SlideShare a Scribd company logo
      Bridging the Technology gap	 TechBridge, Inc www.techbridge.org
Mission Our mission is to help other nonprofits leverage technology to better serve the community. We help nonprofits to: ,[object Object]
Improve communications with stakeholders
Increase operating efficienciesSource: Techbridge
Why have a Technology Plan? A Technology Plan is a strategy document that helps you think through what your IT needs are and how they can be achieved with the resources that you have. Source: Techbridge
Why have a technology plan? A well thought out plan can help you: Increase efficiency in your daily operations Manage your budget and spend money more effectively Build an online community and boost fundraising efforts Give donors more confidence in your organization and provide an element of sustainability. Avoid crisis by reducing the chance of lost data and capabilities Protect your organization from outside threats Source: Techbridge
Getting Started	 Technology planning is a process  (7 things you need to know) Establish leadership and support for your technology plan. Assess your current resources – www.techatlas.org Define your needs Explore solutions- here’s where you may need a technical consultant. Put your plan in writing Develop a funding strategy - 70/30 rule: for every dollar budgeted for technology, 30 cents goes towards hardware and software purchases and the remaining 70 cents for training and support. Implement a plan and timeline  Source: Techbridge
Basic Components of a Technology plan Include a summary of the current state of your technology then provide an overview of how technology will further your organization’s mission.  The body of the plan should include descriptions of the technology projects you plan to undertake.  Source: Techbridge
Basic Components of a technology plan Each project should contain the following information: Description Benefits – useful in raising funds Tasks – helps with a timeline Cost  Budget – is it practical? Timeline – phases and deadlines Source: Techbridge
Technology focusIT Support – who will support the new technology?Workstations/Servers/Printers (hardware) - inventoryNetwork Infrastructure – See example below: areas ,[object Object]
Workstations/Servers/Printers (hardware)- take inventory
Network Infrastructure diagram -  see below:Source: Techbridge
Focus areas Internet Connectivity- How fast is your connection? There are several free tools you can use!  http://www.speakeasy.net/speedtest/ Remote Access- Can your employees access files while at home or on the road? Email – Do you have the ability to share calendars? Backup/Disaster Recovery – what happens if your server fails? How quickly can you recover your data? Intranet – How do your employees share information and collaborate? Applications/Software – Does it meet your needs? Source: Techbridge
Virus Protection Consider a corporate Anti-Virus solution that Centrally manages corporate network devices: Servers, desktops, laptops, and mobile devices are all susceptible to attack Detects virus, trojans, malware, and spyware: replicate & spread, unauthorized access, information gathering Automates scanning and removal processes:  scheduled scans, automated detection and removal without user interaction Combines hardware and software solutions:  Website Filters, E-mail SPAM and Virus Prevention, network firewalls Source: TechBridge
Some Security issues for 2010 Anti Virus is NOT enough – Companies such as Norton Anti-virus are using technologies that evaluate the reputations of the files and applications running on your PC.  Social Engineering - is the act of manipulating people into performing actions or divulging confidential information, rather than by breaking in or using technical hacking techniques. Attackers are going directly after the end user by tricking them into downloading malware or divulging sensitive information. I.e.: Rogue security software vendors.  Social Networking Sites –  Adjust Facebook privacy settings to help protect your identity Read the Facebook Guide to Privacy Think carefully about who you allow to become your friend Show "limited friends" a cut-down version of your profile Disable options, then open them one by one as it makes sense. Social networking third-party apps. Windows 7 will come in the crosshairs of attackers – Be sure your organization keeps security patches up to date with ANY new Operating System.  URL-shortening services – be mindful of the source when you click on shortened links via Twitter. Source: www.internetnews.com/www.sophos.com
Secure your wireless connection Use encryption Use a password Don’t broadcast the name of your network Use MAC address filtering- this forces the network to reject any device it does not recognize. Make sure your computers are properly secured  with anti-virus, security patches and a firewall to protect your org from malware-based connections.  Source: www.sophos.com

