SlideShare a Scribd company logo
1 of 32
Nonprofit IT Trends
Webinar
Series
January 2018
Presenters
Johan Hammerstrom
President & CEO
Presenter
Johanny Torrico
VP Operations
Presenter
Steve Longenecker
Dir IT Consulting
Presenter
Matthew Eshleman
CTO
About Community IT
Advancing mission
through the effective use
of technology.
100% Employee Owned
Trends
1) Cloud
2) Security
3) Consumerization
4) Business Intelligence
Cloud
commons.wikimedia.org
The cloud trend will continue
Cloud computing
User-driven
• User experience
trumps product
• User experience
drives everything!
Environments
need to keep up
with the changes
• For easier, secure
and seamless
access
Business needs
are evolving
• IT providers become
trusted advisor, and
strategic partners as
they transform into
the cloud era
Cloud computing
User-driven
• User experience
trumps product
• User experience
drives everything!
• Tighter integration
• Increase productivity
• Solution-agnostic
Cloud computing
Environments
need to keep
up with the
changes
• For easier, secure
and seamless
access
• Increase bandwidth
• Enterprise level wireless
• Security
Cloud computing
Business
needs are
evolving
• IT providers
become trusted
advisor, and
strategic partners
as they transform
into the cloud era
• Too many solutions
• Not longer classic break-fix
provider
• CIO skill set
Microsoft will continue to lead!
Microsoft will continue to lead
• On-demand sync
• Productivity apps
• Non-profit licensing
• Integration advantage
• Improvements to OneDrive Sync Client are significant
• SharePoint “Modern Experience” is better than classic
• Office 365 Information Rights Management matures
• Office 365 Teams is a developing story – not sure of the
ending yet.
• Office 365 “FindTime” is a hidden gem.
Microsoft continues to improve Office 365
More server-less networks
Helped a client with 40+ staff decommission their remaining
on-premise servers.
Set up a domain controller in Microsoft Azure (the
$5,000/year nonprofit credit largely pays for it).
New computers are joined to Azure Active Directory and
managed by Azure InTune.
Security
Security
• Continued rise in prominence
• Demonstrable attacks against all client networks
• Dramatic increase in successful credential thefts
• Anecdotally less virus/malware activity
Hackernomics
• Most attackers aren’t evil or insane; they just want something
• We don’t have the budget to protect against evil people but
we can protect against people that will look for weaker targets
• Security isn’t about security. It’s about mitigating risk at some cost.
• In the absence of metrics, we tend to over focus on risk that
are either familiar or recent.
• Most costly breaches come from simple failures, not from attacker
ingenuity
• Bad guys can, however, be VERY creative if properly
incentivized
• In the absence of security education or experience, people naturally
make poor security decisions with technology
• System need to be easy to use securely and difficult to use
insecurely
• Attackers usually don’t get in by cracking some impenetrable
security control, they look for weak points like trusting employees
Summary of
Security
Incidents -
2017
6
7
1
1
Total
Advanced
Malware
Credentials
Fraud
Website
Compromise
Security Checklist
• Backups (cloud included)
• Patching
• A Good Password
• SSO / MFA
• Encryption
SSO/MFA - critical to security
2017 was the year Community IT internally implemented a second factor
to logon to Office 365 (called “Multi-Factor Authentication”). For most of
us, this means clicking “Approve” on our phones once a week when
logging onto Office 365 (outside our office).
It was also the year we began using our Office 365 credentials to access
our other cloud services, alleviating the need to remember lots of different
passwords (called “Single Sign-On.”)
Able to move away from regular password changes, as policy
Consumerization
commons.wikimedia.org
Peak consumer
• Laptops > Desktops
• Laptops > Tablets
• Windows > macOS
• Mobile containers
Consumerization - Controls Coming
• Organizations starting to more tightly manage
mobile devices
• Some initial steps to deal with IRM
• Compliance requirements coming, through
finance audits
Business
Intelligence
commons.wikimedia.org
PowerBI
• Extra feature
• Flexible and portable
• Beta-level
Upcoming
Webinar
Five Hacks to Weave
Constituent Experience
into your Organization
Wednesday February 21
4:00 – 5:00 PM EST
Questions?

