SlideShare a Scribd company logo
1 of 36
Download to read offline
BYOD for Nonprofits
June 20, 2013
Community IT Innovators Webinar Series
presented by…
Johan Hammerstrom
Webinar Tips
• Ask questions
Post questions via chat
• Interact
Respond to polls during webinar
• Focus
Avoid multitasking. You may just miss the best part of the presentation
• Webinar Powerpoint & Recording
Powerpoint and recording links will be shared after the webinar
About Community IT
Community IT Innovators partners with nonprofits to help them solve their
strategic & day-to-day IT challenges.
Strategic
Proactive approach so you can make IT decisions that support your
mission and grow with you
Collaborative
Team of over 40 staff who empower you to make informed IT choices
Invested
We are committed to supporting your mission, and take care of your IT
network as if it were our own
Nonprofit focus
Worked with over 900 nonprofits since 1993
about the presenter
Johan Hammerstrom
Chief Operating Officer
jhammerstrom@communityit.com
@hammerstromj
Agenda
I. BYOD…a brief history
II. Best Practices
III. BYOD Risk Management
IV. BYOD Policy Guidelines
Brief History
Computers used to be big
…and expensive
But then they got smaller
and friendlier…
ubiquitous
and personal.
Consumerization
Best Practices
Best Practices
Best Practices
1. Goal: 90% of 150,000
workforce
2. Custom Authentication
System
3. Reason: Avoid locked-in
corporate environment
Aggressive BYOD
1. 20% use their own device
2. Increasing restrictions on
personal device use
3. Reason: Security concerns
4. Dropsmack!
Conservative BYOD
Risk
Benefits of BYOD
1. Reduce hardware & support costs
2. Work flexibility
3. Employee availability
4. User adoption and satisfaction
Risks of BYOD
1. Information Security
2. Legal
3. Financial
Risks of BYOD
(b)
Personal
(a)
Org
1. Information Security Risks
a) Organization
– Data leakage
– Vector into the company
b) Personal
– Onerous security measures
– Loss of full control of device
2. Legal Risks
a) Organization
– Lack of certainty in case law and legislation
b) Personal
– Personal device could be confiscated
– Personal blurs into the corporate
3. Financial Risks
a) Organization
– Stipends can be more expensive than a single
corporate plan
– IT Support can become entangled
– Mobile Device Management (MDM) can be expensive
b) Personal
– Stipend may not cover full cost…or any at all
– Can be responsible for own support
Risks
• Security
• Legal
• Financial
Benefits
• Cost
• Flexibility
• Adoption
Risk/Benefit Analysis
One Size Fits All?
• Sales
• Accounting
• Executive
Guidelines
1) Identify Benefits
a) Prioritize for your Organization
b) Establish your strategy
2) Identify Risks
a) Risk = Impact * Likelihood
3) Consider a few solutions
4) Summarize in 1-page policy
Program Staff Development Executive
Benefits
Reduce costs 1
Work Flexibility 1 1
Availability 1 1
User adoption 1
Risks
Info Security 2 1 1
Legal 3 3 1
Financial 1 1 3
Policy
provide small stipend
& limited access to
information
provide limited
access to
information from
home
org provided
device, fully
managed access
to info
Generic
1) BYOD by staff role
a) Exec staff, accessible 24x7 stipend of $80/mo
b) Senior staff, accessible 10x7 stipend of $50/mo
c) Line staff, accessible 10x5 stipend of $30/mo
2) Requirement of PIN code on device
3) Acceptable Use policy
4) IT Support policy
the Future
mobile first
authentication
Check out…
www.mobilecitizen.org
Upcoming Webinar
July 25
IT Security Best Practices
Presenter
Steve Longenecker
Mark Kraemer
Next Steps
• Connect with us
• Provide feedback
Short survey after you exit the webinar. Be sure to
include any questions that were not answered.
• Missed anything?
Link to slides & recording will be emailed to you.

