ºÝºÝߣ

ºÝºÝߣShare a Scribd company logo
      Bridging the Technology gap	TechBridge, Incwww.techbridge.org
MissionOur mission is to help other nonprofits leverage technology to better serve the community. We help nonprofits to:Solve mission-critical initiatives
Improve communications with stakeholders
Increase operating efficienciesSource: Techbridge
Why have a Technology Plan?A Technology Plan is a strategy document that helps you think through what your IT needs are and how they can be achieved with the resources that you have.Source: Techbridge
Why have a technology plan?A well thought out plan can help you:Increase efficiency in your daily operationsManage your budget and spend money more effectivelyBuild an online community and boost fundraising effortsGive donors more confidence in your organization and provide an element of sustainability.Avoid crisis by reducing the chance of lost data and capabilitiesProtect your organization from outside threatsSource: Techbridge
Getting Started	Technology planning is a process (7 things you need to know)Establish leadership and support for your technology plan.Assess your current resources ¨C www.techatlas.orgDefine your needsExplore solutions- here¡¯s where you may need a technical consultant.Put your plan in writingDevelop a funding strategy - 70/30 rule: for every dollar budgeted for technology, 30 cents goes towards hardware and software purchases and the remaining 70 cents for training and support.Implement a plan and timeline Source: Techbridge
Basic Components of a Technology planInclude a summary of the current state of your technology then provide an overview of how technology will further your organization¡¯s mission. The body of the plan should include descriptions of the technology projects you plan to undertake. Source: Techbridge
Basic Components of a technology planEach project should contain the following information:DescriptionBenefits ¨C useful in raising fundsTasks ¨C helps with a timelineCost Budget ¨C is it practical?Timeline ¨C phases and deadlinesSource: Techbridge
Technology focusIT Support ¨C who will support the new technology?Workstations/Servers/Printers (hardware) - inventoryNetwork Infrastructure ¨C See example below: areasIT Support- who will support the new technologies and respond to problems?
Workstations/Servers/Printers (hardware)- take inventory
Network Infrastructure diagram -  see below:Source: Techbridge
Focus areasInternet Connectivity- How fast is your connection? There are several free tools you can use!  http://www.speakeasy.net/speedtest/Remote Access- Can your employees access files while at home or on the road?Email ¨C Do you have the ability to share calendars?Backup/Disaster Recovery ¨C what happens if your server fails? How quickly can you recover your data?Intranet ¨C How do your employees share information and collaborate?Applications/Software ¨C Does it meet your needs?Source: Techbridge
Virus ProtectionConsider a corporate Anti-Virus solution thatCentrally manages corporate network devices: Servers, desktops, laptops, and mobile devices are all susceptible to attackDetects virus, trojans, malware, and spyware: replicate & spread, unauthorized access, information gatheringAutomates scanning and removal processes:  scheduled scans, automated detection and removal without user interactionCombines hardware and software solutions:  Website Filters, E-mail SPAM and Virus Prevention, network firewallsSource: TechBridge
Some Security issues for 2010Anti Virus is NOT enough ¨C Companies such as Norton Anti-virus are using technologies that evaluate the reputations of the files and applications running on your PC. Social Engineering - is the act of manipulating people into performing actions or divulging confidential information, rather than by breaking in or using technical hacking techniques. Attackers are going directly after the end user by tricking them into downloading malware or divulging sensitive information. I.e.: Rogue security software vendors. Social Networking Sites ¨C Adjust Facebook privacy settings to help protect your identityRead the Facebook Guide to PrivacyThink carefully about who you allow to become your friendShow "limited friends" a cut-down version of your profileDisable options, then open them one by one as it makes sense.Social networking third-party apps.Windows 7 will come in the crosshairs of attackers ¨C Be sure your organization keeps security patches up to date with ANY new Operating System. URL-shortening services ¨C be mindful of the source when you click on shortened links via Twitter.Source: www.internetnews.com/www.sophos.com
Secure your wireless connectionUse encryptionUse a passwordDon¡¯t broadcast the name of your networkUse MAC address filtering- this forces the network to reject any device it does not recognize.Make sure your computers are properly secured  with anti-virus, security patches and a firewall to protect your org from malware-based connections. Source: www.sophos.com

More Related Content

What's hot (20)

PACE-IT: Physical Network Security Control
PACE-IT: Physical Network Security ControlPACE-IT: Physical Network Security Control
PACE-IT: Physical Network Security Control
Pace IT at Edmonds Community College
?
