Episodios

  • October is ESOP Employee Owner Month with Johan Hammerstrom
    Oct 31 2025

    October is ESOP Employee Owner Month

    An Employee Stock Ownership Plan, or ESOP, is a legal structure used in the U.S. to create an employee-owned company. Essentially, an ESOP is a type of retirement plan that invests primarily in company stock, holding the assets in a trust for the staff.

    Community IT is 100% employee-owned. This structure means our staff participates in the company’s success. Not all ESOPs are 100% employee-owned. Our CEO Johan Hammerstrom walks through the decisions and concerns of our founder, David Deal, that the mission of the company always remain focused on serving nonprofits with well-managed IT. The best way to preserve that mission when he sold the company in 2012 was to sell it entirely to the staff.

    Being an ESOP is fundamentally important to Community IT because it ensures we maintain the stability and focus required to serve the nonprofit sector best. This structure guarantees we control our own destiny, allowing us to prioritize long-term, excellent service to nonprofit organizations over external pressures like seeking to be acquired or maximizing short-term profits for outside owners.

    Further, it enhances our culture by aligning the incentives of our passionate employees with our mission, empowering independent decision-making and ensuring that clients benefit from a dedicated, resourceful, and stable team that is invested in the organization’s lasting success.

    Join CEO Johan Hammerstrom as he explains what October being ESOP employee owner month means to Community IT, our clients, and our dedication to providing excellent outsourced IT services.

    Interested in the ESOP structure advantages and how to become an ESOP? Contact Johan directly, he is always happy to talk about our ESOP.

    _______________________________
    Start a conversation :)

    • Register to attend a webinar in real time, and find all past transcripts at https://communityit.com/webinars/
    • email Carolyn at cwoodard@communityit.com
    • on LinkedIn

    Thanks for listening.


    Más Menos
    21 m
  • Cybersecurity Essentials for Nonprofits pt 2
    Oct 24 2025

    A Panel Discussion with Matthew Eshleman and Ian Gottesman.

    In part 1, Ian and Matthew discuss an approach to cybersecurity for nonprofits, taking the first steps, and 3 steps you can take to prevent at least 80% of attacks. In pt 2, they talk about making cybersecurity training more engaging, and lessons learned this year. They finish by taking audience questions.

    Our nonprofit cybersecurity experts discuss the current state of risks, and the best counter-measures nonprofits should have in their toolboxes.

    Learn what are cybersecurity essentials for nonprofits, and how your nonprofit organization can meet the moment.
    Keep your staff, your networks, and your data secure in an insecure world.


    Worried about nonprofit cybersecurity?

    You aren’t alone. The nonprofit sector is seeing new attacks and politicization of work that was never political before. Most attacks we are seeing in our networks are still financial, not political – but that doesn’t make being a victim of these attacks better. AI is changing cybersecurity needs rapidly.

    If you aren’t sure what you need to know, or who to ask, learn from our expert panel in this webinar where we will discuss cybersecurity essentials for nonprofits in accessible language, and lay out a plan for any nonprofit to put the basics of cybersecurity in place.

    Secure your devices.

    Secure your accounts.

    Secure your data.


    In this new webinar, expert panelists discuss cybersecurity essentials and take Q&A.

    As with all our webinars, this presentation is appropriate for an audience of varied IT experience.

    Community IT is proudly vendor-agnostic, and our webinars cover a range of topics and discussions. Webinars are never a sales pitch, always a way to share our knowledge with our community.

    _______________________________
    Start a conversation :)

    • Register to attend a webinar in real time, and find all past transcripts at https://communityit.com/webinars/
    • email Carolyn at cwoodard@communityit.com
    • on LinkedIn

    Thanks for listening.


    Más Menos
    25 m
  • Cybersecurity Essentials for Nonprofits pt 1
    Oct 17 2025

    A Panel Discussion with Matthew Eshleman and Ian Gottesman.

    In part 1, Ian and Matthew discuss an approach to cybersecurity for nonprofits, taking the first steps, and 3 steps you can take to prevent at least 80% of attacks. In pt 2, they talk about making cybersecurity training more engaging, and lessons learned this year. They finish by taking audience questions.

    Our nonprofit cybersecurity experts discuss the current state of risks, and the best counter-measures nonprofits should have in their toolboxes.