More Related Content

Viewers also liked

021013 adecco email (italian)
021013   adecco email (italian)021013   adecco email (italian)
021013 adecco email (italian)VogelDenise
 
021013 adecco email (kannada)
021013   adecco email (kannada)021013   adecco email (kannada)
021013 adecco email (kannada)VogelDenise
 
021013 adecco email (macedonian)
021013   adecco email (macedonian)021013   adecco email (macedonian)
021013 adecco email (macedonian)VogelDenise
 
021013 adecco email (urdu)
021013   adecco email (urdu)021013   adecco email (urdu)
021013 adecco email (urdu)VogelDenise
 
Patrizia Pepe: Perchè Mobile?
Patrizia Pepe: Perchè Mobile? Patrizia Pepe: Perchè Mobile?
Patrizia Pepe: Perchè Mobile? Network Lab
 
Fastweb: Mobile Web Marketing
Fastweb: Mobile Web MarketingFastweb: Mobile Web Marketing
Fastweb: Mobile Web MarketingNetwork Lab
 
BAKER DONELSON - Attorney Layoffs The SINKING OF A TERRORIST REGIME (GALICIAN)
BAKER DONELSON - Attorney Layoffs The SINKING OF A TERRORIST REGIME (GALICIAN)BAKER DONELSON - Attorney Layoffs The SINKING OF A TERRORIST REGIME (GALICIAN)
BAKER DONELSON - Attorney Layoffs The SINKING OF A TERRORIST REGIME (GALICIAN)VogelDenise
 
BAKER DONELSON - Attorney Layoffs The SINKING OF A TERRORIST REGIME (FRISIAN)
BAKER DONELSON - Attorney Layoffs The SINKING OF A TERRORIST REGIME (FRISIAN)BAKER DONELSON - Attorney Layoffs The SINKING OF A TERRORIST REGIME (FRISIAN)
BAKER DONELSON - Attorney Layoffs The SINKING OF A TERRORIST REGIME (FRISIAN)VogelDenise
 
BAKER DONELSON - Attorney Layoffs The SINKING OF A TERRORIST REGIME (FILIPINO)
BAKER DONELSON - Attorney Layoffs The SINKING OF A TERRORIST REGIME (FILIPINO)BAKER DONELSON - Attorney Layoffs The SINKING OF A TERRORIST REGIME (FILIPINO)
BAKER DONELSON - Attorney Layoffs The SINKING OF A TERRORIST REGIME (FILIPINO)VogelDenise
 
031816 - WORLD NEWS RELEASE (Arabic)
031816 - WORLD NEWS RELEASE (Arabic)031816 - WORLD NEWS RELEASE (Arabic)
031816 - WORLD NEWS RELEASE (Arabic)VogelDenise
 
031816 - WORLD NEWS RELEASE (Bulgarian)
031816 - WORLD NEWS RELEASE (Bulgarian)031816 - WORLD NEWS RELEASE (Bulgarian)
031816 - WORLD NEWS RELEASE (Bulgarian)VogelDenise
 
Pp growthanddevelopment
Pp growthanddevelopmentPp growthanddevelopment
Pp growthanddevelopmentPaolaReyesR
 
Ética y atención a la diversidad
Ética y atención a la diversidadÉtica y atención a la diversidad
Ética y atención a la diversidadTania Basantes
 
031816 - WORLD NEWS RELEASE (Russian)
031816 - WORLD NEWS RELEASE (Russian)031816 - WORLD NEWS RELEASE (Russian)
031816 - WORLD NEWS RELEASE (Russian)VogelDenise
 
Community IT Webinar - IT Security for Nonprofits
Community IT Webinar - IT Security for NonprofitsCommunity IT Webinar - IT Security for Nonprofits
Community IT Webinar - IT Security for NonprofitsCommunity IT Innovators
 
05/03/11 USPS MAILING RECEIPTS (Proof of Mailing)
05/03/11 USPS MAILING RECEIPTS (Proof of Mailing)05/03/11 USPS MAILING RECEIPTS (Proof of Mailing)
05/03/11 USPS MAILING RECEIPTS (Proof of Mailing)VogelDenise
 