PACE-IT, Security+2.6: Security Related Awareness and Training
PACE-IT, Security+2.6: Security Related Awareness and TrainingPACE-IT, Security+2.6: Security Related Awareness and Training
PACE-IT, Security+2.6: Security Related Awareness and Training
Pace IT at Edmonds Community College
?
PACE-IT, Security+1.1: Introduction to Network Devices (part 2)
PACE-IT, Security+1.1: Introduction to Network Devices (part 2)PACE-IT, Security+1.1: Introduction to Network Devices (part 2)
PACE-IT, Security+1.1: Introduction to Network Devices (part 2)
Pace IT at Edmonds Community College
?
PACE-IT, Security+1.2: Secure Network Administration Concepts
PACE-IT, Security+1.2: Secure Network Administration ConceptsPACE-IT, Security+1.2: Secure Network Administration Concepts
PACE-IT, Security+1.2: Secure Network Administration Concepts
Pace IT at Edmonds Community College
?
PACE-IT, Security+3.4: Summary of Wireless Attacks
PACE-IT, Security+3.4: Summary of Wireless AttacksPACE-IT, Security+3.4: Summary of Wireless Attacks
PACE-IT, Security+3.4: Summary of Wireless Attacks
Pace IT at Edmonds Community College
?
SC Magazine eSymposium: SIEM
SC Magazine eSymposium: SIEMSC Magazine eSymposium: SIEM
SC Magazine eSymposium: SIEM
Emulex Corporation
?
Data Leakage Prevention
Data Leakage Prevention Data Leakage Prevention
Data Leakage Prevention
Dhananjay Aloorkar
?
Information Security Awareness And Training Business Case For Web Based Solut...
Information Security Awareness And Training Business Case For Web Based Solut...Information Security Awareness And Training Business Case For Web Based Solut...
Information Security Awareness And Training Business Case For Web Based Solut...
Michael Kaishar, MSIA | CISSP
?
PACE-IT: Common Network Vulnerabilities
PACE-IT: Common Network VulnerabilitiesPACE-IT: Common Network Vulnerabilities
PACE-IT: Common Network Vulnerabilities
Pace IT at Edmonds Community College
?
University of maryland infa 620 homework help
University of maryland infa 620 homework helpUniversity of maryland infa 620 homework help
University of maryland infa 620 homework help
Olivia Fournier
?
02 ŒWУ¾W½j°²È«Â©¶´µÄÔu¹À·ÖÏí£¬ ¹ÜÀíÌô‘ð¼°Ú…„Ý¡£
02 ŒWУ¾W½j°²È«Â©¶´µÄÔu¹À·ÖÏí£¬ ¹ÜÀíÌô‘ð¼°Ú…„Ý¡£02 ŒWУ¾W½j°²È«Â©¶´µÄÔu¹À·ÖÏí£¬ ¹ÜÀíÌô‘ð¼°Ú…„Ý¡£
02 ŒWУ¾W½j°²È«Â©¶´µÄÔu¹À·ÖÏí£¬ ¹ÜÀíÌô‘ð¼°Ú…„Ý¡£
eLearning Consortium ëŠ×ÓŒWÁ•Â“ÃË
?
