Technology Tag Archive

Learn About the Andar/360 Tools You Own

Have you ever wondered about the Andar/360 technology you own? Would you like to hear how other organizations are using the same tools effectively across their organization to raise more money and to communicate better both internally and externally?

We are happy to offer a free tailored overview of the technology & tools you own.

Schedule Tech Overview

CyberSource Purchase Return Authorization (PRA) Mandate

CyberSource is the gateway that connects PCI-Compliant Andar databases with customers’ credit card processors. If your Andar database is PCI Compliant and if you purchased Andar’s Credit Card and ACH Payment module (CCAP), then you use CyberSource.

CyberSource recently announced an upcoming change related to processing refunds — for Visa, MasterCard, and Discover payments. (They sent emails to their customers’ contact persons. The subject of the email says ‘MasterCard Purchase Return Authorization (PRA) mandate.’) Previously, CyberSource did not charge their customers for processing a refund; but the new mandate indicates that they will begin doing so in the latter part of 2020.

This will potentially have an impact on Andar’s e-Pledge module. For example, if a donor has already confirmed a credit card payment (Visa, MasterCard, or Discover) and later updates that transaction (by changing the pledge type or dollar amount), Andar e-Pledge will tell CyberSource to process a refund to the donor (to reverse the donor’s original transaction). This will now result in a fee being charged to the customer (the nonprofit organization).

Andar Software plans to implement minor changes in Andar/360 to track this situation.

No action is required of you right now. (Please be aware that CyberSource may apply a small charge if you have any donor refunds.)

To get more details about the CyberSource PRA mandate and receive future updates, follow Andar Support Project #190897.

View Project

Learn About the Andar/360 Tools You Own

Have you ever wondered about the Andar/360 technology you own? Would you like to hear how other organizations are using the same tools effectively across their organization to raise more money and to communicate better both internally and externally?

We are happy to offer a free tailored overview of the technology & tools you own. Sign up below.

Schedule Tech Overview

Featured Enhancements List: Email Alerts

We’ve been getting a lot of valuable input from users through the Featured Enhancements List.

This month, we’ve got a set of suggested code changes to Email Alerts.

The Email Alerts feature enables a customizable email message to be sent to an alert account(s) when either a Transaction or a Communication is added to an account.
(For example: when a pledge is entered for a major donor, an email message is set to the major gifts manager assigned to the account.)

To learn more about Email Alerts, review our Customer Support article. Note that the MIG module is required for full functionality; learn more about MIG in this Fact Sheet.

Check out the current list and let us know what projects interest you!

See Enhancements

Save Server Space

Did you know you can save server space by shrinking your SQL log file? Take a look at step by step instructions in Customer Support.

Read More

Did You 'Like,' 'Support,' or 'Follow' An Enhancement

This is the last chance to have your say on the current group of projects listed on the Featured Enhancements List. Next week we’ll announce a new set of proposed changes.

Check out the list and let us know which projects interest you!

See Enhancements

[Blog] Have You Been Phished?

Our reliance on technology comes with an abundance of benefits, but it also comes with a bunch of new obstacles. One of those obstacles: email scams. How many times a week do you receive an email that looks or sounds questionable?

Learn how to recognize phishing scams and protect yourself in this blog.

Read Blog

Learn About the Andar/360 Tools You Own

Have you ever wondered about the Andar/360 technology you own? Would you like to hear how other organizations are using the same tools effectively across their organization to raise more money and to communicate better both internally and externally?

We are happy to offer a free tailored overview of the technology & tools you own. Sign up below.

Schedule Tech Overview

Featured Enhancements List

This is the last chance to have your say on the current group of projects listed on the Featured Enhancements List. Next week we’ll announce a new set of proposed changes.

Check out the list and let us know which projects interest you!

See Enhancements

How Secure is Your Work from Home Setup?

Most of us have been working from home for a few weeks now. We have made this novelty the norm (at least for now), but one area that may still need our attention is the security of the workspace we have set up. With so many people working remotely, there may be some individuals trying to take advantage of the situation who are looking to gain access to your personal or organization's data. Consider the following tips to create a more secure workspace.

  1. Double-check your router setup. If your password hasn't been changed for a long time or is not unique, consider replacing it. Many home setups use the WPS (WiFi Protected Setup). WPS may initially sound convenient by allowing you to bypass your strong password with a PIN code, but this makes it much easier to "break" by someone trying to gain access to your data. Using the WAP2 encryption mode for your password (instead of WEP) is another way of making your connection more secure. Plus, ensure your firmware is up to date. Newer routers update automatically, but if your router is older, you may have to do this manually. These suggestions just hit the surface. For more detailed instructions, refer to your specific router make and model recommendations.
  2. Use the VPN (Virtual Private Network) recommended by your organization. A VPN encrypts the traffic that goes through it. There are many VPN vendors out in the market, but they come with varying security protocols. As such, you should follow your IT team's guidelines on when and how to use the recommended VPN.
  3. Keep your donor and constituent data safe. Only those individuals who require access to such data should have the means to acquire it. When performance is an issue, you may be inclined to make a local copy of donor and constituent data on your computer, but doing so creates another opportunity for a data breach. We also recommend you maintain the same habits you did at the office, and lock your computer when you step away from it. If you print personal donor information on paper, dispose of the documentation properly by shredding it rather than tossing it in your recycling bin.
  4. Be alert when using videoconferencing and collaboration software. Some well-known platforms are under fire right now for having multiple security vulnerabilities. Make your meetings safer by setting meeting passwords to avoid unwanted guests from joining. Many tools have a "waiting room" feature that allows you to see who is waiting to join the meeting before granting them access. If you're sharing links or documents during meetings, use the approved technology to do so rather than third-party tools. Lastly, when downloading new platforms, read the fine print before agreeing to install — many collect and share personal information in the background!
  5. Be wary of malicious phishing scams via phone, text, email, and downloadable links. Opportunistic scammers are using the coronavirus crisis as a way to pose as the government or qualified institutions to trick recipients into downloading harmful malware or exposing personal data. To protect yourself and your computer, always have the latest version of your anti-virus program installed, verify that email and text senders are legitimate, and only click on links or open attachments that you are sure are safe. If you receive an unusual request for information (be it over the phone or email), be suspicious of it and double-check with your organization to make sure the claim is valid.

We hope these tips continue to keep you and your computers safe!