SlideShare une entreprise Scribd logo
1  sur  1
Télécharger pour lire hors ligne
NEXT DIGITAL STEPS
THE BIGGEST BARRIERS
HARDWARE NEEDS
SECURITY PRACTICES
SOFTWARE NEEDS
SECURITY IMPROVEMENTS
These are the top 5 software categories that nonprofit from Croatia intend to
start to use or use more intensively in the coming period.
Surveyed nonprofits in Croatia believe that resources to buy software is the most
significant barrier for better and more efficient use of technology.
Nonprofits in Croatia state that their most significant needs are laptops,
offline data storage space and projectors.
Nonprofits mostly use various tech solutions for antivirus, backup, and firewalls.
However, they use encryption, VPN, and fraud detection solutions very rarely.
The most popular software solutions nonprofits would like to use are
WordPress, Photoshop, Zoom, Microsoft 365 and MailChimp.
For improved digital security, nonprofits believe that they need better skills in
the first place, followed by better software.
COVID-19 crisis has forced the nonprofit sector into digital transformation.
We researched how nonprofits in Croatia use technology, their
security practices, and their most pressing digital needs.
Research by
NONPROFIT TECH NEEDS
in Croatia
Microsoft 365
53.2%
Photoshop
57.1%
45.5%
58.4%
50.6%
55.8% 54.5%
Conference calls and webinars
45.5%
Media clipping
Databases
64.9%
Desktop PC
51.9%
Resources to buy hardwareResources to buy software
18.2%
Lack of knowledge and skills
Laptop PC
72.7%
Offline storage
Projectors
Smartphones
Access control
62.3%
Servers
50.6%
Tablets
64.9%
Cameras
Antivirus and antimalware Backup Firewall
14.3%
3.9%
Virtual private network (VPN) Encryption of data Fraud detection
26.0% 24.7%
Encryption of communication Preventing hacks
Better skills Better software Better hardware
MailChimp
50.6%
Project management
46.8%
Design
WordPress
79.2%
68.8%
55.8%
46.8%
64.9%
85.7%
64.9%
62.3%
36.4%
15.6%
58.4%
55.8%
Zoom
givingbalkans.orgSupported by

Contenu connexe

Tendances

Computer hacking and security - Social Responsibility of IT Professional by M...
Computer hacking and security - Social Responsibility of IT Professional by M...Computer hacking and security - Social Responsibility of IT Professional by M...
Computer hacking and security - Social Responsibility of IT Professional by M...
Mark John Lado, MIT
 
Industrial Control Systems 101 - Why Hack The Network If You Can Shut Down Th...
Industrial Control Systems 101 - Why Hack The Network If You Can Shut Down Th...Industrial Control Systems 101 - Why Hack The Network If You Can Shut Down Th...
Industrial Control Systems 101 - Why Hack The Network If You Can Shut Down Th...
Resilient Systems
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
Kevin Lee
 
Mobile security
Mobile securityMobile security
Mobile security
home
 

Tendances (19)

Software Security Assurance for DevOps
Software Security Assurance for DevOpsSoftware Security Assurance for DevOps
Software Security Assurance for DevOps
 
Humming Heads Presentation
Humming Heads PresentationHumming Heads Presentation
Humming Heads Presentation
 
2008 Trends
2008 Trends2008 Trends
2008 Trends
 
2012 State of Mobile Survey Global Key Findings
2012 State of Mobile Survey Global Key Findings2012 State of Mobile Survey Global Key Findings
2012 State of Mobile Survey Global Key Findings
 
2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference
 
The Future of Cybersecurity - October 2015
The Future of Cybersecurity - October 2015The Future of Cybersecurity - October 2015
The Future of Cybersecurity - October 2015
 