George zimmerman & ebola crisis (bengali)
George zimmerman & ebola crisis (bengali)George zimmerman & ebola crisis (bengali)
George zimmerman & ebola crisis (bengali)VogelDenise
 
BAKER DONELSON - Attorney Layoffs The SINKING OF A TERRORIST REGIME (FINNISH)
BAKER DONELSON - Attorney Layoffs The SINKING OF A TERRORIST REGIME (FINNISH)BAKER DONELSON - Attorney Layoffs The SINKING OF A TERRORIST REGIME (FINNISH)
BAKER DONELSON - Attorney Layoffs The SINKING OF A TERRORIST REGIME (FINNISH)VogelDenise
 

Viewers also liked (20)

021013 adecco email (italian)
021013   adecco email (italian)021013   adecco email (italian)
021013 adecco email (italian)
 
021013 adecco email (kannada)
021013   adecco email (kannada)021013   adecco email (kannada)
021013 adecco email (kannada)
 
021013 adecco email (macedonian)
021013   adecco email (macedonian)021013   adecco email (macedonian)
021013 adecco email (macedonian)
 
021013 adecco email (urdu)
021013   adecco email (urdu)021013   adecco email (urdu)
021013 adecco email (urdu)
 
Patrizia Pepe: Perchè Mobile?
Patrizia Pepe: Perchè Mobile? Patrizia Pepe: Perchè Mobile?
Patrizia Pepe: Perchè Mobile?
 
Fastweb: Mobile Web Marketing
Fastweb: Mobile Web MarketingFastweb: Mobile Web Marketing
Fastweb: Mobile Web Marketing
 
Presentation1
Presentation1Presentation1
Presentation1
 
BAKER DONELSON - Attorney Layoffs The SINKING OF A TERRORIST REGIME (GALICIAN)
BAKER DONELSON - Attorney Layoffs The SINKING OF A TERRORIST REGIME (GALICIAN)BAKER DONELSON - Attorney Layoffs The SINKING OF A TERRORIST REGIME (GALICIAN)
BAKER DONELSON - Attorney Layoffs The SINKING OF A TERRORIST REGIME (GALICIAN)
 
B.Smith Rugs
B.Smith RugsB.Smith Rugs
B.Smith Rugs
 
BAKER DONELSON - Attorney Layoffs The SINKING OF A TERRORIST REGIME (FRISIAN)
BAKER DONELSON - Attorney Layoffs The SINKING OF A TERRORIST REGIME (FRISIAN)BAKER DONELSON - Attorney Layoffs The SINKING OF A TERRORIST REGIME (FRISIAN)
BAKER DONELSON - Attorney Layoffs The SINKING OF A TERRORIST REGIME (FRISIAN)
 
BAKER DONELSON - Attorney Layoffs The SINKING OF A TERRORIST REGIME (FILIPINO)
BAKER DONELSON - Attorney Layoffs The SINKING OF A TERRORIST REGIME (FILIPINO)BAKER DONELSON - Attorney Layoffs The SINKING OF A TERRORIST REGIME (FILIPINO)
BAKER DONELSON - Attorney Layoffs The SINKING OF A TERRORIST REGIME (FILIPINO)
 
031816 - WORLD NEWS RELEASE (Arabic)
031816 - WORLD NEWS RELEASE (Arabic)031816 - WORLD NEWS RELEASE (Arabic)
031816 - WORLD NEWS RELEASE (Arabic)
 
031816 - WORLD NEWS RELEASE (Bulgarian)
031816 - WORLD NEWS RELEASE (Bulgarian)031816 - WORLD NEWS RELEASE (Bulgarian)
031816 - WORLD NEWS RELEASE (Bulgarian)
 
Pp growthanddevelopment
Pp growthanddevelopmentPp growthanddevelopment
Pp growthanddevelopment
 
Ética y atención a la diversidad
Ética y atención a la diversidadÉtica y atención a la diversidad
Ética y atención a la diversidad
 
