SlideShare a Scribd company logo
1 of 98
Download to read offline
7 Highly Risky Habits of Small to
Medium-Sized Nonprofits:
IT Security Pitfalls
March 23, 2016
Leon Wilson, Cleveland Foundation
Dan Rivas, Idealware
Introductions
Leon Wilson
Chief Technology &
Information Officer
Cleveland Foundation
Dan Rivas
Managing Writer
Idealware
What Are Your Security Habits?
Find the survey link in the Collaborative Notes or just type in the link
below.
Survey link: https://www.surveymonkey.com/r/7LFFJRF
Share Your Notes
Collaborative Notes allow you to add your thoughts, observations,
opinions, and “aha!” moments to a running record of this session.
To view or edit notes go to: http://po.st/7riskyhabits-16NTC
Tell the World What it’s Missing
You can live Tweet
this event using
#16NTC7riskyhabits
Why Is Everyone Talking About Security?
In the digital age, data risk is the new normal.
More Than Just IT
Do Nonprofits Need to Be Concerned?
If you:
•  Maintain financial information.
•  Maintain sensitive personal
information.
•  Maintain contact information.
Then the answer is unequivocally…
A False Sense of Security
Some are overwhelmed, others are just gambling that their number
won’t come up.
Survey link:
Avoiding Security Won’t Protect You
Neither Will Your Nonprofit Status
Survey link:
Hackers are pros
—they don’t care
who their target is.
If they can steal
valuable
information, they
will.
Small Nonprofits Are Attractive Targets
•  Fewer resources
•  Limited IT
security
•  Not likely to
notice an attack
until much later
Notable Nonprofit Data Breaches
The Risks to Your Organization
•  Loss of trust.
•  Reputational damage.
•  Negative impact on donor,
member, and volunteer
retention.
•  Financial liability.
•  Fines from banks and
regulators.
Practical Security Is Within Reach
Don’t leave the door unlocked. Follow these simple steps.
The 7 Highly Risky Habits
1.  Using personal computers for work
2.  Unmanaged personal mobile devices at work
3.  A lack of password management
4.  Using consumer-oriented Cloud storage
5.  Poor backup and disaster recovery infrastructure
6.  A lack of network security
7.  Poor software management
Habit 1: Using Personal
Computers for Work
Allowing staff members to use their personally-owned computers
for work—either as their primary or secondary workstation.
Why Do Nonprofits Do it?
•  Convenience
•  Cost Savings
•  Staff preference
Habit 1: Using Personal Computers for Work
What Are the Risks?
Habit 1: Using Personal Computers for Work
Outdated Software
Unsupported
operating systems,
applications, and
plug-ins are easier
to infiltrate.
Habit 1: Using Personal Computers for Work
You Can’t Control Access
•  A personal device may
have additional users
who can access data.
•  Terminated employees
are likely to still have
organizational
information after leaving.
Habit 1: Using Personal Computers for Work
Virus/Malware Risk
How do you know
personal computers
and devices have
basic protections?
Habit 1: Using Personal Computers for Work
Software Ownership
Your nonprofit may
have purchased the
software, but does not
control the license.
Habit 1: Using Personal Computers for Work
How Do You Reduce the Risks?
Habit 1: Using Personal Computers for Work
Require Minimum Software Standards
Define minimum
software and
versions to access
network.
Habit 1: Using Personal Computers for Work
Establish a Strong Password Policy
•  Establish and enforce
strong passwords.
•  Require periodic password
updates.
•  Establish automatic screen-
saver.
Habit 1: Using Personal Computers for Work
Provide Virus/Malware Protection Software
Set standards and
ensure virus protection
is actively running and
kept up to date.
Habit 1: Using Personal Computers for Work
Establish Software Licensing Policies
For example, you can
reclaim licenses and
reassign them to
other machines.
Habit 1: Using Personal Computers for Work
Habit 2: Unmanaged Personal
Mobile Devices @ Work
The use of personal cellphones, tablets, and other devices in the
workspace.
Why Do Nonprofits Do it?
•  Convenience.
•  Anytime anywhere
information.
•  Cost Savings.
•  Staff preference.
Habit 2: Unmanaged Personal Mobile Devices @ Work
What Are the Risks?
Habit 2: Unmanaged Personal Mobile Devices @ Work
Data Travels
The device is
mobile. That makes
your data mobile
too.
56%
of employees
frequently store
sensitive data on their
personal devices.
Habit 2: Unmanaged Personal Mobile Devices @ Work
Mobile Devices Can Get Stolen
“Apple picking”
happens frequently
in bars and
restaurants.
37%
of iPhone users don’t
password protect their
phones.
Habit 2: Unmanaged Personal Mobile Devices @ Work