More Related Content

What's hot

PACE-IT: Physical Network Security Control
PACE-IT: Physical Network Security ControlPACE-IT: Physical Network Security Control
PACE-IT: Physical Network Security Control
Pace IT at Edmonds Community College
 
PACE-IT, Security+2.6: Security Related Awareness and Training
PACE-IT, Security+2.6: Security Related Awareness and TrainingPACE-IT, Security+2.6: Security Related Awareness and Training
PACE-IT, Security+2.6: Security Related Awareness and Training
Pace IT at Edmonds Community College
 
PACE-IT, Security+1.1: Introduction to Network Devices (part 2)
PACE-IT, Security+1.1: Introduction to Network Devices (part 2)PACE-IT, Security+1.1: Introduction to Network Devices (part 2)
PACE-IT, Security+1.1: Introduction to Network Devices (part 2)
Pace IT at Edmonds Community College
 
PACE-IT, Security+1.2: Secure Network Administration Concepts
PACE-IT, Security+1.2: Secure Network Administration ConceptsPACE-IT, Security+1.2: Secure Network Administration Concepts
PACE-IT, Security+1.2: Secure Network Administration Concepts
Pace IT at Edmonds Community College
 
PACE-IT, Security+3.4: Summary of Wireless Attacks
PACE-IT, Security+3.4: Summary of Wireless AttacksPACE-IT, Security+3.4: Summary of Wireless Attacks
PACE-IT, Security+3.4: Summary of Wireless Attacks
Pace IT at Edmonds Community College
 
SC Magazine eSymposium: SIEM
SC Magazine eSymposium: SIEMSC Magazine eSymposium: SIEM
SC Magazine eSymposium: SIEM
Emulex Corporation
 
Data Leakage Prevention
Data Leakage Prevention Data Leakage Prevention
Data Leakage Prevention
Dhananjay Aloorkar
 
Information Security Awareness And Training Business Case For Web Based Solut...
Information Security Awareness And Training Business Case For Web Based Solut...Information Security Awareness And Training Business Case For Web Based Solut...
Information Security Awareness And Training Business Case For Web Based Solut...
Michael Kaishar, MSIA | CISSP
 
PACE-IT: Common Network Vulnerabilities
PACE-IT: Common Network VulnerabilitiesPACE-IT: Common Network Vulnerabilities
PACE-IT: Common Network Vulnerabilities
Pace IT at Edmonds Community College
 
University of maryland infa 620 homework help
University of maryland infa 620 homework helpUniversity of maryland infa 620 homework help
University of maryland infa 620 homework help
Olivia Fournier
 
02 學校網絡安全漏洞的評估分享, 管理挑戰及趨勢。
02 學校網絡安全漏洞的評估分享, 管理挑戰及趨勢。02 學校網絡安全漏洞的評估分享, 管理挑戰及趨勢。
02 學校網絡安全漏洞的評估分享, 管理挑戰及趨勢。
eLearning Consortium 電子學習聯盟
 
08 Transform Endpoint Security with the World’s Most Secure PCs and Printers
08 Transform Endpoint Security with the World’s Most Secure PCs and Printers08 Transform Endpoint Security with the World’s Most Secure PCs and Printers
08 Transform Endpoint Security with the World’s Most Secure PCs and Printers
eLearning Consortium 電子學習聯盟
 
PACE-IT: Network Hardening Techniques (part 1)
PACE-IT: Network Hardening Techniques (part 1)PACE-IT: Network Hardening Techniques (part 1)
PACE-IT: Network Hardening Techniques (part 1)
Pace IT at Edmonds Community College
 
Best Practices for Security Awareness and Training
Best Practices for Security Awareness and TrainingBest Practices for Security Awareness and Training
Best Practices for Security Awareness and Training
Kimberly Hood
 
Comprehensive Data Leak Prevention
Comprehensive Data Leak PreventionComprehensive Data Leak Prevention
Comprehensive Data Leak Prevention
Tanvir Hashmi
 