08 Transform Endpoint Security with the World¡¯s Most Secure PCs and Printers
08 Transform Endpoint Security with the World¡¯s Most Secure PCs and Printers08 Transform Endpoint Security with the World¡¯s Most Secure PCs and Printers
08 Transform Endpoint Security with the World¡¯s Most Secure PCs and Printers
eLearning Consortium ëŠ×ÓŒWÁ•Â“ÃË
?
PACE-IT: Network Hardening Techniques (part 1)
PACE-IT: Network Hardening Techniques (part 1)PACE-IT: Network Hardening Techniques (part 1)
PACE-IT: Network Hardening Techniques (part 1)
Pace IT at Edmonds Community College
?
Best Practices for Security Awareness and Training
Best Practices for Security Awareness and TrainingBest Practices for Security Awareness and Training
Best Practices for Security Awareness and Training
Kimberly Hood
?
Comprehensive Data Leak Prevention
Comprehensive Data Leak PreventionComprehensive Data Leak Prevention
Comprehensive Data Leak Prevention
Tanvir Hashmi
?
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
Pace IT at Edmonds Community College
?
Assessing Your security
Assessing Your securityAssessing Your security
Assessing Your security
Legal Services National Technology Assistance Project (LSNTAP)
?
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
Pace IT at Edmonds Community College
?
Legal Aid Tech Baseline 2016
Legal Aid Tech Baseline 2016 Legal Aid Tech Baseline 2016
Legal Aid Tech Baseline 2016
Legal Services National Technology Assistance Project (LSNTAP)
?
IT & Network Security Awareness
IT & Network Security AwarenessIT & Network Security Awareness
IT & Network Security Awareness
The Network Support Company
?
Information Security Awareness And Training Business Case For Web Based Solut...
Information Security Awareness And Training Business Case For Web Based Solut...Information Security Awareness And Training Business Case For Web Based Solut...
Information Security Awareness And Training Business Case For Web Based Solut...
Michael Kaishar, MSIA | CISSP
?
University of maryland infa 620 homework help
University of maryland infa 620 homework helpUniversity of maryland infa 620 homework help
University of maryland infa 620 homework help
Olivia Fournier
?
02 ŒWУ¾W½j°²È«Â©¶´µÄÔu¹À·ÖÏí£¬ ¹ÜÀíÌô‘ð¼°Ú…„Ý¡£
02 ŒWУ¾W½j°²È«Â©¶´µÄÔu¹À·ÖÏí£¬ ¹ÜÀíÌô‘ð¼°Ú…„Ý¡£02 ŒWУ¾W½j°²È«Â©¶´µÄÔu¹À·ÖÏí£¬ ¹ÜÀíÌô‘ð¼°Ú…„Ý¡£
02 ŒWУ¾W½j°²È«Â©¶´µÄÔu¹À·ÖÏí£¬ ¹ÜÀíÌô‘ð¼°Ú…„Ý¡£
eLearning Consortium ëŠ×ÓŒWÁ•Â“ÃË
?
Best Practices for Security Awareness and Training
Best Practices for Security Awareness and TrainingBest Practices for Security Awareness and Training
Best Practices for Security Awareness and Training
Kimberly Hood
?
Comprehensive Data Leak Prevention
Comprehensive Data Leak PreventionComprehensive Data Leak Prevention
Comprehensive Data Leak Prevention
Tanvir Hashmi
?

Viewers also liked (7)

Business Opportunity
Business OpportunityBusiness Opportunity
Business Opportunity
Tom Shelton
?
Shultz Sedaag 2008
Shultz Sedaag 2008Shultz Sedaag 2008
Shultz Sedaag 2008
Ben Shultz
?
SDA Presentation, October 2008
SDA Presentation, October 2008SDA Presentation, October 2008
SDA Presentation, October 2008
Ben Shultz
?
National Casa Presentation
National Casa  PresentationNational Casa  Presentation
National Casa Presentation
Mary Derrick Cook
?
Shultz AAG 2008
Shultz AAG 2008Shultz AAG 2008
Shultz AAG 2008
Ben Shultz
?
