SlideShare ist ein Scribd-Unternehmen logo
1 von 21
Remote Staff, Office Staff
Tech Tips For Nonprofits
Webinar
Series
June 2020
Johan Hammerstrom
CEO
Presenter
Presenter
Johanny Torrico
COO
Presenter
Steve Longenecker
Dir IT Consulting
About Community IT
Advancing mission
through the effective use
of technology.
100% Employee Owned
Agenda
Remote Work Best Practices
Cybersecurity Landscape
Good Cybersecurity Practices
Reintegrating work
Remote Work Challenges
Management / reporting harder
Remote work opens up security holes
Difficult to access specialized applications
Proactive planning pays off
Remote Work Best Practices
Leverage the cloud
De-centralized equipment
Centralized management
Video and chat to stay in touch
Ecosystems
Video & Chat
Orgs already have
secure tools
available to them
Microsoft Teams
Google Meet
Orgs with significant
Privacy and Security
concerns
Wire
Signal
Jitsi
Using Zoom?
Update your
client
Follow good
meeting security
practices
Includes Video
Conferencing
• Google Meet
• https://support.google.com/a/users/answer
/9282720?hl=en
• Microsoft Teams
• https://communityit.com/microsoft-teams-
for-nonprofits/
Zoom Video
Conferencing
• Easy to use
• Great for peer to peer collaboration
• Follow best practices for keeping meeting
secure
• https://communityit.com/nonprofit-
cybersecurity-tips-zoom/
• Mixed record on privacy and security
CYBERSECURITY LANDSCAPE
Persistent and ongoing
brute force attacks on
identities
Sophisticated spear
phishing
Organizations targeted
because of the work
they do
Attacks targeting
vendors
CYBERSECURITY LANDSCAPE
New security tools available
to combat new threat types.
Organizations more
proactive about asking
where to start improving
their cybersecurity.
60% of Nonprofits don’t
know how their org handles
cybersecurity risk.
Breach response for a small
to medium business is
$149,000
Security Risks
– Remote
Work
• Opens up more remote access with single factor
authentication
• Remote Desktop Server
• VPN
• Work devices being used by family
• Personal devices used for work
• Increase in targeting phishing
• New apps needed to stay connected
Important
Security
Practices
• Update your computers (reboot weekly)
• Make sure your data is backed up
• Enable Multi Factor Authentication
• Use a password manager
• Enroll in Security Awareness Training
• Use organization provided systems
Reintegrating
Remote Work -
Data
• Communicate systems of record
• Rein in data sprawl
• Move data from personal to organizational
systems
• Incorporate new systems
• Train the trainer
• Ensure systems meet org policies
Reintegrating
Remote Work -
Devices
• Make sure systems up to date with patches
• Make sure systems are clean
• Update / remove controls associated with shared use
• Update / rotate local admin credentials
Reintegrating
Remote Work -
Policy
• Revisit Business Continuity Plans
• What worked
• What needs revised
• Revisit IT Policy
• Incorporate new scenarios
• Revise to address changing business landscape
• Update IT Planning
• Accelerate cloud centric computing
• Plan for more mobile workforce
• Invest in tools to manage distributed computers
Upcoming
Webinar
Nonprofit Cybersecurity Risk
Assessment Basics
Wednesday July 15
3:00 – 4:00 PM EST
Questions?

Weitere ähnliche Inhalte

Mehr von Community IT Innovators

5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and MoreCommunity IT Innovators
 
How Data Quality Defines Your Organization Webinar November 2019
How Data Quality Defines Your Organization Webinar November 2019How Data Quality Defines Your Organization Webinar November 2019
How Data Quality Defines Your Organization Webinar November 2019Community IT Innovators
 
Nonprofit Cybersecurity Readiness - Community IT Innovators Webinar
Nonprofit Cybersecurity Readiness - Community IT Innovators WebinarNonprofit Cybersecurity Readiness - Community IT Innovators Webinar
Nonprofit Cybersecurity Readiness - Community IT Innovators WebinarCommunity IT Innovators
 
