SlideShare a Scribd company logo
NEXT DIGITAL STEPS
THE BIGGEST BARRIERS
HARDWARE NEEDS
SECURITY PRACTICES
SOFTWARE NEEDS
SECURITY IMPROVEMENTS
These are the top 5 software categories that nonprofit from Croatia intend to
start to use or use more intensively in the coming period.
Surveyed nonprofits in Croatia believe that resources to buy software is the most
significant barrier for better and more efficient use of technology.
Nonprofits in Croatia state that their most significant needs are laptops,
offline data storage space and projectors.
Nonprofits mostly use various tech solutions for antivirus, backup, and firewalls.
However, they use encryption, VPN, and fraud detection solutions very rarely.
The most popular software solutions nonprofits would like to use are
WordPress, Photoshop, Zoom, Microsoft 365 and MailChimp.
For improved digital security, nonprofits believe that they need better skills in
the first place, followed by better software.
COVID-19 crisis has forced the nonprofit sector into digital transformation.
We researched how nonprofits in Croatia use technology, their
security practices, and their most pressing digital needs.
Research by
NONPROFIT TECH NEEDS
in Croatia
Microsoft 365
53.2%
Photoshop
57.1%
45.5%
58.4%
50.6%
55.8% 54.5%
Conference calls and webinars
45.5%
Media clipping
Databases
64.9%
Desktop PC
51.9%
Resources to buy hardwareResources to buy software
18.2%
Lack of knowledge and skills
Laptop PC
72.7%
Offline storage
Projectors
Smartphones
Access control
62.3%
Servers
50.6%
Tablets
64.9%
Cameras
Antivirus and antimalware Backup Firewall
14.3%
3.9%
Virtual private network (VPN) Encryption of data Fraud detection
26.0% 24.7%
Encryption of communication Preventing hacks
Better skills Better software Better hardware
MailChimp
50.6%
Project management
46.8%
Design
WordPress
79.2%
68.8%
55.8%
46.8%
64.9%
85.7%
64.9%
62.3%
36.4%
15.6%
58.4%
55.8%
Zoom
givingbalkans.orgSupported by

More Related Content

What's hot

Software Security Assurance for DevOps
Software Security Assurance for DevOpsSoftware Security Assurance for DevOps
Software Security Assurance for DevOps
Black Duck by Synopsys
 
Humming Heads Presentation
Humming Heads PresentationHumming Heads Presentation
Humming Heads Presentation
Dansha
 
2008 Trends
2008 Trends2008 Trends
2008 Trends
TBledsoe
 
2012 State of Mobile Survey Global Key Findings
2012 State of Mobile Survey Global Key Findings2012 State of Mobile Survey Global Key Findings
2012 State of Mobile Survey Global Key Findings
Symantec
 
2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference
Fabio Pietrosanti
 
The Future of Cybersecurity - October 2015
The Future of Cybersecurity - October 2015The Future of Cybersecurity - October 2015
The Future of Cybersecurity - October 2015
Security Innovation
 
OWASP Poland Day 2018 - Michal Kurek - Application Security in IIoT World
OWASP Poland Day 2018 - Michal Kurek - Application Security in IIoT WorldOWASP Poland Day 2018 - Michal Kurek - Application Security in IIoT World
OWASP Poland Day 2018 - Michal Kurek - Application Security in IIoT World
OWASP
 
Third Annual Mobile Threats Report
Third Annual Mobile Threats ReportThird Annual Mobile Threats Report
Third Annual Mobile Threats Report
Juniper Networks
 
Computer hacking and security - Social Responsibility of IT Professional by M...
Computer hacking and security - Social Responsibility of IT Professional by M...Computer hacking and security - Social Responsibility of IT Professional by M...
Computer hacking and security - Social Responsibility of IT Professional by M...
Mark John Lado, MIT
 
Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and Tablets
Vince Verbeke
 
Industrial Control Systems 101 - Why Hack The Network If You Can Shut Down Th...
Industrial Control Systems 101 - Why Hack The Network If You Can Shut Down Th...Industrial Control Systems 101 - Why Hack The Network If You Can Shut Down Th...
Industrial Control Systems 101 - Why Hack The Network If You Can Shut Down Th...
Resilient Systems
 
5 Steps to Successful BYOD Implementation
5 Steps to Successful BYOD Implementation5 Steps to Successful BYOD Implementation
5 Steps to Successful BYOD Implementation
JumpCloud
 
Manage Remote Workers in Three Easy Steps
Manage Remote Workers in Three Easy StepsManage Remote Workers in Three Easy Steps
Manage Remote Workers in Three Easy Steps
JumpCloud
 
