5 Questions to Assess Your Campaign Readiness for Advancement

 

At times organizations need to raise substantial funds for a specific purpose apart from annual budgets. Typically, campaigns fund tangible things like an expansion, renovation, or restoration. Capital campaigns are always based on an ambitious vision, or more commonly referred to as Big, Hairy, Audacious Goals (BHAG).

 

When it comes to capital campaigns, some organizations focus primarily on the question of campaign feasibility. But it is just as (if not more) important to focus on the question of campaign readiness.

 

If you are preparing for a capital campaign, much focus is on your gift officers and programs to develop your overall campaign strategy and identify campaign priorities. During this process, there are often many questions as planning gets underway.

 

The campaign feasibility assesses the external environment, whereas readiness examines the organization’s ability to manage and maintain a campaign. Here are five questions to ask within your organization to determine if your capital campaign is ready for launch.

 

Can we identify a lead gift?

 

The success of capital campaigns highly depends on the initial lead or principal level gifts. If you aren’t able to identify lead gifts, you likely won’t develop the campaign you are envisioning.

 

The most successful capital campaigns identify where the top two or three gifts will derive. For example, if you’re looking to raise $1 billion, you’ll need to identify lead gifts upwards of $100 million.

 

Can we identify major gift donors?

 

Similar to lead gifts, it’s essential to know where a significant number of major gifts will come from. If you can’t, it might not be time to launch, and your time would be better spent developing your major gift fundraising for your annual fund.

 

How well-positioned are we to solicit, receive, and steward the gifts that donors will give?

 

Donor relations are an organization’s comprehensive actions promoting long-term engagement and quality interactions with donors. Positively manage prospect relationships over time by focusing on the seven steps of solicitation.

 

  1. Identify
  2. Research
  3. Plan
  4. Cultivate
  5. Ask
  6. Close
  7. Thank and Steward

 

Are our advancement services teams prepared for a capital campaign?

 

You can’t reach audacious capital campaign goals without the proper teams to support your initiatives. If the expectation is that your current staff and resources are sufficient for campaign production, you might fail to reach new, ambitious goals. Instead, assess the areas you may need additional support.

 

From prospects to patients, members to alumni (and everyone in between), the people who fuel and fund an organization’s future present an immense amount of data to be captured, managed, and visualized—ultimately leveraged by the experts in advancement services[1].

 

Do we have the prospect development pipeline to meet our capital campaign goals?

 

You must know what’s in your fundraising pipeline. One way to determine if the pipeline works as it should, is to determine whether people from your donor list are spread throughout.

 

Remember, there are three main reasons people donate:

 

  • deep passion for the cause;
  • belief in the organization; or
  • know someone affected by the mission.

 

Accurate Constituent Data

 

In addition to readiness, accurate constituent data, efficient and reliable gift tracking, and reliable campaign reporting are critical components to your capital campaign success.

 

An organization’s most valuable asset is its accurate constituent data. The Constituent Relationship Management (CRM) system is usually the central piece of software at an organization. The CRM is more than a database—proving intelligence and functionality organizations need to optimize fundraising and communication with their supporters.

 

Accurate data sets you up for fundraising success—allowing you to set reasonable goals, evaluate your team needs, reach constituents, track gifts efficiently, and analyze reliable campaign reporting.

 

[1] https://www.advserv.org/page/about-advancement-services/

 

5 Best Practices to Ease Your Advancement CRM Online Training

 

Advancement is becoming increasingly more challenging. If 2020 has taught us anything, it’s to expect the unexpected. These unprecedented times are fueled by a global health crisis, world-wide financial turmoil, and political unrest. Markets are volatile with many negative societal implications. Many organizations continue to shutter their face-to-face activities and healthcare systems are strained under the pressure of ongoing patient needs.

 

Online learning is continuing. Working virtually has proved many positives but may not be as straightforward when considering online training in complex systems like Constituent Relationship Management (CRM)—especially if your audience is more “old school” and prefers in-person learning.

 

A fully online course lacks a physical teaching space and requires digital communication and transmission of materials and assessments. Compared to the in-person learning environment, the online environment requires different strategies for teaching and learning. These new elements might seem intuitive, but for others might not be as obvious.

