Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
Encompass Group, LLC
Keeping up with the
demands of IT Security on a
nonprofit budget.
www.encompassgroupllc.com
Tyler Vil...
Who are we to talk?
2
enCompass is a team of business and
compliance technologists providing Managed IT
Services to regula...
3
Brandon Shaw
Managing Partner, Lead Engineer
 18 years industry experience
 Consulted for many SMB’s,
public school sy...
4
*Source: The Global State of Information
Security® Survey 2016
The State of IT Security
5
The State of IT Security
6
5 Points about Mobile and BYOD
1
2
3
4
5
Source: Crowd Research Partners: BYOD and Mobile
Security 2016 report
Increased...
7
Nonprofit Challenge(s)
Boards (Process and Approval)
Regulatory Environment
Government
Healthcare
Protecting the data of both those you
serv...
9
Where Your IT Security Should Be
Today to be Ready for Tomorrow
THREAT SOLUTION
Viruses Centrally Managed AntiVirus
Rans...
10
Layered Security
1. Patch your systems
2. Educate your users
3. Backup files
4. Invest in layered security
Firewalls An...
11
Firewalls/Antivirus/AntiMalware
 Malware is a broad term used to describe all
sorts of malicious software including vi...
12
IDPS
Intrusion
Detection System
Intrusion
Prevention System
Capable of stopping
first packet of an attack
Analyzes traf...
13
Device Control
Restricts user access to devices by access
rules:
• data storage media
• removable devices
• CD/DVDs
• m...
14
Mobile Device Management
15
Email Encryption
There are many different types of
email encryption, but one gaining
popularity due to simplicity and
c...
16
Office 365 for Nonprofits
Many of the products and tools we discussed are either free or heavily
discounted as part of ...
Rule of thumb: 8-10 people
Chronic problems occur (unable to access
email, network outages, etc.)
Cybersecurity attack
...
18
enCompass Would Like to be
Your Partner in IT Security…
Experience
Managed IT Services and Support in
Northeast Ohio an...
Encompass Group, LLC
Brandon Shaw
bshaw@encompassgroupllc.com
www.encompassgroupllc.com
Tyler Village 3615 Superior Avenue...
Upcoming SlideShare
Loading in …5
×

Keep Up with the Demands of IT Security on a Nonprofit Budget

269 views

Published on

The technical requirements facing nonprofits are challenging and complex due to budgetary constraints, and the demands for secure and reliable access to data regulators, clients, donors, and board members. We will explore different tools non-profits can leverage for better IT security practices that won't break your IT budget, including cloud based anti-virus solutions, Intrusion Detection and Prevention Systems, and data backup in the cloud. Additionally, you will learn how tools built within Office 365 (available for free to qualified nonprofits from Microsoft), such as Email Encryption and Mobile Device Management, enable non-profits to operate more efficiently and securely.