Cybersecurity
Cybersecurity Cybersecurity
Cybersecurity
nado-web
 
Avoid These Top 15 IT Security Threats
Avoid These Top 15 IT Security ThreatsAvoid These Top 15 IT Security Threats
Avoid These Top 15 IT Security Threats
JumpCloud
 
Cyber Security in the time of COVID -19
Cyber Security in the time of COVID -19Cyber Security in the time of COVID -19
Cyber Security in the time of COVID -19
fingerprint.sh
 
Using Technology and Techno-People to Improve your Threat Resistance and Cybe...
Using Technology and Techno-People to Improve your Threat Resistance and Cybe...Using Technology and Techno-People to Improve your Threat Resistance and Cybe...
Using Technology and Techno-People to Improve your Threat Resistance and Cybe...
Stephen Cobb
 
Mobile Security
Mobile SecurityMobile Security
Mobile SecurityKevin Lee
 
Mobile security
Mobile securityMobile security
Mobile securityhome
 

What's hot (19)

Software Security Assurance for DevOps
Software Security Assurance for DevOpsSoftware Security Assurance for DevOps
Software Security Assurance for DevOps
 
Humming Heads Presentation
Humming Heads PresentationHumming Heads Presentation
Humming Heads Presentation
 
2008 Trends
2008 Trends2008 Trends
2008 Trends
 
2012 State of Mobile Survey Global Key Findings
2012 State of Mobile Survey Global Key Findings2012 State of Mobile Survey Global Key Findings
2012 State of Mobile Survey Global Key Findings
 
2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference
 
The Future of Cybersecurity - October 2015
The Future of Cybersecurity - October 2015The Future of Cybersecurity - October 2015
The Future of Cybersecurity - October 2015
 
OWASP Poland Day 2018 - Michal Kurek - Application Security in IIoT World
OWASP Poland Day 2018 - Michal Kurek - Application Security in IIoT WorldOWASP Poland Day 2018 - Michal Kurek - Application Security in IIoT World
OWASP Poland Day 2018 - Michal Kurek - Application Security in IIoT World
 
Third Annual Mobile Threats Report
Third Annual Mobile Threats ReportThird Annual Mobile Threats Report
Third Annual Mobile Threats Report
 
Computer hacking and security - Social Responsibility of IT Professional by M...
Computer hacking and security - Social Responsibility of IT Professional by M...Computer hacking and security - Social Responsibility of IT Professional by M...
Computer hacking and security - Social Responsibility of IT Professional by M...
 
Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and Tablets
 
Industrial Control Systems 101 - Why Hack The Network If You Can Shut Down Th...
Industrial Control Systems 101 - Why Hack The Network If You Can Shut Down Th...Industrial Control Systems 101 - Why Hack The Network If You Can Shut Down Th...
Industrial Control Systems 101 - Why Hack The Network If You Can Shut Down Th...
 
5 Steps to Successful BYOD Implementation
5 Steps to Successful BYOD Implementation5 Steps to Successful BYOD Implementation
5 Steps to Successful BYOD Implementation
 
Manage Remote Workers in Three Easy Steps
Manage Remote Workers in Three Easy StepsManage Remote Workers in Three Easy Steps
Manage Remote Workers in Three Easy Steps
 
Cybersecurity
Cybersecurity Cybersecurity
Cybersecurity
 
Avoid These Top 15 IT Security Threats
Avoid These Top 15 IT Security ThreatsAvoid These Top 15 IT Security Threats
Avoid These Top 15 IT Security Threats
 
Cyber Security in the time of COVID -19
Cyber Security in the time of COVID -19Cyber Security in the time of COVID -19
Cyber Security in the time of COVID -19
 
Using Technology and Techno-People to Improve your Threat Resistance and Cybe...
Using Technology and Techno-People to Improve your Threat Resistance and Cybe...Using Technology and Techno-People to Improve your Threat Resistance and Cybe...
Using Technology and Techno-People to Improve your Threat Resistance and Cybe...
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Mobile security
Mobile securityMobile security
Mobile security
 

Similar to Non-profit Tech Needs in Croatia

Non-profit Tech Needs in Montenegro
Non-profit Tech Needs in MontenegroNon-profit Tech Needs in Montenegro
Non-profit Tech Needs in Montenegro
Catalyst Balkans
 
Non-profit Tech Needs in North Macedonia
Non-profit Tech Needs in North MacedoniaNon-profit Tech Needs in North Macedonia
Non-profit Tech Needs in North Macedonia
Catalyst Balkans
 
Open Source Insight: Container Tech, Data Centre Security & 2018's Biggest Se...
Open Source Insight:Container Tech, Data Centre Security & 2018's Biggest Se...Open Source Insight:Container Tech, Data Centre Security & 2018's Biggest Se...
Open Source Insight: Container Tech, Data Centre Security & 2018's Biggest Se...
Black Duck by Synopsys
 
