Disaster Planning What Organizations Need To Know To Protect Their Tech


Published on

This online seminar was recorded and can be accessed by clicking on the link to the right. You'll also see a link to the PowerPoint presentation. Additional questions will be answered in the Technology Planning Forum.

Published in: Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Disaster Planning What Organizations Need To Know To Protect Their Tech

  1. 1. Disaster Planning: What Organizations Need to Know to Protect Their Tech Audio is only available by calling this number: Conference Call: 866-740-1260 Access Code: 6339349 Sponsored by
  2. 2. Using ReadyTalk <ul><li>Chat & raise hand </li></ul><ul><li>Mute = *6, Unmute = *7 </li></ul><ul><li>If you lose your Internet connection, reconnect using the link emailed to you. </li></ul><ul><li>If you lose your phone connection, r e-dial the phone number and re-join. </li></ul><ul><li>ReadyTalk support: 800-843-9166 </li></ul>
  3. 3. You are being recorded… <ul><li>This seminar will be available on the TechSoup website along with past webinar presentations: </li></ul><ul><ul><li>www.techsoup.org/go/webinars </li></ul></ul><ul><li>You will receive a link to this presentation, material and links. </li></ul><ul><li>Twitter hashtag: #tsdp </li></ul><ul><li>Ask follow-up questions in the Tech Planning Forum: </li></ul><ul><ul><li>http://tinyurl.com/nmoema </li></ul></ul>
  4. 4. Facilitator: Becky Wiegand (TechSoup) Presenters: Michelle Baldwin, Chris Shipley, Elliot Harmon Disaster Planning: What Organizations Need to Know to Protect Their Tech Sponsored by
  5. 5. Today’s Speakers Answering chat questions: Kami Griffiths, TechSoup Becky Wiegand TechSoup Michelle Baldwin V.I.S.T.O. Chris Shipley Nutmeg Consulting Elliot Harmon TechSoup
  6. 6. Agenda <ul><li>Why plan for the worst? </li></ul><ul><li>How to create your own plan </li></ul><ul><li>Examples </li></ul><ul><li>Resources </li></ul><ul><li>Q&A </li></ul>
  7. 7. Why do organizations need a plan? Sponsored by
  8. 8. flickr.com/arielarielariel (Creative Commons)
  9. 9. Whether big disasters… flickr.com/ministrylink (Creative Commons)
  10. 10. Or little… flickr.com/splorp (Creative Commons )
  11. 11. …It pays to be prepared. Either way, if you have a solid prevention plan in place, you can mitigate a disaster and recover easier and faster, keeping your organization nimble and able to continue your critical work. flickr.com/bartmaguire (Creative Commons)
  12. 12. How to create your own plan Sponsored by
  13. 13. Overview of Areas <ul><li>Communications – internal and external </li></ul><ul><li>Documentation </li></ul><ul><li>Backup </li></ul><ul><li>Policies to prevent human-made disasters </li></ul>
  14. 14. Communications – Internal and External <ul><li>How does your organization communicate? What contingency plans are in place for a change in available services? </li></ul><ul><ul><li>Need to vacate main office </li></ul></ul><ul><ul><li>Loss or intermittent Internet availability </li></ul></ul><ul><ul><li>Drop in mobile phone services </li></ul></ul><ul><ul><li>Landlines become unavailable </li></ul></ul>
  15. 15. Communications – Options & Education <ul><li>Keep multiple routes of communication available and interconnected </li></ul><ul><li>Educate your key stakeholders and test where to look for communication from you before they need it. </li></ul>flickr.com/deivorytower (Creative Commons)
  16. 16. Communications – Unified Comm <ul><li>Unified Communications </li></ul><ul><ul><li>UC refers to a broad range of technologies and business practices that allow for continuity among multiple forms of communication. </li></ul></ul><ul><ul><ul><li>Hosted Voice Over IP (VoIP) services </li></ul></ul></ul><ul><ul><ul><li>Local VoIP implementations </li></ul></ul></ul><ul><ul><ul><li>Online telephony services (Google Voice, RingCentral, etc.) </li></ul></ul></ul><ul><ul><li>Work can continue if phone service is interrupted or staff needs to vacate the office. </li></ul></ul>
  17. 17. Communications – Alerting Stakeholders <ul><li>How will you keep donors, volunteers, beneficiaries, and friends of your organization informed during an emergency? </li></ul><ul><ul><li>Sudden changes to your organization’s services. </li></ul></ul><ul><ul><li>Status of recovery and rebuilding </li></ul></ul><ul><ul><li>Time-sensitive requests (for donations, work, or needed items) </li></ul></ul>