Published in: Government & Nonprofit
  • Be the first to comment

  • Be the first to like this

Keep Up with the Demands of IT Security on a Nonprofit Budget

  1. 1. Encompass Group, LLC Keeping up with the demands of IT Security on a nonprofit budget. www.encompassgroupllc.com Tyler Village 3615 Superior Avenue, Suite 3103F Cleveland, OH 44114 216.539.0100
  2. 2. Who are we to talk? 2 enCompass is a team of business and compliance technologists providing Managed IT Services to regulated organizations, with a concentration on:  Financial Industry  Healthcare  Nonprofits
  3. 3. 3 Brandon Shaw Managing Partner, Lead Engineer  18 years industry experience  Consulted for many SMB’s, public school systems, Government branches, Senatorial campaigns and even a Presidential campaign  Just received his Pilot license Mary Katherine Donnelly Business Development Director  Background in IT Product Marketing & Enterprise Sales to Fortune 500 companies  Director of a DC nonprofit, marketing Director for a local nonprofit, and Chair of the Board for local YMCA  Is NOT a pilot Experience
  4. 4. 4 *Source: The Global State of Information Security® Survey 2016 The State of IT Security
  5. 5. 5 The State of IT Security
  6. 6. 6 5 Points about Mobile and BYOD 1 2 3 4 5 Source: Crowd Research Partners: BYOD and Mobile Security 2016 report Increased mobility, satisfaction and productivity are the top drivers of BYOD. Security and employee privacy are the biggest inhibitors of BYOD. 1 in 5 organizations suffered a mobile security breach, primarily driven by Malware and malicious WiFi BYOD Security threats pose heavy burdens on IT resources and help desk workloads Despite all this, only 30% of organizations are increasing security budgets for BYOD in the next 12 months
  7. 7. 7 Nonprofit Challenge(s)
  8. 8. Boards (Process and Approval) Regulatory Environment Government Healthcare Protecting the data of both those you serve and those who donate Volunteers access to data 8 Nonprofit Other Challenges
  9. 9. 9 Where Your IT Security Should Be Today to be Ready for Tomorrow THREAT SOLUTION Viruses Centrally Managed AntiVirus RansomWare User Education/Training, Backups Unauthorized Network Access Firewalls, Penetration Testing & Vulnerability Scans, IDPS BYOD Clear Policy, MDM Disaster Planning Backup and Recovery, onsite and offsite Internal – accidental or malicious Written policies and procedures, training, device control Theft/Loss Mobile Device Management, centrally managed encryption Hackers IDPS, Encryption Out of Date Software Patch Management “Rogue” Downloads User access and privileges, non-critical application patches
  10. 10. 10 Layered Security 1. Patch your systems 2. Educate your users 3. Backup files 4. Invest in layered security Firewalls AntiVirus AntiMalware IDPS Device Control Security Tools Email Encryption MDM
  11. 11. 11 Firewalls/Antivirus/AntiMalware  Malware is a broad term used to describe all sorts of malicious software including viruses, spyware, trojans, worms, and more.  Anti-virus prevents and gets rid of viruses by preventing harmful software from installing and damaging your computer; protects and detects when a file has some kind of malicious behavior and prevent it from executing.  A firewall controls network traffic acting as a filter between the internet and your network servers.
  12. 12. 12 IDPS Intrusion Detection System Intrusion Prevention System Capable of stopping first packet of an attack Analyzes traffic for anomalies Issues alarms when attack occurs Sits directly in line of network traffic VISIBILITY & CONTROL
  13. 13. 13 Device Control Restricts user access to devices by access rules: • data storage media • removable devices • CD/DVDs • modems • external network adapters • printers • multi-function peripherals • USB Before investing, see if your AV Solution has Device Control (also called Access Control)
  14. 14. 14 Mobile Device Management
  15. 15. 15 Email Encryption There are many different types of email encryption, but one gaining popularity due to simplicity and cost structure is Office 365 Message Encryption:  Fill regulatory requirements  Policy based encryption  First building block in a Data Loss Prevention strategy
  16. 16. 16 Office 365 for Nonprofits Many of the products and tools we discussed are either free or heavily discounted as part of Office 365: https://products.office.com/en- us/nonprofit/office-365-nonprofit-plans-and-pricing#seemore
  17. 17. Rule of thumb: 8-10 people Chronic problems occur (unable to access email, network outages, etc.) Cybersecurity attack 17 When Your Nonprofit Outgrows Homegrown IT $2500-$4000/mo: average salary for dedicated IT staff $750/mo average for Managed IT Services in 10 person office* *Source: TechSoup
  18. 18. 18 enCompass Would Like to be Your Partner in IT Security… Experience Managed IT Services and Support in Northeast Ohio and Nationwide for 10+ years, gaining the trust of our client base with every interaction. Compliance We take a comprehensive approach to IT operations so our clients feel confident that IT is under control, risk is managed and regulations are met. Budget We strive to strike just the right balance between the business requirements that drive results and the budget constraints faced by nonprofits. Exceptional Client Experience At each interaction point: • Ownership • Clear Expectations • Friendly & Personable Service • Bigger Picture Reference
  19. 19. Encompass Group, LLC Brandon Shaw bshaw@encompassgroupllc.com www.encompassgroupllc.com Tyler Village 3615 Superior Avenue, Suite 3103F Cleveland, OH 44114 216.539.0100 Mary K. Donnelly mdonnelly@encompassgroupllc.com

×