OWASP Poland Day 2018 - Michal Kurek - Application Security in IIoT World
OWASP Poland Day 2018 - Michal Kurek - Application Security in IIoT WorldOWASP Poland Day 2018 - Michal Kurek - Application Security in IIoT World
OWASP Poland Day 2018 - Michal Kurek - Application Security in IIoT World
 
Third Annual Mobile Threats Report
Third Annual Mobile Threats ReportThird Annual Mobile Threats Report
Third Annual Mobile Threats Report
 
Computer hacking and security - Social Responsibility of IT Professional by M...
Computer hacking and security - Social Responsibility of IT Professional by M...Computer hacking and security - Social Responsibility of IT Professional by M...
Computer hacking and security - Social Responsibility of IT Professional by M...
 
Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and Tablets
 
Industrial Control Systems 101 - Why Hack The Network If You Can Shut Down Th...
Industrial Control Systems 101 - Why Hack The Network If You Can Shut Down Th...Industrial Control Systems 101 - Why Hack The Network If You Can Shut Down Th...
Industrial Control Systems 101 - Why Hack The Network If You Can Shut Down Th...
 
5 Steps to Successful BYOD Implementation
5 Steps to Successful BYOD Implementation5 Steps to Successful BYOD Implementation
5 Steps to Successful BYOD Implementation
 
Manage Remote Workers in Three Easy Steps
Manage Remote Workers in Three Easy StepsManage Remote Workers in Three Easy Steps
Manage Remote Workers in Three Easy Steps
 
Cybersecurity
Cybersecurity Cybersecurity
Cybersecurity
 
Avoid These Top 15 IT Security Threats
Avoid These Top 15 IT Security ThreatsAvoid These Top 15 IT Security Threats
Avoid These Top 15 IT Security Threats
 
Cyber Security in the time of COVID -19
Cyber Security in the time of COVID -19Cyber Security in the time of COVID -19
Cyber Security in the time of COVID -19
 
Using Technology and Techno-People to Improve your Threat Resistance and Cybe...
Using Technology and Techno-People to Improve your Threat Resistance and Cybe...Using Technology and Techno-People to Improve your Threat Resistance and Cybe...
Using Technology and Techno-People to Improve your Threat Resistance and Cybe...
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Mobile security
Mobile securityMobile security
Mobile security
 

Similaire à Non-profit Tech Needs in Croatia

SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)
Norm Barber
 
application-security-fallacies-and-realities-veracode
application-security-fallacies-and-realities-veracodeapplication-security-fallacies-and-realities-veracode
application-security-fallacies-and-realities-veracode
sciccone
 

Similaire à Non-profit Tech Needs in Croatia (20)

Non-profit Tech Needs in Montenegro
Non-profit Tech Needs in MontenegroNon-profit Tech Needs in Montenegro
Non-profit Tech Needs in Montenegro
 
Non-profit Tech Needs in North Macedonia
Non-profit Tech Needs in North MacedoniaNon-profit Tech Needs in North Macedonia
Non-profit Tech Needs in North Macedonia
 
Open Source Insight: Container Tech, Data Centre Security & 2018's Biggest Se...
Open Source Insight:Container Tech, Data Centre Security & 2018's Biggest Se...Open Source Insight:Container Tech, Data Centre Security & 2018's Biggest Se...
Open Source Insight: Container Tech, Data Centre Security & 2018's Biggest Se...
 
Open Source Insight: Security Breaches and Cryptocurrency Dominating News
Open Source Insight: Security Breaches and Cryptocurrency Dominating NewsOpen Source Insight: Security Breaches and Cryptocurrency Dominating News
Open Source Insight: Security Breaches and Cryptocurrency Dominating News
 
Software piracy in Bangladesh
Software piracy in BangladeshSoftware piracy in Bangladesh
Software piracy in Bangladesh
 
Infosecurity Europe - Infographic
Infosecurity Europe - InfographicInfosecurity Europe - Infographic
Infosecurity Europe - Infographic
 