031816 - WORLD NEWS RELEASE (Russian)
031816 - WORLD NEWS RELEASE (Russian)031816 - WORLD NEWS RELEASE (Russian)
031816 - WORLD NEWS RELEASE (Russian)
 
Community IT Webinar - IT Security for Nonprofits
Community IT Webinar - IT Security for NonprofitsCommunity IT Webinar - IT Security for Nonprofits
Community IT Webinar - IT Security for Nonprofits
 
05/03/11 USPS MAILING RECEIPTS (Proof of Mailing)
05/03/11 USPS MAILING RECEIPTS (Proof of Mailing)05/03/11 USPS MAILING RECEIPTS (Proof of Mailing)
05/03/11 USPS MAILING RECEIPTS (Proof of Mailing)
 
George zimmerman & ebola crisis (bengali)
George zimmerman & ebola crisis (bengali)George zimmerman & ebola crisis (bengali)
George zimmerman & ebola crisis (bengali)
 
BAKER DONELSON - Attorney Layoffs The SINKING OF A TERRORIST REGIME (FINNISH)
BAKER DONELSON - Attorney Layoffs The SINKING OF A TERRORIST REGIME (FINNISH)BAKER DONELSON - Attorney Layoffs The SINKING OF A TERRORIST REGIME (FINNISH)
BAKER DONELSON - Attorney Layoffs The SINKING OF A TERRORIST REGIME (FINNISH)
 

Similar to Community IT Innovators - BYOD for Nonprofits

Meeting the cyber risk challenge
Meeting the cyber risk challengeMeeting the cyber risk challenge
Meeting the cyber risk challengeFERMA
 
HDI Capital Area Slides August 17, 2018
HDI Capital Area Slides August 17, 2018HDI Capital Area Slides August 17, 2018
HDI Capital Area Slides August 17, 2018hdicapitalarea
 
Challenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act BringsChallenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act BringsRobert 'Bob' Reyes
 
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...AIIM International
 
Role of The Board In IT Governance & Cyber Security-Steve Howse
Role of The Board In IT Governance & Cyber Security-Steve HowseRole of The Board In IT Governance & Cyber Security-Steve Howse
Role of The Board In IT Governance & Cyber Security-Steve HowseCGTI
 
Best practices to mitigate data breach risk
Best practices to mitigate data breach riskBest practices to mitigate data breach risk
Best practices to mitigate data breach riskLivingstone Advisory
 
Staying Safe In A Quickly Evolving World
Staying Safe In A Quickly Evolving WorldStaying Safe In A Quickly Evolving World
Staying Safe In A Quickly Evolving Worldbrian andrews
 
Community IT Innovators - Best of Nonprofit Tech Webinar
Community IT Innovators - Best of Nonprofit Tech WebinarCommunity IT Innovators - Best of Nonprofit Tech Webinar
Community IT Innovators - Best of Nonprofit Tech WebinarCommunity IT Innovators
 
Selling security to the C-level
Selling security to the C-levelSelling security to the C-level
Selling security to the C-levelDonald Tabone
 
Information Security is NOT an IT Issue
Information Security is NOT an IT IssueInformation Security is NOT an IT Issue
Information Security is NOT an IT IssueEvan Francen
 
Ravi i ot-security
Ravi i ot-securityRavi i ot-security
Ravi i ot-securityskumartarget
 
Webinar : Desperately Seeking Transformation - Part 1: Why data will make or ...
Webinar : Desperately Seeking Transformation - Part 1: Why data will make or ...Webinar : Desperately Seeking Transformation - Part 1: Why data will make or ...
Webinar : Desperately Seeking Transformation - Part 1: Why data will make or ...The Digital Insurer
 
BYOD: D for Device or D for Disaster?
BYOD: D for Device or D for Disaster?BYOD: D for Device or D for Disaster?
BYOD: D for Device or D for Disaster?Marketing Team
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education ConferanceTommy Riggins
 