Open Source Insight: Security Breaches and Cryptocurrency Dominating News
Open Source Insight: Security Breaches and Cryptocurrency Dominating NewsOpen Source Insight: Security Breaches and Cryptocurrency Dominating News
Open Source Insight: Security Breaches and Cryptocurrency Dominating News
Black Duck by Synopsys
 
Software piracy in Bangladesh
Software piracy in BangladeshSoftware piracy in Bangladesh
Software piracy in Bangladesh
East West University
 
Infosecurity Europe - Infographic
Infosecurity Europe - InfographicInfosecurity Europe - Infographic
Infosecurity Europe - Infographic
Synopsys Software Integrity Group
 
Paul Henry’s 2011 Malware Trends
Paul Henry’s 2011 Malware TrendsPaul Henry’s 2011 Malware Trends
Paul Henry’s 2011 Malware Trends
Lumension
 
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfJust-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
InfinityGroup5
 
Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012
Andris Soroka
 
Cybersecurity - Sam Maccherola
Cybersecurity - Sam MaccherolaCybersecurity - Sam Maccherola
Cybersecurity - Sam Maccherola
TechBiz Forense Digital
 
Offshore software development.pdf
Offshore software development.pdfOffshore software development.pdf
Offshore software development.pdf
Urolime Technologies
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2
SHOLOVE INTERNATIONAL LLC
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)Norm Barber
 
Drivelock modern approach of it security & amp; encryption solution -whitep...
Drivelock   modern approach of it security & amp; encryption solution -whitep...Drivelock   modern approach of it security & amp; encryption solution -whitep...
Drivelock modern approach of it security & amp; encryption solution -whitep...
Arbp Worldwide
 
application-security-fallacies-and-realities-veracode
application-security-fallacies-and-realities-veracodeapplication-security-fallacies-and-realities-veracode
application-security-fallacies-and-realities-veracodesciccone
 
Trend Micro Titanium Antivirus 2012 Review
Trend Micro Titanium Antivirus 2012 ReviewTrend Micro Titanium Antivirus 2012 Review
Trend Micro Titanium Antivirus 2012 Review
stakro
 
Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...
Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...
Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...
Black Duck by Synopsys
 
Internet 2.0 Reviews The Future Of Software Development: Trends In AI, Cloud ...
Internet 2.0 Reviews The Future Of Software Development: Trends In AI, Cloud ...Internet 2.0 Reviews The Future Of Software Development: Trends In AI, Cloud ...
Internet 2.0 Reviews The Future Of Software Development: Trends In AI, Cloud ...
Internet 2Conf
 
Unicom Conference - Mobile Application Security
Unicom Conference - Mobile Application SecurityUnicom Conference - Mobile Application Security
Unicom Conference - Mobile Application Security
Subho Halder
 
Cisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco 2014 Midyear Security Report
Cisco 2014 Midyear Security Report
Cisco Security
 

Similar to Non-profit Tech Needs in Croatia (20)

Non-profit Tech Needs in Montenegro
Non-profit Tech Needs in MontenegroNon-profit Tech Needs in Montenegro
Non-profit Tech Needs in Montenegro
 
Non-profit Tech Needs in North Macedonia
Non-profit Tech Needs in North MacedoniaNon-profit Tech Needs in North Macedonia
Non-profit Tech Needs in North Macedonia
 
Open Source Insight: Container Tech, Data Centre Security & 2018's Biggest Se...
Open Source Insight:Container Tech, Data Centre Security & 2018's Biggest Se...Open Source Insight:Container Tech, Data Centre Security & 2018's Biggest Se...
Open Source Insight: Container Tech, Data Centre Security & 2018's Biggest Se...
 
Open Source Insight: Security Breaches and Cryptocurrency Dominating News
Open Source Insight: Security Breaches and Cryptocurrency Dominating NewsOpen Source Insight: Security Breaches and Cryptocurrency Dominating News
Open Source Insight: Security Breaches and Cryptocurrency Dominating News
 
Software piracy in Bangladesh
Software piracy in BangladeshSoftware piracy in Bangladesh
Software piracy in Bangladesh
 
Infosecurity Europe - Infographic
Infosecurity Europe - InfographicInfosecurity Europe - Infographic
Infosecurity Europe - Infographic
 
Paul Henry’s 2011 Malware Trends
Paul Henry’s 2011 Malware TrendsPaul Henry’s 2011 Malware Trends
Paul Henry’s 2011 Malware Trends
 
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfJust-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
 
Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012
 
Cybersecurity - Sam Maccherola
Cybersecurity - Sam MaccherolaCybersecurity - Sam Maccherola
Cybersecurity - Sam Maccherola
 
Offshore software development.pdf
Offshore software development.pdfOffshore software development.pdf
Offshore software development.pdf
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)
 
Drivelock modern approach of it security & amp; encryption solution -whitep...
Drivelock   modern approach of it security & amp; encryption solution -whitep...Drivelock   modern approach of it security & amp; encryption solution -whitep...
Drivelock modern approach of it security & amp; encryption solution -whitep...
 
application-security-fallacies-and-realities-veracode
application-security-fallacies-and-realities-veracodeapplication-security-fallacies-and-realities-veracode
application-security-fallacies-and-realities-veracode
 
Trend Micro Titanium Antivirus 2012 Review
Trend Micro Titanium Antivirus 2012 ReviewTrend Micro Titanium Antivirus 2012 Review
Trend Micro Titanium Antivirus 2012 Review
 
Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...
Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...
Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...
 
Internet 2.0 Reviews The Future Of Software Development: Trends In AI, Cloud ...
Internet 2.0 Reviews The Future Of Software Development: Trends In AI, Cloud ...Internet 2.0 Reviews The Future Of Software Development: Trends In AI, Cloud ...
Internet 2.0 Reviews The Future Of Software Development: Trends In AI, Cloud ...
 
Unicom Conference - Mobile Application Security
Unicom Conference - Mobile Application SecurityUnicom Conference - Mobile Application Security
Unicom Conference - Mobile Application Security
 
Cisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco 2014 Midyear Security Report
Cisco 2014 Midyear Security Report
 

More from Catalyst Balkans

Društveno odgovorno poslovanje u službi osnaživanja žena
 Društveno odgovorno poslovanje u službi osnaživanja žena Društveno odgovorno poslovanje u službi osnaživanja žena
Društveno odgovorno poslovanje u službi osnaživanja žena
Catalyst Balkans
 
Shqipëria dhuron 2021 – Raporti vjetor për gjendjen e filantropisë
Shqipëria dhuron 2021 – Raporti vjetor për gjendjen e filantropisëShqipëria dhuron 2021 – Raporti vjetor për gjendjen e filantropisë
Shqipëria dhuron 2021 – Raporti vjetor për gjendjen e filantropisë
Catalyst Balkans
 
Giving Albania 2021 - Annual Report on the State of Philanthropy
Giving Albania 2021 - Annual Report on the State of PhilanthropyGiving Albania 2021 - Annual Report on the State of Philanthropy
Giving Albania 2021 - Annual Report on the State of Philanthropy
Catalyst Balkans
 
Kosovo daruje 2021 - Izveštaj o stanju filantropije
Kosovo daruje 2021 - Izveštaj o stanju filantropijeKosovo daruje 2021 - Izveštaj o stanju filantropije
Kosovo daruje 2021 - Izveštaj o stanju filantropije
Catalyst Balkans
 
BiH daruje 2021 - rezime nalaza
BiH daruje 2021 - rezime nalazaBiH daruje 2021 - rezime nalaza
BiH daruje 2021 - rezime nalaza
Catalyst Balkans
 
BiH daruje 2021 - Izvještaj o stanju filantropije
BiH daruje 2021 - Izvještaj o stanju filantropijeBiH daruje 2021 - Izvještaj o stanju filantropije
BiH daruje 2021 - Izvještaj o stanju filantropije
Catalyst Balkans
 
Kosova dhuron 2021 - Raporti vjetor për gjendjen e filantropisë
Kosova dhuron 2021 - Raporti vjetor për gjendjen e filantropisëKosova dhuron 2021 - Raporti vjetor për gjendjen e filantropisë
Kosova dhuron 2021 - Raporti vjetor për gjendjen e filantropisë
Catalyst Balkans
 
Giving Kosovo 2021 -Quick Facts
Giving Kosovo 2021 -Quick FactsGiving Kosovo 2021 -Quick Facts
Giving Kosovo 2021 -Quick Facts
Catalyst Balkans
 
Giving Bosnia and Herzegovina 2021 - Report on the State of Philanthropy
Giving Bosnia and Herzegovina 2021 - Report on the State of PhilanthropyGiving Bosnia and Herzegovina 2021 - Report on the State of Philanthropy
Giving Bosnia and Herzegovina 2021 - Report on the State of Philanthropy
Catalyst Balkans
 
Giving Kosovo 2021 - Report on the State of Philanthropy
Giving Kosovo 2021 - Report on the State of PhilanthropyGiving Kosovo 2021 - Report on the State of Philanthropy
Giving Kosovo 2021 - Report on the State of Philanthropy
Catalyst Balkans
 