Terminated Employees
It’s difficult to
immediately
remove data from
mobile devices.
Habit 2: Unmanaged Personal Mobile Devices @ Work
Devices Are Often Shared
Kids, spouses,
people looking at
pictures, someone
who needs to make a
quick phone call….
Habit 2: Unmanaged Personal Mobile Devices @ Work
More Tech Issues
IT staff have to be more
nimble and keep up with
how mobile changes
affect nonprofits.
Habit 2: Unmanaged Personal Mobile Devices @ Work
Malicious Apps and Other Attacks
Most people don’t
run anti-virus
software and are not
aware of app risks.
Habit 2: Unmanaged Personal Mobile Devices @ Work
How Do You Reduce the Risks?
Habit 2: Unmanaged Personal Mobile Devices @ Work
Strong Password Policies
•  Establish and enforce
strong passwords.
•  Require periodic
password changing.
•  Establish automatic
screen-locking.
Habit 2: Unmanaged Personal Mobile Devices @ Work
Encourage the Use of Anti-Virus Software
Set standards and
ensure virus protection
is actively running and
kept up to date.
Habit 2: Unmanaged Personal Mobile Devices @ Work
Employee Termination Policies
Develop policies and
procedures for handling
access removal for
terminated employees.
Habit 2: Unmanaged Personal Mobile Devices @ Work
Establish and Enforce BYOD Policy
•  Require written review,
acceptance, and compliance of
policy.
•  Ensure policy includes theft/
loss of device reporting.
•  Address wiping of organization
data and personal data, if
possible.
Habit 2: Unmanaged Personal Mobile Devices @ Work
Mobile Device Management (MDM)
If your organization
expects staff to do a lot of
work on personal mobile
devices, this may be worth
the extra expense.
Habit 2: Unmanaged Personal Mobile Devices @ Work
Habit 3: A Lack of Password
Management
Lack of or ineffective standards around the use of passwords for
computers and systems.
Why Do Nonprofits Do it?
•  Convenience—too many
passwords to remember.
•  Unaware of what makes
a good password.
•  Management feels like a
lot of work.
16%
Report being able to
use old usernames and
passwords after
leaving their
organization.
Habit 3: Lack of Password Management
What Are the Risks?
Habit 3: Lack of Password Management
Weak Passwords
2/3 of data
breaches
involve weak
passwords.
Habit 3: Lack of Password Management
No Password Policies
Without guidance,
staff members
often take the
path of least
resistance.
Habit 3: Lack of Password Management
Default Passwords in Place
Default passwords
are publicly known
and often the first
password a hacker
will try.
Habit 3: Lack of Password Management
Bad Habits
•  Sharing passwords with co-workers.
•  Writing down passwords on unsecured notepads and post-it
notes.
•  Trying to keep it too simple.
Habit 3: Lack of Password Management
How Do You Reduce the Risks?
Habit 3: Lack of Password Management
Strong Password Management Policies
periodically!
Habit 3: Lack of Password Management
Set Technology Controls
Most major software
systems can be set to
force staff to change
their passwords
periodically and comply
with standards.
Habit 3: Lack of Password Management
Make Sure Default Passwords Are Changed
Don’t forget routers
and other network
devices around the
office.
Habit 3: Lack of Password Management
Provide Training
Staff need
education on the
difference between
good and bad
passwords.
Habit 3: Lack of Password Management
Habit 4: Using Consumer-
Oriented Cloud Storage
Using solutions such as Dropbox or Google Drive to store,
share, and access organization files.
Why Do Nonprofits Do it?
•  Convenience.
•  Ease of use.
•  Don’t have to involve IT
support.
•  It’s free!
•  Can be synced among
multiple devices.
Habit 4: Using Consumer-Oriented Cloud Storage
What Are the Risks?
Habit 4: Using Consumer-Oriented Cloud Storage
Hard to Control Access to Data
• Convenience
• Cost Savings
• Staff preference
Habit 4: Using Consumer-Oriented Cloud Storage
Personal Accounts
If work is being stored on
personal Cloud accounts,
it’s the same as if it’s on
their computers at home.
Habit 4: Using Consumer-Oriented Cloud Storage
Personal Accounts
•  No way to retrieve data and
files post employment.
•  Data instantaneously
replicated to multiple
devices.
•  No way to control who has
access and is viewing your
data.
Habit 4: Using Consumer-Oriented Cloud Storage
How Do You Reduce the Risks?
Habit 4: Using Consumer-Oriented Cloud Storage
Provide Business-Grade Cloud Storage
And discourage or
prevent the use of
personal accounts.
Habit 4: Using Consumer-Oriented Cloud Storage
Establish Information Policies
Set policy
standards for file
management.
Habit 4: Using Consumer-Oriented Cloud Storage
Block Unauthorized Syncing