Marketing Program Overview_Sal A _2012 v2.1
Marketing Program Overview_Sal A _2012 v2.1Marketing Program Overview_Sal A _2012 v2.1
Marketing Program Overview_Sal A _2012 v2.1Sal Abramo
 
BSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessBSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessJoel Cardella
 
BYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And BenefitsBYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And BenefitsModis
 

Similar to Community IT Innovators - BYOD for Nonprofits (20)

Meeting the cyber risk challenge
Meeting the cyber risk challengeMeeting the cyber risk challenge
Meeting the cyber risk challenge
 
HDI Capital Area Slides August 17, 2018
HDI Capital Area Slides August 17, 2018HDI Capital Area Slides August 17, 2018
HDI Capital Area Slides August 17, 2018
 
Challenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act BringsChallenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act Brings
 
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
 
Role of The Board In IT Governance & Cyber Security-Steve Howse
Role of The Board In IT Governance & Cyber Security-Steve HowseRole of The Board In IT Governance & Cyber Security-Steve Howse
Role of The Board In IT Governance & Cyber Security-Steve Howse
 
Information & Cyber Security Risk
Information & Cyber Security RiskInformation & Cyber Security Risk
Information & Cyber Security Risk
 
Best practices to mitigate data breach risk
Best practices to mitigate data breach riskBest practices to mitigate data breach risk
Best practices to mitigate data breach risk
 
Staying Safe In A Quickly Evolving World
Staying Safe In A Quickly Evolving WorldStaying Safe In A Quickly Evolving World
Staying Safe In A Quickly Evolving World
 
Community IT Innovators - Best of Nonprofit Tech Webinar
Community IT Innovators - Best of Nonprofit Tech WebinarCommunity IT Innovators - Best of Nonprofit Tech Webinar
Community IT Innovators - Best of Nonprofit Tech Webinar
 
Selling security to the C-level
Selling security to the C-levelSelling security to the C-level
Selling security to the C-level
 
Information Security is NOT an IT Issue
Information Security is NOT an IT IssueInformation Security is NOT an IT Issue
Information Security is NOT an IT Issue
 
Ravi i ot-security
Ravi i ot-securityRavi i ot-security
Ravi i ot-security
 
Webinar : Desperately Seeking Transformation - Part 1: Why data will make or ...
Webinar : Desperately Seeking Transformation - Part 1: Why data will make or ...Webinar : Desperately Seeking Transformation - Part 1: Why data will make or ...
Webinar : Desperately Seeking Transformation - Part 1: Why data will make or ...
 
BYOD: D for Device or D for Disaster?
BYOD: D for Device or D for Disaster?BYOD: D for Device or D for Disaster?
BYOD: D for Device or D for Disaster?
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education Conferance
 
Marketing Program Overview_Sal A _2012 v2.1
Marketing Program Overview_Sal A _2012 v2.1Marketing Program Overview_Sal A _2012 v2.1
Marketing Program Overview_Sal A _2012 v2.1
 
BSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessBSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing business
 
BYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And BenefitsBYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And Benefits
 
BYOD
BYODBYOD
BYOD
 
Byod final (2)
Byod   final (2)Byod   final (2)
Byod final (2)
 

More from Community IT Innovators

Slack, Microsoft Teams, Zoom: What Works Best for Nonprofits?
Slack, Microsoft Teams, Zoom: What Works Best for Nonprofits?Slack, Microsoft Teams, Zoom: What Works Best for Nonprofits?
Slack, Microsoft Teams, Zoom: What Works Best for Nonprofits?Community IT Innovators
 
2021 Nonprofit Cybersecurity Incident Report
2021 Nonprofit Cybersecurity Incident Report2021 Nonprofit Cybersecurity Incident Report
2021 Nonprofit Cybersecurity Incident ReportCommunity IT Innovators
 
Microsoft Dynamics and Salesforce: What You Need To Know Before Choosing a Pl...
Microsoft Dynamics and Salesforce: What You Need To Know Before Choosing a Pl...Microsoft Dynamics and Salesforce: What You Need To Know Before Choosing a Pl...
Microsoft Dynamics and Salesforce: What You Need To Know Before Choosing a Pl...Community IT Innovators
 