Giving Serbia 2021 - Report on the State of Philanthropy
Giving Serbia 2021 - Report on the State of PhilanthropyGiving Serbia 2021 - Report on the State of Philanthropy
Giving Serbia 2021 - Report on the State of Philanthropy
Catalyst Balkans
 
Maqedonia e Veriut Dhuron – Raporti për gjendjen e filantropisë 2021
Maqedonia e Veriut Dhuron – Raporti për gjendjen e filantropisë 2021Maqedonia e Veriut Dhuron – Raporti për gjendjen e filantropisë 2021
Maqedonia e Veriut Dhuron – Raporti për gjendjen e filantropisë 2021
Catalyst Balkans
 
Северна Македонија донира 2021 – извештај за состојбата на филантропијата
Северна Македонија донира 2021 – извештај за состојбата на филантропијатаСеверна Македонија донира 2021 – извештај за состојбата на филантропијата
Северна Македонија донира 2021 – извештај за состојбата на филантропијата
Catalyst Balkans
 
Giving North Macedonia 2021 - Report on the State of Philanthropy
Giving North Macedonia 2021 - Report on the State of PhilanthropyGiving North Macedonia 2021 - Report on the State of Philanthropy
Giving North Macedonia 2021 - Report on the State of Philanthropy
Catalyst Balkans
 
Giving Montenegro 2021 - Report on the State of Philanthropy
Giving Montenegro 2021 - Report on the State of PhilanthropyGiving Montenegro 2021 - Report on the State of Philanthropy
Giving Montenegro 2021 - Report on the State of Philanthropy
Catalyst Balkans
 
Crna Gora daruje 2021 - Rezime nalaza
Crna Gora daruje 2021 - Rezime nalazaCrna Gora daruje 2021 - Rezime nalaza
Crna Gora daruje 2021 - Rezime nalaza
Catalyst Balkans
 
Crna Gora Daruje 2021 - Izvještaj o dobročinstvu
Crna Gora Daruje 2021 - Izvještaj o dobročinstvuCrna Gora Daruje 2021 - Izvještaj o dobročinstvu
Crna Gora Daruje 2021 - Izvještaj o dobročinstvu
Catalyst Balkans
 
Hrvatska daruje 2021 - sažetak nalaza
Hrvatska daruje 2021 - sažetak nalazaHrvatska daruje 2021 - sažetak nalaza
Hrvatska daruje 2021 - sažetak nalaza
Catalyst Balkans
 
Giving Croatia 2021 - Annual Report on the State of Philanthropy
Giving Croatia 2021 - Annual Report on the State of PhilanthropyGiving Croatia 2021 - Annual Report on the State of Philanthropy
Giving Croatia 2021 - Annual Report on the State of Philanthropy
Catalyst Balkans
 
Hrvatska daruje 2021: Izvješće o stanju filantropije
Hrvatska daruje 2021: Izvješće o stanju filantropijeHrvatska daruje 2021: Izvješće o stanju filantropije
Hrvatska daruje 2021: Izvješće o stanju filantropije
Catalyst Balkans
 

More from Catalyst Balkans (20)

Društveno odgovorno poslovanje u službi osnaživanja žena
 Društveno odgovorno poslovanje u službi osnaživanja žena Društveno odgovorno poslovanje u službi osnaživanja žena
Društveno odgovorno poslovanje u službi osnaživanja žena
 
Shqipëria dhuron 2021 – Raporti vjetor për gjendjen e filantropisë
Shqipëria dhuron 2021 – Raporti vjetor për gjendjen e filantropisëShqipëria dhuron 2021 – Raporti vjetor për gjendjen e filantropisë
Shqipëria dhuron 2021 – Raporti vjetor për gjendjen e filantropisë
 
Giving Albania 2021 - Annual Report on the State of Philanthropy
Giving Albania 2021 - Annual Report on the State of PhilanthropyGiving Albania 2021 - Annual Report on the State of Philanthropy
Giving Albania 2021 - Annual Report on the State of Philanthropy
 
Kosovo daruje 2021 - Izveštaj o stanju filantropije
Kosovo daruje 2021 - Izveštaj o stanju filantropijeKosovo daruje 2021 - Izveštaj o stanju filantropije
Kosovo daruje 2021 - Izveštaj o stanju filantropije
 
BiH daruje 2021 - rezime nalaza
BiH daruje 2021 - rezime nalazaBiH daruje 2021 - rezime nalaza
BiH daruje 2021 - rezime nalaza
 
BiH daruje 2021 - Izvještaj o stanju filantropije
BiH daruje 2021 - Izvještaj o stanju filantropijeBiH daruje 2021 - Izvještaj o stanju filantropije
BiH daruje 2021 - Izvještaj o stanju filantropije
 
