Tech in Ten
March 7, 2018
#62 In Blockchain We Trust
Through The Noise
February 8, 2018
#327 Teri Carden of ReviewMyAMS on Finding a System that Works for You
Through the Noise #327
Teri Carden // Founder // ReviewMyAMS
Association Management Software is critical for every nonprofit that intends to grow and be successful, yet there are many organizations that still juggle their information on Excel spreadsheets. If you …
Tech in Ten
February 7, 2018
#58 GDPR coming to an organization near you
Tech In Ten #58
Yes, you should know what this is. GDPR, the European data privacy regulation, goes into effect May 2018, and US-based organizations can be fined for non-compliance.…
Tech in Ten
January 17, 2018
#55 VPN-ize your world
Tech In Ten #55
We talk about the importance of virtual private networks and how they’re used to protect organizations.…
Through The Noise
August 28, 2017
Tech in Ten Takes Over Through the Noise for Twenty
TTN #295
Mickey Panayiotakis // Managing Partner // Infamia
Today’s Through the Noise is a quickie takeover by our sister podcast, Tech in Ten. Mickey Panayiotakis, Ernesto’s partner at Infamia joins us on the show today for an informal conversation …
Tech in Ten
August 9, 2017
#32 How Can Associations Use Remarketing?
Tech In Ten #32
Remarketing is better known for ads that follow you around when you buy shows. But can associations use remarketing? (Events are a good example). Just a heads up, we may get off topic on this one. …
Through The Noise
May 29, 2017
David Lusk of Key Advocacy on Getting Your Voice Heard
Through the Noise #274
David Lusk // Founder // Key Advocacy
David Lusk, Founder, and CEO of Key Advocacy joins Ernesto on the show to talk about how he helps nonprofits and associations become more effective advocates. Planning a lobbying …
Tech in Ten
March 29, 2017
#13 You Got Hacked, Now What?
Tech in Ten #13
What do you when you get hacked as an organization? Ideally, you shouldn’t have to ask that question. But nothing is ideal about getting hacked. Mickey broke down some of the steps of what happens next.…
Tech in Ten
March 22, 2017
#12 The Cyber Security Black Hole
Tech in Ten #12
Mickey suggests that knowledge is power when it comes to developing good cyber security practices for an organization. The first step is a security assessment to help determine the risks faced by your organization to help …