More Related Content

What's hot

SMB Threat Awareness Poll Global Results 2011
SMB Threat Awareness Poll Global Results 2011SMB Threat Awareness Poll Global Results 2011
SMB Threat Awareness Poll Global Results 2011Symantec
 
How to Build a Successful Cybersecurity Program?
How to Build a Successful Cybersecurity Program?How to Build a Successful Cybersecurity Program?
How to Build a Successful Cybersecurity Program?PECB
 
Securing the New Digital Enterprise: Trackable, Controlled, and Authorized
Securing the New Digital Enterprise: Trackable, Controlled, and AuthorizedSecuring the New Digital Enterprise: Trackable, Controlled, and Authorized
Securing the New Digital Enterprise: Trackable, Controlled, and AuthorizedEnterprise Management Associates
 
Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and Ideas
Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and IdeasBlack Hat USA 2015: A Visual Snapshot of Security Threats, Trends and Ideas
Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and IdeasTripwire
 
Adam Maskatiya - Redefining Security in an Era of Digital Transformation #mid...
Adam Maskatiya - Redefining Security in an Era of Digital Transformation #mid...Adam Maskatiya - Redefining Security in an Era of Digital Transformation #mid...
Adam Maskatiya - Redefining Security in an Era of Digital Transformation #mid...Pro Mrkt
 
5 Steps to Successful BYOD Implementation
5 Steps to Successful BYOD Implementation5 Steps to Successful BYOD Implementation
5 Steps to Successful BYOD ImplementationJumpCloud
 
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinCloud Expo
 
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...Michael Noel
 
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSIMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSPreetiDevidas
 
Outpost24 webinar: Risk-based approach to security assessments
Outpost24 webinar: Risk-based approach to security assessmentsOutpost24 webinar: Risk-based approach to security assessments
Outpost24 webinar: Risk-based approach to security assessmentsOutpost24
 
Infographic: Mobile is growing and so are security threats
Infographic: Mobile is growing and so are security threatsInfographic: Mobile is growing and so are security threats
Infographic: Mobile is growing and so are security threatsIBM Security
 
Stay Ahead of Threats with Advanced Security Protection - Fortinet
Stay Ahead of Threats with Advanced Security Protection - FortinetStay Ahead of Threats with Advanced Security Protection - Fortinet
Stay Ahead of Threats with Advanced Security Protection - FortinetMarcoTechnologies
 
2010 State Of Enterprise Security
2010 State Of Enterprise Security2010 State Of Enterprise Security
2010 State Of Enterprise SecuritySymantec
 
Iid infoshare exec_summary final
Iid infoshare exec_summary finalIid infoshare exec_summary final
Iid infoshare exec_summary finalAndrew_Goss
 
Nero Technology Consulting Services
Nero Technology Consulting ServicesNero Technology Consulting Services
Nero Technology Consulting ServicesAnthony Oren
 
Manage Remote Workers in Three Easy Steps
Manage Remote Workers in Three Easy StepsManage Remote Workers in Three Easy Steps
Manage Remote Workers in Three Easy StepsJumpCloud
 
10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should KnowIBM Security
 
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune SystemCybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune SystemIBM Security
 
IBM Security Strategy Overview
IBM Security Strategy OverviewIBM Security Strategy Overview
IBM Security Strategy Overviewxband
 
Is the Cloud Safe? Ensuring Security in the Cloud
Is the Cloud Safe? Ensuring Security in the CloudIs the Cloud Safe? Ensuring Security in the Cloud
Is the Cloud Safe? Ensuring Security in the CloudTechSoup
 

What's hot (20)

SMB Threat Awareness Poll Global Results 2011
SMB Threat Awareness Poll Global Results 2011SMB Threat Awareness Poll Global Results 2011
SMB Threat Awareness Poll Global Results 2011
 
How to Build a Successful Cybersecurity Program?
How to Build a Successful Cybersecurity Program?How to Build a Successful Cybersecurity Program?
How to Build a Successful Cybersecurity Program?
 
Securing the New Digital Enterprise: Trackable, Controlled, and Authorized
Securing the New Digital Enterprise: Trackable, Controlled, and AuthorizedSecuring the New Digital Enterprise: Trackable, Controlled, and Authorized
Securing the New Digital Enterprise: Trackable, Controlled, and Authorized
 
Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and Ideas
Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and IdeasBlack Hat USA 2015: A Visual Snapshot of Security Threats, Trends and Ideas
Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and Ideas
 
Adam Maskatiya - Redefining Security in an Era of Digital Transformation #mid...
Adam Maskatiya - Redefining Security in an Era of Digital Transformation #mid...Adam Maskatiya - Redefining Security in an Era of Digital Transformation #mid...
Adam Maskatiya - Redefining Security in an Era of Digital Transformation #mid...
 