Work with staff to
prevent the
unintentional
spread of access.
Habit 4: Using Consumer-Oriented Cloud Storage
Habit 5: Poor Backup and
Disaster Recovery Infrastructure
Not being sure whether you can quickly and effectively recover
from an accidental or intentional loss, destruction, or corruption
of your organization’s systems, data, or files.
Why Do Nonprofits Do it?
•  Shortsightedness.
•  Not putting a price
on data or key
systems.
•  Lack of adequate IT
support to lead
effort.
•  Blind faith.
62%
of small
organizations do
not routinely
back up data.
Habit 5: Poor Backup and Disaster Recovery
Why Do Nonprofits Do it?
•  Backup: is the result of copying or archiving files
and folders for the purpose of being able to restore
them in case of data loss
•  Disaster Recovery: the process, policies and
procedures related to preparing for recovery or
continuation of technology infrastructure critical to
an organization after a natural or human-induced
disaster
It’s about
more than
just data!
Habit 5: Poor Backup and Disaster Recovery
What Are the Risks?
Habit 5: Poor Backup and Disaster Recovery
Consider the “What if” Scenarios
What would you do if you lost
all of your data due to a virus,
an accidental deletion, or a
natural catastrophe?
Habit 5: Poor Backup and Disaster Recovery
Major Costs
Habit 5: Poor Backup and Disaster Recovery
How Do You Reduce the Risks?
Habit 5: Poor Backup and Disaster Recovery
Regularly Schedule Backups
Any work you can’t easily
replace should be
backed up and stored off
site or in the Cloud.
Habit 5: Poor Backup and Disaster Recovery
Create a Disaster Recovery Plan
What will you need to do
to get up and running if
any of your “what if”
scenarios come true?
Habit 5: Poor Backup and Disaster Recovery
Test Your Plans
At least once a year
restore a deleted file
or a crashed server
just to make sure
you can do it.
Habit 5: Poor Backup and Disaster Recovery
Habit 6: A Lack of Adequate
Network Security
Haphazard IT infrastructure to protect from malicious attacks
and unauthorized access.
Why Do Nonprofits Do it?
•  Shortsightedness.
•  Lack of adequate IT
support to lead effort.
•  Too complicated.
•  Assume that its not
necessary…until it is.
Habit 6: Lack of Adequate Network Security
What Are the Risks?
Habit 6: Lack of Adequate Network Security
Unauthorized Access to Critical Information
Your organization’s
future is on the line.
Habit 6: Lack of Adequate Network Security
Disruption of Work
An attack that halts work
means:
•  You can’t get
anything done.
•  The loss or corruption
of data.
Habit 6: Lack of Adequate Network Security
Malicious Software
It can not only infect a
single machine—
malicious code can
spread throughout your
network.
Habit 6: Lack of Adequate Network Security
How Do You Reduce the Risks?
Habit 6: Lack of Adequate Network Security
Firewall Protection
Habit 6: Lack of Adequate Network Security
Mandate Anti-Virus/Malware Software
And remember to
keep it updated.
Habit 6: Lack of Adequate Network Security
Multiple Layers of Protection
Both at the server/
network level and
workstations.
Habit 6: Lack of Adequate Network Security
Remove Former Employees from Network
Make it part of your
HR employee off-
boarding process.
Habit 6: Lack of Adequate Network Security
Habit 7: Poor Software
Management
Proper lifecycle management, identification, and control of
wanted versus unwanted applications.
Why Do Nonprofits Do it?
• Convenience.
• Shortsightedness.
• Lack of adequate IT
support to lead effort.
• Blind faith.
Habit 7: Poor Software Management
What Are the Risks?
Habit 7: Poor Software Management
Potentially Unwanted Applications (PUAs)
They affect everyone’s
productivity and are
hard to get rid of.
Habit 7: Poor Software Management
Security Vulnerabilities
Hackers keep up to date on
security holes and are always
looking for opportunities to
exploit them.
Habit 7: Poor Software Management
Poor Hardware Performance
Out-of-date software
can slow down your
computer.
Habit 7: Poor Software Management
How Do You Reduce the Risks?
Habit 7: Poor Software Management
Establish a Patch Management Policy
A policy that governs
how, when, and by
what means software
is updated helps
everyone do their best.
Habit 7: Poor Software Management
Manage Software Installs
Consider only
allowing authorized
IT support
personnel to
perform installs.
Habit 7: Poor Software Management
Perform Routine PC Tune-ups
Your PC is like your
attic—it collects a
lot of junk over
time.
Habit 7: Poor Software Management
Manage Software Installs
Habit 7: Poor Software Management
This includes
network
hardware and
firmware
updates!
Questions?

