SlideShare ist ein Scribd-Unternehmen logo
1 von 41
Downloaden Sie, um offline zu lesen
IT Security Best Practices
July 25, 2013
Community IT Innovators Webinar Series
Presenters:
Steve Longenecker
Mark Kraemer
Webinar Tips
• Ask questions
Post questions via chat
• Interact
Respond to polls during webinar
• Focus
Avoid multitasking. You may just miss the best part of the
presentation
• Webinar PowerPoint & Recording
PowerPoint and recording links will be shared after the webinar
About Community IT
Community IT Innovators partners with nonprofits to help them solve their
strategic & day-to-day IT challenges.
Strategic
Proactive approach so you can make IT decisions that support your
mission and grow with you
Collaborative
Team of over 40 staff who empower you to make informed IT choices
Invested
We are committed to supporting your mission, and take care of your IT
network as if it were our own
Nonprofit focus
Worked with over 900 nonprofits since 1993
Presenters
Steve Longenecker, Project Manager
slongenecker@communityit.com
Mark Kraemer, Network Administrator
mkraemer@communityit.com
Agenda
• The Big Picture
• Organizational Philosophy/Attitude
• Organizational Structures
• Security Technology
• End User Responsibility
• IT Security Stories
• Questions
The Big Picture
What are we hoping for when we say
we want our network to be secure?
• No interruptions to operations?
• No data loss?
• No inappropriate use of IT resources?
We are focused on the traditional view in
this webinar. For our purposes today:
IT Security means preventing unauthorized
access, misuse, modification or denial of IT
resources.(credit to Wikipedia)
What are your organization’s biggest IT
security challenges?
Poll question
Denial of Service attack prevents access to our
organization’s website for six hours.
Malware causes half my desktops to participate in a
“bot army.”
Interns are reading the personnel files of veteran staff
members.
The office manager is using your organization’s fantastic
Internet connection to download copyrighted movies
so he can burn them to DVD and watch them at home.
Examples
Organizational
Philosophy/Attitude
What is your organizational
balance between security,
accessibility and cost?
• What is your mission?
• Who do you serve?
• What types of data do you have?
• How many users?
• What does your existing security
infrastructure look like?
Assessing your organization’s risk
• Where do your users do most of their
work?
• Do they use their own devices?
• Do they need remote access to your
systems?
What are your accessibility
requirements?
• What is required by law or credentialing
organizations?
• What is the state of your current network?
• What is your IT budget?
What is the cost of security?
Organizational Structures
• Does your organization think about
security?
• Are user accountable for their actions?
• Do stakeholders understand what security
breaches can mean for the mission?
Security Culture
• Office Manager?
• HR person?
• CFO?
Someone needs to “own” security
Who is responsible for IT Security in your
organization?
Poll question
• Appropriate Use Policy.
• Password Policy.
• BYOD and BYOA Policies.
You Need Policies for End Users
• Patching Policy.
• Data Retention Policies
• Identity and Access management.
You Need Policies for the IT Dept
Confidentiality
CIA
Integrity Availability
Security Technology
• Patch Tuesday.
• Third Party Patching.
• How to patch? Day or Night? Force
Reboots?
• Alerts/Triggers on Monitors.
Centralized Patching/Monitoring
• NTFS Permissions.
• UAC.
• Event logs.
• Host Level Firewalls.
• Password Enforcement Group Policy.
• Screen Saver Lock Group Policy.
Windows Security Tools
• Community IT recommends Fortigates.
• Limit Outgoing Traffic.
• Limit Incoming Traffic’s Source Address
when Appropriate.
• Can provide VPN remote access.
• Replace every 5 years.
• Size appropriately.
• Maintain your firewall (update firmware,
backup, maintain support contract, remove
policies when no longer in use).
Firewalls
• Hosted is preferred.
• Mail Continuity service can be included.
• Postini was great.
• Community IT offers McAfee SaaS Email
Protection and Continuity to its clients.
Email Filters
• You must have it. You must maintain it.
• An enterprise solution is needed (includes
centralized management).
• Cloud-based is preferred so that traveling
laptops have access to updated definitions
whenever they are online.
• No solution is immune to the zero-day threat.
• Community IT offers Vipre Antivirus to its clients.
• AV software is no substitute for careful end user
behavior
Desktop/Server Antivirus Software
• Popular in school and lab scenarios.
• Doesn’t have to restrict access to content
areas.
• No substitute for good end user habits.
Internet Content Filtering
• Not something our clients are doing at
the enterprise level.
• Overhead – password/recovery system
needed.
• Can be circumvented.
File/Disk Encryption
• Hosted services are coming online, very
much a work in progress.
• Allows focus on maintaining a single
complex frequently changed password.
• Builds corporate ownership of distributed
hosted services.
Single Sign-On
• Two separate authentication systems
must be navigated to gain access –
famous example is the ATM machine.
• Google offers 2-factor authentication to
Gmail (and other Google apps).
• Key fobs replaced by “soft tokens” on
mobile phones.
Two Factor Authentication
• Mobile devices have become a
significant data leakage/loss
opportunity.
• Can conflict with BYOD expectations.
• On Community IT’s service offering road
map.
Mobile Device Management
End User Responsibility
• Safe email habits
• Safe password habits
• Safe browsing habits
• Safe social media habits
• Healthy skepticism of potential social
engineering attacks
Which of these practices does your staff
need to improve on the most?
Poll question
IT Security Stories
• Simple passwords.
• Domain Admin privileges.
• Virus Impacts
• Sharing of copyrighted material.
Questions?
Upcoming Webinar
August 29
Office 365 for Nonprofits
Presenter
Johanny Torrico
Next Steps
Connect with us
Provide feedback
Short survey after you exit the webinar. Be sure to include any
questions that were not answered.
Missed anything?
Link to slides & recording will be emailed to you.