  18. 18. Communications – Outreach <ul><li>Email newsletter </li></ul><ul><li>Coordinating efforts with other organizations in your area </li></ul><ul><li>Social media strategy </li></ul><ul><ul><li>Social media is often discussed as a marketing venue for nonprofits, but you can use it to get urgent messages out quickly too. </li></ul></ul><ul><ul><li>TechSoup resources </li></ul></ul><ul><ul><ul><li>Eight Secrets of Effective Online Networking </li></ul></ul></ul><ul><ul><ul><li>New Media, Old Media, and Your Nonprofit </li></ul></ul></ul>
  19. 19. http://backup.idiolexicon.com/
  20. 20. Documentation <ul><li>During an emergency, you’ll be glad you documented your systems and procedures clearly, thoroughly, and accessibly. </li></ul>flickr.com/stian_olsen (Creative Commons)
  21. 21. What to Document <ul><ul><li>Warranties and receipts for computers and peripherals </li></ul></ul><ul><ul><li>Information about where, how, and how frequently your data is stored and backed up </li></ul></ul><ul><ul><li>Instructions for how to restore your data </li></ul></ul><ul><ul><li>Passwords for encrypted data </li></ul></ul><ul><ul><li>Contact information for any employees, volunteers, or consultants who maintain your organization’s tech infrastructure </li></ul></ul><ul><ul><li>A phone tree that includes home and cell phone numbers for all staff. The phone tree should follow your normal chain of management, with each manager contacting her direct reports in case of an emergency. </li></ul></ul><ul><ul><li>Login information for administrative accounts on all computers </li></ul></ul><ul><ul><li>Login information for web hosting and backup services </li></ul></ul><ul><ul><li>Contact information for web hosting and backup services </li></ul></ul><ul><ul><li>Software registration information, including keys </li></ul></ul>
  22. 22. Where to Keep Documentation <ul><ul><li>Hard copies </li></ul></ul><ul><ul><ul><li>Keep in a waterproof safe or safe deposit box </li></ul></ul></ul><ul><ul><li>“ The Master Key” </li></ul></ul><ul><ul><ul><li>Encrypted USB flash drive </li></ul></ul></ul><ul><ul><li>Online </li></ul></ul><ul><ul><ul><li>But be sure it’s encrypted! </li></ul></ul></ul>
  23. 23. Documentation – Encryption <ul><li>MS Office 2003 includes professional encryption, but not by default. Default encryption is lower-quality. </li></ul><ul><li>See instructions in The Resilient Organization , Chapter 4. </li></ul>
  24. 24. What to Backup <ul><li>Secure backup strategies include onsite and offsite backups, </li></ul><ul><li>with the critical components updated frequently. </li></ul><ul><li>What to back up </li></ul><ul><ul><li>User data on all computers </li></ul></ul><ul><ul><li>Home computers and handheld devices </li></ul></ul><ul><ul><ul><li>If working on personal computers or other device, include work files in the backup plan. </li></ul></ul></ul><ul><li>Website </li></ul><ul><ul><li>Find out how frequently your web hosting service performs backups </li></ul></ul><ul><ul><li>Even if your web host performs regular backups, there are benefits to storing a local copy of your site. </li></ul></ul>
  25. 25. Additional Backup <ul><li>Documentation </li></ul><ul><li>Internal data </li></ul><ul><ul><li>Any data that’s not stored on computer? </li></ul></ul><ul><ul><ul><li>Government forms </li></ul></ul></ul><ul><ul><ul><li>Contracts </li></ul></ul></ul><ul><ul><ul><li>Leases </li></ul></ul></ul><ul><ul><ul><li>HR records </li></ul></ul></ul><ul><li>Email </li></ul><ul><li>Bookmarks </li></ul><ul><ul><li>Switch to a non-local social bookmarking service </li></ul></ul>
  26. 26. Test Your Backups <ul><li>Test your backups before you need them. </li></ul><ul><ul><li>Test your backups before you need them. </li></ul></ul><ul><ul><li>Test your backups before you need them. </li></ul></ul><ul><ul><li>Test your backups before you need them. </li></ul></ul><ul><li>Where to back up </li></ul><ul><ul><li>Local Backup </li></ul></ul><ul><ul><ul><li>“ The 2x2 Rule” </li></ul></ul></ul><ul><ul><li>Remote Backup </li></ul></ul>Keep Your Friends Close and Your Backups Distant In the wake of Hurricane Ike, one organization we spoke with had displaced staff working remotely in four different cities. One staff person reminded us that if you’re storing your backups in the same city as your office computers, there’s a danger that one catastrophe will destroy both: “Consider your entire city a potential point of failure!” This advice can also apply to remote backup and web hosting services. The Resilient Organization , page 25 