5 Steps to Successful BYOD Implementation
5 Steps to Successful BYOD Implementation5 Steps to Successful BYOD Implementation
5 Steps to Successful BYOD Implementation
 
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny Heaberlin
 
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
 
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSIMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
 
Outpost24 webinar: Risk-based approach to security assessments
Outpost24 webinar: Risk-based approach to security assessmentsOutpost24 webinar: Risk-based approach to security assessments
Outpost24 webinar: Risk-based approach to security assessments
 
Infographic: Mobile is growing and so are security threats
Infographic: Mobile is growing and so are security threatsInfographic: Mobile is growing and so are security threats
Infographic: Mobile is growing and so are security threats
 
Stay Ahead of Threats with Advanced Security Protection - Fortinet
Stay Ahead of Threats with Advanced Security Protection - FortinetStay Ahead of Threats with Advanced Security Protection - Fortinet
Stay Ahead of Threats with Advanced Security Protection - Fortinet
 
2010 State Of Enterprise Security
2010 State Of Enterprise Security2010 State Of Enterprise Security
2010 State Of Enterprise Security
 
Iid infoshare exec_summary final
Iid infoshare exec_summary finalIid infoshare exec_summary final
Iid infoshare exec_summary final
 
Nero Technology Consulting Services
Nero Technology Consulting ServicesNero Technology Consulting Services
Nero Technology Consulting Services
 
Manage Remote Workers in Three Easy Steps
Manage Remote Workers in Three Easy StepsManage Remote Workers in Three Easy Steps
Manage Remote Workers in Three Easy Steps
 
10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know
 
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune SystemCybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
 
IBM Security Strategy Overview
IBM Security Strategy OverviewIBM Security Strategy Overview
IBM Security Strategy Overview
 
Is the Cloud Safe? Ensuring Security in the Cloud
Is the Cloud Safe? Ensuring Security in the CloudIs the Cloud Safe? Ensuring Security in the Cloud
Is the Cloud Safe? Ensuring Security in the Cloud
 

Similar to Nonprofit IT Trends 2018

Securing Solutions Amid The Journey To Digital Transformation.pdf
Securing Solutions Amid The Journey To Digital Transformation.pdfSecuring Solutions Amid The Journey To Digital Transformation.pdf
Securing Solutions Amid The Journey To Digital Transformation.pdfCiente
 
The 5 ws of Cyber Security
The 5 ws of Cyber SecurityThe 5 ws of Cyber Security
The 5 ws of Cyber SecurityMisha Hanin
 
NZISF Talk: Six essential security services
NZISF Talk: Six essential security servicesNZISF Talk: Six essential security services
NZISF Talk: Six essential security servicesHinne Hettema
 
Trending it security threats in the public sector
Trending it security threats in the public sectorTrending it security threats in the public sector
Trending it security threats in the public sectorCore Security
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxYoisRoberthTapiadeLa
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxVictoriaChavesta
 
Elastic's recommendation on keeping services up and running with real-time vi...
Elastic's recommendation on keeping services up and running with real-time vi...Elastic's recommendation on keeping services up and running with real-time vi...
Elastic's recommendation on keeping services up and running with real-time vi...FaithWestdorp
 
OT Security Architecture & Resilience: Designing for Security Success
OT Security Architecture & Resilience:  Designing for Security SuccessOT Security Architecture & Resilience:  Designing for Security Success
OT Security Architecture & Resilience: Designing for Security Successaccenture
 
Protect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chainProtect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chainDavid J Rosenthal
 
Operation: Next Summit Takeaways
Operation: Next Summit TakeawaysOperation: Next Summit Takeaways
Operation: Next Summit Takeawaysaccenture
 
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...Troy Marshall
 
Executive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top DownExecutive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top Downaccenture
 
Security For Business: Are You And Your Customers Safe
Security For Business:  Are You And Your Customers SafeSecurity For Business:  Are You And Your Customers Safe
Security For Business: Are You And Your Customers Safewoodsy01
 
End-to-End OT SecOps Transforming from Good to Great
End-to-End OT SecOps Transforming from Good to GreatEnd-to-End OT SecOps Transforming from Good to Great
End-to-End OT SecOps Transforming from Good to Greataccenture
 
Top 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and BeyondTop 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and BeyondNandita Nityanandam
 
Journey to the Cloud: Securing Your AWS Applications - April 2015
Journey to the Cloud: Securing Your AWS Applications - April 2015Journey to the Cloud: Securing Your AWS Applications - April 2015
Journey to the Cloud: Securing Your AWS Applications - April 2015Alert Logic
 
Open Security and Privacy Reference Architecture
Open Security and Privacy Reference Architecture Open Security and Privacy Reference Architecture
Open Security and Privacy Reference Architecture Asim Jahan
 

Similar to Nonprofit IT Trends 2018 (20)

Securing Solutions Amid The Journey To Digital Transformation.pdf
Securing Solutions Amid The Journey To Digital Transformation.pdfSecuring Solutions Amid The Journey To Digital Transformation.pdf
Securing Solutions Amid The Journey To Digital Transformation.pdf
 
The 5 ws of Cyber Security
The 5 ws of Cyber SecurityThe 5 ws of Cyber Security
The 5 ws of Cyber Security
 
NZISF Talk: Six essential security services
NZISF Talk: Six essential security servicesNZISF Talk: Six essential security services
NZISF Talk: Six essential security services
 
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
 
Trending it security threats in the public sector
Trending it security threats in the public sectorTrending it security threats in the public sector
Trending it security threats in the public sector
 
biometrics and cyber security
biometrics and cyber securitybiometrics and cyber security
biometrics and cyber security
 
2019 Cyber Security Trends
2019 Cyber Security Trends2019 Cyber Security Trends
2019 Cyber Security Trends
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
 
Elastic's recommendation on keeping services up and running with real-time vi...
Elastic's recommendation on keeping services up and running with real-time vi...Elastic's recommendation on keeping services up and running with real-time vi...
Elastic's recommendation on keeping services up and running with real-time vi...
 