Weitere ähnliche Inhalte

Was ist angesagt?

The Three Critical Steps for Effective BYOD Management
The Three Critical Steps for Effective BYOD Management The Three Critical Steps for Effective BYOD Management
The Three Critical Steps for Effective BYOD Management Kaseya
 
Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...
 Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf... Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...
Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...Information Security Awareness Group
 
Webinar: 12 Tips to Stay Safer Online - 2018-10-16
Webinar: 12 Tips to Stay Safer Online - 2018-10-16Webinar: 12 Tips to Stay Safer Online - 2018-10-16
Webinar: 12 Tips to Stay Safer Online - 2018-10-16TechSoup
 
5 Essential Tips for Creating An Effective BYOD Policy
5 Essential Tips for Creating An Effective BYOD Policy5 Essential Tips for Creating An Effective BYOD Policy
5 Essential Tips for Creating An Effective BYOD PolicyKaseya
 
Bring Your Own Device - DesktopDirect by Array Networks
 Bring Your Own Device - DesktopDirect by Array Networks Bring Your Own Device - DesktopDirect by Array Networks
Bring Your Own Device - DesktopDirect by Array NetworksIntellicomp GmbH
 
Leveraging Identity to Manage Change and Complexity
Leveraging Identity to Manage Change and ComplexityLeveraging Identity to Manage Change and Complexity
Leveraging Identity to Manage Change and ComplexityNetIQ
 
Mobile Device Managment
Mobile Device Managment Mobile Device Managment
Mobile Device Managment InnoTech
 
CA Unified Endpoint Management
CA Unified Endpoint ManagementCA Unified Endpoint Management
CA Unified Endpoint ManagementCA Technologies
 
Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...
Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...
Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...TechSoup
 
Cloud Software - Cloud-based System Security
Cloud Software - Cloud-based System SecurityCloud Software - Cloud-based System Security
Cloud Software - Cloud-based System SecurityNet at Work
 
Securing people that don't look like you, yet
Securing people that don't look like you, yetSecuring people that don't look like you, yet
Securing people that don't look like you, yetLaura Bell
 
Panel Discussion: Why IT Service and IT Asset Management are Better Together
Panel Discussion: Why IT Service and IT Asset Management are Better TogetherPanel Discussion: Why IT Service and IT Asset Management are Better Together
Panel Discussion: Why IT Service and IT Asset Management are Better TogetherIvanti
 
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19TechSoup
 
Upgrade Your Nonprofit’s Technology in 2021
 Upgrade Your Nonprofit’s Technology in 2021 Upgrade Your Nonprofit’s Technology in 2021
Upgrade Your Nonprofit’s Technology in 2021TechSoup
 
The digital natives are coming
The digital natives are comingThe digital natives are coming
The digital natives are comingSean Massey
 
MISA Cloud Workshop_ ipc privacy in the cloud
MISA Cloud Workshop_ ipc privacy in the cloudMISA Cloud Workshop_ ipc privacy in the cloud
MISA Cloud Workshop_ ipc privacy in the cloudMISA Ontario Cloud SIG
 
7.5 steps to overlaying byod & iot
7.5 steps to overlaying byod & iot7.5 steps to overlaying byod & iot
7.5 steps to overlaying byod & iotCaston Thomas
 
Webinar - Microsoft Windows 10 for Nonprofits and Libraries - 2015-08-27
Webinar - Microsoft Windows 10 for Nonprofits and Libraries - 2015-08-27Webinar - Microsoft Windows 10 for Nonprofits and Libraries - 2015-08-27
Webinar - Microsoft Windows 10 for Nonprofits and Libraries - 2015-08-27TechSoup
 
Selling to The IT Department
Selling to The IT DepartmentSelling to The IT Department
Selling to The IT Department3VR Inc.
 

Was ist angesagt? (20)

The Three Critical Steps for Effective BYOD Management
The Three Critical Steps for Effective BYOD Management The Three Critical Steps for Effective BYOD Management
The Three Critical Steps for Effective BYOD Management
 
Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...
 Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf... Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...
Mobile Device Security by Michael Gong, Jake Kreider, Chris Lugo, Kwame Osaf...
 