Presentation Microsoft Training
Presentation Microsoft TrainingPresentation Microsoft Training
Presentation Microsoft Training
Mary Derrick Cook
?
TechBridge Services 2009
TechBridge Services 2009TechBridge Services 2009
TechBridge Services 2009
Mary Derrick Cook
?
Business Opportunity
Business OpportunityBusiness Opportunity
Business Opportunity
Tom Shelton
?
Shultz Sedaag 2008
Shultz Sedaag 2008Shultz Sedaag 2008
Shultz Sedaag 2008
Ben Shultz
?
SDA Presentation, October 2008
SDA Presentation, October 2008SDA Presentation, October 2008
SDA Presentation, October 2008
Ben Shultz
?
Presentation Microsoft Training
Presentation Microsoft TrainingPresentation Microsoft Training
Presentation Microsoft Training
Mary Derrick Cook
?

Similar to Aging Services Expo Presentation (20)

Art of Technology: Core Technical Services
Art of Technology: Core Technical ServicesArt of Technology: Core Technical Services
Art of Technology: Core Technical Services
Holly Ross
?
Intranet Design: Step by Step Design Guide
Intranet Design: Step by Step Design GuideIntranet Design: Step by Step Design Guide
Intranet Design: Step by Step Design Guide
My Hub Intranet Solutions
?
nonprof2007.ppt
nonprof2007.pptnonprof2007.ppt
nonprof2007.ppt
webhostingguy
?
Help! I'm an accidental techie
Help! I'm an accidental techieHelp! I'm an accidental techie
Help! I'm an accidental techie
Miles Maier
?
Intranet Software
Intranet SoftwareIntranet Software
Intranet Software
My Hub Intranet Solutions
?
PurposeThis course project is intended to assess your abilit
PurposeThis course project is intended to assess your abilitPurposeThis course project is intended to assess your abilit
PurposeThis course project is intended to assess your abilit
TakishaPeck109
?
Security Development Life Cycle
Security Development Life CycleSecurity Development Life Cycle
Security Development Life Cycle
Directorate of Information Security | Ditjen Aptika
?
I need 10 pages of report and 10 slides?PurposeThis course p
I need 10 pages of report and 10 slides?PurposeThis course pI need 10 pages of report and 10 slides?PurposeThis course p
I need 10 pages of report and 10 slides?PurposeThis course p
doylymaura
?
For Accidental Techies Sw
For Accidental Techies SwFor Accidental Techies Sw
For Accidental Techies Sw
Lasa UK
?
IT 700 Final Project Guidelines and RubricOverviewAs the fin.docx
IT 700 Final Project Guidelines and RubricOverviewAs the fin.docxIT 700 Final Project Guidelines and RubricOverviewAs the fin.docx
IT 700 Final Project Guidelines and RubricOverviewAs the fin.docx
ADDY50
?
Software Engineering and Fundamentals note
Software Engineering and Fundamentals noteSoftware Engineering and Fundamentals note
Software Engineering and Fundamentals note
lissannakeryz84
?
According To The Author Of ¡°Build A Streamlined Refinery¡±,
According To The Author Of ¡°Build A Streamlined Refinery¡±,According To The Author Of ¡°Build A Streamlined Refinery¡±,
According To The Author Of ¡°Build A Streamlined Refinery¡±,
Jill Lyons
?
CSE18R264 - Unit 1.pptx
CSE18R264 - Unit 1.pptxCSE18R264 - Unit 1.pptx
CSE18R264 - Unit 1.pptx
YouTube299255
?
Project 6 - Cloud Computing Security PolicyThis week you will pr.docx
Project 6 - Cloud Computing Security PolicyThis week you will pr.docxProject 6 - Cloud Computing Security PolicyThis week you will pr.docx
Project 6 - Cloud Computing Security PolicyThis week you will pr.docx
anitramcroberts
?