OT Security Architecture & Resilience: Designing for Security Success
OT Security Architecture & Resilience:  Designing for Security SuccessOT Security Architecture & Resilience:  Designing for Security Success
OT Security Architecture & Resilience: Designing for Security Success
 
Protect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chainProtect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chain
 
Operation: Next Summit Takeaways
Operation: Next Summit TakeawaysOperation: Next Summit Takeaways
Operation: Next Summit Takeaways
 
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
 
Executive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top DownExecutive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top Down
 
Security For Business: Are You And Your Customers Safe
Security For Business:  Are You And Your Customers SafeSecurity For Business:  Are You And Your Customers Safe
Security For Business: Are You And Your Customers Safe
 
End-to-End OT SecOps Transforming from Good to Great
End-to-End OT SecOps Transforming from Good to GreatEnd-to-End OT SecOps Transforming from Good to Great
End-to-End OT SecOps Transforming from Good to Great
 
Top 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and BeyondTop 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and Beyond
 
Journey to the Cloud: Securing Your AWS Applications - April 2015
Journey to the Cloud: Securing Your AWS Applications - April 2015Journey to the Cloud: Securing Your AWS Applications - April 2015
Journey to the Cloud: Securing Your AWS Applications - April 2015
 
Open Security and Privacy Reference Architecture
Open Security and Privacy Reference Architecture Open Security and Privacy Reference Architecture
Open Security and Privacy Reference Architecture
 

More from Community IT Innovators

Slack, Microsoft Teams, Zoom: What Works Best for Nonprofits?
Slack, Microsoft Teams, Zoom: What Works Best for Nonprofits?Slack, Microsoft Teams, Zoom: What Works Best for Nonprofits?
Slack, Microsoft Teams, Zoom: What Works Best for Nonprofits?Community IT Innovators
 
2021 Nonprofit Cybersecurity Incident Report
2021 Nonprofit Cybersecurity Incident Report2021 Nonprofit Cybersecurity Incident Report
2021 Nonprofit Cybersecurity Incident ReportCommunity IT Innovators
 
Microsoft Dynamics and Salesforce: What You Need To Know Before Choosing a Pl...
Microsoft Dynamics and Salesforce: What You Need To Know Before Choosing a Pl...Microsoft Dynamics and Salesforce: What You Need To Know Before Choosing a Pl...
Microsoft Dynamics and Salesforce: What You Need To Know Before Choosing a Pl...Community IT Innovators
 
Nonprofit Cybersecurity Risk Assessment Basics
Nonprofit Cybersecurity Risk Assessment BasicsNonprofit Cybersecurity Risk Assessment Basics
Nonprofit Cybersecurity Risk Assessment BasicsCommunity IT Innovators
 
Does Your Organization Need a Better Technology Roadmap?
Does Your Organization Need a Better Technology Roadmap?Does Your Organization Need a Better Technology Roadmap?
Does Your Organization Need a Better Technology Roadmap?Community IT Innovators
 
2020 Nonprofit Technology Trends Roundtable
2020 Nonprofit Technology Trends Roundtable2020 Nonprofit Technology Trends Roundtable
2020 Nonprofit Technology Trends RoundtableCommunity IT Innovators
 
5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and MoreCommunity IT Innovators
 
How Data Quality Defines Your Organization Webinar November 2019
How Data Quality Defines Your Organization Webinar November 2019How Data Quality Defines Your Organization Webinar November 2019
How Data Quality Defines Your Organization Webinar November 2019Community IT Innovators
 
Nonprofit Cybersecurity Readiness - Community IT Innovators Webinar
Nonprofit Cybersecurity Readiness - Community IT Innovators WebinarNonprofit Cybersecurity Readiness - Community IT Innovators Webinar
Nonprofit Cybersecurity Readiness - Community IT Innovators WebinarCommunity IT Innovators
 
5 Steps to Create an Information Strategy for Your Organization
5 Steps to Create an Information Strategy for Your Organization5 Steps to Create an Information Strategy for Your Organization
5 Steps to Create an Information Strategy for Your OrganizationCommunity IT Innovators
 
Server 2008 and Windows 7 End of Life: 3 Things You Need to Know
Server 2008 and Windows 7 End of Life: 3 Things You Need to KnowServer 2008 and Windows 7 End of Life: 3 Things You Need to Know
Server 2008 and Windows 7 End of Life: 3 Things You Need to KnowCommunity IT Innovators
 