Webinar: 12 Tips to Stay Safer Online - 2018-10-16
Webinar: 12 Tips to Stay Safer Online - 2018-10-16Webinar: 12 Tips to Stay Safer Online - 2018-10-16
Webinar: 12 Tips to Stay Safer Online - 2018-10-16
 
5 Essential Tips for Creating An Effective BYOD Policy
5 Essential Tips for Creating An Effective BYOD Policy5 Essential Tips for Creating An Effective BYOD Policy
5 Essential Tips for Creating An Effective BYOD Policy
 
Bring Your Own Device - DesktopDirect by Array Networks
 Bring Your Own Device - DesktopDirect by Array Networks Bring Your Own Device - DesktopDirect by Array Networks
Bring Your Own Device - DesktopDirect by Array Networks
 
Leveraging Identity to Manage Change and Complexity
Leveraging Identity to Manage Change and ComplexityLeveraging Identity to Manage Change and Complexity
Leveraging Identity to Manage Change and Complexity
 
Mobile Device Managment
Mobile Device Managment Mobile Device Managment
Mobile Device Managment
 
CA Unified Endpoint Management
CA Unified Endpoint ManagementCA Unified Endpoint Management
CA Unified Endpoint Management
 
Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...
Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...
Developing Your Security Foundation: A Guide for Nonprofits During the Pandem...
 
Cloud Software - Cloud-based System Security
Cloud Software - Cloud-based System SecurityCloud Software - Cloud-based System Security
Cloud Software - Cloud-based System Security
 
Securing people that don't look like you, yet
Securing people that don't look like you, yetSecuring people that don't look like you, yet
Securing people that don't look like you, yet
 
Panel Discussion: Why IT Service and IT Asset Management are Better Together
Panel Discussion: Why IT Service and IT Asset Management are Better TogetherPanel Discussion: Why IT Service and IT Asset Management are Better Together
Panel Discussion: Why IT Service and IT Asset Management are Better Together
 
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
 
Upgrade Your Nonprofit’s Technology in 2021
 Upgrade Your Nonprofit’s Technology in 2021 Upgrade Your Nonprofit’s Technology in 2021
Upgrade Your Nonprofit’s Technology in 2021
 
The digital natives are coming
The digital natives are comingThe digital natives are coming
The digital natives are coming
 
MISA Cloud Workshop_ ipc privacy in the cloud
MISA Cloud Workshop_ ipc privacy in the cloudMISA Cloud Workshop_ ipc privacy in the cloud
MISA Cloud Workshop_ ipc privacy in the cloud
 
7.5 steps to overlaying byod & iot
7.5 steps to overlaying byod & iot7.5 steps to overlaying byod & iot
7.5 steps to overlaying byod & iot
 
Webinar - Microsoft Windows 10 for Nonprofits and Libraries - 2015-08-27
Webinar - Microsoft Windows 10 for Nonprofits and Libraries - 2015-08-27Webinar - Microsoft Windows 10 for Nonprofits and Libraries - 2015-08-27
Webinar - Microsoft Windows 10 for Nonprofits and Libraries - 2015-08-27
 
Selling to The IT Department
Selling to The IT DepartmentSelling to The IT Department
Selling to The IT Department
 
Cyber Security # Lec 5
Cyber Security # Lec 5Cyber Security # Lec 5
Cyber Security # Lec 5
 

Andere mochten auch

102912 vogel denise slideshare documents (georgian)
102912   vogel denise slideshare documents (georgian)102912   vogel denise slideshare documents (georgian)
102912 vogel denise slideshare documents (georgian)VogelDenise
 
021013 adecco email (norwegian)
021013   adecco email (norwegian)021013   adecco email (norwegian)
021013 adecco email (norwegian)VogelDenise
 
Barack obama christian or heathen (galician)
Barack obama   christian or heathen (galician)Barack obama   christian or heathen (galician)
Barack obama christian or heathen (galician)VogelDenise
 
Barack obama christian or heathen (urdu)
Barack obama   christian or heathen (urdu)Barack obama   christian or heathen (urdu)
Barack obama christian or heathen (urdu)VogelDenise
 
Barack obama christian or heathen (yiddish)
Barack obama   christian or heathen (yiddish)Barack obama   christian or heathen (yiddish)
Barack obama christian or heathen (yiddish)VogelDenise
 
Barack obama christian or heathen (filipino)
Barack obama   christian or heathen (filipino)Barack obama   christian or heathen (filipino)
Barack obama christian or heathen (filipino)VogelDenise
 
COMPLAINT - Andrea Constand vs William H Cosby
COMPLAINT - Andrea Constand vs William H CosbyCOMPLAINT - Andrea Constand vs William H Cosby
COMPLAINT - Andrea Constand vs William H CosbyVogelDenise
 
071310 obama email (czech)
071310   obama email (czech)071310   obama email (czech)
071310 obama email (czech)VogelDenise
 
031808 obama speech (latvian)
031808   obama speech (latvian)031808   obama speech (latvian)
031808 obama speech (latvian)VogelDenise
 
100112 obama reality check (update)-latin
100112 obama   reality check (update)-latin100112 obama   reality check (update)-latin
100112 obama reality check (update)-latinVogelDenise
 
United States of America – IMMIGRATION REFORM - INDONESIAN
United States of America – IMMIGRATION REFORM - INDONESIANUnited States of America – IMMIGRATION REFORM - INDONESIAN
United States of America – IMMIGRATION REFORM - INDONESIANVogelDenise
 
Obama us wars used to train white supremacist (persian)
Obama   us wars used to train white supremacist (persian)Obama   us wars used to train white supremacist (persian)
Obama us wars used to train white supremacist (persian)VogelDenise
 
100112 obama reality check (update)-swedish
100112 obama   reality check (update)-swedish100112 obama   reality check (update)-swedish
100112 obama reality check (update)-swedishVogelDenise
 