5 Steps to Create an Information Strategy for Your Organization
5 Steps to Create an Information Strategy for Your Organization5 Steps to Create an Information Strategy for Your Organization
5 Steps to Create an Information Strategy for Your OrganizationCommunity IT Innovators
 
Server 2008 and Windows 7 End of Life: 3 Things You Need to Know
Server 2008 and Windows 7 End of Life: 3 Things You Need to KnowServer 2008 and Windows 7 End of Life: 3 Things You Need to Know
Server 2008 and Windows 7 End of Life: 3 Things You Need to KnowCommunity IT Innovators
 
What Makes Nonprofit Tech Projects Succeed?
What Makes Nonprofit Tech Projects Succeed?What Makes Nonprofit Tech Projects Succeed?
What Makes Nonprofit Tech Projects Succeed?Community IT Innovators
 
Community IT Webinar: Working with an Outsourced IT Manager
Community IT Webinar: Working with an Outsourced IT ManagerCommunity IT Webinar: Working with an Outsourced IT Manager
Community IT Webinar: Working with an Outsourced IT ManagerCommunity IT Innovators
 
Improving Nonprofit CRM Data Management in 2019 - Build Consulting and Commun...
Improving Nonprofit CRM Data Management in 2019 - Build Consulting and Commun...Improving Nonprofit CRM Data Management in 2019 - Build Consulting and Commun...
Improving Nonprofit CRM Data Management in 2019 - Build Consulting and Commun...Community IT Innovators
 
Community IT Innovators Technology Trends Round Table 2019
Community IT Innovators Technology Trends Round Table 2019Community IT Innovators Technology Trends Round Table 2019
Community IT Innovators Technology Trends Round Table 2019Community IT Innovators
 
Selecting Nonprofit Software: Technology Comes Last
Selecting Nonprofit Software: Technology Comes LastSelecting Nonprofit Software: Technology Comes Last
Selecting Nonprofit Software: Technology Comes LastCommunity IT Innovators
 
IT Security Incident Response for Nonprofits
IT Security Incident Response for NonprofitsIT Security Incident Response for Nonprofits
IT Security Incident Response for NonprofitsCommunity IT Innovators
 
Nonprofit Development Operations and Technology
Nonprofit Development Operations and TechnologyNonprofit Development Operations and Technology
Nonprofit Development Operations and TechnologyCommunity IT Innovators
 
18NTC Nonprofit Technology Conference Round Up
18NTC Nonprofit Technology Conference Round Up18NTC Nonprofit Technology Conference Round Up
18NTC Nonprofit Technology Conference Round UpCommunity IT Innovators
 
Five Hacks to Weave Constituent Experience Into Your Organization
Five Hacks to Weave Constituent Experience Into Your OrganizationFive Hacks to Weave Constituent Experience Into Your Organization
Five Hacks to Weave Constituent Experience Into Your OrganizationCommunity IT Innovators
 

Mehr von Community IT Innovators (20)

5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More
 
How Data Quality Defines Your Organization Webinar November 2019
How Data Quality Defines Your Organization Webinar November 2019How Data Quality Defines Your Organization Webinar November 2019
How Data Quality Defines Your Organization Webinar November 2019
 
Nonprofit Cybersecurity Readiness - Community IT Innovators Webinar
Nonprofit Cybersecurity Readiness - Community IT Innovators WebinarNonprofit Cybersecurity Readiness - Community IT Innovators Webinar
Nonprofit Cybersecurity Readiness - Community IT Innovators Webinar
 
5 Steps to Create an Information Strategy for Your Organization
5 Steps to Create an Information Strategy for Your Organization5 Steps to Create an Information Strategy for Your Organization
5 Steps to Create an Information Strategy for Your Organization
 
Server 2008 and Windows 7 End of Life: 3 Things You Need to Know
Server 2008 and Windows 7 End of Life: 3 Things You Need to KnowServer 2008 and Windows 7 End of Life: 3 Things You Need to Know
Server 2008 and Windows 7 End of Life: 3 Things You Need to Know
 
What Makes Nonprofit Tech Projects Succeed?
What Makes Nonprofit Tech Projects Succeed?What Makes Nonprofit Tech Projects Succeed?
What Makes Nonprofit Tech Projects Succeed?
 