What Makes Nonprofit Tech Projects Succeed?
What Makes Nonprofit Tech Projects Succeed?What Makes Nonprofit Tech Projects Succeed?
What Makes Nonprofit Tech Projects Succeed?Community IT Innovators
 
Community IT Webinar: Working with an Outsourced IT Manager
Community IT Webinar: Working with an Outsourced IT ManagerCommunity IT Webinar: Working with an Outsourced IT Manager
Community IT Webinar: Working with an Outsourced IT ManagerCommunity IT Innovators
 
Improving Nonprofit CRM Data Management in 2019 - Build Consulting and Commun...
Improving Nonprofit CRM Data Management in 2019 - Build Consulting and Commun...Improving Nonprofit CRM Data Management in 2019 - Build Consulting and Commun...
Improving Nonprofit CRM Data Management in 2019 - Build Consulting and Commun...Community IT Innovators
 
Community IT Innovators Technology Trends Round Table 2019
Community IT Innovators Technology Trends Round Table 2019Community IT Innovators Technology Trends Round Table 2019
Community IT Innovators Technology Trends Round Table 2019Community IT Innovators
 
Selecting Nonprofit Software: Technology Comes Last
Selecting Nonprofit Software: Technology Comes LastSelecting Nonprofit Software: Technology Comes Last
Selecting Nonprofit Software: Technology Comes LastCommunity IT Innovators
 
IT Security Incident Response for Nonprofits
IT Security Incident Response for NonprofitsIT Security Incident Response for Nonprofits
IT Security Incident Response for NonprofitsCommunity IT Innovators
 

More from Community IT Innovators (20)

Slack, Microsoft Teams, Zoom: What Works Best for Nonprofits?
Slack, Microsoft Teams, Zoom: What Works Best for Nonprofits?Slack, Microsoft Teams, Zoom: What Works Best for Nonprofits?
Slack, Microsoft Teams, Zoom: What Works Best for Nonprofits?
 
2021 Nonprofit Cybersecurity Incident Report
2021 Nonprofit Cybersecurity Incident Report2021 Nonprofit Cybersecurity Incident Report
2021 Nonprofit Cybersecurity Incident Report
 
Cybersecurity Training for Nonprofits
Cybersecurity Training for NonprofitsCybersecurity Training for Nonprofits
Cybersecurity Training for Nonprofits
 
SharePoint Online for Nonprofits
SharePoint Online for NonprofitsSharePoint Online for Nonprofits
SharePoint Online for Nonprofits
 
Microsoft Dynamics and Salesforce: What You Need To Know Before Choosing a Pl...
Microsoft Dynamics and Salesforce: What You Need To Know Before Choosing a Pl...Microsoft Dynamics and Salesforce: What You Need To Know Before Choosing a Pl...
Microsoft Dynamics and Salesforce: What You Need To Know Before Choosing a Pl...
 
Nonprofit Cybersecurity Risk Assessment Basics
Nonprofit Cybersecurity Risk Assessment BasicsNonprofit Cybersecurity Risk Assessment Basics
Nonprofit Cybersecurity Risk Assessment Basics
 
Does Your Organization Need a Better Technology Roadmap?
Does Your Organization Need a Better Technology Roadmap?Does Your Organization Need a Better Technology Roadmap?
Does Your Organization Need a Better Technology Roadmap?
 
2020 Nonprofit Technology Trends Roundtable
2020 Nonprofit Technology Trends Roundtable2020 Nonprofit Technology Trends Roundtable
2020 Nonprofit Technology Trends Roundtable
 
5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More
 
How Data Quality Defines Your Organization Webinar November 2019
How Data Quality Defines Your Organization Webinar November 2019How Data Quality Defines Your Organization Webinar November 2019
How Data Quality Defines Your Organization Webinar November 2019
 
Nonprofit Cybersecurity Readiness - Community IT Innovators Webinar
Nonprofit Cybersecurity Readiness - Community IT Innovators WebinarNonprofit Cybersecurity Readiness - Community IT Innovators Webinar
Nonprofit Cybersecurity Readiness - Community IT Innovators Webinar
 
5 Steps to Create an Information Strategy for Your Organization
5 Steps to Create an Information Strategy for Your Organization5 Steps to Create an Information Strategy for Your Organization
5 Steps to Create an Information Strategy for Your Organization
 
Server 2008 and Windows 7 End of Life: 3 Things You Need to Know
Server 2008 and Windows 7 End of Life: 3 Things You Need to KnowServer 2008 and Windows 7 End of Life: 3 Things You Need to Know
Server 2008 and Windows 7 End of Life: 3 Things You Need to Know
 
What Makes Nonprofit Tech Projects Succeed?
What Makes Nonprofit Tech Projects Succeed?What Makes Nonprofit Tech Projects Succeed?
What Makes Nonprofit Tech Projects Succeed?
 