Paul Henry’s 2011 Malware Trends
Paul Henry’s 2011 Malware TrendsPaul Henry’s 2011 Malware Trends
Paul Henry’s 2011 Malware Trends
 
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfJust-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
 
Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012Lumension Security - Adjusting our defenses for 2012
Lumension Security - Adjusting our defenses for 2012
 
Cybersecurity - Sam Maccherola
Cybersecurity - Sam MaccherolaCybersecurity - Sam Maccherola
Cybersecurity - Sam Maccherola
 
Offshore software development.pdf
Offshore software development.pdfOffshore software development.pdf
Offshore software development.pdf
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)
 
Drivelock modern approach of it security & amp; encryption solution -whitep...
Drivelock   modern approach of it security & amp; encryption solution -whitep...Drivelock   modern approach of it security & amp; encryption solution -whitep...
Drivelock modern approach of it security & amp; encryption solution -whitep...
 
application-security-fallacies-and-realities-veracode
application-security-fallacies-and-realities-veracodeapplication-security-fallacies-and-realities-veracode
application-security-fallacies-and-realities-veracode
 
Trend Micro Titanium Antivirus 2012 Review
Trend Micro Titanium Antivirus 2012 ReviewTrend Micro Titanium Antivirus 2012 Review
Trend Micro Titanium Antivirus 2012 Review
 
Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...
Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...
Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...
 
Internet 2.0 Reviews The Future Of Software Development: Trends In AI, Cloud ...
Internet 2.0 Reviews The Future Of Software Development: Trends In AI, Cloud ...Internet 2.0 Reviews The Future Of Software Development: Trends In AI, Cloud ...
Internet 2.0 Reviews The Future Of Software Development: Trends In AI, Cloud ...
 
Unicom Conference - Mobile Application Security
Unicom Conference - Mobile Application SecurityUnicom Conference - Mobile Application Security
Unicom Conference - Mobile Application Security
 
Cisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco 2014 Midyear Security Report
Cisco 2014 Midyear Security Report
 

Plus de Catalyst Balkans

Plus de Catalyst Balkans (20)

Društveno odgovorno poslovanje u službi osnaživanja žena
 Društveno odgovorno poslovanje u službi osnaživanja žena Društveno odgovorno poslovanje u službi osnaživanja žena
Društveno odgovorno poslovanje u službi osnaživanja žena
 
Shqipëria dhuron 2021 – Raporti vjetor për gjendjen e filantropisë
Shqipëria dhuron 2021 – Raporti vjetor për gjendjen e filantropisëShqipëria dhuron 2021 – Raporti vjetor për gjendjen e filantropisë
Shqipëria dhuron 2021 – Raporti vjetor për gjendjen e filantropisë
 
Giving Albania 2021 - Annual Report on the State of Philanthropy
Giving Albania 2021 - Annual Report on the State of PhilanthropyGiving Albania 2021 - Annual Report on the State of Philanthropy
Giving Albania 2021 - Annual Report on the State of Philanthropy
 
Kosovo daruje 2021 - Izveštaj o stanju filantropije
Kosovo daruje 2021 - Izveštaj o stanju filantropijeKosovo daruje 2021 - Izveštaj o stanju filantropije
Kosovo daruje 2021 - Izveštaj o stanju filantropije
 
BiH daruje 2021 - rezime nalaza
BiH daruje 2021 - rezime nalazaBiH daruje 2021 - rezime nalaza
BiH daruje 2021 - rezime nalaza
 
BiH daruje 2021 - Izvještaj o stanju filantropije
BiH daruje 2021 - Izvještaj o stanju filantropijeBiH daruje 2021 - Izvještaj o stanju filantropije
BiH daruje 2021 - Izvještaj o stanju filantropije
 
Kosova dhuron 2021 - Raporti vjetor për gjendjen e filantropisë
Kosova dhuron 2021 - Raporti vjetor për gjendjen e filantropisëKosova dhuron 2021 - Raporti vjetor për gjendjen e filantropisë
Kosova dhuron 2021 - Raporti vjetor për gjendjen e filantropisë
 