102912 vogel denise slideshare documents (belarusian)
102912   vogel denise slideshare documents (belarusian)102912   vogel denise slideshare documents (belarusian)
102912 vogel denise slideshare documents (belarusian)VogelDenise
 
071310 obama email (galician)
071310   obama email (galician)071310   obama email (galician)
071310 obama email (galician)VogelDenise
 
092812 david addington article (malay)
092812   david addington article (malay)092812   david addington article (malay)
092812 david addington article (malay)VogelDenise
 
RESERVED FOR THE ANNA LOUISE INN CRIMINAL COMPLAINT
RESERVED FOR THE ANNA LOUISE INN CRIMINAL COMPLAINTRESERVED FOR THE ANNA LOUISE INN CRIMINAL COMPLAINT
RESERVED FOR THE ANNA LOUISE INN CRIMINAL COMPLAINTVogelDenise
 
1.บทวิเคราะห์ประเทศเพื่อนบ้าน
1.บทวิเคราะห์ประเทศเพื่อนบ้าน1.บทวิเคราะห์ประเทศเพื่อนบ้าน
1.บทวิเคราะห์ประเทศเพื่อนบ้านNexus Art'Hit
 
07/13/10 Email To President Barack Obama (ENGLISH)
07/13/10 Email To President Barack Obama (ENGLISH)07/13/10 Email To President Barack Obama (ENGLISH)
07/13/10 Email To President Barack Obama (ENGLISH)VogelDenise
 

Andere mochten auch (20)

102912 vogel denise slideshare documents (georgian)
102912   vogel denise slideshare documents (georgian)102912   vogel denise slideshare documents (georgian)
102912 vogel denise slideshare documents (georgian)
 
021013 adecco email (norwegian)
021013   adecco email (norwegian)021013   adecco email (norwegian)
021013 adecco email (norwegian)
 
Barack obama christian or heathen (galician)
Barack obama   christian or heathen (galician)Barack obama   christian or heathen (galician)
Barack obama christian or heathen (galician)
 
Barack obama christian or heathen (urdu)
Barack obama   christian or heathen (urdu)Barack obama   christian or heathen (urdu)
Barack obama christian or heathen (urdu)
 
Barack obama christian or heathen (yiddish)
Barack obama   christian or heathen (yiddish)Barack obama   christian or heathen (yiddish)
Barack obama christian or heathen (yiddish)
 
Barack obama christian or heathen (filipino)
Barack obama   christian or heathen (filipino)Barack obama   christian or heathen (filipino)
Barack obama christian or heathen (filipino)
 
COMPLAINT - Andrea Constand vs William H Cosby
COMPLAINT - Andrea Constand vs William H CosbyCOMPLAINT - Andrea Constand vs William H Cosby
COMPLAINT - Andrea Constand vs William H Cosby
 
Madd 2007
Madd 2007Madd 2007
Madd 2007
 
071310 obama email (czech)
071310   obama email (czech)071310   obama email (czech)
071310 obama email (czech)
 
031808 obama speech (latvian)
031808   obama speech (latvian)031808   obama speech (latvian)
031808 obama speech (latvian)
 
100112 obama reality check (update)-latin
100112 obama   reality check (update)-latin100112 obama   reality check (update)-latin
100112 obama reality check (update)-latin
 
United States of America – IMMIGRATION REFORM - INDONESIAN
United States of America – IMMIGRATION REFORM - INDONESIANUnited States of America – IMMIGRATION REFORM - INDONESIAN
United States of America – IMMIGRATION REFORM - INDONESIAN
 
Obama us wars used to train white supremacist (persian)
Obama   us wars used to train white supremacist (persian)Obama   us wars used to train white supremacist (persian)
Obama us wars used to train white supremacist (persian)
 
100112 obama reality check (update)-swedish
100112 obama   reality check (update)-swedish100112 obama   reality check (update)-swedish
100112 obama reality check (update)-swedish
 
102912 vogel denise slideshare documents (belarusian)
102912   vogel denise slideshare documents (belarusian)102912   vogel denise slideshare documents (belarusian)
102912 vogel denise slideshare documents (belarusian)
 
071310 obama email (galician)
071310   obama email (galician)071310   obama email (galician)
071310 obama email (galician)
 
092812 david addington article (malay)
092812   david addington article (malay)092812   david addington article (malay)
092812 david addington article (malay)
 
RESERVED FOR THE ANNA LOUISE INN CRIMINAL COMPLAINT
RESERVED FOR THE ANNA LOUISE INN CRIMINAL COMPLAINTRESERVED FOR THE ANNA LOUISE INN CRIMINAL COMPLAINT
RESERVED FOR THE ANNA LOUISE INN CRIMINAL COMPLAINT
 
1.บทวิเคราะห์ประเทศเพื่อนบ้าน
1.บทวิเคราะห์ประเทศเพื่อนบ้าน1.บทวิเคราะห์ประเทศเพื่อนบ้าน
1.บทวิเคราะห์ประเทศเพื่อนบ้าน
 
07/13/10 Email To President Barack Obama (ENGLISH)
07/13/10 Email To President Barack Obama (ENGLISH)07/13/10 Email To President Barack Obama (ENGLISH)
07/13/10 Email To President Barack Obama (ENGLISH)
 