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
Pace IT at Edmonds Community College
 
Assessing Your security
Assessing Your securityAssessing Your security
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
Pace IT at Edmonds Community College
 
Legal Aid Tech Baseline 2016
Legal Aid Tech Baseline 2016 Legal Aid Tech Baseline 2016
IT & Network Security Awareness
IT & Network Security AwarenessIT & Network Security Awareness
IT & Network Security Awareness
The Network Support Company
 

What's hot (20)

PACE-IT: Physical Network Security Control
PACE-IT: Physical Network Security ControlPACE-IT: Physical Network Security Control
PACE-IT: Physical Network Security Control
 
PACE-IT, Security+2.6: Security Related Awareness and Training
PACE-IT, Security+2.6: Security Related Awareness and TrainingPACE-IT, Security+2.6: Security Related Awareness and Training
PACE-IT, Security+2.6: Security Related Awareness and Training
 
PACE-IT, Security+1.1: Introduction to Network Devices (part 2)
PACE-IT, Security+1.1: Introduction to Network Devices (part 2)PACE-IT, Security+1.1: Introduction to Network Devices (part 2)
PACE-IT, Security+1.1: Introduction to Network Devices (part 2)
 
PACE-IT, Security+1.2: Secure Network Administration Concepts
PACE-IT, Security+1.2: Secure Network Administration ConceptsPACE-IT, Security+1.2: Secure Network Administration Concepts
PACE-IT, Security+1.2: Secure Network Administration Concepts
 
PACE-IT, Security+3.4: Summary of Wireless Attacks
PACE-IT, Security+3.4: Summary of Wireless AttacksPACE-IT, Security+3.4: Summary of Wireless Attacks
PACE-IT, Security+3.4: Summary of Wireless Attacks
 
SC Magazine eSymposium: SIEM
SC Magazine eSymposium: SIEMSC Magazine eSymposium: SIEM
SC Magazine eSymposium: SIEM
 
Data Leakage Prevention
Data Leakage Prevention Data Leakage Prevention
Data Leakage Prevention
 
Information Security Awareness And Training Business Case For Web Based Solut...
Information Security Awareness And Training Business Case For Web Based Solut...Information Security Awareness And Training Business Case For Web Based Solut...
Information Security Awareness And Training Business Case For Web Based Solut...
 
PACE-IT: Common Network Vulnerabilities
PACE-IT: Common Network VulnerabilitiesPACE-IT: Common Network Vulnerabilities
PACE-IT: Common Network Vulnerabilities
 
University of maryland infa 620 homework help
University of maryland infa 620 homework helpUniversity of maryland infa 620 homework help
University of maryland infa 620 homework help
 
02 學校網絡安全漏洞的評估分享, 管理挑戰及趨勢。
02 學校網絡安全漏洞的評估分享, 管理挑戰及趨勢。02 學校網絡安全漏洞的評估分享, 管理挑戰及趨勢。
02 學校網絡安全漏洞的評估分享, 管理挑戰及趨勢。
 
08 Transform Endpoint Security with the World’s Most Secure PCs and Printers
08 Transform Endpoint Security with the World’s Most Secure PCs and Printers08 Transform Endpoint Security with the World’s Most Secure PCs and Printers
08 Transform Endpoint Security with the World’s Most Secure PCs and Printers
 
PACE-IT: Network Hardening Techniques (part 1)
PACE-IT: Network Hardening Techniques (part 1)PACE-IT: Network Hardening Techniques (part 1)
PACE-IT: Network Hardening Techniques (part 1)
 
Best Practices for Security Awareness and Training
Best Practices for Security Awareness and TrainingBest Practices for Security Awareness and Training
Best Practices for Security Awareness and Training
 
Comprehensive Data Leak Prevention
Comprehensive Data Leak PreventionComprehensive Data Leak Prevention
Comprehensive Data Leak Prevention
 