    Learn what are cybersecurity essentials for nonprofits, and how your nonprofit organization can meet the moment.
    Keep your staff, your networks, and your data secure in an insecure world.


    Worried about nonprofit cybersecurity?

    You aren’t alone. The nonprofit sector is seeing new attacks and politicization of work that was never political before. Most attacks we are seeing in our networks are still financial, not political – but that doesn’t make being a victim of these attacks better. AI is changing cybersecurity needs rapidly.

    If you aren’t sure what you need to know, or who to ask, learn from our expert panel in this webinar where we will discuss cybersecurity essentials for nonprofits in accessible language, and lay out a plan for any nonprofit to put the basics of cybersecurity in place.

    Secure your devices.

    Secure your accounts.

    Secure your data.


    In this new webinar, expert panelists discuss cybersecurity essentials and take Q&A.

    As with all our webinars, this presentation is appropriate for an audience of varied IT experience.

    Community IT is proudly vendor-agnostic, and our webinars cover a range of topics and discussions. Webinars are never a sales pitch, always a way to share our knowledge with our community.

    _______________________________
    Start a conversation :)

    • Register to attend a webinar in real time, and find all past transcripts at https://communityit.com/webinars/
    • email Carolyn at cwoodard@communityit.com
    • on LinkedIn

    Thanks for listening.


    Más Menos
    34 m
  • Community IT Voices: Johanny Torrico, President and COO
    Oct 10 2025

    Today Carolyn talks with Johanny Torrico about her recent promotion to an executive position that the Community IT Board created for her: President and Chief Operations Officer.

    This conversation provided an opportunity to delve into Johanny’s strategic vision for the company’s future. We explored how the new position was created to recognize her role guiding the company through a period of significant growth and innovation in the past few years, ensuring that we continue to provide the highest level of service and support to the nonprofit community.

    We also touched on the challenges and successes of our expansion at Community IT, doubling both staff and clients served in the years following the pandemic. From scaling our services to meet increasing demand to fostering a cohesive culture as our team grows, Johanny shared valuable insights into the dedication and strategic planning that was required to navigate this dynamic landscape.

    Our President and COO shared personal reflections on her extensive career in IT and operations, highlighting pivotal moments of challenge and the principles that have led to her success. This led to insights on what it takes to recognize and nurture talent within an organization, offering practical advice for HR professionals, managers, and job seekers alike.

    We also explored the unique benefits of being a 100% employee-owned company. This model is a cornerstone of our internal culture, fostering a deep sense of ownership and commitment among our staff. Ultimately, this shared purpose and dedication not only helps us attract and retain top talent but also directly translates into the exceptional service and long-term partnerships we provide to our nonprofit clients.

    Johanny has a lot to say on the benefits of a culture that encourages staff to be happy and capable, and the focus at Community IT on customer service – the face to face interactions of people with people.

    “As an employee owned company, we all have a stake in the success of our company. For sure, that is something that has contributed to the culture that we have. A culture of work-life balance. A culture of team building, of learning together. I think that part of staff development, that part of working together for the better good, supporting nonprofit organizations, is definitely what makes Community IT unique in the sector.”– Johanny Torrico, COO

    Speaker:

    Johanny Torrico brings over thirty years of experience managing teams and operations to her role as President and Chief Operating Officer at Community IT, where she leads the largest internal team providing services to clients. A calm and organized leader, Johanny is responsible for the service and technical operations for all the teams at Community IT. She also leads staff development and internal business processes, with a focus on staff retention and career mentoring.

    As Chief Operating Officer Johanny played a critical role in leading the dramatic expansion of our service operations. She established new teams, expanded company management and led the successful adoption of a wide range of new technologies. Johanny has a special ability to promote standardization of our services in ways that add value for our clients. Johanny brings decades of experience, professional maturity and tremendous skillsets as a business leader.

    _______________________________
    Start a conversation :)

    • Register to attend a webinar in real time, and find all past transcripts at https://communityit.com/webinars/
    • email Carolyn at cwoodard@communityit.com
    • on LinkedIn

    Thanks for listening.