Ähnlich wie Community IT Innovators - IT Security Best Practices

BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestJay McLaughlin
 
Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Mark Williams
 
Community IT Webinar Series - Supporting Remote Workers
Community IT Webinar Series - Supporting Remote WorkersCommunity IT Webinar Series - Supporting Remote Workers
Community IT Webinar Series - Supporting Remote WorkersCommunity IT Innovators
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSonny Hashmi
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb esSonny Hashmi
 
The myth of secure computing; management information system; MIS
The myth of secure computing; management information system; MISThe myth of secure computing; management information system; MIS
The myth of secure computing; management information system; MISSaazan Shrestha
 
cloud session uklug
cloud session uklugcloud session uklug
cloud session uklugdominion
 
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...Kimberley Dray
 
Security For Business: Are You And Your Customers Safe
Security For Business:  Are You And Your Customers SafeSecurity For Business:  Are You And Your Customers Safe
Security For Business: Are You And Your Customers Safewoodsy01
 
Efficiencies in RPA with UiPath and CyberArk Technologies - Session 2
Efficiencies in RPA with UiPath and CyberArk Technologies - Session 2Efficiencies in RPA with UiPath and CyberArk Technologies - Session 2
Efficiencies in RPA with UiPath and CyberArk Technologies - Session 2DianaGray10
 
Andrew Shepherd - Rethink the service desk role to change its image forever
Andrew Shepherd - Rethink the service desk role to change its image foreverAndrew Shepherd - Rethink the service desk role to change its image forever
Andrew Shepherd - Rethink the service desk role to change its image foreveritSMF UK
 
Endpoint Security & Why It Matters!
Endpoint Security & Why It Matters!Endpoint Security & Why It Matters!
Endpoint Security & Why It Matters!Net at Work
 
July webinar slides industry 4.0 view from the front lines
July webinar slides industry 4.0  view  from the front linesJuly webinar slides industry 4.0  view  from the front lines
July webinar slides industry 4.0 view from the front linesInductive Automation
 
Community IT Webinar - Crafting IT Security Policy Apr 2015
Community IT Webinar - Crafting IT Security Policy Apr 2015Community IT Webinar - Crafting IT Security Policy Apr 2015
Community IT Webinar - Crafting IT Security Policy Apr 2015Community IT Innovators
 
BATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern48_How Zero Trust can help your organisation keep safe.pdfBATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern48_How Zero Trust can help your organisation keep safe.pdfBATbern
 
Enterprise IT Security| CIO Innovation and Leadership
Enterprise IT Security| CIO Innovation and LeadershipEnterprise IT Security| CIO Innovation and Leadership
Enterprise IT Security| CIO Innovation and LeadershipRedZone Technologies
 
Webinar - Should You Contract Out Your Nonprofit's Tech? IT Assist and Manage...
Webinar - Should You Contract Out Your Nonprofit's Tech? IT Assist and Manage...Webinar - Should You Contract Out Your Nonprofit's Tech? IT Assist and Manage...
Webinar - Should You Contract Out Your Nonprofit's Tech? IT Assist and Manage...TechSoup
 

Ähnlich wie Community IT Innovators - IT Security Best Practices (20)

CIO 360 grados: empoderamiento total
CIO 360 grados: empoderamiento totalCIO 360 grados: empoderamiento total
CIO 360 grados: empoderamiento total
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
 
Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Cloud Security: A matter of trust?
Cloud Security: A matter of trust?
 
U nit 4
U nit 4U nit 4
U nit 4
 
Community IT Webinar Series - Supporting Remote Workers
Community IT Webinar Series - Supporting Remote WorkersCommunity IT Webinar Series - Supporting Remote Workers
Community IT Webinar Series - Supporting Remote Workers
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEs
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb es
 
The myth of secure computing; management information system; MIS
The myth of secure computing; management information system; MISThe myth of secure computing; management information system; MIS
The myth of secure computing; management information system; MIS
 
cloud session uklug
cloud session uklugcloud session uklug
cloud session uklug
 
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...
 
Security For Business: Are You And Your Customers Safe
Security For Business:  Are You And Your Customers SafeSecurity For Business:  Are You And Your Customers Safe
Security For Business: Are You And Your Customers Safe
 
Efficiencies in RPA with UiPath and CyberArk Technologies - Session 2
Efficiencies in RPA with UiPath and CyberArk Technologies - Session 2Efficiencies in RPA with UiPath and CyberArk Technologies - Session 2
Efficiencies in RPA with UiPath and CyberArk Technologies - Session 2
 
Andy Malone - Microsoft office 365 security deep dive
Andy Malone - Microsoft office 365 security deep diveAndy Malone - Microsoft office 365 security deep dive
Andy Malone - Microsoft office 365 security deep dive
 
Andrew Shepherd - Rethink the service desk role to change its image forever
Andrew Shepherd - Rethink the service desk role to change its image foreverAndrew Shepherd - Rethink the service desk role to change its image forever
Andrew Shepherd - Rethink the service desk role to change its image forever
 
Endpoint Security & Why It Matters!
Endpoint Security & Why It Matters!Endpoint Security & Why It Matters!
Endpoint Security & Why It Matters!
 