  27. 27. Policies to Prevent Human-Made Disasters <ul><li>Protect critical organization logins </li></ul><ul><ul><li>Avoid auto-logins for sensitive data </li></ul></ul><ul><ul><li>Use different passwords </li></ul></ul><ul><ul><li>Use multiple passwords to minimize a security breach. </li></ul></ul><ul><ul><li>Don’t use the same passwords for “nuisance logins” that you use for important ones. </li></ul></ul><ul><li>Article: Password Tips for Privacy </li></ul><ul><li>http://www.techsoup.org/learningcenter/internet/page6912.cfm </li></ul>
  28. 28. Policies to Prevent Human-Made Disasters <ul><li>End-of-Employment Policy </li></ul><ul><ul><li>Archive former employee’s email (don’t delete). Forward emails to their manager. </li></ul></ul><ul><ul><li>Change all passwords. If applicable, have them make a list of all accounts and passwords set up for the organization. </li></ul></ul><ul><ul><li>Back up their computer. Reformat before giving it to another employee. </li></ul></ul><ul><ul><li>Keep an updated list of contact info for former employees. </li></ul></ul><ul><li>* These measures do not denote mistrust of the former employee. They provide for a smooth transition for all. </li></ul>
  29. 29. Examples and resources Sponsored by
  30. 30. What Worked for One “ One of the most critical purchases that we made was the Data Protection Manager (DPM) software for doing shadow copy/replica backups of our files. It allowed us to take our data and save it off-site by having each site have its own DPM server located at the opposite site. It also allowed our user base to recover different versions of documents if they were accidentally overwritten or deleted.“ -- Freestore Food Bank http:// www.showyourimpact.org /raising-bar Winner of the TechSoup-Microsoft Show Your Impact Story Contest
  31. 31. More Resources <ul><li>Disaster Planning and Recovery Toolkit </li></ul><ul><li>http://www.techsoup.org/toolkits/disasterplan/index.cfm </li></ul><ul><li>Unified Communications Options for Nonprofits </li></ul><ul><li>http://www.techsoup.org/learningcenter/networks/page11697.cfm </li></ul><ul><li>Backing Up Your Data </li></ul><ul><li>http://www.techsoup.org/learningcenter/software/page6089.cfm </li></ul><ul><li>The No-Excuses Guide to Automated Online Backup </li></ul><ul><li>http://www.techsoup.org/learningcenter/software/page6089.cfm </li></ul><ul><li>Share your own resources with the tsdp tag </li></ul><ul><li>http://delicious.com/tag/tsdp </li></ul>
  32. 32. More Resources <ul><li>SANS Institute for freely editable IT policies and a disaster plan template http://www.sans.org/resources/policies </li></ul><ul><li>IronKey for hardware encrypted USB flash memory (documentation and encrypting the master key) https://www.ironkey.com/ </li></ul><ul><li>Volunteers in Service to Others www.vistohelps.com </li></ul><ul><li>Nutmeg Consulting www.nutmegit.com </li></ul>
  33. 33. Questions? Submit your questions using the chat box.
  34. 34. Free Backup System Webinar <ul><li>Join us for the second part of our free disaster planning webinar series next </li></ul><ul><li>Thursday, August 27 at 11 a.m. Pacific. </li></ul><ul><li>Disaster Planning: Backup, Backup, Backup! </li></ul><ul><li>https://cc.readytalk.com/r/swjbuqg4e6rq </li></ul>
  35. 35. Continue the Discussion… <ul><li>Thanks to our presenters, Chris, Michelle, and Elliot! </li></ul><ul><li>Thanks to Kami Griffiths for managing the chat! </li></ul><ul><li>Twitter hashtag: #tsdp </li></ul><ul><li>Ask follow-up questions in the Tech Planning Forum: </li></ul><ul><ul><li>http://tinyurl.com/nmoema </li></ul></ul>
  36. 36. Thanks to Our Planning Partners! <ul><li>Cisco http:// www.cisco.com / </li></ul><ul><li>Collaborating Agencies Responding to Disasters http://www.cardcanhelp.org/ </li></ul><ul><li>One/Northwest http:// www.onenw.org / </li></ul>
  37. 37. Get the most out of TechSoup <ul><li>At TechSoup, you’ll find a range of technology services to help your nonprofit: </li></ul><ul><ul><li>Read helpful articles in our Learning Center </li></ul></ul><ul><ul><li>Request donated software , hardware, and online services </li></ul></ul><ul><ul><li>Join our community forums to learn from your colleagues </li></ul></ul><ul><ul><li>Browse upcoming events and conferences </li></ul></ul>
  38. 38. Thank you to our webinar sponsor! ReadyTalk offers dedicated product demos for TechSoup organizations 4 times per week: Monday   1:00 pm Mountain Standard Time (MST) Wednesday   9:00 am MST Thursday   1:00 pm MST Friday   9:00 am MST For more information: pages.readytalk.com/techsoup.html
  39. 39. Thank you! Please complete the post event survey. For more information contact: Becky Wiegand [email_address]