Community IT Webinar: Working with an Outsourced IT Manager
Community IT Webinar: Working with an Outsourced IT ManagerCommunity IT Webinar: Working with an Outsourced IT Manager
Community IT Webinar: Working with an Outsourced IT Manager
 
Nonprofit Cybersecurity Incident Report
Nonprofit Cybersecurity Incident ReportNonprofit Cybersecurity Incident Report
Nonprofit Cybersecurity Incident Report
 
Improving Nonprofit CRM Data Management in 2019 - Build Consulting and Commun...
Improving Nonprofit CRM Data Management in 2019 - Build Consulting and Commun...Improving Nonprofit CRM Data Management in 2019 - Build Consulting and Commun...
Improving Nonprofit CRM Data Management in 2019 - Build Consulting and Commun...
 
Community IT Innovators Technology Trends Round Table 2019
Community IT Innovators Technology Trends Round Table 2019Community IT Innovators Technology Trends Round Table 2019
Community IT Innovators Technology Trends Round Table 2019
 
Selecting Nonprofit Software: Technology Comes Last
Selecting Nonprofit Software: Technology Comes LastSelecting Nonprofit Software: Technology Comes Last
Selecting Nonprofit Software: Technology Comes Last
 
IT Security Incident Response for Nonprofits
IT Security Incident Response for NonprofitsIT Security Incident Response for Nonprofits
IT Security Incident Response for Nonprofits
 

Recently uploaded

"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsAndrey Dotsenko
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 

Recently uploaded (20)