Community IT Webinar: Working with an Outsourced IT Manager
Community IT Webinar: Working with an Outsourced IT ManagerCommunity IT Webinar: Working with an Outsourced IT Manager
Community IT Webinar: Working with an Outsourced IT Manager
 
Nonprofit Cybersecurity Incident Report
Nonprofit Cybersecurity Incident ReportNonprofit Cybersecurity Incident Report
Nonprofit Cybersecurity Incident Report
 
Improving Nonprofit CRM Data Management in 2019 - Build Consulting and Commun...
Improving Nonprofit CRM Data Management in 2019 - Build Consulting and Commun...Improving Nonprofit CRM Data Management in 2019 - Build Consulting and Commun...
Improving Nonprofit CRM Data Management in 2019 - Build Consulting and Commun...
 
Community IT Innovators Technology Trends Round Table 2019
Community IT Innovators Technology Trends Round Table 2019Community IT Innovators Technology Trends Round Table 2019
Community IT Innovators Technology Trends Round Table 2019
 
Selecting Nonprofit Software: Technology Comes Last
Selecting Nonprofit Software: Technology Comes LastSelecting Nonprofit Software: Technology Comes Last
Selecting Nonprofit Software: Technology Comes Last
 
IT Security Incident Response for Nonprofits
IT Security Incident Response for NonprofitsIT Security Incident Response for Nonprofits
IT Security Incident Response for Nonprofits
 
Office 365 Security Best Practices
Office 365 Security Best PracticesOffice 365 Security Best Practices
Office 365 Security Best Practices
 
Nonprofit Development, Meet Accounting!
Nonprofit Development, Meet Accounting!Nonprofit Development, Meet Accounting!
Nonprofit Development, Meet Accounting!
 
IT Management Fundamentals
IT Management FundamentalsIT Management Fundamentals
IT Management Fundamentals
 
Encryption 101 for Nonprofits
Encryption 101 for NonprofitsEncryption 101 for Nonprofits
Encryption 101 for Nonprofits
 
Nonprofit Development Operations and Technology
Nonprofit Development Operations and TechnologyNonprofit Development Operations and Technology
Nonprofit Development Operations and Technology
 
18NTC Nonprofit Technology Conference Round Up
18NTC Nonprofit Technology Conference Round Up18NTC Nonprofit Technology Conference Round Up
18NTC Nonprofit Technology Conference Round Up
 
PowerBI for Nonprofits
PowerBI for NonprofitsPowerBI for Nonprofits
PowerBI for Nonprofits
 
Five Hacks to Weave Constituent Experience Into Your Organization
Five Hacks to Weave Constituent Experience Into Your OrganizationFive Hacks to Weave Constituent Experience Into Your Organization
Five Hacks to Weave Constituent Experience Into Your Organization
 

Kürzlich hochgeladen

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 

Kürzlich hochgeladen (20)

