Aging Services Expo Presentation


Published on

IT Security Best Practices

  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Aging Services Expo Presentation

  1. 1. Bridging the Technology gap <br />TechBridge, Inc<br /><br />
  2. 2. Mission<br />Our mission is to help other nonprofits leverage technology to better serve the community. We help nonprofits to:<br /><ul><li>Solve mission-critical initiatives
  3. 3. Improve communications with stakeholders
  4. 4. Increase operating efficiencies</li></ul>Source: Techbridge<br />
  5. 5. Why have a Technology Plan?<br />A Technology Plan is a strategy document that helps you think through what your IT needs are and how they can be achieved with the resources that you have.<br />Source: Techbridge <br />
  6. 6. Why have a technology plan?<br />A well thought out plan can help you:<br />Increase efficiency in your daily operations<br />Manage your budget and spend money more effectively<br />Build an online community and boost fundraising efforts<br />Give donors more confidence in your organization and provide an element of sustainability.<br />Avoid crisis by reducing the chance of lost data and capabilities<br />Protect your organization from outside threats<br />Source: Techbridge <br />
  7. 7. Getting Started <br />Technology planning is a process <br />(7 things you need to know)<br />Establish leadership and support for your technology plan.<br />Assess your current resources –<br />Define your needs<br />Explore solutions- here’s where you may need a technical consultant.<br />Put your plan in writing<br />Develop a funding strategy - 70/30 rule: for every dollar budgeted for technology, 30 cents goes towards hardware and software purchases and the remaining 70 cents for training and support.<br />Implement a plan and timeline <br />Source: Techbridge <br />
  8. 8. Basic Components of a Technology plan<br />Include a summary of the current state of your technology then provide an overview of how technology will further your organization’s mission. <br />The body of the plan should include descriptions of the technology projects you plan to undertake. <br />Source: Techbridge <br />
  9. 9. Basic Components of a technology plan<br />Each project should contain the following information:<br />Description<br />Benefits – useful in raising funds<br />Tasks – helps with a timeline<br />Cost <br />Budget – is it practical?<br />Timeline – phases and deadlines<br />Source: Techbridge <br />
  10. 10. Technology focusIT Support – who will support the new technology?Workstations/Servers/Printers (hardware) - inventoryNetwork Infrastructure – See example below: areas<br /><ul><li>IT Support- who will support the new technologies and respond to problems?
  11. 11. Workstations/Servers/Printers (hardware)- take inventory
  12. 12. Network Infrastructure diagram - see below:</li></ul>Source: Techbridge <br />
  13. 13. Focus areas<br />Internet Connectivity- How fast is your connection? There are several free tools you can use!<br />Remote Access- Can your employees access files while at home or on the road?<br />Email – Do you have the ability to share calendars?<br />Backup/Disaster Recovery – what happens if your server fails? How quickly can you recover your data?<br />Intranet – How do your employees share information and collaborate?<br />Applications/Software – Does it meet your needs?<br />Source: Techbridge <br />
  14. 14. Virus Protection<br />Consider a corporate Anti-Virus solution that<br />Centrally manages corporate network devices: Servers, desktops, laptops, and mobile devices are all susceptible to attack<br />Detects virus, trojans, malware, and spyware: replicate & spread, unauthorized access, information gathering<br />Automates scanning and removal processes: scheduled scans, automated detection and removal without user interaction<br />Combines hardware and software solutions: Website Filters, E-mail SPAM and Virus Prevention, network firewalls<br />Source: TechBridge <br />
  15. 15. Some Security issues for 2010<br />Anti Virus is NOT enough – Companies such as Norton Anti-virus are using technologies that evaluate the reputations of the files and applications running on your PC. <br />Social Engineering - is the act of manipulating people into performing actions or divulging confidential information, rather than by breaking in or using technical hacking techniques. Attackers are going directly after the end user by tricking them into downloading malware or divulging sensitive information. I.e.: Rogue security software vendors. <br />Social Networking Sites – <br />Adjust Facebook privacy settings to help protect your identity<br />Read the Facebook Guide to Privacy<br />Think carefully about who you allow to become your friend<br />Show "limited friends" a cut-down version of your profile<br />Disable options, then open them one by one as it makes sense.<br />Social networking third-party apps.<br />Windows 7 will come in the crosshairs of attackers – Be sure your organization keeps security patches up to date with ANY new Operating System. <br />URL-shortening services – be mindful of the source when you click on shortened links via Twitter.<br />Source:<br />
  16. 16. Secure your wireless connection<br />Use encryption<br />Use a password<br />Don’t broadcast the name of your network<br />Use MAC address filtering- this forces the network to reject any device it does not recognize.<br />Make sure your computers are properly secured with anti-virus, security patches and a firewall to protect your org from malware-based connections. <br />Source: <br />
  17. 17. Anti-virus policy<br />Introduce an anti-virus policy<br />Produce a policy for safe computing and distribute it to all staff. Make sure every employee has read and understood the policy, and that they know who to speak to, if they have any questions.<br />Such a policy could include:<br />A ban on downloading executables and documents directly from the internet.<br />A ban on running unsolicited executables/documents/spreadsheets within the organization.<br />A ban on playing computer games or using screensavers which did not come with the operating system.<br />An IT checking and approval system for executables that arrive via email from the outside world.<br />Locking down workstation to prevent users from downloading programs. <br />Source:<br />
  18. 18. IT Project Implementation<br />Designate a point person<br />Break projects into tasks<br />Assign responsibilities<br />Establish a timeline – set milestones <br />Evaluate your success – On time? On budget? Meet your needs? Is it being used?<br />Update your technology plan- should be a living breathing document<br />Source: TechBridge <br />
  19. 19. Things to consider <br />Training – Technology that is implemented and not used is useless! <br />How will you care for your new technology? Who will do regular maintenance to prevent problems? Consider 3rd party support. <br />Sometimes going the cheapest route doesn’t yield good short-term results.<br />Source:<br />
  20. 20. Resources <br />Techsoup- donated and discounted hardware and software.<br />Sophos - – Download the 2010 security report. <br />Tech Atlas- FREE online Tech Assessment and planning tool<br />Find Tech Grants-<br />FREE Online Training for Microsoft Office 03/07-<br />Source: TechBridge <br />