    Más Menos
    20 m
  • Cybersecurity, Viruses, Phish-Resistant MFA with Matt Eshleman
    Oct 3 2025

    Nonprofit Cybersecurity expert and Community IT CTO Matt Eshleman offered his take on these trends. Listen for expert advice on avoiding new computer viruses and making sure your organization is protected from Attacker-in-the-Middle attacks on MFA (Multi-Factor Authentication), particularly for important accounts like your Executive Director and CFO.

    Fighting Viruses

    • Virus attacks have been increasing. These computer viruses are no longer just malware that “infects” your network through an email link or website.
    • Bad actors know we are suspicious of links in our email and that these days most malicious emails are stopped from reaching our inboxes. As a work around, they have started sending a document with instructions to open the document with a “secure code” – actually a malicious code. In this way, they trick the victim into running the attack against themselves.
    • To resist this attack, always think – if the document you need to open is legitimate, and the person emailing it to you is genuine, they can send you a pdf. You should be very suspicious of any attachment that requires another set of steps to open, particularly executing code on your computer.
    • Other ways you may pick up a computer virus: downloading something malicious online. Be careful to double check you are on a legitimate site before downloading anything. Better yet, use the App Store where possible.
    • We are also seeing an increase in malicious pop-ups. If a window opens on your computer saying you have a virus, it can be scary. Always contact your own IT provider. Do not follow the directions the pop up is giving you to get “support,” or you will be calling the scammer.

    Using Phish-Resistant MFA

    • Community IT continues to recommend that all users use a Multi-Factor Authentication method on all accounts.
    • Because MFA is so effective, it is not surprising that attackers are trying to work around it. In the past few years Attacker-in-the-Middle attacks have been on the rise. In this attack, the bad guys trick a user into “logging in” in a way that exposes their secure token for the attacker to steal. The attacker can then login as the user from a different device and gain access to anything the user has access to.
    • Phish-Resistant MFA, like using a passkey or Microsoft Hello, will only allow the MFA to be authenticated from the device where you are. You can also use a physical key like Ubikey or FIDO, which must be present to allow the login.
    • Community IT is recommending at a minimum that all accounts with access to sensitive data such as Executive Director, CFO, maybe Board members, the executive team, should use Phish-Resistant MFA to best protect the organization. Of course, any access to your network is a risk, so where possible, investing in Phish-Resistant MFA for all staff is a good investment.
    • Training on Phish-Resistant MFA can lessen the friction or feeling that an extra step is required. Most Phish-Resistant MFA is quick to use and easy to learn. Peace of mind is worth it.

    Community IT hopes that building this culture of care at your organization makes it easier for you to update your staff on new threats and scams through your regular training program.

    _______________________________
    Start a conversation :)

    • Register to attend a webinar in real time, and find all past transcripts at https://communityit.com/webinars/
    • email Carolyn at cwoodard@communityit.com
    • on LinkedIn

    Thanks for listening.


    Más Menos
    20 m
  • How to Rescue a Nonprofit Technology Project with Change Management pt 2: with Debbie Cameron
    Sep 26 2025

    Change Management Lessons with Debbie Cameron

    Build Consulting Partner Debbie Cameron and change management expert in a webinar on when you can rescue a nonprofit technology project using change management techniques.

    In part 1, Debbie describes the philosophy of change management and how these techniques work in helping the people at your organization understand and adapt to big changes. In part 2, she discusses how to rescue a failed project and some techniques to turn a project around. She also gives a mini-case study and takes audience questions.

    It is never too late to go back and re-assess where change management best practices can help.
    Learn how to use change management principles to get more out of your nonprofit technology investments and rescue a tech project that hasn’t succeeded – yet.


    Do you have a technology tool that is not living up to expectations?

    In an ideal world, change management would help inform three main phases of technology project implementation: planning, during, and after go-live. Build Consulting curated a three-part video series with Debbie Cameron, change management expert at Build Consulting, walking through the Build philosophy and providing best practices and examples at each stage of nonprofit tech project management.

    But what if you weren’t present for the entire project? What if you are facing a project that isn’t going well – that you inherited – a technology tool that your organization is paying for but everyone hates – a tool your organization is stuck with … is there still a role for good change management? Is it too late to use change management best practices to rescue these projects?

    In this new webinar, Debbie shares techniques and tools to help analyze where change management can support implementation after technology change.


