Bridging the Technology gap	TechBridge, Incwww.techbridge.org
MissionOur mission is to help other nonprofits leverage technology to better serve the community. We help nonprofits to:Solve mission-critical initiatives
Improve communications with stakeholders
Increase operating efficienciesSource: Techbridge
Why have a Technology Plan?A Technology Plan is a strategy document that helps you think through what your IT needs are and how they can be achieved with the resources that you have.Source: Techbridge
Why have a technology plan?A well thought out plan can help you:Increase efficiency in your daily operationsManage your budget and spend money more effectivelyBuild an online community and boost fundraising effortsGive donors more confidence in your organization and provide an element of sustainability.Avoid crisis by reducing the chance of lost data and capabilitiesProtect your organization from outside threatsSource: Techbridge
Getting Started	Technology planning is a process (7 things you need to know)Establish leadership and support for your technology plan.Assess your current resources – www.techatlas.orgDefine your needsExplore solutions- here’s where you may need a technical consultant.Put your plan in writingDevelop a funding strategy - 70/30 rule: for every dollar budgeted for technology, 30 cents goes towards hardware and software purchases and the remaining 70 cents for training and support.Implement a plan and timeline Source: Techbridge
Basic Components of a Technology planInclude a summary of the current state of your technology then provide an overview of how technology will further your organization’s mission. The body of the plan should include descriptions of the technology projects you plan to undertake. Source: Techbridge
Basic Components of a technology planEach project should contain the following information:DescriptionBenefits – useful in raising fundsTasks – helps with a timelineCost Budget – is it practical?Timeline – phases and deadlinesSource: Techbridge
Technology focusIT Support – who will support the new technology?Workstations/Servers/Printers (hardware) - inventoryNetwork Infrastructure – See example below: areasIT Support- who will support the new technologies and respond to problems?
Workstations/Servers/Printers (hardware)- take inventory
Network Infrastructure diagram -  see below:Source: Techbridge
Focus areasInternet Connectivity- How fast is your connection? There are several free tools you can use!  http://www.speakeasy.net/speedtest/Remote Access- Can your employees access files while at home or on the road?Email – Do you have the ability to share calendars?Backup/Disaster Recovery – what happens if your server fails? How quickly can you recover your data?Intranet – How do your employees share information and collaborate?Applications/Software – Does it meet your needs?Source: Techbridge
Virus ProtectionConsider a corporate Anti-Virus solution thatCentrally manages corporate network devices: Servers, desktops, laptops, and mobile devices are all susceptible to attackDetects virus, trojans, malware, and spyware: replicate & spread, unauthorized access, information gatheringAutomates scanning and removal processes:  scheduled scans, automated detection and removal without user interactionCombines hardware and software solutions:  Website Filters, E-mail SPAM and Virus Prevention, network firewallsSource: TechBridge
Some Security issues for 2010Anti Virus is NOT enough – Companies such as Norton Anti-virus are using technologies that evaluate the reputations of the files and applications running on your PC. Social Engineering - is the act of manipulating people into performing actions or divulging confidential information, rather than by breaking in or using technical hacking techniques. Attackers are going directly after the end user by tricking them into downloading malware or divulging sensitive information. I.e.: Rogue security software vendors. Social Networking Sites – Adjust Facebook privacy settings to help protect your identityRead the Facebook Guide to PrivacyThink carefully about who you allow to become your friendShow "limited friends" a cut-down version of your profileDisable options, then open them one by one as it makes sense.Social networking third-party apps.Windows 7 will come in the crosshairs of attackers – Be sure your organization keeps security patches up to date with ANY new Operating System. URL-shortening services – be mindful of the source when you click on shortened links via Twitter.Source: www.internetnews.com/www.sophos.com
Secure your wireless connectionUse encryptionUse a passwordDon’t broadcast the name of your networkUse MAC address filtering- this forces the network to reject any device it does not recognize.Make sure your computers are properly secured  with anti-virus, security patches and a firewall to protect your org from malware-based connections. Source: www.sophos.com

Aging Services Expo Presentation

  • 1.