More Related Content

What's hot

Understanding records management print and electronic
Understanding records management   print and electronicUnderstanding records management   print and electronic
Understanding records management print and electronicFe Angela Verzosa
 
Is SharePoint 2013 'good enough'?
Is SharePoint 2013 'good enough'?Is SharePoint 2013 'good enough'?
Is SharePoint 2013 'good enough'?Metataxis
 
comparision between IT and Information system
comparision between IT and Information systemcomparision between IT and Information system
comparision between IT and Information systemtayyab3052
 
MIS-lecture-2
MIS-lecture-2MIS-lecture-2
MIS-lecture-227273737
 
Intelligent information: New Rules for Managing the Customer Experience
Intelligent information:  New Rules for Managing the Customer ExperienceIntelligent information:  New Rules for Managing the Customer Experience
Intelligent information: New Rules for Managing the Customer ExperienceJohn Mancini
 
[AIIM16] The Last Mile in Information Management
[AIIM16] The Last Mile in Information Management[AIIM16] The Last Mile in Information Management
[AIIM16] The Last Mile in Information ManagementAIIM International
 
What's in your digital landfill?
What's in your digital landfill?What's in your digital landfill?
What's in your digital landfill?John Mancini
 

What's hot (7)

Understanding records management print and electronic
Understanding records management   print and electronicUnderstanding records management   print and electronic
Understanding records management print and electronic
 
Is SharePoint 2013 'good enough'?
Is SharePoint 2013 'good enough'?Is SharePoint 2013 'good enough'?
Is SharePoint 2013 'good enough'?
 
comparision between IT and Information system
comparision between IT and Information systemcomparision between IT and Information system
comparision between IT and Information system
 
MIS-lecture-2
MIS-lecture-2MIS-lecture-2
MIS-lecture-2
 
Intelligent information: New Rules for Managing the Customer Experience
Intelligent information:  New Rules for Managing the Customer ExperienceIntelligent information:  New Rules for Managing the Customer Experience
Intelligent information: New Rules for Managing the Customer Experience
 
[AIIM16] The Last Mile in Information Management
[AIIM16] The Last Mile in Information Management[AIIM16] The Last Mile in Information Management
[AIIM16] The Last Mile in Information Management
 
What's in your digital landfill?
What's in your digital landfill?What's in your digital landfill?
What's in your digital landfill?
 

Viewers also liked

Viewers also liked (15)

ادعية النبي
ادعية النبيادعية النبي
ادعية النبي
 
Application and CV 2016 Latest 8-23-2016
Application and CV  2016 Latest 8-23-2016Application and CV  2016 Latest 8-23-2016
Application and CV 2016 Latest 8-23-2016
 
Capstone Project (Execution Copy)
Capstone Project (Execution Copy)Capstone Project (Execution Copy)
Capstone Project (Execution Copy)
 
Vision
VisionVision
Vision
 
Get paid to blog
Get paid to blogGet paid to blog
Get paid to blog
 
Presentation group-12
Presentation group-12Presentation group-12
Presentation group-12
 
CV - Nikhil(1)
CV - Nikhil(1)CV - Nikhil(1)
CV - Nikhil(1)
 
2 dedap an kiem tra ki 2 toan 4
2 dedap an kiem tra ki 2 toan 42 dedap an kiem tra ki 2 toan 4
2 dedap an kiem tra ki 2 toan 4
 
Dream valley Resorts
Dream valley ResortsDream valley Resorts
Dream valley Resorts
 
O`Connor, A. Digital Badges in ITTE
O`Connor, A. Digital Badges in ITTEO`Connor, A. Digital Badges in ITTE
O`Connor, A. Digital Badges in ITTE
 
E-Fatura & E-Arşiv v3
E-Fatura & E-Arşiv v3E-Fatura & E-Arşiv v3
E-Fatura & E-Arşiv v3
 
MBA 506 Project Hajiran_Regression Analysis
MBA 506 Project Hajiran_Regression AnalysisMBA 506 Project Hajiran_Regression Analysis
MBA 506 Project Hajiran_Regression Analysis
 
Pembaharuan manajemen pemerintahan (prof ermaya)
Pembaharuan manajemen pemerintahan (prof ermaya)Pembaharuan manajemen pemerintahan (prof ermaya)
Pembaharuan manajemen pemerintahan (prof ermaya)
 
PPTs for presentation on 14.03.15
PPTs for presentation on 14.03.15PPTs for presentation on 14.03.15
PPTs for presentation on 14.03.15
 