Kosova dhuron 2021 - Raporti vjetor për gjendjen e filantropisë
Kosova dhuron 2021 - Raporti vjetor për gjendjen e filantropisëKosova dhuron 2021 - Raporti vjetor për gjendjen e filantropisë
Kosova dhuron 2021 - Raporti vjetor për gjendjen e filantropisë
 
Giving Kosovo 2021 -Quick Facts
Giving Kosovo 2021 -Quick FactsGiving Kosovo 2021 -Quick Facts
Giving Kosovo 2021 -Quick Facts
 
Giving Bosnia and Herzegovina 2021 - Report on the State of Philanthropy
Giving Bosnia and Herzegovina 2021 - Report on the State of PhilanthropyGiving Bosnia and Herzegovina 2021 - Report on the State of Philanthropy
Giving Bosnia and Herzegovina 2021 - Report on the State of Philanthropy
 
Giving Kosovo 2021 - Report on the State of Philanthropy
Giving Kosovo 2021 - Report on the State of PhilanthropyGiving Kosovo 2021 - Report on the State of Philanthropy
Giving Kosovo 2021 - Report on the State of Philanthropy
 
Giving Serbia 2021 - Report on the State of Philanthropy
Giving Serbia 2021 - Report on the State of PhilanthropyGiving Serbia 2021 - Report on the State of Philanthropy
Giving Serbia 2021 - Report on the State of Philanthropy
 
Maqedonia e Veriut Dhuron – Raporti për gjendjen e filantropisë 2021
Maqedonia e Veriut Dhuron – Raporti për gjendjen e filantropisë 2021Maqedonia e Veriut Dhuron – Raporti për gjendjen e filantropisë 2021
Maqedonia e Veriut Dhuron – Raporti për gjendjen e filantropisë 2021
 
Северна Македонија донира 2021 – извештај за состојбата на филантропијата
Северна Македонија донира 2021 – извештај за состојбата на филантропијатаСеверна Македонија донира 2021 – извештај за состојбата на филантропијата
Северна Македонија донира 2021 – извештај за состојбата на филантропијата
 
Giving North Macedonia 2021 - Report on the State of Philanthropy
Giving North Macedonia 2021 - Report on the State of PhilanthropyGiving North Macedonia 2021 - Report on the State of Philanthropy
Giving North Macedonia 2021 - Report on the State of Philanthropy
 
Giving Montenegro 2021 - Report on the State of Philanthropy
Giving Montenegro 2021 - Report on the State of PhilanthropyGiving Montenegro 2021 - Report on the State of Philanthropy
Giving Montenegro 2021 - Report on the State of Philanthropy
 
Crna Gora daruje 2021 - Rezime nalaza
Crna Gora daruje 2021 - Rezime nalazaCrna Gora daruje 2021 - Rezime nalaza
Crna Gora daruje 2021 - Rezime nalaza
 
Crna Gora Daruje 2021 - Izvještaj o dobročinstvu
Crna Gora Daruje 2021 - Izvještaj o dobročinstvuCrna Gora Daruje 2021 - Izvještaj o dobročinstvu
Crna Gora Daruje 2021 - Izvještaj o dobročinstvu
 
Hrvatska daruje 2021 - sažetak nalaza
Hrvatska daruje 2021 - sažetak nalazaHrvatska daruje 2021 - sažetak nalaza
Hrvatska daruje 2021 - sažetak nalaza
 
Giving Croatia 2021 - Annual Report on the State of Philanthropy
Giving Croatia 2021 - Annual Report on the State of PhilanthropyGiving Croatia 2021 - Annual Report on the State of Philanthropy
Giving Croatia 2021 - Annual Report on the State of Philanthropy
 
Hrvatska daruje 2021: Izvješće o stanju filantropije
Hrvatska daruje 2021: Izvješće o stanju filantropijeHrvatska daruje 2021: Izvješće o stanju filantropije
Hrvatska daruje 2021: Izvješće o stanju filantropije
 

Recently uploaded

PD-1602-as-amended-by-RA-9287-Anti-Illegal-Gambling-Law.pptx
PD-1602-as-amended-by-RA-9287-Anti-Illegal-Gambling-Law.pptxPD-1602-as-amended-by-RA-9287-Anti-Illegal-Gambling-Law.pptx
PD-1602-as-amended-by-RA-9287-Anti-Illegal-Gambling-Law.pptx
RIDPRO11
 
MHM Roundtable Slide Deck WHA Side-event May 28 2024.pptx
MHM Roundtable Slide Deck WHA Side-event May 28 2024.pptxMHM Roundtable Slide Deck WHA Side-event May 28 2024.pptx
MHM Roundtable Slide Deck WHA Side-event May 28 2024.pptx
ILC- UK
 