INTERNAL Assign no 207( JAIPUR NATIONAL UNI)
INTERNAL Assign no   207( JAIPUR NATIONAL UNI)INTERNAL Assign no   207( JAIPUR NATIONAL UNI)
INTERNAL Assign no 207( JAIPUR NATIONAL UNI)
Partha_bappa
?
Streaming Processes: Creating a Start-up Within a Big Corporate (Mohammad Sha...
Streaming Processes: Creating a Start-up Within a Big Corporate (Mohammad Sha...Streaming Processes: Creating a Start-up Within a Big Corporate (Mohammad Sha...
Streaming Processes: Creating a Start-up Within a Big Corporate (Mohammad Sha...
Executive Leaders Network
?
the world of technology is changing at an unprecedented pace, and th.docx
the world of technology is changing at an unprecedented pace, and th.docxthe world of technology is changing at an unprecedented pace, and th.docx
the world of technology is changing at an unprecedented pace, and th.docx
pelise1
?
Topic 4 - impact of Information Technology.pptx.pdf
Topic 4 - impact of Information Technology.pptx.pdfTopic 4 - impact of Information Technology.pptx.pdf
Topic 4 - impact of Information Technology.pptx.pdf
lundamiko
?
Maximizing Potential - Hiring and Managing Dedicated Software Developers.pdf
Maximizing Potential - Hiring and Managing Dedicated Software Developers.pdfMaximizing Potential - Hiring and Managing Dedicated Software Developers.pdf
Maximizing Potential - Hiring and Managing Dedicated Software Developers.pdf
JamesEddie2
?
COM 421 Chapter 1.pptx computer studies university of eldoret
COM 421 Chapter 1.pptx computer studies university of eldoretCOM 421 Chapter 1.pptx computer studies university of eldoret
COM 421 Chapter 1.pptx computer studies university of eldoret
NakhabalaMaurice
?
Art of Technology: Core Technical Services
Art of Technology: Core Technical ServicesArt of Technology: Core Technical Services
Art of Technology: Core Technical Services
Holly Ross
?
Help! I'm an accidental techie
Help! I'm an accidental techieHelp! I'm an accidental techie
Help! I'm an accidental techie
Miles Maier
?
PurposeThis course project is intended to assess your abilit
PurposeThis course project is intended to assess your abilitPurposeThis course project is intended to assess your abilit
PurposeThis course project is intended to assess your abilit
TakishaPeck109
?
I need 10 pages of report and 10 slides?PurposeThis course p
I need 10 pages of report and 10 slides?PurposeThis course pI need 10 pages of report and 10 slides?PurposeThis course p
I need 10 pages of report and 10 slides?PurposeThis course p
doylymaura
?
For Accidental Techies Sw
For Accidental Techies SwFor Accidental Techies Sw
For Accidental Techies Sw
Lasa UK
?
IT 700 Final Project Guidelines and RubricOverviewAs the fin.docx
IT 700 Final Project Guidelines and RubricOverviewAs the fin.docxIT 700 Final Project Guidelines and RubricOverviewAs the fin.docx
IT 700 Final Project Guidelines and RubricOverviewAs the fin.docx
ADDY50
?
Software Engineering and Fundamentals note
Software Engineering and Fundamentals noteSoftware Engineering and Fundamentals note
Software Engineering and Fundamentals note
lissannakeryz84
?
According To The Author Of ¡°Build A Streamlined Refinery¡±,
According To The Author Of ¡°Build A Streamlined Refinery¡±,According To The Author Of ¡°Build A Streamlined Refinery¡±,
According To The Author Of ¡°Build A Streamlined Refinery¡±,
Jill Lyons
?
CSE18R264 - Unit 1.pptx
CSE18R264 - Unit 1.pptxCSE18R264 - Unit 1.pptx
CSE18R264 - Unit 1.pptx
YouTube299255
?