 

Online instruction requires the knowledge and practice of online etiquette (or netiquette) and the initial establishment of performance and behavior expectations. Virtual instructors need to be aware of these differences and be deliberate as they transition their course to the online environment.

 

Online training for your Advancement CRM is no exception. Here are five best practices to ease the burden of your Advancement CRM online training.

 

Get Employee Support

 

First things first, you’ll need to get your entire organization to ‘buy-in’ to the idea of virtual CRM training. Without their support, conducting training in any capacity will fall flat. CRM training and education will flourish if the organization’s people believe in the system, the benefits it can deliver, and have an understanding of their role in the overall implementation.

 

Getting key stakeholders involved early can help, but don’t forget about engaging end-users. Frequently, organizations think that if the executives are supportive, their staff will be too—this isn’t always the case.

 

If you’re struggling to get the support you need, survey to see if employees value the transition. They may be worried about learning a new system or assume their job may change as a result. While valid—and in some cases true—understanding their trepidations helps meet them where they’re at and eventually supporting them to buy into the transition.

 

Develop a Targeted Training Strategy

 

CRM platforms are often equipped with limitless possibilities—overwhelming even the most technology-inclined individual. Instead of jumping into all it has to offer, break your training into bite-size pieces that support crucial operational processes.

 

For example, one of the things you might do with your CRM system is to locate your constituent base in a personalized and targeted way. To do this effectively, first develop a strategy. Then train people on how you use the system to support that initiative.

 

Utilize Synchronous and Asynchronous Methods

 

There is an assumption that people will use the CRM system consistently and systematically immediately following training. Not everyone learns in the same way, and inadequate training can increase frustrations or even lead to employee burnout[1].

 

Avoid this by incorporating synchronous training—live scheduled classes—with a combination of asynchronous work encouraging employees to complete activities independently. Use the asynchronous work sessions to have trainees practice uploading data or running reports.

 

Create a strategy to address the non-users or those that may be struggling with comprehension. In an online training environment, this might look like having office hours to ask questions. Or set aside time to allow the training leader to conduct a screen share and walk the end-user through the issue in real-time.

 

Create Real-Life Training Scenarios

 

There is nothing more frustrating than trying to learn new software and not understand how it applies to a person’s day-to-day. Tailor training to your specific organizational needs. Clearly identify outcomes and expectations, focusing on tasks they’ll need to understand in their individual role.

 

Use this opportunity to establish acceptable working practices. Decide formatting and other requirements to ensure consistency.

 

Creating standards of practice helps avoid entering data in multiple ways. For example, if you’re entering names and addresses into the CRM database, require everyone to enter information in title case without abbreviations.

 

Schedule Ongoing Training

 

Plan to have ongoing online training for your Advancement CRM. This helps to maintain the long-term value of your investment in CRM technology by regularly engaging end-users in new updates, processes, and procedures.

 

It also provides opportunities for consistency, making sure anyone using the CRM system has a solid understanding of expectations, specifications, feedback, and the ability to problem-solve.

 

Investing in your CRM now is more important than ever before. But your CRM system must be more than a database—it should provide the intelligence and functionality you need to optimize fundraising and communication with your supporters.

 

 

[1] https://www.sciencedirect.com/science/article/pii/S0007681321000392

 

Data Security: A Primer for Advancement Leadership

Data security is critical to making sure that vital information from your organization is not easily accessible, but maintaining data security isn’t easy. In fact, there have been 540 data breaches this year.

 

That’s 163,551,023 people affected in 2020 so far by breaches in data security. Let’s dive into this critical topic as more and more workers and students sign in online every, single day.

Top 6 Causes of Data Breaches

To increase your knowledge about data security, here are the top causes of data breaches.

1. Weak and Stolen Credentials

Passwords that are cracked through brute force algorithms are a main cause of data breaches, but so are stolen passwords.

 

To keep your passwords safe, make sure that you’ve made them complex enough to render them “unhackable”. You can randomly generated passwords and manage them with tools like LogMeOnce or LastPass. Extra points for a combination of upper and lowercase letters, numbers, and special characters.