July webinar slides industry 4.0 view from the front lines
July webinar slides industry 4.0  view  from the front linesJuly webinar slides industry 4.0  view  from the front lines
July webinar slides industry 4.0 view from the front lines
 
Community IT Webinar - Crafting IT Security Policy Apr 2015
Community IT Webinar - Crafting IT Security Policy Apr 2015Community IT Webinar - Crafting IT Security Policy Apr 2015
Community IT Webinar - Crafting IT Security Policy Apr 2015
 
BATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern48_How Zero Trust can help your organisation keep safe.pdfBATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern48_How Zero Trust can help your organisation keep safe.pdf
 
Enterprise IT Security| CIO Innovation and Leadership
Enterprise IT Security| CIO Innovation and LeadershipEnterprise IT Security| CIO Innovation and Leadership
Enterprise IT Security| CIO Innovation and Leadership
 
Webinar - Should You Contract Out Your Nonprofit's Tech? IT Assist and Manage...
Webinar - Should You Contract Out Your Nonprofit's Tech? IT Assist and Manage...Webinar - Should You Contract Out Your Nonprofit's Tech? IT Assist and Manage...
Webinar - Should You Contract Out Your Nonprofit's Tech? IT Assist and Manage...
 

Mehr von Community IT Innovators

Slack, Microsoft Teams, Zoom: What Works Best for Nonprofits?
Slack, Microsoft Teams, Zoom: What Works Best for Nonprofits?Slack, Microsoft Teams, Zoom: What Works Best for Nonprofits?
Slack, Microsoft Teams, Zoom: What Works Best for Nonprofits?Community IT Innovators
 
2021 Nonprofit Cybersecurity Incident Report
2021 Nonprofit Cybersecurity Incident Report2021 Nonprofit Cybersecurity Incident Report
2021 Nonprofit Cybersecurity Incident ReportCommunity IT Innovators
 
Microsoft Dynamics and Salesforce: What You Need To Know Before Choosing a Pl...
Microsoft Dynamics and Salesforce: What You Need To Know Before Choosing a Pl...Microsoft Dynamics and Salesforce: What You Need To Know Before Choosing a Pl...
Microsoft Dynamics and Salesforce: What You Need To Know Before Choosing a Pl...Community IT Innovators
 
Nonprofit Cybersecurity Risk Assessment Basics
Nonprofit Cybersecurity Risk Assessment BasicsNonprofit Cybersecurity Risk Assessment Basics
Nonprofit Cybersecurity Risk Assessment BasicsCommunity IT Innovators
 
Does Your Organization Need a Better Technology Roadmap?
Does Your Organization Need a Better Technology Roadmap?Does Your Organization Need a Better Technology Roadmap?
Does Your Organization Need a Better Technology Roadmap?Community IT Innovators
 
2020 Nonprofit Technology Trends Roundtable
2020 Nonprofit Technology Trends Roundtable2020 Nonprofit Technology Trends Roundtable
2020 Nonprofit Technology Trends RoundtableCommunity IT Innovators
 
5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and MoreCommunity IT Innovators
 
How Data Quality Defines Your Organization Webinar November 2019
How Data Quality Defines Your Organization Webinar November 2019How Data Quality Defines Your Organization Webinar November 2019
How Data Quality Defines Your Organization Webinar November 2019Community IT Innovators
 
Nonprofit Cybersecurity Readiness - Community IT Innovators Webinar
Nonprofit Cybersecurity Readiness - Community IT Innovators WebinarNonprofit Cybersecurity Readiness - Community IT Innovators Webinar
Nonprofit Cybersecurity Readiness - Community IT Innovators WebinarCommunity IT Innovators
 
5 Steps to Create an Information Strategy for Your Organization
5 Steps to Create an Information Strategy for Your Organization5 Steps to Create an Information Strategy for Your Organization
5 Steps to Create an Information Strategy for Your OrganizationCommunity IT Innovators
 
Server 2008 and Windows 7 End of Life: 3 Things You Need to Know
Server 2008 and Windows 7 End of Life: 3 Things You Need to KnowServer 2008 and Windows 7 End of Life: 3 Things You Need to Know
Server 2008 and Windows 7 End of Life: 3 Things You Need to KnowCommunity IT Innovators
 
What Makes Nonprofit Tech Projects Succeed?
What Makes Nonprofit Tech Projects Succeed?What Makes Nonprofit Tech Projects Succeed?
What Makes Nonprofit Tech Projects Succeed?Community IT Innovators
 
Community IT Webinar: Working with an Outsourced IT Manager
Community IT Webinar: Working with an Outsourced IT ManagerCommunity IT Webinar: Working with an Outsourced IT Manager
Community IT Webinar: Working with an Outsourced IT ManagerCommunity IT Innovators
 
Improving Nonprofit CRM Data Management in 2019 - Build Consulting and Commun...
Improving Nonprofit CRM Data Management in 2019 - Build Consulting and Commun...Improving Nonprofit CRM Data Management in 2019 - Build Consulting and Commun...
Improving Nonprofit CRM Data Management in 2019 - Build Consulting and Commun...Community IT Innovators
 
Community IT Innovators Technology Trends Round Table 2019
Community IT Innovators Technology Trends Round Table 2019Community IT Innovators Technology Trends Round Table 2019
Community IT Innovators Technology Trends Round Table 2019Community IT Innovators
 
Selecting Nonprofit Software: Technology Comes Last
Selecting Nonprofit Software: Technology Comes LastSelecting Nonprofit Software: Technology Comes Last
Selecting Nonprofit Software: Technology Comes LastCommunity IT Innovators
 
IT Security Incident Response for Nonprofits
IT Security Incident Response for NonprofitsIT Security Incident Response for Nonprofits
IT Security Incident Response for NonprofitsCommunity IT Innovators
 

Mehr von Community IT Innovators (20)

Slack, Microsoft Teams, Zoom: What Works Best for Nonprofits?
Slack, Microsoft Teams, Zoom: What Works Best for Nonprofits?Slack, Microsoft Teams, Zoom: What Works Best for Nonprofits?
Slack, Microsoft Teams, Zoom: What Works Best for Nonprofits?
 