    Bridging the Technology gap TechBridge, Incwww.techbridge.org
  • 2.
    MissionOur mission isto help other nonprofits leverage technology to better serve the community. We help nonprofits to:Solve mission-critical initiatives
  • 3.
  • 4.
  • 5.
    Why have aTechnology Plan?A Technology Plan is a strategy document that helps you think through what your IT needs are and how they can be achieved with the resources that you have.Source: Techbridge
  • 6.
    Why have atechnology plan?A well thought out plan can help you:Increase efficiency in your daily operationsManage your budget and spend money more effectivelyBuild an online community and boost fundraising effortsGive donors more confidence in your organization and provide an element of sustainability.Avoid crisis by reducing the chance of lost data and capabilitiesProtect your organization from outside threatsSource: Techbridge
  • 7.
    Getting Started Technology planningis a process (7 things you need to know)Establish leadership and support for your technology plan.Assess your current resources – www.techatlas.orgDefine your needsExplore solutions- here’s where you may need a technical consultant.Put your plan in writingDevelop a funding strategy - 70/30 rule: for every dollar budgeted for technology, 30 cents goes towards hardware and software purchases and the remaining 70 cents for training and support.Implement a plan and timeline Source: Techbridge
  • 8.
    Basic Components ofa Technology planInclude a summary of the current state of your technology then provide an overview of how technology will further your organization’s mission. The body of the plan should include descriptions of the technology projects you plan to undertake. Source: Techbridge
  • 9.
    Basic Components ofa technology planEach project should contain the following information:DescriptionBenefits – useful in raising fundsTasks – helps with a timelineCost Budget – is it practical?Timeline – phases and deadlinesSource: Techbridge
  • 10.
    Technology focusIT Support– who will support the new technology?Workstations/Servers/Printers (hardware) - inventoryNetwork Infrastructure – See example below: areasIT Support- who will support the new technologies and respond to problems?
  • 11.
  • 12.
    Network Infrastructure diagram- see below:Source: Techbridge
  • 13.
    Focus areasInternet Connectivity-How fast is your connection? There are several free tools you can use! http://www.speakeasy.net/speedtest/Remote Access- Can your employees access files while at home or on the road?Email – Do you have the ability to share calendars?Backup/Disaster Recovery – what happens if your server fails? How quickly can you recover your data?Intranet – How do your employees share information and collaborate?Applications/Software – Does it meet your needs?Source: Techbridge
  • 14.
    Virus ProtectionConsider acorporate Anti-Virus solution thatCentrally manages corporate network devices: Servers, desktops, laptops, and mobile devices are all susceptible to attackDetects virus, trojans, malware, and spyware: replicate & spread, unauthorized access, information gatheringAutomates scanning and removal processes: scheduled scans, automated detection and removal without user interactionCombines hardware and software solutions: Website Filters, E-mail SPAM and Virus Prevention, network firewallsSource: TechBridge
  • 15.
    Some Security issuesfor 2010Anti Virus is NOT enough – Companies such as Norton Anti-virus are using technologies that evaluate the reputations of the files and applications running on your PC. Social Engineering - is the act of manipulating people into performing actions or divulging confidential information, rather than by breaking in or using technical hacking techniques. Attackers are going directly after the end user by tricking them into downloading malware or divulging sensitive information. I.e.: Rogue security software vendors. Social Networking Sites – Adjust Facebook privacy settings to help protect your identityRead the Facebook Guide to PrivacyThink carefully about who you allow to become your friendShow "limited friends" a cut-down version of your profileDisable options, then open them one by one as it makes sense.Social networking third-party apps.Windows 7 will come in the crosshairs of attackers – Be sure your organization keeps security patches up to date with ANY new Operating System. URL-shortening services – be mindful of the source when you click on shortened links via Twitter.Source: www.internetnews.com/www.sophos.com
  • 16.
    Secure your wirelessconnectionUse encryptionUse a passwordDon’t broadcast the name of your networkUse MAC address filtering- this forces the network to reject any device it does not recognize.Make sure your computers are properly secured with anti-virus, security patches and a firewall to protect your org from malware-based connections. Source: www.sophos.com