Filsafat pemerintahan s3 (prof eliana)
Filsafat pemerintahan s3 (prof eliana)Filsafat pemerintahan s3 (prof eliana)
Filsafat pemerintahan s3 (prof eliana)
 

Similar to 7 Highly Risky Habits of Small to Medium-Sized Nonprofits: IT Security Pitfalls

IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?Barry Caplin
 
A Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsA Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsgppcpa
 
Securing Mobile Devices in the Workplace - Six Tips For Midsize Businesses
Securing Mobile Devices in the Workplace - Six Tips For Midsize BusinessesSecuring Mobile Devices in the Workplace - Six Tips For Midsize Businesses
Securing Mobile Devices in the Workplace - Six Tips For Midsize BusinessesMidmarketIBM
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight BackMTG IT Professionals
 
Physician Office Presentation
Physician Office PresentationPhysician Office Presentation
Physician Office Presentationfranbodh
 
10 Tips to Strengthen Your Insider Threat Program
10 Tips to Strengthen Your Insider Threat Program 10 Tips to Strengthen Your Insider Threat Program
10 Tips to Strengthen Your Insider Threat Program Dtex Systems
 
Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security InnovationPriyanka Aash
 
Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha Visram
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber securityAnimesh Roy
 
Tips for creating Effective & HIPPA compliant mobile.pptx
Tips for creating Effective & HIPPA compliant mobile.pptxTips for creating Effective & HIPPA compliant mobile.pptx
Tips for creating Effective & HIPPA compliant mobile.pptxMyAppGurus
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security BasicsMohan Jadhav
 
MS810 Information Security and Ethics Assignment
MS810 Information Security and Ethics AssignmentMS810 Information Security and Ethics Assignment
MS810 Information Security and Ethics AssignmentDarren McManus
 
Cyber Security for Financial Planners
Cyber Security for Financial PlannersCyber Security for Financial Planners
Cyber Security for Financial PlannersMichael O'Phelan
 
Sec and ethics presentation
Sec and ethics presentationSec and ethics presentation
Sec and ethics presentationDarren McManus
 
Cyber Security and Healthcare
Cyber Security and HealthcareCyber Security and Healthcare
Cyber Security and HealthcareJonathon Coulter
 
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataAccellis Technology Group
 

Similar to 7 Highly Risky Habits of Small to Medium-Sized Nonprofits: IT Security Pitfalls (20)

Assessing Your security
Assessing Your securityAssessing Your security
Assessing Your security
 
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
 
A Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsA Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOs
 
Securing Mobile Devices in the Workplace - Six Tips For Midsize Businesses
Securing Mobile Devices in the Workplace - Six Tips For Midsize BusinessesSecuring Mobile Devices in the Workplace - Six Tips For Midsize Businesses
Securing Mobile Devices in the Workplace - Six Tips For Midsize Businesses
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back
 
Physician Office Presentation
Physician Office PresentationPhysician Office Presentation
Physician Office Presentation
 
10 Tips to Strengthen Your Insider Threat Program
10 Tips to Strengthen Your Insider Threat Program 10 Tips to Strengthen Your Insider Threat Program
10 Tips to Strengthen Your Insider Threat Program
 
Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security Innovation
 
Personal Threat Models
Personal Threat ModelsPersonal Threat Models
Personal Threat Models
 
Team black
Team blackTeam black
Team black
 
Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
Tips for creating Effective & HIPPA compliant mobile.pptx
Tips for creating Effective & HIPPA compliant mobile.pptxTips for creating Effective & HIPPA compliant mobile.pptx
Tips for creating Effective & HIPPA compliant mobile.pptx
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
 
MS810 Information Security and Ethics Assignment
MS810 Information Security and Ethics AssignmentMS810 Information Security and Ethics Assignment
MS810 Information Security and Ethics Assignment
 
Cyber Security for Financial Planners
Cyber Security for Financial PlannersCyber Security for Financial Planners
Cyber Security for Financial Planners
 
3 steps security
3 steps security3 steps security
3 steps security
 
Sec and ethics presentation
Sec and ethics presentationSec and ethics presentation
Sec and ethics presentation
 
Cyber Security and Healthcare
Cyber Security and HealthcareCyber Security and Healthcare
Cyber Security and Healthcare
 
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
 

Recently uploaded

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Recently uploaded (20)