Transit-Oriented Development Study Working Group Meeting
Transit-Oriented Development Study Working Group MeetingTransit-Oriented Development Study Working Group Meeting
Transit-Oriented Development Study Working Group Meeting
Cuyahoga County Planning Commission
 
kupon sample qurban masjid indonesia terbaru.pptx
kupon sample qurban masjid indonesia terbaru.pptxkupon sample qurban masjid indonesia terbaru.pptx
kupon sample qurban masjid indonesia terbaru.pptx
viderakai
 
Uniform Guidance 3.0 - The New 2 CFR 200
Uniform Guidance 3.0 - The New 2 CFR 200Uniform Guidance 3.0 - The New 2 CFR 200
Uniform Guidance 3.0 - The New 2 CFR 200
GrantManagementInsti
 
Get Government Grants and Assistance Program
Get Government Grants and Assistance ProgramGet Government Grants and Assistance Program
Get Government Grants and Assistance Program
Get Government Grants
 
一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单
一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单
一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单
ehbuaw
 
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
850fcj96
 
State crafting: Changes and challenges for managing the public finances
State crafting: Changes and challenges for managing the public financesState crafting: Changes and challenges for managing the public finances
State crafting: Changes and challenges for managing the public finances
ResolutionFoundation
 
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Congressional Budget Office
 
Donate to charity during this holiday season
Donate to charity during this holiday seasonDonate to charity during this holiday season
Donate to charity during this holiday season
SERUDS INDIA
 
ZGB - The Role of Generative AI in Government transformation.pdf
ZGB - The Role of Generative AI in Government transformation.pdfZGB - The Role of Generative AI in Government transformation.pdf
ZGB - The Role of Generative AI in Government transformation.pdf
Saeed Al Dhaheri
 
Russian anarchist and anti-war movement in the third year of full-scale war
Russian anarchist and anti-war movement in the third year of full-scale warRussian anarchist and anti-war movement in the third year of full-scale war
Russian anarchist and anti-war movement in the third year of full-scale war
Antti Rautiainen
 
2024: The FAR - Federal Acquisition Regulations, Part 36
2024: The FAR - Federal Acquisition Regulations, Part 362024: The FAR - Federal Acquisition Regulations, Part 36
2024: The FAR - Federal Acquisition Regulations, Part 36
JSchaus & Associates
 
PNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdf
PNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdfPNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdf
PNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdf
ClaudioTebaldi2
 
2024: The FAR - Federal Acquisition Regulations, Part 38
2024: The FAR - Federal Acquisition Regulations, Part 382024: The FAR - Federal Acquisition Regulations, Part 38
2024: The FAR - Federal Acquisition Regulations, Part 38
JSchaus & Associates
 
The Role of a Process Server in real estate
The Role of a Process Server in real estateThe Role of a Process Server in real estate
The Role of a Process Server in real estate
oklahomajudicialproc1
 
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
850fcj96
 
NHAI_Under_Implementation_01-05-2024.pdf
NHAI_Under_Implementation_01-05-2024.pdfNHAI_Under_Implementation_01-05-2024.pdf
NHAI_Under_Implementation_01-05-2024.pdf
AjayVejendla3
 
Understanding the Challenges of Street Children
Understanding the Challenges of Street ChildrenUnderstanding the Challenges of Street Children
Understanding the Challenges of Street Children
SERUDS INDIA
 

Recently uploaded (20)

PD-1602-as-amended-by-RA-9287-Anti-Illegal-Gambling-Law.pptx
PD-1602-as-amended-by-RA-9287-Anti-Illegal-Gambling-Law.pptxPD-1602-as-amended-by-RA-9287-Anti-Illegal-Gambling-Law.pptx
PD-1602-as-amended-by-RA-9287-Anti-Illegal-Gambling-Law.pptx
 
MHM Roundtable Slide Deck WHA Side-event May 28 2024.pptx
MHM Roundtable Slide Deck WHA Side-event May 28 2024.pptxMHM Roundtable Slide Deck WHA Side-event May 28 2024.pptx
MHM Roundtable Slide Deck WHA Side-event May 28 2024.pptx
 
Transit-Oriented Development Study Working Group Meeting
Transit-Oriented Development Study Working Group MeetingTransit-Oriented Development Study Working Group Meeting
Transit-Oriented Development Study Working Group Meeting
 
kupon sample qurban masjid indonesia terbaru.pptx
kupon sample qurban masjid indonesia terbaru.pptxkupon sample qurban masjid indonesia terbaru.pptx
kupon sample qurban masjid indonesia terbaru.pptx
 