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
 
Assessing Your security
Assessing Your securityAssessing Your security
Assessing Your security
 
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
 
Legal Aid Tech Baseline 2016
Legal Aid Tech Baseline 2016 Legal Aid Tech Baseline 2016
Legal Aid Tech Baseline 2016
 
IT & Network Security Awareness
IT & Network Security AwarenessIT & Network Security Awareness
IT & Network Security Awareness
 

Viewers also liked

Business Opportunity
Business OpportunityBusiness Opportunity
Business Opportunity
Tom Shelton
 
Shultz Sedaag 2008
Shultz Sedaag 2008Shultz Sedaag 2008
Shultz Sedaag 2008
Ben Shultz
 
SDA Presentation, October 2008
SDA Presentation, October 2008SDA Presentation, October 2008
SDA Presentation, October 2008
Ben Shultz
 
National Casa Presentation
National Casa  PresentationNational Casa  Presentation
National Casa Presentation
Mary Derrick Cook
 
Shultz AAG 2008
Shultz AAG 2008Shultz AAG 2008
Shultz AAG 2008
Ben Shultz
 
Presentation Microsoft Training
Presentation Microsoft TrainingPresentation Microsoft Training
Presentation Microsoft Training
Mary Derrick Cook
 
TechBridge Services 2009
TechBridge Services 2009TechBridge Services 2009
TechBridge Services 2009
Mary Derrick Cook
 

Viewers also liked (7)

Business Opportunity
Business OpportunityBusiness Opportunity
Business Opportunity
 
Shultz Sedaag 2008
Shultz Sedaag 2008Shultz Sedaag 2008
Shultz Sedaag 2008
 
SDA Presentation, October 2008
SDA Presentation, October 2008SDA Presentation, October 2008
SDA Presentation, October 2008
 
National Casa Presentation
National Casa  PresentationNational Casa  Presentation
National Casa Presentation
 
Shultz AAG 2008
Shultz AAG 2008Shultz AAG 2008
Shultz AAG 2008
 
Presentation Microsoft Training
Presentation Microsoft TrainingPresentation Microsoft Training
Presentation Microsoft Training
 
TechBridge Services 2009
TechBridge Services 2009TechBridge Services 2009
TechBridge Services 2009
 

Similar to Aging Services Expo Presentation

Art of Technology: Core Technical Services
Art of Technology: Core Technical ServicesArt of Technology: Core Technical Services
Art of Technology: Core Technical Services
Holly Ross
 
Intranet Design: Step by Step Design Guide
Intranet Design: Step by Step Design GuideIntranet Design: Step by Step Design Guide
Intranet Design: Step by Step Design Guide
My Hub Intranet Solutions
 
nonprof2007.ppt
nonprof2007.pptnonprof2007.ppt
nonprof2007.ppt
webhostingguy
 
Help! I'm an accidental techie
Help! I'm an accidental techieHelp! I'm an accidental techie
Help! I'm an accidental techie
Miles Maier
 
Intranet Software
Intranet SoftwareIntranet Software
Intranet Software
My Hub Intranet Solutions
 
PurposeThis course project is intended to assess your abilit
PurposeThis course project is intended to assess your abilitPurposeThis course project is intended to assess your abilit
PurposeThis course project is intended to assess your abilit
TakishaPeck109
 
Security Development Life Cycle
Security Development Life CycleSecurity Development Life Cycle
I need 10 pages of report and 10 slides PurposeThis course p
I need 10 pages of report and 10 slides PurposeThis course pI need 10 pages of report and 10 slides PurposeThis course p
I need 10 pages of report and 10 slides PurposeThis course p
doylymaura
 
For Accidental Techies Sw
For Accidental Techies SwFor Accidental Techies Sw
For Accidental Techies Sw
Lasa UK
 