Project 6 - Cloud Computing Security PolicyThis week you will pr.docx
Project 6 - Cloud Computing Security PolicyThis week you will pr.docxProject 6 - Cloud Computing Security PolicyThis week you will pr.docx
Project 6 - Cloud Computing Security PolicyThis week you will pr.docx
anitramcroberts
?
INTERNAL Assign no 207( JAIPUR NATIONAL UNI)
INTERNAL Assign no   207( JAIPUR NATIONAL UNI)INTERNAL Assign no   207( JAIPUR NATIONAL UNI)
INTERNAL Assign no 207( JAIPUR NATIONAL UNI)
Partha_bappa
?
Streaming Processes: Creating a Start-up Within a Big Corporate (Mohammad Sha...
Streaming Processes: Creating a Start-up Within a Big Corporate (Mohammad Sha...Streaming Processes: Creating a Start-up Within a Big Corporate (Mohammad Sha...
Streaming Processes: Creating a Start-up Within a Big Corporate (Mohammad Sha...
Executive Leaders Network
?
the world of technology is changing at an unprecedented pace, and th.docx
the world of technology is changing at an unprecedented pace, and th.docxthe world of technology is changing at an unprecedented pace, and th.docx
the world of technology is changing at an unprecedented pace, and th.docx
pelise1
?
Topic 4 - impact of Information Technology.pptx.pdf
Topic 4 - impact of Information Technology.pptx.pdfTopic 4 - impact of Information Technology.pptx.pdf
Topic 4 - impact of Information Technology.pptx.pdf
lundamiko
?
Maximizing Potential - Hiring and Managing Dedicated Software Developers.pdf
Maximizing Potential - Hiring and Managing Dedicated Software Developers.pdfMaximizing Potential - Hiring and Managing Dedicated Software Developers.pdf
Maximizing Potential - Hiring and Managing Dedicated Software Developers.pdf
JamesEddie2
?
COM 421 Chapter 1.pptx computer studies university of eldoret
COM 421 Chapter 1.pptx computer studies university of eldoretCOM 421 Chapter 1.pptx computer studies university of eldoret
COM 421 Chapter 1.pptx computer studies university of eldoret
NakhabalaMaurice
?

Aging Services Expo Presentation

  • 1. Bridging the Technology gap TechBridge, Incwww.techbridge.org
  • 2. MissionOur mission is to help other nonprofits leverage technology to better serve the community. We help nonprofits to:Solve mission-critical initiatives
  • 5. Why have a Technology Plan?A Technology Plan is a strategy document that helps you think through what your IT needs are and how they can be achieved with the resources that you have.Source: Techbridge
  • 6. Why have a technology plan?A well thought out plan can help you:Increase efficiency in your daily operationsManage your budget and spend money more effectivelyBuild an online community and boost fundraising effortsGive donors more confidence in your organization and provide an element of sustainability.Avoid crisis by reducing the chance of lost data and capabilitiesProtect your organization from outside threatsSource: Techbridge
  • 7. Getting Started Technology planning is a process (7 things you need to know)Establish leadership and support for your technology plan.Assess your current resources ¨C www.techatlas.orgDefine your needsExplore solutions- here¡¯s where you may need a technical consultant.Put your plan in writingDevelop a funding strategy - 70/30 rule: for every dollar budgeted for technology, 30 cents goes towards hardware and software purchases and the remaining 70 cents for training and support.Implement a plan and timeline Source: Techbridge
  • 8. Basic Components of a Technology planInclude a summary of the current state of your technology then provide an overview of how technology will further your organization¡¯s mission. The body of the plan should include descriptions of the technology projects you plan to undertake. Source: Techbridge
  • 9. Basic Components of a technology planEach project should contain the following information:DescriptionBenefits ¨C useful in raising fundsTasks ¨C helps with a timelineCost Budget ¨C is it practical?Timeline ¨C phases and deadlinesSource: Techbridge
  • 10. Technology focusIT Support ¨C who will support the new technology?Workstations/Servers/Printers (hardware) - inventoryNetwork Infrastructure ¨C See example below: areasIT Support- who will support the new technologies and respond to problems?