2. Application Vulnerabilities

Hackers find the technical vulnerability in a software and then exploit it. Before using or launching a new application, make sure your team tests it for vulnerabilities and finds ways to patch those security threats. This includes applications that house your constituent data, like your Advancement CRM database.

3. Malware

“Malware” is short for “malicious software.” It describes a variety of threatening methods that are designed to infiltrate and damage, disrupt, or hack a device. For example, think of viruses, worms, ransomware, and Trojan Horses. You don’t want to be on the receiving end of malware.

4. Malicious Insiders

Taking care of your employees so that they don’t become a future risk to your institution is important, but so is screening out those who seem predisposed to betraying their employer. Malicious insiders are the employees who have access to sensitive information and then purposefully commit a data breach to harm the institution. Better hiring and screening processes, along with maintaining a good organizational culture and robust employee training programs, can help prevent these insiders from coming on board and wreaking havoc from within the organization.

5. Insider Error

Employees who do not have malicious intent but commit a data breach by mistake are also a threat. These employees may not be aware they’ve done anything wrong, but one accidental keystroke can cause a serious data breach.

 

For these employees, it’s important to remind them to take more care with their work and to encourage them to be transparent when they’ve made an error. Employee training is a crucial step to prevent these errors. Together, you can grow and learn, ultimately stopping similar mistakes from happening.

6. Physical Theft

Theft of a device that holds your institution’s sensitive information falls under this category. To prevent these breaches, you may want to take extra care in where you physically store this information—consider using a safe or a security system.

Why Preventing Data Breaches Is Important

Data breaches are preventable. In fact, 4 of the 6 causes of data breaches can be prevented based on changing human behavior. This means that every staff member in Advancement can be a part of the solution.

How To Prevent Data Breaches

There are several measures you can take to prevent data breaches.

Security Policy Training and Education: Setting The Standard

When you’re creating your security policy training and pulling together your educational materials, it’s important to clearly set the standard. When you’re completing this step, it helps to ask yourself and your colleagues the following questions:

  • What is the policy?
  • Why is it beneficial to the organization?
  • How does a security breach impact Advancement?
    • By making a breach relevant to Advancement itself, you’re adding a sense of urgency for employees to comply.

You’ll also want to discuss examples of behaviors that adhere to the policy and examples of behaviors that would violate the policy. By giving employees clear examples, you’re ensuring that they’ll fully understand what does and does not constitute a data breach.

Advancement Leadership as Security Champions: Lead by Example

As a leader in your Advancement team, you must champion the cause to protect sensitive information and build confidence with your donors and supporters. Give periodic Executive Briefings on the key points below:

  • Know what data you have, including its:
    • Location (is it in an on-premise data center, is it vendor-hosted, is it in a storage room, or is it in Mike’s desk drawer?)
    • Format (is the data in a digital copy or a hard copy?)
    • Volume (how much data is there, really?)
    • Classification (whether the data is sensitive or confidential)
  • What potential vulnerabilities exist based on the data you have, the software you’ve used, and access you’ve given staff members?
    • Map these vulnerabilities out and identify them, before a breach occurs.
  • What plans are in place to reduce the vulnerabilities your company has? Are they working? (Tip: If they’re not working, brainstorm ways to improve.)

Communication Plan for Data Breach

Have your plan ready before a data breach occurs. Establish a communication plan such that you and your leadership team can be immediately informed if there is a threat or possible threat of a data breach. Creating a data breach task force or committee can also help streamline that process internally. Determine how you will communicate to your constituents.

Performance Evaluations: Enforce Security Policies

You can’t simply rely on IT to be the sole security watchdog for your organization. By the time they are even aware of staff behavior that has compromised the organization, that door may have been open for months. Staff should be evaluated on a consistent and measured basis.

Data Security: Final Thoughts

Assessment of your Advancement team’s Data Security requires a 360-degree look into how your institution is performing, the vulnerabilities that exist, and ways that existing processes can be refined to prevent future data breaches.

 

When you’re trusting employees with sensitive data, remember—human error can and will happen, but with the right precautions, you’re taking safeguards to prevent future accidental breaches from happening again.

 

Malicious actors also exist, but again—with the right measures, you’re taking steps to prevent them from hacking into or stealing your data.