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

7 Highly Risky Habits of Small to Medium-Sized Nonprofits: IT Security Pitfalls

  • 1. 7 Highly Risky Habits of Small to Medium-Sized Nonprofits: IT Security Pitfalls March 23, 2016 Leon Wilson, Cleveland Foundation Dan Rivas, Idealware
  • 2. Introductions Leon Wilson Chief Technology & Information Officer Cleveland Foundation Dan Rivas Managing Writer Idealware
  • 3. What Are Your Security Habits? Find the survey link in the Collaborative Notes or just type in the link below. Survey link: https://www.surveymonkey.com/r/7LFFJRF
  • 4. Share Your Notes Collaborative Notes allow you to add your thoughts, observations, opinions, and “aha!” moments to a running record of this session. To view or edit notes go to: http://po.st/7riskyhabits-16NTC
  • 5. Tell the World What it’s Missing You can live Tweet this event using #16NTC7riskyhabits
  • 6. Why Is Everyone Talking About Security? In the digital age, data risk is the new normal.
  • 8. Do Nonprofits Need to Be Concerned? If you: •  Maintain financial information. •  Maintain sensitive personal information. •  Maintain contact information. Then the answer is unequivocally…
  • 9. A False Sense of Security Some are overwhelmed, others are just gambling that their number won’t come up. Survey link:
  • 11. Neither Will Your Nonprofit Status Survey link: Hackers are pros —they don’t care who their target is. If they can steal valuable information, they will.
  • 12. Small Nonprofits Are Attractive Targets •  Fewer resources •  Limited IT security •  Not likely to notice an attack until much later
  • 14. The Risks to Your Organization •  Loss of trust. •  Reputational damage. •  Negative impact on donor, member, and volunteer retention. •  Financial liability. •  Fines from banks and regulators.
  • 15. Practical Security Is Within Reach Don’t leave the door unlocked. Follow these simple steps.
  • 16. The 7 Highly Risky Habits 1.  Using personal computers for work 2.  Unmanaged personal mobile devices at work 3.  A lack of password management 4.  Using consumer-oriented Cloud storage 5.  Poor backup and disaster recovery infrastructure 6.  A lack of network security 7.  Poor software management
  • 17. Habit 1: Using Personal Computers for Work Allowing staff members to use their personally-owned computers for work—either as their primary or secondary workstation.
  • 18. Why Do Nonprofits Do it? •  Convenience •  Cost Savings •  Staff preference Habit 1: Using Personal Computers for Work
  • 19. What Are the Risks? Habit 1: Using Personal Computers for Work
  • 20. Outdated Software Unsupported operating systems, applications, and plug-ins are easier to infiltrate. Habit 1: Using Personal Computers for Work
  • 21. You Can’t Control Access •  A personal device may have additional users who can access data. •  Terminated employees are likely to still have organizational information after leaving. Habit 1: Using Personal Computers for Work
  • 22. Virus/Malware Risk How do you know personal computers and devices have basic protections? Habit 1: Using Personal Computers for Work
  • 23. Software Ownership Your nonprofit may have purchased the software, but does not control the license. Habit 1: Using Personal Computers for Work
  • 24. How Do You Reduce the Risks? Habit 1: Using Personal Computers for Work
  • 25. Require Minimum Software Standards Define minimum software and versions to access network. Habit 1: Using Personal Computers for Work
  • 26. Establish a Strong Password Policy •  Establish and enforce strong passwords. •  Require periodic password updates. •  Establish automatic screen- saver. Habit 1: Using Personal Computers for Work
  • 27. Provide Virus/Malware Protection Software Set standards and ensure virus protection is actively running and kept up to date. Habit 1: Using Personal Computers for Work
  • 28. Establish Software Licensing Policies For example, you can reclaim licenses and reassign them to other machines. Habit 1: Using Personal Computers for Work
  • 29. Habit 2: Unmanaged Personal Mobile Devices @ Work The use of personal cellphones, tablets, and other devices in the workspace.
  • 30. Why Do Nonprofits Do it? •  Convenience. •  Anytime anywhere information. •  Cost Savings. •  Staff preference. Habit 2: Unmanaged Personal Mobile Devices @ Work
  • 31. What Are the Risks? Habit 2: Unmanaged Personal Mobile Devices @ Work
  • 32. Data Travels The device is mobile. That makes your data mobile too. 56% of employees frequently store sensitive data on their personal devices. Habit 2: Unmanaged Personal Mobile Devices @ Work
  • 33. Mobile Devices Can Get Stolen “Apple picking” happens frequently in bars and restaurants. 37% of iPhone users don’t password protect their phones. Habit 2: Unmanaged Personal Mobile Devices @ Work