IT 700 Final Project Guidelines and RubricOverviewAs the fin.docx
IT 700 Final Project Guidelines and RubricOverviewAs the fin.docxIT 700 Final Project Guidelines and RubricOverviewAs the fin.docx
IT 700 Final Project Guidelines and RubricOverviewAs the fin.docx
ADDY50
 
According To The Author Of “Build A Streamlined Refinery”,
According To The Author Of “Build A Streamlined Refinery”,According To The Author Of “Build A Streamlined Refinery”,
According To The Author Of “Build A Streamlined Refinery”,
Jill Lyons
 
CSE18R264 - Unit 1.pptx
CSE18R264 - Unit 1.pptxCSE18R264 - Unit 1.pptx
CSE18R264 - Unit 1.pptx
YouTube299255
 
Project 6 - Cloud Computing Security PolicyThis week you will pr.docx
Project 6 - Cloud Computing Security PolicyThis week you will pr.docxProject 6 - Cloud Computing Security PolicyThis week you will pr.docx
Project 6 - Cloud Computing Security PolicyThis week you will pr.docx
anitramcroberts
 
INTERNAL Assign no 207( JAIPUR NATIONAL UNI)
INTERNAL Assign no   207( JAIPUR NATIONAL UNI)INTERNAL Assign no   207( JAIPUR NATIONAL UNI)
INTERNAL Assign no 207( JAIPUR NATIONAL UNI)
Partha_bappa
 
Streaming Processes: Creating a Start-up Within a Big Corporate (Mohammad Sha...
Streaming Processes: Creating a Start-up Within a Big Corporate (Mohammad Sha...Streaming Processes: Creating a Start-up Within a Big Corporate (Mohammad Sha...
Streaming Processes: Creating a Start-up Within a Big Corporate (Mohammad Sha...
Executive Leaders Network
 
the world of technology is changing at an unprecedented pace, and th.docx
the world of technology is changing at an unprecedented pace, and th.docxthe world of technology is changing at an unprecedented pace, and th.docx
the world of technology is changing at an unprecedented pace, and th.docx
pelise1
 
Topic 4 - impact of Information Technology.pptx.pdf
Topic 4 - impact of Information Technology.pptx.pdfTopic 4 - impact of Information Technology.pptx.pdf
Topic 4 - impact of Information Technology.pptx.pdf
lundamiko
 
Maximizing Potential - Hiring and Managing Dedicated Software Developers.pdf
Maximizing Potential - Hiring and Managing Dedicated Software Developers.pdfMaximizing Potential - Hiring and Managing Dedicated Software Developers.pdf
Maximizing Potential - Hiring and Managing Dedicated Software Developers.pdf
JamesEddie2
 
Swe notes
Swe notesSwe notes
Swe notes
Mohammed Romi
 
Asset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt LabsAsset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt Labs
RedhuntLabs2
 

Similar to Aging Services Expo Presentation (20)

Art of Technology: Core Technical Services
Art of Technology: Core Technical ServicesArt of Technology: Core Technical Services
Art of Technology: Core Technical Services
 
Intranet Design: Step by Step Design Guide
Intranet Design: Step by Step Design GuideIntranet Design: Step by Step Design Guide
Intranet Design: Step by Step Design Guide
 
nonprof2007.ppt
nonprof2007.pptnonprof2007.ppt
nonprof2007.ppt
 
Help! I'm an accidental techie
Help! I'm an accidental techieHelp! I'm an accidental techie
Help! I'm an accidental techie
 
Intranet Software
Intranet SoftwareIntranet Software
Intranet Software
 
PurposeThis course project is intended to assess your abilit
PurposeThis course project is intended to assess your abilitPurposeThis course project is intended to assess your abilit
PurposeThis course project is intended to assess your abilit
 
Security Development Life Cycle
Security Development Life CycleSecurity Development Life Cycle
Security Development Life Cycle
 
I need 10 pages of report and 10 slides PurposeThis course p
I need 10 pages of report and 10 slides PurposeThis course pI need 10 pages of report and 10 slides PurposeThis course p
I need 10 pages of report and 10 slides PurposeThis course p
 