Uniform Guidance 3.0 - The New 2 CFR 200
Uniform Guidance 3.0 - The New 2 CFR 200Uniform Guidance 3.0 - The New 2 CFR 200
Uniform Guidance 3.0 - The New 2 CFR 200
 
Get Government Grants and Assistance Program
Get Government Grants and Assistance ProgramGet Government Grants and Assistance Program
Get Government Grants and Assistance Program
 
一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单
一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单
一比一原版(Adelaide毕业证)阿德莱德大学毕业证成绩单
 
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
 
State crafting: Changes and challenges for managing the public finances
State crafting: Changes and challenges for managing the public financesState crafting: Changes and challenges for managing the public finances
State crafting: Changes and challenges for managing the public finances
 
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
Effects of Extreme Temperatures From Climate Change on the Medicare Populatio...
 
Donate to charity during this holiday season
Donate to charity during this holiday seasonDonate to charity during this holiday season
Donate to charity during this holiday season
 
ZGB - The Role of Generative AI in Government transformation.pdf
ZGB - The Role of Generative AI in Government transformation.pdfZGB - The Role of Generative AI in Government transformation.pdf
ZGB - The Role of Generative AI in Government transformation.pdf
 
Russian anarchist and anti-war movement in the third year of full-scale war
Russian anarchist and anti-war movement in the third year of full-scale warRussian anarchist and anti-war movement in the third year of full-scale war
Russian anarchist and anti-war movement in the third year of full-scale war
 
2024: The FAR - Federal Acquisition Regulations, Part 36
2024: The FAR - Federal Acquisition Regulations, Part 362024: The FAR - Federal Acquisition Regulations, Part 36
2024: The FAR - Federal Acquisition Regulations, Part 36
 
PNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdf
PNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdfPNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdf
PNRR MADRID GREENTECH FOR BROWN NETWORKS NETWORKS MUR_MUSA_TEBALDI.pdf
 
2024: The FAR - Federal Acquisition Regulations, Part 38
2024: The FAR - Federal Acquisition Regulations, Part 382024: The FAR - Federal Acquisition Regulations, Part 38
2024: The FAR - Federal Acquisition Regulations, Part 38
 
The Role of a Process Server in real estate
The Role of a Process Server in real estateThe Role of a Process Server in real estate
The Role of a Process Server in real estate
 
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
 
NHAI_Under_Implementation_01-05-2024.pdf
NHAI_Under_Implementation_01-05-2024.pdfNHAI_Under_Implementation_01-05-2024.pdf
NHAI_Under_Implementation_01-05-2024.pdf
 
Understanding the Challenges of Street Children
Understanding the Challenges of Street ChildrenUnderstanding the Challenges of Street Children
Understanding the Challenges of Street Children
 

Non-profit Tech Needs in Croatia

  • 1. NEXT DIGITAL STEPS THE BIGGEST BARRIERS HARDWARE NEEDS SECURITY PRACTICES SOFTWARE NEEDS SECURITY IMPROVEMENTS These are the top 5 software categories that nonprofit from Croatia intend to start to use or use more intensively in the coming period. Surveyed nonprofits in Croatia believe that resources to buy software is the most significant barrier for better and more efficient use of technology. Nonprofits in Croatia state that their most significant needs are laptops, offline data storage space and projectors. Nonprofits mostly use various tech solutions for antivirus, backup, and firewalls. However, they use encryption, VPN, and fraud detection solutions very rarely. The most popular software solutions nonprofits would like to use are WordPress, Photoshop, Zoom, Microsoft 365 and MailChimp. For improved digital security, nonprofits believe that they need better skills in the first place, followed by better software. COVID-19 crisis has forced the nonprofit sector into digital transformation. We researched how nonprofits in Croatia use technology, their security practices, and their most pressing digital needs. Research by NONPROFIT TECH NEEDS in Croatia Microsoft 365 53.2% Photoshop 57.1% 45.5% 58.4% 50.6% 55.8% 54.5% Conference calls and webinars 45.5% Media clipping Databases 64.9% Desktop PC 51.9% Resources to buy hardwareResources to buy software 18.2% Lack of knowledge and skills Laptop PC 72.7% Offline storage Projectors Smartphones Access control 62.3% Servers 50.6% Tablets 64.9% Cameras Antivirus and antimalware Backup Firewall 14.3% 3.9% Virtual private network (VPN) Encryption of data Fraud detection 26.0% 24.7% Encryption of communication Preventing hacks Better skills Better software Better hardware MailChimp 50.6% Project management 46.8% Design WordPress 79.2% 68.8% 55.8% 46.8% 64.9% 85.7% 64.9% 62.3% 36.4% 15.6% 58.4% 55.8% Zoom givingbalkans.orgSupported by