"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 

Nonprofit IT Trends 2018

Editor's Notes

  1. Cloud computing adoption continues to grow. According to a Forbes report, organizations will dedicate 80% of their IT budgets to the cloud! -and we’ve seen this trend with our own clients especially around moving files to a cloud environment being Office 365, dropbox or even box. 
  2. User-driven Business needs are evolving because of the rapid change of cloud computing Environments need to adjust to this Environments need to keep up with the changes For easier, secure and seamless access
  3. Cloud computing adoption continues to grow. According to a Forbes report, organizations will dedicate 80% of their IT budgets to the cloud! -and we’ve seen this trend with our own clients especially around moving files to a cloud environment being Office 365, dropbox or even box.  Another trend I see for 2018, is that MS will continue working on taking the lead here. They continue making strikes to improve their cloud umbrella in Office 365. A recent example is the changes on how files sync locally from Office 365 document libraries. Last year Microsoft released On-demand synching with their windows 10 fall creator release. With Files On-Demand, you can access all your files in the cloud without having to download them and use storage on your computer. You can see all your files in File Explorer. This applies to personal and business version of OD and SharePoint libraries.  They also continue to invest in their productivity line: Office 365 groups, teams, Skype for Business, and working on integrating them better within their Office 365 ecosystem.   In addition, a lot of critical applications, accounting applications, donor databases, CRMs are making the transition to the cloud. All this is driving organizations to make decisions on ways to improve internet access, increasing speeds, and providing better ways for users to connect wirelessly. So increasing speeds is important but also provide a reliable way to connect throughout the office seamlessly, organizations are force to spent more on enterprise level solutions that will provide what users need to work effectively and efficiently.    You can see more and more that user experience is driving improvements across all products that compete within the cloud arena. Users are looking at cloud services across vendors, Google, Dropbox, Microsoft and look for tighter integration between cloud, critical applications and their local systems. It’s not about the product anymore, is about how these can help users simplify their work and help organizations be more productive and mobile.   Microsoft has a tremendous advantage with other cloud products. The majority of us work within windows and use the Office productivity suite. Microsoft poses a big lead among others like Google or Dropbox, as integration is becoming seamless for users that are within the Microsoft ecosystem. And not only that, but Microsoft is also crossing the bridge to better integration with Apple products. Their Office suite for macs is closing out to what you can do with a windows device. Furthermore, the user experience in not only focus on application integration, but also access integration… With many cloud services, how can we integrate access so that the user has a better experience? (SSO – I am sure Matt or Steve will talk about this)  And my last point…  With the eruption of the cloud, organizations are presented with an ever-increasing number of cloud technologies. All these different cloud products, and different needs…. looking for better productivity tools, looking for seamless integration, and better ways to access all of these cloud applications… All these needs are changing the landscape of what organizations are looking for in an IT provider, organizations face the need to partner with IT providers that can understand the organization needs, understand the organization vision, and can help them make a strategic decision on how to make that transition. Organizations are looking more seriously to IT providers to become their trusted advisor, and strategic partners as they transform into this new era.  Organizations no longer need the classic provider that will fix their computers so much, but rather look for a provider that can act as trusted advisors and help them with this transformation. As I said, there are a ton of cloud services to choose from, the question to answer is which cloud technology aligns best with their business objectives. So talking at that level about technology and the needs of the organization requires a more strategic approach and a different skill set that your typical IT provider might offer -and organizations are coming to that realization.           
  4. In addition, a lot of critical applications, accounting applications, donor databases, CRMs are making the transition to the cloud. All this is driving organizations to make decisions on ways to improve internet access, increasing speeds, and providing better ways for users to connect wirelessly. So increasing speeds is important but also provide a reliable way to connect throughout the office seamlessly, organizations are force to spent more on enterprise level solutions that will provide what users need to work effectively and efficiently. 
  5. With the eruption of the cloud, organizations are presented with an ever-increasing number of cloud technologies. All these different cloud products, and different needs…. looking for better productivity tools, looking for seamless integration, and better ways to access all of these cloud applications… All these needs are changing the landscape of what organizations are looking for in an IT provider, organizations face the need to partner with IT providers that can understand the organization needs, understand the organization vision, and can help them make a strategic decision on how to make that transition. Organizations are looking more seriously to IT providers to become their trusted advisor, and strategic partners as they transform into this new era.  Organizations no longer need the classic provider that will fix their computers so much, but rather look for a provider that can act as trusted advisors and help them with this transformation. As I said, there are a ton of cloud services to choose from, the question to answer is which cloud technology aligns best with their business objectives. So talking at that level about technology and the needs of the organization requires a more strategic approach and a different skill set that your typical IT provider might offer -and organizations are coming to that realization.
  6. Another trend I see for 2018, is that MS will continue working on taking the lead on cloud computing. They continue making strikes to improve their cloud umbrella in Office 365
  7. A recent example is the changes on how files sync locally from Office 365 document libraries. Last year Microsoft released On-demand synching with their windows 10 fall creator release. With Files On-Demand, you can access all your files in the cloud without having to download them and use storage on your computer. You can see all your files in File Explorer. This applies to personal and business version of OD and SharePoint libraries.  This is a game changer at least for some of our clients who have been looking on moving files to a cloud environment. Being able to sync files locally cuts on a lot of the change management that was traditionally needed. Microsoft also continue to invest in their productivity line: Office 365 groups, teams, Skype for Business, and working on integrating them better within their Office 365 ecosystem.   In addition, a lot of critical applications, accounting applications, donor databases, CRMs are making the transition to the cloud. All this is driving organizations to make decisions on ways to improve internet access, increasing speeds, and providing better ways for users to connect wirelessly. So increasing speeds is important but also provide a reliable way to connect throughout the office seamlessly, organizations are force to spent more on enterprise level solutions that will provide what users need to work effectively and efficiently.    You can see more and more that user experience is driving improvements across all products that compete within the cloud arena. Users are looking at cloud services across vendors, Google, Dropbox, Microsoft and look for tighter integration between cloud, critical applications and their local systems. It’s not about the product anymore, is about how these can help users simplify their work and help organizations be more productive and mobile.   