Giving Kosovo 2021 -Quick Facts
Giving Kosovo 2021 -Quick FactsGiving Kosovo 2021 -Quick Facts
Giving Kosovo 2021 -Quick Facts
 
Giving Bosnia and Herzegovina 2021 - Report on the State of Philanthropy
Giving Bosnia and Herzegovina 2021 - Report on the State of PhilanthropyGiving Bosnia and Herzegovina 2021 - Report on the State of Philanthropy
Giving Bosnia and Herzegovina 2021 - Report on the State of Philanthropy
 
Giving Kosovo 2021 - Report on the State of Philanthropy
Giving Kosovo 2021 - Report on the State of PhilanthropyGiving Kosovo 2021 - Report on the State of Philanthropy
Giving Kosovo 2021 - Report on the State of Philanthropy
 
Giving Serbia 2021 - Report on the State of Philanthropy
Giving Serbia 2021 - Report on the State of PhilanthropyGiving Serbia 2021 - Report on the State of Philanthropy
Giving Serbia 2021 - Report on the State of Philanthropy
 
Maqedonia e Veriut Dhuron – Raporti për gjendjen e filantropisë 2021
Maqedonia e Veriut Dhuron – Raporti për gjendjen e filantropisë 2021Maqedonia e Veriut Dhuron – Raporti për gjendjen e filantropisë 2021
Maqedonia e Veriut Dhuron – Raporti për gjendjen e filantropisë 2021
 
Северна Македонија донира 2021 – извештај за состојбата на филантропијата
Северна Македонија донира 2021 – извештај за состојбата на филантропијатаСеверна Македонија донира 2021 – извештај за состојбата на филантропијата
Северна Македонија донира 2021 – извештај за состојбата на филантропијата
 
Giving North Macedonia 2021 - Report on the State of Philanthropy
Giving North Macedonia 2021 - Report on the State of PhilanthropyGiving North Macedonia 2021 - Report on the State of Philanthropy
Giving North Macedonia 2021 - Report on the State of Philanthropy
 
Giving Montenegro 2021 - Report on the State of Philanthropy
Giving Montenegro 2021 - Report on the State of PhilanthropyGiving Montenegro 2021 - Report on the State of Philanthropy
Giving Montenegro 2021 - Report on the State of Philanthropy
 
Crna Gora daruje 2021 - Rezime nalaza
Crna Gora daruje 2021 - Rezime nalazaCrna Gora daruje 2021 - Rezime nalaza
Crna Gora daruje 2021 - Rezime nalaza
 
Crna Gora Daruje 2021 - Izvještaj o dobročinstvu
Crna Gora Daruje 2021 - Izvještaj o dobročinstvuCrna Gora Daruje 2021 - Izvještaj o dobročinstvu
Crna Gora Daruje 2021 - Izvještaj o dobročinstvu
 
Hrvatska daruje 2021 - sažetak nalaza
Hrvatska daruje 2021 - sažetak nalazaHrvatska daruje 2021 - sažetak nalaza
Hrvatska daruje 2021 - sažetak nalaza
 
Giving Croatia 2021 - Annual Report on the State of Philanthropy
Giving Croatia 2021 - Annual Report on the State of PhilanthropyGiving Croatia 2021 - Annual Report on the State of Philanthropy
Giving Croatia 2021 - Annual Report on the State of Philanthropy
 
Hrvatska daruje 2021: Izvješće o stanju filantropije
Hrvatska daruje 2021: Izvješće o stanju filantropijeHrvatska daruje 2021: Izvješće o stanju filantropije
Hrvatska daruje 2021: Izvješće o stanju filantropije
 

Dernier

Dernier (20)