2021 Nonprofit Cybersecurity Incident Report
2021 Nonprofit Cybersecurity Incident Report2021 Nonprofit Cybersecurity Incident Report
2021 Nonprofit Cybersecurity Incident Report
 
Cybersecurity Training for Nonprofits
Cybersecurity Training for NonprofitsCybersecurity Training for Nonprofits
Cybersecurity Training for Nonprofits
 
SharePoint Online for Nonprofits
SharePoint Online for NonprofitsSharePoint Online for Nonprofits
SharePoint Online for Nonprofits
 
Microsoft Dynamics and Salesforce: What You Need To Know Before Choosing a Pl...
Microsoft Dynamics and Salesforce: What You Need To Know Before Choosing a Pl...Microsoft Dynamics and Salesforce: What You Need To Know Before Choosing a Pl...
Microsoft Dynamics and Salesforce: What You Need To Know Before Choosing a Pl...
 
Nonprofit Cybersecurity Risk Assessment Basics
Nonprofit Cybersecurity Risk Assessment BasicsNonprofit Cybersecurity Risk Assessment Basics
Nonprofit Cybersecurity Risk Assessment Basics
 
Does Your Organization Need a Better Technology Roadmap?
Does Your Organization Need a Better Technology Roadmap?Does Your Organization Need a Better Technology Roadmap?
Does Your Organization Need a Better Technology Roadmap?
 
2020 Nonprofit Technology Trends Roundtable
2020 Nonprofit Technology Trends Roundtable2020 Nonprofit Technology Trends Roundtable
2020 Nonprofit Technology Trends Roundtable
 
5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More
 
How Data Quality Defines Your Organization Webinar November 2019
How Data Quality Defines Your Organization Webinar November 2019How Data Quality Defines Your Organization Webinar November 2019
How Data Quality Defines Your Organization Webinar November 2019
 
Nonprofit Cybersecurity Readiness - Community IT Innovators Webinar
Nonprofit Cybersecurity Readiness - Community IT Innovators WebinarNonprofit Cybersecurity Readiness - Community IT Innovators Webinar
Nonprofit Cybersecurity Readiness - Community IT Innovators Webinar
 
5 Steps to Create an Information Strategy for Your Organization
5 Steps to Create an Information Strategy for Your Organization5 Steps to Create an Information Strategy for Your Organization
5 Steps to Create an Information Strategy for Your Organization
 
Server 2008 and Windows 7 End of Life: 3 Things You Need to Know
Server 2008 and Windows 7 End of Life: 3 Things You Need to KnowServer 2008 and Windows 7 End of Life: 3 Things You Need to Know
Server 2008 and Windows 7 End of Life: 3 Things You Need to Know
 
What Makes Nonprofit Tech Projects Succeed?
What Makes Nonprofit Tech Projects Succeed?What Makes Nonprofit Tech Projects Succeed?
What Makes Nonprofit Tech Projects Succeed?
 
Community IT Webinar: Working with an Outsourced IT Manager
Community IT Webinar: Working with an Outsourced IT ManagerCommunity IT Webinar: Working with an Outsourced IT Manager
Community IT Webinar: Working with an Outsourced IT Manager
 
Nonprofit Cybersecurity Incident Report
Nonprofit Cybersecurity Incident ReportNonprofit Cybersecurity Incident Report
Nonprofit Cybersecurity Incident Report
 
Improving Nonprofit CRM Data Management in 2019 - Build Consulting and Commun...
Improving Nonprofit CRM Data Management in 2019 - Build Consulting and Commun...Improving Nonprofit CRM Data Management in 2019 - Build Consulting and Commun...
Improving Nonprofit CRM Data Management in 2019 - Build Consulting and Commun...
 
Community IT Innovators Technology Trends Round Table 2019
Community IT Innovators Technology Trends Round Table 2019Community IT Innovators Technology Trends Round Table 2019
Community IT Innovators Technology Trends Round Table 2019
 
Selecting Nonprofit Software: Technology Comes Last
Selecting Nonprofit Software: Technology Comes LastSelecting Nonprofit Software: Technology Comes Last
Selecting Nonprofit Software: Technology Comes Last
 
IT Security Incident Response for Nonprofits
IT Security Incident Response for NonprofitsIT Security Incident Response for Nonprofits
IT Security Incident Response for Nonprofits
 

Kürzlich hochgeladen

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 

Kürzlich hochgeladen (20)