    _______________________________
    Start a conversation :)

    • Register to attend a webinar in real time, and find all past transcripts at https://communityit.com/webinars/
    • email Carolyn at cwoodard@communityit.com
    • on LinkedIn

    Thanks for listening.


    Más Menos
    21 m
  • How to Rescue a Nonprofit Technology Project with Change Management pt 1: with Debbie Cameron
    Sep 19 2025

    Change Management Lessons with Debbie Cameron

    Build Consulting Partner Debbie Cameron and change management expert in a webinar on when you can rescue a nonprofit technology project using change management techniques.

    In part 1, Debbie describes the philosophy of change management and how these techniques work in helping the people at your organization understand and adapt to big changes. In part 2, she discusses how to rescue a failed project and some techniques to turn a project around. She also gives a mini-case study and takes audience questions.

    It is never too late to go back and re-assess where change management best practices can help.
    Learn how to use change management principles to get more out of your nonprofit technology investments and rescue a tech project that hasn’t succeeded – yet.


    Do you have a technology tool that is not living up to expectations?

    In an ideal world, change management would help inform three main phases of technology project implementation: planning, during, and after go-live. Build Consulting curated a three-part video series with Debbie Cameron, change management expert at Build Consulting, walking through the Build philosophy and providing best practices and examples at each stage of nonprofit tech project management.

    But what if you weren’t present for the entire project? What if you are facing a project that isn’t going well – that you inherited – a technology tool that your organization is paying for but everyone hates – a tool your organization is stuck with … is there still a role for good change management? Is it too late to use change management best practices to rescue these projects?

    In this new webinar, Debbie shares techniques and tools to help analyze where change management can support implementation after technology change.

    _______________________________
    Start a conversation :)

    • Register to attend a webinar in real time, and find all past transcripts at https://communityit.com/webinars/
    • email Carolyn at cwoodard@communityit.com
    • on LinkedIn

    Thanks for listening.


    Más Menos
    37 m
  • Google Drive Trick for Nonprofits with Steve Longenecker
    Sep 12 2025

    Do you have important files in your nonprofits’ Google Drive that are associated with their owners’ personal gmail address? Google lets you migrate those files to Shared Drive so your organization never loses access to them.

    Google Workspace is fantastically easy for nonprofit start ups to set up and doesn’t take a lot of technical know-how to manage until you grow to a larger staff size.

    One of the common issues we run into is ownership of files. In Google world, the creator “owns” the files even when shared or saved on a shared Google Drive, and if that owner leaves the organization – through any number of scenarios – the organization no longer has access to those files.

    Depending on how important the files are, that can cause problems! For example, if you are using an outsourced CFO – or if a photographer “shared” files with you – you can lose access.

    A while back Google created “Shared Drive” and we recommend moving files from individually shared folders to organizationally owned folders.

    In this podcast, Steve shares a Google Drive trick for nonprofits on migrating those files to Shared Drive relatively easily, by making the owner a temporary manager of the new folder.


    The takeaways:

    • Google regards the “owner” of files as the creator. Various options for sharing files may not grant complete access to those files for as long as they are needed.
    • Community IT recommends creating Shared Drive in Google Workspace and migrating individual files and folders there to preserve organization access to them. This changes the “owner” from the individual to the organization.
    • If you are running into migration issues with shared files disappearing, it is probably because the file was “owned” by someone outside your organization, or even someone within your organization using an individual gmail account to access Google. It is very easy to mistakenly log in to Google under other accounts to do your work!
    • To migrate files in that situation, Google makes it possible to solve the ownership problem without a third-party tool. Staying within the Google universe preserves the file formats and makes migration easier. Links remain valid as will dynamic connections within Google Sheets.
    • Community IT recommends creating a Shared Drive and temporarily making those external people managers with their individual gmail account. That gives them the ability to move whole folders of their files into the Shared Drive, where they become “owned” by the organization even after the individual leaves. This also helps clear up files created by external vendors where ownership needs to sit with the organization not with the individual owner, such as photos.
    • It sounds complicated, but Steve walks through how to approach “ownership” in the Google Workspace universe and make data management as easy as possible.

    _______________________________
    Start a conversation :)

    • Register to attend a webinar in real time, and find all past transcripts at https://communityit.com/webinars/
    • email Carolyn at cwoodard@communityit.com
    • on LinkedIn

    Thanks for listening.


    Más Menos
    27 m