The U.S. Budget and Economic Outlook (Presentation)
The U.S. Budget and Economic Outlook (Presentation)The U.S. Budget and Economic Outlook (Presentation)
The U.S. Budget and Economic Outlook (Presentation)
 
Tuvalu Coastal Adaptation Project (TCAP)
Tuvalu Coastal Adaptation Project (TCAP)Tuvalu Coastal Adaptation Project (TCAP)
Tuvalu Coastal Adaptation Project (TCAP)
 
Government e Marketplace GeM Presentation
Government e Marketplace GeM PresentationGovernment e Marketplace GeM Presentation
Government e Marketplace GeM Presentation
 
Antisemitism Awareness Act: pénaliser la critique de l'Etat d'Israël
Antisemitism Awareness Act: pénaliser la critique de l'Etat d'IsraëlAntisemitism Awareness Act: pénaliser la critique de l'Etat d'Israël
Antisemitism Awareness Act: pénaliser la critique de l'Etat d'Israël
 
Pimpri Chinchwad ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi R...
Pimpri Chinchwad ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi R...Pimpri Chinchwad ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi R...
Pimpri Chinchwad ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi R...
 
Get Premium Budhwar Peth Call Girls (8005736733) 24x7 Rate 15999 with A/c Roo...
Get Premium Budhwar Peth Call Girls (8005736733) 24x7 Rate 15999 with A/c Roo...Get Premium Budhwar Peth Call Girls (8005736733) 24x7 Rate 15999 with A/c Roo...
Get Premium Budhwar Peth Call Girls (8005736733) 24x7 Rate 15999 with A/c Roo...
 
Postal Ballots-For home voting step by step process 2024.pptx
Postal Ballots-For home voting step by step process 2024.pptxPostal Ballots-For home voting step by step process 2024.pptx
Postal Ballots-For home voting step by step process 2024.pptx
 
PPT BIJNOR COUNTING Counting of Votes on ETPBs (FOR SERVICE ELECTORS
PPT BIJNOR COUNTING Counting of Votes on ETPBs (FOR SERVICE ELECTORSPPT BIJNOR COUNTING Counting of Votes on ETPBs (FOR SERVICE ELECTORS
PPT BIJNOR COUNTING Counting of Votes on ETPBs (FOR SERVICE ELECTORS
 
World Press Freedom Day 2024; May 3rd - Poster
World Press Freedom Day 2024; May 3rd - PosterWorld Press Freedom Day 2024; May 3rd - Poster
World Press Freedom Day 2024; May 3rd - Poster
 
1935 CONSTITUTION REPORT IN RIPH FINALLS
1935 CONSTITUTION REPORT IN RIPH FINALLS1935 CONSTITUTION REPORT IN RIPH FINALLS
1935 CONSTITUTION REPORT IN RIPH FINALLS
 
Junnar ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Junnar ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Junnar ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Junnar ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
 
Night 7k to 12k Call Girls Service In Navi Mumbai 👉 BOOK NOW 9833363713 👈 ♀️...
Night 7k to 12k  Call Girls Service In Navi Mumbai 👉 BOOK NOW 9833363713 👈 ♀️...Night 7k to 12k  Call Girls Service In Navi Mumbai 👉 BOOK NOW 9833363713 👈 ♀️...
Night 7k to 12k Call Girls Service In Navi Mumbai 👉 BOOK NOW 9833363713 👈 ♀️...
 