For Accidental Techies Sw
For Accidental Techies SwFor Accidental Techies Sw
For Accidental Techies Sw
 
IT 700 Final Project Guidelines and RubricOverviewAs the fin.docx
IT 700 Final Project Guidelines and RubricOverviewAs the fin.docxIT 700 Final Project Guidelines and RubricOverviewAs the fin.docx
IT 700 Final Project Guidelines and RubricOverviewAs the fin.docx
 
According To The Author Of “Build A Streamlined Refinery”,
According To The Author Of “Build A Streamlined Refinery”,According To The Author Of “Build A Streamlined Refinery”,
According To The Author Of “Build A Streamlined Refinery”,
 
CSE18R264 - Unit 1.pptx
CSE18R264 - Unit 1.pptxCSE18R264 - Unit 1.pptx
CSE18R264 - Unit 1.pptx
 
Project 6 - Cloud Computing Security PolicyThis week you will pr.docx
Project 6 - Cloud Computing Security PolicyThis week you will pr.docxProject 6 - Cloud Computing Security PolicyThis week you will pr.docx
Project 6 - Cloud Computing Security PolicyThis week you will pr.docx
 
INTERNAL Assign no 207( JAIPUR NATIONAL UNI)
INTERNAL Assign no   207( JAIPUR NATIONAL UNI)INTERNAL Assign no   207( JAIPUR NATIONAL UNI)
INTERNAL Assign no 207( JAIPUR NATIONAL UNI)
 
Streaming Processes: Creating a Start-up Within a Big Corporate (Mohammad Sha...
Streaming Processes: Creating a Start-up Within a Big Corporate (Mohammad Sha...Streaming Processes: Creating a Start-up Within a Big Corporate (Mohammad Sha...
Streaming Processes: Creating a Start-up Within a Big Corporate (Mohammad Sha...
 
the world of technology is changing at an unprecedented pace, and th.docx
the world of technology is changing at an unprecedented pace, and th.docxthe world of technology is changing at an unprecedented pace, and th.docx
the world of technology is changing at an unprecedented pace, and th.docx
 
Topic 4 - impact of Information Technology.pptx.pdf
Topic 4 - impact of Information Technology.pptx.pdfTopic 4 - impact of Information Technology.pptx.pdf
Topic 4 - impact of Information Technology.pptx.pdf
 
Maximizing Potential - Hiring and Managing Dedicated Software Developers.pdf
Maximizing Potential - Hiring and Managing Dedicated Software Developers.pdfMaximizing Potential - Hiring and Managing Dedicated Software Developers.pdf
Maximizing Potential - Hiring and Managing Dedicated Software Developers.pdf
 
Swe notes
Swe notesSwe notes
Swe notes
 
Asset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt LabsAsset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt Labs
 