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 

Community IT Innovators - IT Security Best Practices

  • 1. IT Security Best Practices July 25, 2013 Community IT Innovators Webinar Series Presenters: Steve Longenecker Mark Kraemer
  • 2. Webinar Tips • Ask questions Post questions via chat • Interact Respond to polls during webinar • Focus Avoid multitasking. You may just miss the best part of the presentation • Webinar PowerPoint & Recording PowerPoint and recording links will be shared after the webinar
  • 3. About Community IT Community IT Innovators partners with nonprofits to help them solve their strategic & day-to-day IT challenges. Strategic Proactive approach so you can make IT decisions that support your mission and grow with you Collaborative Team of over 40 staff who empower you to make informed IT choices Invested We are committed to supporting your mission, and take care of your IT network as if it were our own Nonprofit focus Worked with over 900 nonprofits since 1993
  • 4. Presenters Steve Longenecker, Project Manager slongenecker@communityit.com Mark Kraemer, Network Administrator mkraemer@communityit.com
  • 5. Agenda • The Big Picture • Organizational Philosophy/Attitude • Organizational Structures • Security Technology • End User Responsibility • IT Security Stories • Questions
  • 7. What are we hoping for when we say we want our network to be secure? • No interruptions to operations? • No data loss? • No inappropriate use of IT resources?
  • 8. We are focused on the traditional view in this webinar. For our purposes today: IT Security means preventing unauthorized access, misuse, modification or denial of IT resources.(credit to Wikipedia)
  • 9. What are your organization’s biggest IT security challenges? Poll question
  • 10. Denial of Service attack prevents access to our organization’s website for six hours. Malware causes half my desktops to participate in a “bot army.” Interns are reading the personnel files of veteran staff members. The office manager is using your organization’s fantastic Internet connection to download copyrighted movies so he can burn them to DVD and watch them at home. Examples
  • 12. What is your organizational balance between security, accessibility and cost?
  • 13. • What is your mission? • Who do you serve? • What types of data do you have? • How many users? • What does your existing security infrastructure look like? Assessing your organization’s risk
  • 14. • Where do your users do most of their work? • Do they use their own devices? • Do they need remote access to your systems? What are your accessibility requirements?
  • 15. • What is required by law or credentialing organizations? • What is the state of your current network? • What is your IT budget? What is the cost of security?
  • 17. • Does your organization think about security? • Are user accountable for their actions? • Do stakeholders understand what security breaches can mean for the mission? Security Culture
  • 18. • Office Manager? • HR person? • CFO? Someone needs to “own” security
  • 19. Who is responsible for IT Security in your organization? Poll question
  • 20. • Appropriate Use Policy. • Password Policy. • BYOD and BYOA Policies. You Need Policies for End Users
  • 21. • Patching Policy. • Data Retention Policies • Identity and Access management. You Need Policies for the IT Dept
  • 24. • Patch Tuesday. • Third Party Patching. • How to patch? Day or Night? Force Reboots? • Alerts/Triggers on Monitors. Centralized Patching/Monitoring
  • 25. • NTFS Permissions. • UAC. • Event logs. • Host Level Firewalls. • Password Enforcement Group Policy. • Screen Saver Lock Group Policy. Windows Security Tools
  • 26. • Community IT recommends Fortigates. • Limit Outgoing Traffic. • Limit Incoming Traffic’s Source Address when Appropriate. • Can provide VPN remote access. • Replace every 5 years. • Size appropriately. • Maintain your firewall (update firmware, backup, maintain support contract, remove policies when no longer in use). Firewalls
  • 27. • Hosted is preferred. • Mail Continuity service can be included. • Postini was great. • Community IT offers McAfee SaaS Email Protection and Continuity to its clients. Email Filters
  • 28. • You must have it. You must maintain it. • An enterprise solution is needed (includes centralized management). • Cloud-based is preferred so that traveling laptops have access to updated definitions whenever they are online. • No solution is immune to the zero-day threat. • Community IT offers Vipre Antivirus to its clients. • AV software is no substitute for careful end user behavior Desktop/Server Antivirus Software
  • 29. • Popular in school and lab scenarios. • Doesn’t have to restrict access to content areas. • No substitute for good end user habits. Internet Content Filtering
  • 30. • Not something our clients are doing at the enterprise level. • Overhead – password/recovery system needed. • Can be circumvented. File/Disk Encryption
  • 31. • Hosted services are coming online, very much a work in progress. • Allows focus on maintaining a single complex frequently changed password. • Builds corporate ownership of distributed hosted services. Single Sign-On
  • 32. • Two separate authentication systems must be navigated to gain access – famous example is the ATM machine. • Google offers 2-factor authentication to Gmail (and other Google apps). • Key fobs replaced by “soft tokens” on mobile phones. Two Factor Authentication
  • 33. • Mobile devices have become a significant data leakage/loss opportunity. • Can conflict with BYOD expectations. • On Community IT’s service offering road map. Mobile Device Management
  • 35. • Safe email habits • Safe password habits • Safe browsing habits • Safe social media habits • Healthy skepticism of potential social engineering attacks
  • 36. Which of these practices does your staff need to improve on the most? Poll question
  • 38. • Simple passwords. • Domain Admin privileges. • Virus Impacts • Sharing of copyrighted material.
  • 40. Upcoming Webinar August 29 Office 365 for Nonprofits Presenter Johanny Torrico
  • 41. Next Steps Connect with us Provide feedback Short survey after you exit the webinar. Be sure to include any questions that were not answered. Missed anything? Link to slides & recording will be emailed to you.