Nonprofit Cybersecurity Risk Assessment Basics
Nonprofit Cybersecurity Risk Assessment BasicsNonprofit Cybersecurity Risk Assessment Basics
Nonprofit Cybersecurity Risk Assessment BasicsCommunity IT Innovators
 
Does Your Organization Need a Better Technology Roadmap?
Does Your Organization Need a Better Technology Roadmap?Does Your Organization Need a Better Technology Roadmap?
Does Your Organization Need a Better Technology Roadmap?Community IT Innovators
 
2020 Nonprofit Technology Trends Roundtable
2020 Nonprofit Technology Trends Roundtable2020 Nonprofit Technology Trends Roundtable
2020 Nonprofit Technology Trends RoundtableCommunity IT Innovators
 
5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and MoreCommunity IT Innovators
 
How Data Quality Defines Your Organization Webinar November 2019
How Data Quality Defines Your Organization Webinar November 2019How Data Quality Defines Your Organization Webinar November 2019
How Data Quality Defines Your Organization Webinar November 2019Community IT Innovators
 
Nonprofit Cybersecurity Readiness - Community IT Innovators Webinar
Nonprofit Cybersecurity Readiness - Community IT Innovators WebinarNonprofit Cybersecurity Readiness - Community IT Innovators Webinar
Nonprofit Cybersecurity Readiness - Community IT Innovators WebinarCommunity IT Innovators
 
5 Steps to Create an Information Strategy for Your Organization
5 Steps to Create an Information Strategy for Your Organization5 Steps to Create an Information Strategy for Your Organization
5 Steps to Create an Information Strategy for Your OrganizationCommunity IT Innovators
 
Server 2008 and Windows 7 End of Life: 3 Things You Need to Know
Server 2008 and Windows 7 End of Life: 3 Things You Need to KnowServer 2008 and Windows 7 End of Life: 3 Things You Need to Know
Server 2008 and Windows 7 End of Life: 3 Things You Need to KnowCommunity IT Innovators
 
What Makes Nonprofit Tech Projects Succeed?
What Makes Nonprofit Tech Projects Succeed?What Makes Nonprofit Tech Projects Succeed?
What Makes Nonprofit Tech Projects Succeed?Community IT Innovators
 
Community IT Webinar: Working with an Outsourced IT Manager
Community IT Webinar: Working with an Outsourced IT ManagerCommunity IT Webinar: Working with an Outsourced IT Manager
Community IT Webinar: Working with an Outsourced IT ManagerCommunity IT Innovators
 
Improving Nonprofit CRM Data Management in 2019 - Build Consulting and Commun...
Improving Nonprofit CRM Data Management in 2019 - Build Consulting and Commun...Improving Nonprofit CRM Data Management in 2019 - Build Consulting and Commun...
Improving Nonprofit CRM Data Management in 2019 - Build Consulting and Commun...Community IT Innovators
 
Community IT Innovators Technology Trends Round Table 2019
Community IT Innovators Technology Trends Round Table 2019Community IT Innovators Technology Trends Round Table 2019
Community IT Innovators Technology Trends Round Table 2019Community IT Innovators
 
Selecting Nonprofit Software: Technology Comes Last
Selecting Nonprofit Software: Technology Comes LastSelecting Nonprofit Software: Technology Comes Last
Selecting Nonprofit Software: Technology Comes LastCommunity IT Innovators
 
IT Security Incident Response for Nonprofits
IT Security Incident Response for NonprofitsIT Security Incident Response for Nonprofits
IT Security Incident Response for NonprofitsCommunity IT Innovators
 

More from Community IT Innovators (20)

Slack, Microsoft Teams, Zoom: What Works Best for Nonprofits?
Slack, Microsoft Teams, Zoom: What Works Best for Nonprofits?Slack, Microsoft Teams, Zoom: What Works Best for Nonprofits?
Slack, Microsoft Teams, Zoom: What Works Best for Nonprofits?
 