  • 34. Terminated Employees It’s difficult to immediately remove data from mobile devices. Habit 2: Unmanaged Personal Mobile Devices @ Work
  • 35. Devices Are Often Shared Kids, spouses, people looking at pictures, someone who needs to make a quick phone call…. Habit 2: Unmanaged Personal Mobile Devices @ Work
  • 36. More Tech Issues IT staff have to be more nimble and keep up with how mobile changes affect nonprofits. Habit 2: Unmanaged Personal Mobile Devices @ Work
  • 37. Malicious Apps and Other Attacks Most people don’t run anti-virus software and are not aware of app risks. Habit 2: Unmanaged Personal Mobile Devices @ Work
  • 38. How Do You Reduce the Risks? Habit 2: Unmanaged Personal Mobile Devices @ Work
  • 39. Strong Password Policies •  Establish and enforce strong passwords. •  Require periodic password changing. •  Establish automatic screen-locking. Habit 2: Unmanaged Personal Mobile Devices @ Work
  • 40. Encourage the Use of Anti-Virus Software Set standards and ensure virus protection is actively running and kept up to date. Habit 2: Unmanaged Personal Mobile Devices @ Work
  • 41. Employee Termination Policies Develop policies and procedures for handling access removal for terminated employees. Habit 2: Unmanaged Personal Mobile Devices @ Work
  • 42. Establish and Enforce BYOD Policy •  Require written review, acceptance, and compliance of policy. •  Ensure policy includes theft/ loss of device reporting. •  Address wiping of organization data and personal data, if possible. Habit 2: Unmanaged Personal Mobile Devices @ Work
  • 43. Mobile Device Management (MDM) If your organization expects staff to do a lot of work on personal mobile devices, this may be worth the extra expense. Habit 2: Unmanaged Personal Mobile Devices @ Work
  • 44. Habit 3: A Lack of Password Management Lack of or ineffective standards around the use of passwords for computers and systems.
  • 45. Why Do Nonprofits Do it? •  Convenience—too many passwords to remember. •  Unaware of what makes a good password. •  Management feels like a lot of work. 16% Report being able to use old usernames and passwords after leaving their organization. Habit 3: Lack of Password Management
  • 46. What Are the Risks? Habit 3: Lack of Password Management
  • 47. Weak Passwords 2/3 of data breaches involve weak passwords. Habit 3: Lack of Password Management
  • 48. No Password Policies Without guidance, staff members often take the path of least resistance. Habit 3: Lack of Password Management
  • 49. Default Passwords in Place Default passwords are publicly known and often the first password a hacker will try. Habit 3: Lack of Password Management
  • 50. Bad Habits •  Sharing passwords with co-workers. •  Writing down passwords on unsecured notepads and post-it notes. •  Trying to keep it too simple. Habit 3: Lack of Password Management
  • 51. How Do You Reduce the Risks? Habit 3: Lack of Password Management
  • 52. Strong Password Management Policies periodically! Habit 3: Lack of Password Management
  • 53. Set Technology Controls Most major software systems can be set to force staff to change their passwords periodically and comply with standards. Habit 3: Lack of Password Management
  • 54. Make Sure Default Passwords Are Changed Don’t forget routers and other network devices around the office. Habit 3: Lack of Password Management
  • 55. Provide Training Staff need education on the difference between good and bad passwords. Habit 3: Lack of Password Management
  • 56. Habit 4: Using Consumer- Oriented Cloud Storage Using solutions such as Dropbox or Google Drive to store, share, and access organization files.
  • 57. Why Do Nonprofits Do it? •  Convenience. •  Ease of use. •  Don’t have to involve IT support. •  It’s free! •  Can be synced among multiple devices. Habit 4: Using Consumer-Oriented Cloud Storage
  • 58. What Are the Risks? Habit 4: Using Consumer-Oriented Cloud Storage
  • 59. Hard to Control Access to Data • Convenience • Cost Savings • Staff preference Habit 4: Using Consumer-Oriented Cloud Storage
  • 60. Personal Accounts If work is being stored on personal Cloud accounts, it’s the same as if it’s on their computers at home. Habit 4: Using Consumer-Oriented Cloud Storage
  • 61. Personal Accounts •  No way to retrieve data and files post employment. •  Data instantaneously replicated to multiple devices. •  No way to control who has access and is viewing your data. Habit 4: Using Consumer-Oriented Cloud Storage
  • 62. How Do You Reduce the Risks? Habit 4: Using Consumer-Oriented Cloud Storage
  • 63. Provide Business-Grade Cloud Storage And discourage or prevent the use of personal accounts. Habit 4: Using Consumer-Oriented Cloud Storage
  • 64. Establish Information Policies Set policy standards for file management. Habit 4: Using Consumer-Oriented Cloud Storage
