Community IT offers free webinars monthly to promote learning within our nonprofit technology community. Our podcast is appropriate for a varied level of technology expertise. Community IT is vendor-agnostic and our webinars cover a range of topics and discussions. Something on your mind you don’t see covered here? Contact us to suggest a topic! http://www.communityit.com
In today’s interview, Carolyn talks with Tiff Parker, an IT Business Manager at Community IT. They talk about her background, how she got into a technology career, and what brought her to Community I…
What does the future hold for nonprofit technology from one of the giants in the industry?
Ryan Ozimek, founder of Soapbox Engage and long time nonprofit IT thought leader, reflects on the trends and …
Ian Gottesman is CEO of a coalition of 200+ NGOs and 20 major IT companies working together to improve cybersecurity for the nonprofit sector (NGO ISAC). He has decades of experience in executive rol…
Which platform would you choose if you were starting a brand new nonprofit tomorrow?
Learn the differences, how to choose, and when to contemplate changing platforms in this webinar with Community IT …
Which platform would you choose if you were starting a brand new nonprofit tomorrow?
Learn the differences, how to choose, and when to contemplate changing platforms in this webinar with Community IT …
Do you have a technology tool that just isn’t working? How do you get at the root of the issue and find solutions?
Sometimes IT staff and directors and executives get really into the cool details of t…
Are your staff as ready as they can be for the next attack?
Our cybersecurity training team manages hundreds of clients and shares our knowledge on what works to keep your staff prepared, not just sca…
Are your staff as ready as they can be for the next attack?
Our cybersecurity training team manages hundreds of clients and shares our knowledge on what works to keep your staff prepared, not just sca…
A week in the life of the Help Desk Team
Ever wonder what it takes to be a help desk analyst, or what our Help Desk Team does in a typical week?
We’re inordinately proud of our Help Desk Team, the fir…
Shauna Dillavou is the co-founder of Brightlin.es, a security firm working with the nonprofit sector to prevent vulnerabilities. She is a seasoned intelligence analyst with decades of experience work…
In this interview from December 2024, Director of Marketing Carolyn Woodard talks with Ramunda Lark Young about her journey from growing up in Tulsa Oklahoma to working in Washington DC to founding a…
Expert Tips on Current Trends:
Webinar 2025 Nonprofit Tech Round Table
Expert Tips on Current Trends:
Webinar 2025 Nonprofit Tech Round Table
Set four intentions to make 2025 safer, saner, and more fun for your IT staff and your nonprofit.
Now is the month to set intentions for the year ahead. We know nonprofits are facing challenges in a c…
If your organization uses Google Workspace you have access to Google Groups. Kind of like a listserv but so much better.
What are Google Groups?
If your nonprofit uses Google Workspace, you can use Goo…
Welcome 2025! It's going to be a big year for nonprofit IT and as is our tradition, our senior staff weighed in with the biggest stories of 2024, the most overlooked trends, and what they will be kee…
Is your nonprofit ready to go server-less? What's holding you back from going to the cloud?
Norwin Herrera is an IT Business Manager with Community IT and has decades of experience in IT and as a non…
Cybersecurity Readiness for Nonprofit Accountants, Hosted by Jitasa University
Join Matt Eshleman, cybersecurity expert and author of the re-released Community IT Cybersecurity Readiness for Nonprofit…
New nonprofit auditing requirements SAS145 now include IT and cybersecurity compliance. Are you ready?
In 2022 the AICPA Auditing Standards Board (ASB) issued Statement on Auditing Standards (SAS) No.…
It won’t be a surprise that AI is on everyone’s mind. Matt also shared some thoughts on some year end cybersecurity tips and maintenance to ensure your cybersecurity practices – and permissions – are…