2021 Nonprofit Cybersecurity Incident Report
2021 Nonprofit Cybersecurity Incident Report2021 Nonprofit Cybersecurity Incident Report
2021 Nonprofit Cybersecurity Incident Report
 
Cybersecurity Training for Nonprofits
Cybersecurity Training for NonprofitsCybersecurity Training for Nonprofits
Cybersecurity Training for Nonprofits
 
SharePoint Online for Nonprofits
SharePoint Online for NonprofitsSharePoint Online for Nonprofits
SharePoint Online for Nonprofits
 
Microsoft Dynamics and Salesforce: What You Need To Know Before Choosing a Pl...
Microsoft Dynamics and Salesforce: What You Need To Know Before Choosing a Pl...Microsoft Dynamics and Salesforce: What You Need To Know Before Choosing a Pl...
Microsoft Dynamics and Salesforce: What You Need To Know Before Choosing a Pl...
 
Nonprofit Cybersecurity Risk Assessment Basics
Nonprofit Cybersecurity Risk Assessment BasicsNonprofit Cybersecurity Risk Assessment Basics
Nonprofit Cybersecurity Risk Assessment Basics
 
Does Your Organization Need a Better Technology Roadmap?
Does Your Organization Need a Better Technology Roadmap?Does Your Organization Need a Better Technology Roadmap?
Does Your Organization Need a Better Technology Roadmap?
 
2020 Nonprofit Technology Trends Roundtable
2020 Nonprofit Technology Trends Roundtable2020 Nonprofit Technology Trends Roundtable
2020 Nonprofit Technology Trends Roundtable
 
5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More
 
How Data Quality Defines Your Organization Webinar November 2019
How Data Quality Defines Your Organization Webinar November 2019How Data Quality Defines Your Organization Webinar November 2019
How Data Quality Defines Your Organization Webinar November 2019
 
Nonprofit Cybersecurity Readiness - Community IT Innovators Webinar
Nonprofit Cybersecurity Readiness - Community IT Innovators WebinarNonprofit Cybersecurity Readiness - Community IT Innovators Webinar
Nonprofit Cybersecurity Readiness - Community IT Innovators Webinar
 
5 Steps to Create an Information Strategy for Your Organization
5 Steps to Create an Information Strategy for Your Organization5 Steps to Create an Information Strategy for Your Organization
5 Steps to Create an Information Strategy for Your Organization
 
Server 2008 and Windows 7 End of Life: 3 Things You Need to Know
Server 2008 and Windows 7 End of Life: 3 Things You Need to KnowServer 2008 and Windows 7 End of Life: 3 Things You Need to Know
Server 2008 and Windows 7 End of Life: 3 Things You Need to Know
 
What Makes Nonprofit Tech Projects Succeed?
What Makes Nonprofit Tech Projects Succeed?What Makes Nonprofit Tech Projects Succeed?
What Makes Nonprofit Tech Projects Succeed?
 
Community IT Webinar: Working with an Outsourced IT Manager
Community IT Webinar: Working with an Outsourced IT ManagerCommunity IT Webinar: Working with an Outsourced IT Manager
Community IT Webinar: Working with an Outsourced IT Manager
 
Nonprofit Cybersecurity Incident Report
Nonprofit Cybersecurity Incident ReportNonprofit Cybersecurity Incident Report
Nonprofit Cybersecurity Incident Report
 
Improving Nonprofit CRM Data Management in 2019 - Build Consulting and Commun...
Improving Nonprofit CRM Data Management in 2019 - Build Consulting and Commun...Improving Nonprofit CRM Data Management in 2019 - Build Consulting and Commun...
Improving Nonprofit CRM Data Management in 2019 - Build Consulting and Commun...
 