Microsoft has a tremendous advantage with other cloud products. The majority of us work within windows and use the Office productivity suite. Microsoft poses a big lead among others like Google or Dropbox, as integration is becoming seamless for users that are within the Microsoft ecosystem. And not only that, but Microsoft is also crossing the bridge to better integration with Apple products. Their Office suite for macs is closing out to what you can do with a windows device. Furthermore, the user experience in not only focus on application integration, but also access integration… With many cloud services, how can we integrate access so that the user has a better experience? (SSO – I am sure Matt or Steve will talk about this)  And my last point…  With the eruption of the cloud, organizations are presented with an ever-increasing number of cloud technologies. All these different cloud products, and different needs…. looking for better productivity tools, looking for seamless integration, and better ways to access all of these cloud applications… All these needs are changing the landscape of what organizations are looking for in an IT provider, organizations face the need to partner with IT providers that can understand the organization needs, understand the organization vision, and can help them make a strategic decision on how to make that transition. Organizations are looking more seriously to IT providers to become their trusted advisor, and strategic partners as they transform into this new era.  Organizations no longer need the classic provider that will fix their computers so much, but rather look for a provider that can act as trusted advisors and help them with this transformation. As I said, there are a ton of cloud services to choose from, the question to answer is which cloud technology aligns best with their business objectives. So talking at that level about technology and the needs of the organization requires a more strategic approach and a different skill set that your typical IT provider might offer -and organizations are coming to that realization. 
  8. Windows 10 Fall Creators Update includes “OneDrive Files On-Demand.” Files On-Demand means a traditional folder hierarchy is becoming more possible since many interactions can now be through File Explorer, rather than a web browser. New sharing controls from Windows Explorer. Co-authoriting from Windows Explorer. “Modern Experience” was deployed throughout 2017, but we really saw it mature in the second half of 2017. We like the modern experience interface a lot, enough that we’ve been reluctant to employ “Document Sets” in new implementations of SharePoint because within document sets SP is forced to the Classic UI. Makes it easier to update metadata, to share documents, to see document history, etc. SharePoint continues to be an evolving service/product. Matt was playing with IRM this fall and sent me some test attachments. I was really impressed that I could open the documents, in either a browser or Word/Excel, but I couldn’t forward them, save them to another location, or even take screen shots of them. I’m sure there are ways to break it (and if nothing else, one can take a picture of the screen with your phone) but it definitely increases the barrier to willynilly sending intellectual property all over the world. We test drove Office 365 Teams (which tech writers immediately identified as a response to Slack) for a big project we undertook with a client this fall. Members of the team included not just our own internal people but also two of the IT folks on the clientside of the project. Teams (which it appears may be supplanting Office 365 Groups) is a “chat-based workspace.” It’s a bundle of Office 365 services including shared messages, tasks lists, email threads, files, etc. The idea is that you are a member of different teams and can see them all as different “channels”. It looks very millennial-friendly in the intro videos with special mentions of emoji and stickers (something I am not) and I confess my experience of the pilot didn’t change my life (I continue to be an email-bound old fogie) but I do see easy bundling of Office 365 services into some sort of team/group based bundles as an important improvement to the service and MS Teams might be the start of that. I just sent my first “FindTime” poll last week after being on the receiving end of them a few times now. I like it. Finding a common available meeting time is relatively easy when meeting with folks within your organization since you can see their free/busy information, but FindTime allows polling of external contacts for finding meeting times. You send a meeting request to a group of people with a number of meeting time options. Everyone indicates which times work for them and hopefully a common time emerges. It’s like combining Doodle and Outlook.
  9. Finance, CRM, file sharing, device management, are all done rather well through cloud services. I am helping a new client set up their very small brand new organization and everything is being done in the cloud.
  10. It’s a trend we expect to see gain ground amongst our clients as it really is the easiest/best way to reduce ability of hackers to compromised your accounts with stolen passwords.
  11. A recent example is the changes on how files sync locally from Office 365 document libraries. Last year Microsoft released On-demand synching with their windows 10 fall creator release. With Files On-Demand, you can access all your files in the cloud without having to download them and use storage on your computer. You can see all your files in File Explorer. This applies to personal and business version of OD and SharePoint libraries.  This is a game changer at least for some of our clients who have been looking on moving files to a cloud environment. Being able to sync files locally cuts on a lot of the change management that was traditionally needed. Microsoft also continue to invest in their productivity line: Office 365 groups, teams, Skype for Business, and working on integrating them better within their Office 365 ecosystem.   In addition, a lot of critical applications, accounting applications, donor databases, CRMs are making the transition to the cloud. All this is driving organizations to make decisions on ways to improve internet access, increasing speeds, and providing better ways for users to connect wirelessly. So increasing speeds is important but also provide a reliable way to connect throughout the office seamlessly, organizations are force to spent more on enterprise level solutions that will provide what users need to work effectively and efficiently.    You can see more and more that user experience is driving improvements across all products that compete within the cloud arena. Users are looking at cloud services across vendors, Google, Dropbox, Microsoft and look for tighter integration between cloud, critical applications and their local systems. It’s not about the product anymore, is about how these can help users simplify their work and help organizations be more productive and mobile.   Microsoft has a tremendous advantage with other cloud products. The majority of us work within windows and use the Office productivity suite. Microsoft poses a big lead among others like Google or Dropbox, as integration is becoming seamless for users that are within the Microsoft ecosystem. And not only that, but Microsoft is also crossing the bridge to better integration with Apple products. Their Office suite for macs is closing out to what you can do with a windows device. Furthermore, the user experience in not only focus on application integration, but also access integration… With many cloud services, how can we integrate access so that the user has a better experience? (SSO – I am sure Matt or Steve will talk about this)  And my last point…  With the eruption of the cloud, organizations are presented with an ever-increasing number of cloud technologies. All these different cloud products, and different needs…. looking for better productivity tools, looking for seamless integration, and better ways to access all of these cloud applications… All these needs are changing the landscape of what organizations are looking for in an IT provider, organizations face the need to partner with IT providers that can understand the organization needs, understand the organization vision, and can help them make a strategic decision on how to make that transition. Organizations are looking more seriously to IT providers to become their trusted advisor, and strategic partners as they transform into this new era.  Organizations no longer need the classic provider that will fix their computers so much, but rather look for a provider that can act as trusted advisors and help them with this transformation. As I said, there are a ton of cloud services to choose from, the question to answer is which cloud technology aligns best with their business objectives. So talking at that level about technology and the needs of the organization requires a more strategic approach and a different skill set that your typical IT provider might offer -and organizations are coming to that realization. 
  12. - What is your best guidance for balancing security, with reasonable policies that do not unreasonably impede team productivity?