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 

Remote Staff, Office Staff - Tech Tips for Nonprofits

  • 1. Remote Staff, Office Staff Tech Tips For Nonprofits Webinar Series June 2020
  • 5. About Community IT Advancing mission through the effective use of technology. 100% Employee Owned
  • 6. Agenda Remote Work Best Practices Cybersecurity Landscape Good Cybersecurity Practices Reintegrating work
  • 7. Remote Work Challenges Management / reporting harder Remote work opens up security holes Difficult to access specialized applications Proactive planning pays off
  • 8. Remote Work Best Practices Leverage the cloud De-centralized equipment Centralized management Video and chat to stay in touch
  • 10. Video & Chat Orgs already have secure tools available to them Microsoft Teams Google Meet Orgs with significant Privacy and Security concerns Wire Signal Jitsi Using Zoom? Update your client Follow good meeting security practices
  • 11. Includes Video Conferencing • Google Meet • https://support.google.com/a/users/answer /9282720?hl=en • Microsoft Teams • https://communityit.com/microsoft-teams- for-nonprofits/
  • 12. Zoom Video Conferencing • Easy to use • Great for peer to peer collaboration • Follow best practices for keeping meeting secure • https://communityit.com/nonprofit- cybersecurity-tips-zoom/ • Mixed record on privacy and security
  • 13. CYBERSECURITY LANDSCAPE Persistent and ongoing brute force attacks on identities Sophisticated spear phishing Organizations targeted because of the work they do Attacks targeting vendors
  • 14. CYBERSECURITY LANDSCAPE New security tools available to combat new threat types. Organizations more proactive about asking where to start improving their cybersecurity. 60% of Nonprofits don’t know how their org handles cybersecurity risk. Breach response for a small to medium business is $149,000
  • 15. Security Risks – Remote Work • Opens up more remote access with single factor authentication • Remote Desktop Server • VPN • Work devices being used by family • Personal devices used for work • Increase in targeting phishing • New apps needed to stay connected
  • 16. Important Security Practices • Update your computers (reboot weekly) • Make sure your data is backed up • Enable Multi Factor Authentication • Use a password manager • Enroll in Security Awareness Training • Use organization provided systems
  • 17. Reintegrating Remote Work - Data • Communicate systems of record • Rein in data sprawl • Move data from personal to organizational systems • Incorporate new systems • Train the trainer • Ensure systems meet org policies
  • 18. Reintegrating Remote Work - Devices • Make sure systems up to date with patches • Make sure systems are clean • Update / remove controls associated with shared use • Update / rotate local admin credentials
  • 19. Reintegrating Remote Work - Policy • Revisit Business Continuity Plans • What worked • What needs revised • Revisit IT Policy • Incorporate new scenarios • Revise to address changing business landscape • Update IT Planning • Accelerate cloud centric computing • Plan for more mobile workforce • Invest in tools to manage distributed computers
  • 20. Upcoming Webinar Nonprofit Cybersecurity Risk Assessment Basics Wednesday July 15 3:00 – 4:00 PM EST

Hinweis der Redaktion

  1. Access to specialized applications Fundraising/Donor databases Accounting software SL - Getting IT Support can be harder.
  2. Access to specialized applications Fundraising/Donor databases Accounting software SL - Clients in best shape are the ones that have already converted over to the cloud and have settled on the laptop as the standard company-provided device given to users. By choosing company-provided over BYOD, the centralized management is much easier and ownership of data (less data leakage) is clearer. SL – Meetings used to be a break from screens. In a remote work environment they are not. So one of the unspoken benefits of meetings is taken away. It probably means there should be fewer meetings and the purpose of meetings should be well-defined. SL – Because there are no built-in breaks from screens, flexible schedules are really beneficial if operational requirements can allow for it.
  3. Define Spear Phishing - the fraudulent practice of sending emails ostensibly from a known or trusted sender in order to induce targeted individuals to reveal confidential information. Can be one technique of Business Email Compromise the fraudulent practice of sending emails ostensibly from a known or trusted sender in order to induce targeted individuals to reveal confidential information. Organizations Targeted – because of lists and donors
  4. SL – Cybersecurity INSURANCE is getting to be more and more of a requirement?
  5. Get Mary to talk about her experience with Security Awareness Training MFA https://communityit.com/nonprofits-should-require-multi-factor-authentication-mfa-three-reasons/ Our big picture guide is https://communityit.com/nonprofit-cybersecurity/
  6. Look at IT Policy Identify systems of records - Example of now using Dropbox, or Slack. How to What are the requirements? Support MFA Have strong data privacy Able to backup Ensure data ownership Ensure auditing / reporting