Community IT Innovators Technology Trends Round Table 2019
Community IT Innovators Technology Trends Round Table 2019Community IT Innovators Technology Trends Round Table 2019
Community IT Innovators Technology Trends Round Table 2019
 
Selecting Nonprofit Software: Technology Comes Last
Selecting Nonprofit Software: Technology Comes LastSelecting Nonprofit Software: Technology Comes Last
Selecting Nonprofit Software: Technology Comes Last
 
IT Security Incident Response for Nonprofits
IT Security Incident Response for NonprofitsIT Security Incident Response for Nonprofits
IT Security Incident Response for Nonprofits
 

Recently uploaded

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 

Recently uploaded (20)

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 

Community IT Innovators - BYOD for Nonprofits

  • 1. BYOD for Nonprofits June 20, 2013 Community IT Innovators Webinar Series presented by… Johan Hammerstrom
  • 2. Webinar Tips • Ask questions Post questions via chat • Interact Respond to polls during webinar • Focus Avoid multitasking. You may just miss the best part of the presentation • Webinar Powerpoint & Recording Powerpoint and recording links will be shared after the webinar
  • 3. About Community IT Community IT Innovators partners with nonprofits to help them solve their strategic & day-to-day IT challenges. Strategic Proactive approach so you can make IT decisions that support your mission and grow with you Collaborative Team of over 40 staff who empower you to make informed IT choices Invested We are committed to supporting your mission, and take care of your IT network as if it were our own Nonprofit focus Worked with over 900 nonprofits since 1993
  • 4. about the presenter Johan Hammerstrom Chief Operating Officer jhammerstrom@communityit.com @hammerstromj
  • 5. Agenda I. BYOD…a brief history II. Best Practices III. BYOD Risk Management IV. BYOD Policy Guidelines
  • 9. But then they got smaller
  • 17. 1. Goal: 90% of 150,000 workforce 2. Custom Authentication System 3. Reason: Avoid locked-in corporate environment Aggressive BYOD
  • 18. 1. 20% use their own device 2. Increasing restrictions on personal device use 3. Reason: Security concerns 4. Dropsmack! Conservative BYOD
  • 19. Risk
  • 20. Benefits of BYOD 1. Reduce hardware & support costs 2. Work flexibility 3. Employee availability 4. User adoption and satisfaction
  • 21. Risks of BYOD 1. Information Security 2. Legal 3. Financial
  • 23. 1. Information Security Risks a) Organization – Data leakage – Vector into the company b) Personal – Onerous security measures – Loss of full control of device
  • 24. 2. Legal Risks a) Organization – Lack of certainty in case law and legislation b) Personal – Personal device could be confiscated – Personal blurs into the corporate
  • 25. 3. Financial Risks a) Organization – Stipends can be more expensive than a single corporate plan – IT Support can become entangled – Mobile Device Management (MDM) can be expensive b) Personal – Stipend may not cover full cost…or any at all – Can be responsible for own support
  • 26. Risks • Security • Legal • Financial Benefits • Cost • Flexibility • Adoption Risk/Benefit Analysis
  • 27. One Size Fits All? • Sales • Accounting • Executive
  • 28. Guidelines 1) Identify Benefits a) Prioritize for your Organization b) Establish your strategy 2) Identify Risks a) Risk = Impact * Likelihood 3) Consider a few solutions 4) Summarize in 1-page policy
  • 29. Program Staff Development Executive Benefits Reduce costs 1 Work Flexibility 1 1 Availability 1 1 User adoption 1 Risks Info Security 2 1 1 Legal 3 3 1 Financial 1 1 3 Policy provide small stipend & limited access to information provide limited access to information from home org provided device, fully managed access to info
  • 30. Generic 1) BYOD by staff role a) Exec staff, accessible 24x7 stipend of $80/mo b) Senior staff, accessible 10x7 stipend of $50/mo c) Line staff, accessible 10x5 stipend of $30/mo 2) Requirement of PIN code on device 3) Acceptable Use policy 4) IT Support policy
  • 35. Upcoming Webinar July 25 IT Security Best Practices Presenter Steve Longenecker Mark Kraemer
  • 36. Next Steps • Connect with us • Provide feedback Short survey after you exit the webinar. Be sure to include any questions that were not answered. • Missed anything? Link to slides & recording will be emailed to you.