Finance strategies for adaptation. Presentation for CANCC
Finance strategies for adaptation. Presentation for CANCCFinance strategies for adaptation. Presentation for CANCC
Finance strategies for adaptation. Presentation for CANCC
 
Election 2024 Presiding Duty Keypoints_01.pdf
Election 2024 Presiding Duty Keypoints_01.pdfElection 2024 Presiding Duty Keypoints_01.pdf
Election 2024 Presiding Duty Keypoints_01.pdf
 
A Press for the Planet: Journalism in the face of the Environmental Crisis
A Press for the Planet: Journalism in the face of the Environmental CrisisA Press for the Planet: Journalism in the face of the Environmental Crisis
A Press for the Planet: Journalism in the face of the Environmental Crisis
 
Coastal Protection Measures in Hulhumale'
Coastal Protection Measures in Hulhumale'Coastal Protection Measures in Hulhumale'
Coastal Protection Measures in Hulhumale'
 
Nanded City ? Russian Call Girls Pune - 450+ Call Girl Cash Payment 800573673...
Nanded City ? Russian Call Girls Pune - 450+ Call Girl Cash Payment 800573673...Nanded City ? Russian Call Girls Pune - 450+ Call Girl Cash Payment 800573673...
Nanded City ? Russian Call Girls Pune - 450+ Call Girl Cash Payment 800573673...
 
WORLD DEVELOPMENT REPORT 2024 - Economic Growth in Middle-Income Countries.
WORLD DEVELOPMENT REPORT 2024 - Economic Growth in Middle-Income Countries.WORLD DEVELOPMENT REPORT 2024 - Economic Growth in Middle-Income Countries.
WORLD DEVELOPMENT REPORT 2024 - Economic Growth in Middle-Income Countries.
 
Top Rated Pune Call Girls Hadapsar ⟟ 6297143586 ⟟ Call Me For Genuine Sex Se...
Top Rated  Pune Call Girls Hadapsar ⟟ 6297143586 ⟟ Call Me For Genuine Sex Se...Top Rated  Pune Call Girls Hadapsar ⟟ 6297143586 ⟟ Call Me For Genuine Sex Se...
Top Rated Pune Call Girls Hadapsar ⟟ 6297143586 ⟟ Call Me For Genuine Sex Se...
 
Call Girls Sangamwadi Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Sangamwadi Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Sangamwadi Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Sangamwadi Call Me 7737669865 Budget Friendly No Advance Booking
 

Non-profit Tech Needs in Croatia

  • 1. NEXT DIGITAL STEPS THE BIGGEST BARRIERS HARDWARE NEEDS SECURITY PRACTICES SOFTWARE NEEDS SECURITY IMPROVEMENTS These are the top 5 software categories that nonprofit from Croatia intend to start to use or use more intensively in the coming period. Surveyed nonprofits in Croatia believe that resources to buy software is the most significant barrier for better and more efficient use of technology. Nonprofits in Croatia state that their most significant needs are laptops, offline data storage space and projectors. Nonprofits mostly use various tech solutions for antivirus, backup, and firewalls. However, they use encryption, VPN, and fraud detection solutions very rarely. The most popular software solutions nonprofits would like to use are WordPress, Photoshop, Zoom, Microsoft 365 and MailChimp. For improved digital security, nonprofits believe that they need better skills in the first place, followed by better software. COVID-19 crisis has forced the nonprofit sector into digital transformation. We researched how nonprofits in Croatia use technology, their security practices, and their most pressing digital needs. Research by NONPROFIT TECH NEEDS in Croatia Microsoft 365 53.2% Photoshop 57.1% 45.5% 58.4% 50.6% 55.8% 54.5% Conference calls and webinars 45.5% Media clipping Databases 64.9% Desktop PC 51.9% Resources to buy hardwareResources to buy software 18.2% Lack of knowledge and skills Laptop PC 72.7% Offline storage Projectors Smartphones Access control 62.3% Servers 50.6% Tablets 64.9% Cameras Antivirus and antimalware Backup Firewall 14.3% 3.9% Virtual private network (VPN) Encryption of data Fraud detection 26.0% 24.7% Encryption of communication Preventing hacks Better skills Better software Better hardware MailChimp 50.6% Project management 46.8% Design WordPress 79.2% 68.8% 55.8% 46.8% 64.9% 85.7% 64.9% 62.3% 36.4% 15.6% 58.4% 55.8% Zoom givingbalkans.orgSupported by