Aging Services Expo Presentation

  • 1. Bridging the Technology gap TechBridge, Inc www.techbridge.org
  • 2.
  • 5. Why have a Technology Plan? A Technology Plan is a strategy document that helps you think through what your IT needs are and how they can be achieved with the resources that you have. Source: Techbridge
  • 6. Why have a technology plan? A well thought out plan can help you: Increase efficiency in your daily operations Manage your budget and spend money more effectively Build an online community and boost fundraising efforts Give donors more confidence in your organization and provide an element of sustainability. Avoid crisis by reducing the chance of lost data and capabilities Protect your organization from outside threats Source: Techbridge
  • 7. Getting Started Technology planning is a process (7 things you need to know) Establish leadership and support for your technology plan. Assess your current resources – www.techatlas.org Define your needs Explore solutions- here’s where you may need a technical consultant. Put your plan in writing Develop a funding strategy - 70/30 rule: for every dollar budgeted for technology, 30 cents goes towards hardware and software purchases and the remaining 70 cents for training and support. Implement a plan and timeline Source: Techbridge
  • 8. Basic Components of a Technology plan Include a summary of the current state of your technology then provide an overview of how technology will further your organization’s mission. The body of the plan should include descriptions of the technology projects you plan to undertake. Source: Techbridge
  • 9. Basic Components of a technology plan Each project should contain the following information: Description Benefits – useful in raising funds Tasks – helps with a timeline Cost Budget – is it practical? Timeline – phases and deadlines Source: Techbridge
  • 10.
  • 12. Network Infrastructure diagram - see below:Source: Techbridge
  • 13. Focus areas Internet Connectivity- How fast is your connection? There are several free tools you can use! http://www.speakeasy.net/speedtest/ Remote Access- Can your employees access files while at home or on the road? Email – Do you have the ability to share calendars? Backup/Disaster Recovery – what happens if your server fails? How quickly can you recover your data? Intranet – How do your employees share information and collaborate? Applications/Software – Does it meet your needs? Source: Techbridge
  • 14. Virus Protection Consider a corporate Anti-Virus solution that Centrally manages corporate network devices: Servers, desktops, laptops, and mobile devices are all susceptible to attack Detects virus, trojans, malware, and spyware: replicate & spread, unauthorized access, information gathering Automates scanning and removal processes: scheduled scans, automated detection and removal without user interaction Combines hardware and software solutions: Website Filters, E-mail SPAM and Virus Prevention, network firewalls Source: TechBridge
  • 15. Some Security issues for 2010 Anti Virus is NOT enough – Companies such as Norton Anti-virus are using technologies that evaluate the reputations of the files and applications running on your PC. Social Engineering - is the act of manipulating people into performing actions or divulging confidential information, rather than by breaking in or using technical hacking techniques. Attackers are going directly after the end user by tricking them into downloading malware or divulging sensitive information. I.e.: Rogue security software vendors. Social Networking Sites – Adjust Facebook privacy settings to help protect your identity Read the Facebook Guide to Privacy Think carefully about who you allow to become your friend Show "limited friends" a cut-down version of your profile Disable options, then open them one by one as it makes sense. Social networking third-party apps. Windows 7 will come in the crosshairs of attackers – Be sure your organization keeps security patches up to date with ANY new Operating System. URL-shortening services – be mindful of the source when you click on shortened links via Twitter. Source: www.internetnews.com/www.sophos.com
  • 16. Secure your wireless connection Use encryption Use a password Don’t broadcast the name of your network Use MAC address filtering- this forces the network to reject any device it does not recognize. Make sure your computers are properly secured with anti-virus, security patches and a firewall to protect your org from malware-based connections. Source: www.sophos.com
  • 17. Anti-virus policy Introduce an anti-virus policy Produce a policy for safe computing and distribute it to all staff. Make sure every employee has read and understood the policy, and that they know who to speak to, if they have any questions. Such a policy could include: A ban on downloading executables and documents directly from the internet. A ban on running unsolicited executables/documents/spreadsheets within the organization. A ban on playing computer games or using screensavers which did not come with the operating system. An IT checking and approval system for executables that arrive via email from the outside world. Locking down workstation to prevent users from downloading programs. Source: www.sophos.com
  • 18. IT Project Implementation Designate a point person Break projects into tasks Assign responsibilities Establish a timeline – set milestones Evaluate your success – On time? On budget? Meet your needs? Is it being used? Update your technology plan- should be a living breathing document Source: TechBridge
  • 19. Things to consider Training – Technology that is implemented and not used is useless! How will you care for your new technology? Who will do regular maintenance to prevent problems? Consider 3rd party support. Sometimes going the cheapest route doesn’t yield good short-term results. Source:
  • 20. Resources Techsoup- donated and discounted hardware and software. www.techsoup.org Sophos - www.sophos.com – Download the 2010 security report. Tech Atlas- FREE online Tech Assessment and planning tool www.techatlas.org Find Tech Grants- www.techfoundation.org FREE Online Training for Microsoft Office 03/07- http://office.microsoft.com/en-us/training/ Source: TechBridge