  • 65. Block Unauthorized Syncing Work with staff to prevent the unintentional spread of access. Habit 4: Using Consumer-Oriented Cloud Storage
  • 66. Habit 5: Poor Backup and Disaster Recovery Infrastructure Not being sure whether you can quickly and effectively recover from an accidental or intentional loss, destruction, or corruption of your organization’s systems, data, or files.
  • 67. Why Do Nonprofits Do it? •  Shortsightedness. •  Not putting a price on data or key systems. •  Lack of adequate IT support to lead effort. •  Blind faith. 62% of small organizations do not routinely back up data. Habit 5: Poor Backup and Disaster Recovery
  • 68. Why Do Nonprofits Do it? •  Backup: is the result of copying or archiving files and folders for the purpose of being able to restore them in case of data loss •  Disaster Recovery: the process, policies and procedures related to preparing for recovery or continuation of technology infrastructure critical to an organization after a natural or human-induced disaster It’s about more than just data! Habit 5: Poor Backup and Disaster Recovery
  • 69. What Are the Risks? Habit 5: Poor Backup and Disaster Recovery
  • 70. Consider the “What if” Scenarios What would you do if you lost all of your data due to a virus, an accidental deletion, or a natural catastrophe? Habit 5: Poor Backup and Disaster Recovery
  • 71. Major Costs Habit 5: Poor Backup and Disaster Recovery
  • 72. How Do You Reduce the Risks? Habit 5: Poor Backup and Disaster Recovery
  • 73. Regularly Schedule Backups Any work you can’t easily replace should be backed up and stored off site or in the Cloud. Habit 5: Poor Backup and Disaster Recovery
  • 74. Create a Disaster Recovery Plan What will you need to do to get up and running if any of your “what if” scenarios come true? Habit 5: Poor Backup and Disaster Recovery
  • 75. Test Your Plans At least once a year restore a deleted file or a crashed server just to make sure you can do it. Habit 5: Poor Backup and Disaster Recovery
  • 76. Habit 6: A Lack of Adequate Network Security Haphazard IT infrastructure to protect from malicious attacks and unauthorized access.
  • 77. Why Do Nonprofits Do it? •  Shortsightedness. •  Lack of adequate IT support to lead effort. •  Too complicated. •  Assume that its not necessary…until it is. Habit 6: Lack of Adequate Network Security
  • 78. What Are the Risks? Habit 6: Lack of Adequate Network Security
  • 79. Unauthorized Access to Critical Information Your organization’s future is on the line. Habit 6: Lack of Adequate Network Security
  • 80. Disruption of Work An attack that halts work means: •  You can’t get anything done. •  The loss or corruption of data. Habit 6: Lack of Adequate Network Security
  • 81. Malicious Software It can not only infect a single machine— malicious code can spread throughout your network. Habit 6: Lack of Adequate Network Security
  • 82. How Do You Reduce the Risks? Habit 6: Lack of Adequate Network Security
  • 83. Firewall Protection Habit 6: Lack of Adequate Network Security
  • 84. Mandate Anti-Virus/Malware Software And remember to keep it updated. Habit 6: Lack of Adequate Network Security
  • 85. Multiple Layers of Protection Both at the server/ network level and workstations. Habit 6: Lack of Adequate Network Security
  • 86. Remove Former Employees from Network Make it part of your HR employee off- boarding process. Habit 6: Lack of Adequate Network Security
  • 87. Habit 7: Poor Software Management Proper lifecycle management, identification, and control of wanted versus unwanted applications.
  • 88. Why Do Nonprofits Do it? • Convenience. • Shortsightedness. • Lack of adequate IT support to lead effort. • Blind faith. Habit 7: Poor Software Management
  • 89. What Are the Risks? Habit 7: Poor Software Management
  • 90. Potentially Unwanted Applications (PUAs) They affect everyone’s productivity and are hard to get rid of. Habit 7: Poor Software Management
  • 91. Security Vulnerabilities Hackers keep up to date on security holes and are always looking for opportunities to exploit them. Habit 7: Poor Software Management
  • 92. Poor Hardware Performance Out-of-date software can slow down your computer. Habit 7: Poor Software Management
  • 93. How Do You Reduce the Risks? Habit 7: Poor Software Management
  • 94. Establish a Patch Management Policy A policy that governs how, when, and by what means software is updated helps everyone do their best. Habit 7: Poor Software Management
  • 95. Manage Software Installs Consider only allowing authorized IT support personnel to perform installs. Habit 7: Poor Software Management
  • 96. Perform Routine PC Tune-ups Your PC is like your attic—it collects a lot of junk over time. Habit 7: Poor Software Management
  • 97. Manage Software Installs Habit 7: Poor Software Management This includes network hardware and firmware updates!