’s to make money.

How Tech Support Scams Work

Scammers have been peddling bogus security software for years. They set up fake websites, offer free “security” scans, and send alarming messages to try to convince you that your computer is infected. Then, they try to sell you software to fix the problem. At best, the software is worthless or available elsewhere for free. At worst, it could be malware — software designed to give criminals access to your computer and your personal information.

The latest version of the scam begins with a phone call. Scammers can get your name and other basic information from public directories. They might even guess what computer software you’re using.

Once they have you on the phone, they often try to gain your trust by pretending to be associated with well-known companies or confusing you with a barrage of technical terms. They may ask you to go to your computer and perform a series of complex tasks. Sometimes, they target legitimate computer files and claim that they are viruses. Their tactics are designed to scare you into believing they can help fix your “problem.”

Once they’ve gained your trust, they may:

  • ask you to give them remote access to your computer and then make changes to your settings that could leave your computer vulnerable
  • try to enroll you in a worthless computer maintenance or warranty program
  • ask for credit card information so they can bill you for phony services — or services you could get elsewhere for free
  • trick you into installing malware that could steal sensitive data, like user names and passwords
  • direct you to websites and ask you to enter your credit card number and other personal information

Regardless of the tactics they use, they have one purpose: to make money.

If You Get a Call

If you get a call from someone who claims to be a tech support person, hang up and call the company yourself on a phone number you know to be genuine. A caller who creates a sense of urgency or uses high-pressure tactics is probably a scam artist.

Keep these other tips in mind:

  • Don’t give control of your computer to a third party who calls you out of the blue.
  • Do not rely on caller ID alone to authenticate a caller. Criminals spoof caller ID numbers. They may appear to be calling from a legitimate company or a local number, when they’re not even in the same country as you.
  • Online search results might not be the best way to find technical support or get a company’s contact information. Scammers sometimes place online ads to convince you to call them. They pay to boost their ranking in search results so their websites and phone numbers appear above those of legitimate companies. If you want tech support, look for a company’s contact information on their software package or on your receipt.
  • Never provide your credit card or financial information to someone who calls and claims to be from tech support.
  • If a caller pressures you to buy a computer security product or says there is a subscription fee associated with the call, hang up. If you’re concerned about your computer, call your security software company directly and ask for help.
  • Never give your password on the phone. No legitimate organization calls you and asks for your password.
  • Put your phone number on the National Do Not Call Registry, and then report illegal sales calls.

If You’ve Responded to a Scam

If you think you might have downloaded malware from a scam site or allowed a cybercriminal to access your computer, don’t panic. Instead:

  • Get rid of malware. Update or download legitimate security software and scan your computer. Delete anything it identifies as a problem.
  • Change any passwords that you gave out. If you use these passwords for other accounts, change those accounts, too.
  • If you paid for bogus services with a credit card, call your credit card provider and ask to reverse the charges. Check your statements for any other charges you didn’t make, and ask to reverse those, too.
  • If you believe that someone may have accessed your personal or financial information, visit the FTC’s identity theft website. You can minimize your risk of further damage and repair any problems already in place.
  • File a complaint with the FTC at ftc.gov/complaint.

How to Spot a Refund Scam

If you paid for tech support services, and you later get a call about a refund, don’t give out any personal information, like your credit card or bank account number. The call is almost certainly another trick to take your money.

The refund scam works like this: Several months after the purchase, someone might call to ask if you were happy with the service. When you say you weren’t, the scammer offers a refund.

Or the caller may say that the company is going out of business and providing refunds for “warranties” and other services.

In either case, the scammers eventually ask for a bank or credit card account number. Or they ask you to create a Western Union account. They might even ask for remote access to your computer to help you fill out the necessary forms. But instead of putting money in your account, the scammers withdraw money from your account.

If you get a call like this, hang up, and report it at ftc.gov/complaint.

Older posts

© 2017 LocalCause

Website Malware Scan