  • 12. Network Infrastructure diagram - see below:Source: Techbridge
  • 13. Focus areasInternet Connectivity- How fast is your connection? There are several free tools you can use! http://www.speakeasy.net/speedtest/Remote Access- Can your employees access files while at home or on the road?Email ¨C Do you have the ability to share calendars?Backup/Disaster Recovery ¨C what happens if your server fails? How quickly can you recover your data?Intranet ¨C How do your employees share information and collaborate?Applications/Software ¨C Does it meet your needs?Source: Techbridge
  • 14. Virus ProtectionConsider a corporate Anti-Virus solution thatCentrally manages corporate network devices: Servers, desktops, laptops, and mobile devices are all susceptible to attackDetects virus, trojans, malware, and spyware: replicate & spread, unauthorized access, information gatheringAutomates scanning and removal processes: scheduled scans, automated detection and removal without user interactionCombines hardware and software solutions: Website Filters, E-mail SPAM and Virus Prevention, network firewallsSource: TechBridge
  • 15. Some Security issues for 2010Anti Virus is NOT enough ¨C Companies such as Norton Anti-virus are using technologies that evaluate the reputations of the files and applications running on your PC. Social Engineering - is the act of manipulating people into performing actions or divulging confidential information, rather than by breaking in or using technical hacking techniques. Attackers are going directly after the end user by tricking them into downloading malware or divulging sensitive information. I.e.: Rogue security software vendors. Social Networking Sites ¨C Adjust Facebook privacy settings to help protect your identityRead the Facebook Guide to PrivacyThink carefully about who you allow to become your friendShow "limited friends" a cut-down version of your profileDisable options, then open them one by one as it makes sense.Social networking third-party apps.Windows 7 will come in the crosshairs of attackers ¨C Be sure your organization keeps security patches up to date with ANY new Operating System. URL-shortening services ¨C be mindful of the source when you click on shortened links via Twitter.Source: www.internetnews.com/www.sophos.com
  • 16. Secure your wireless connectionUse encryptionUse a passwordDon¡¯t broadcast the name of your networkUse MAC address filtering- this forces the network to reject any device it does not recognize.Make sure your computers are properly secured with anti-virus, security patches and a firewall to protect your org from malware-based connections. Source: www.sophos.com
  • 17. Anti-virus policyIntroduce an anti-virus policyProduce a policy for safe computing and distribute it to all staff. Make sure every employee has read and understood the policy, and that they know who to speak to, if they have any questions.Such a policy could include:A ban on downloading executables and documents directly from the internet.A ban on running unsolicited executables/documents/spreadsheets within the organization.A ban on playing computer games or using screensavers which did not come with the operating system.An IT checking and approval system for executables that arrive via email from the outside world.Locking down workstation to prevent users from downloading programs. Source: www.sophos.com
  • 18. IT Project ImplementationDesignate a point personBreak projects into tasksAssign responsibilitiesEstablish a timeline ¨C set milestones Evaluate your success ¨C On time? On budget? Meet your needs? Is it being used?Update your technology plan- should be a living breathing documentSource: TechBridge
  • 19. Things to consider Training ¨C Technology that is implemented and not used is useless! How will you care for your new technology? Who will do regular maintenance to prevent problems? Consider 3rd party support. Sometimes going the cheapest route doesn¡¯t yield good short-term results.Source:
  • 20. Resources Techsoup- donated and discounted hardware and software. www.techsoup.orgSophos - www.sophos.com ¨C Download the 2010 security report. Tech Atlas- FREE online Tech Assessment and planning tool www.techatlas.orgFind Tech Grants- www.techfoundation.orgFREE Online Training for Microsoft Office 03/07- http://office.microsoft.com/en-us/training/Source: TechBridge