+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
How to assess your it needs and implement technology at your nonprofit
1. How to Assess your IT
Needs and Implement
Technology
at your Nonprofit
Presented by Enzo Logozzo and Eric Neufeld, 365 iT Solutions
March 17th, 2016
3. We make technology more affordable
through the Technology Donations Program
Register your charity, nonprofit or library to see which products
you’re eligible for: www.TechSoupCanada.ca/Getting_Started
4. We create and curate tech resources
facebook.com/techsoupcanada
techsoupcanada.ca/blog
meetup.com/toronto-net-tuesday
@techsoupcanada
5. 1. Close/expand GoToWebinar panel
2. Submit a question/comment via Chat
3. View and select your audio
• You can hear us, but we can’t hear you!
• Can’t hear? Try turning up your volume or call in
• Have a question? Use the Q&A box
• Recording will be available post-webinar
• Please fill in the post-webinar survey!
1 3
2
Webinar Logistics
6. Today’s speakers are
Enzo Logozzo
Director, Sales and Marketing, 365 iT SOLUTIONS
• Provides managed IT services, IT outsourcing, tech support
services and cloud services to non-profit organizations
Eric Neufeld
Senior Project Manager, 365 iT SOLUTIONS
• 14 years experience in IT industry
• Previously worked as a consultant with Deloitte
7. Who is 365 iT SOLUTIONS?
Company founded in 2003
Based in Toronto, Ontario
100% Canadian Team
Responsible for connecting companies
worldwide
We work with various nonprofits and
charities
We believe in our brand, image and
reputation. Better yet, we believe in our
clients.
“We make IT Simple!”
8. What is a Network Assessment?
A network assessment provides a snapshot of the entire IT
network.
It creates an effective IT strategy including recommendations
and pain points.
The network and security assessment will cover the following:
Infrastructure, Performance, Availability, Management
and Security
9. Step 1 = Assess Your Entire Company
To get a “TRUE” picture of your entire business, you need a solid foundation to build
on and you should collect the following information within a excel sheet with your
management team.
1. Size?
2. Geography?
3. Business Goals?
4. New technology?
5. Pain points?
10. Step 2 = Assess Your Network Assets
This will show any vulnerability in your network that might be exploited by a security
threat. Risks include potential consequences and vulnerabilities including loss of
data, downtime and security breach.
The assessment should cover the
following areas:
Firewalls & Routers
Network Switches
Wireless Access Points
11. Step 3 = Assess Your Server
Your server manages, stores and processes your data 24x7x365. Your servers need
to be reliable as it is the heart of your business and network. It is important to know
your server is healthy.
The assessment should cover the
following areas:
Warranty?
Operating systems?
Network services?
Security updates?
Performance?
Disaster recovery?
12. Step 4 = Assess Your Workstations
Workstations and laptops keep your organizations running and employees
productive however they also are the source of most downtime, lost productivity
and security risk.
The assessment should cover the
following areas:
Operating systems?
Endpoint security?
Central Antivirus management?
Local administrator access?
Business software?
13. Step 5 = Assess Your LOB Software
LOB stands for “line-of-business” software. Every organization has one as it is
needed to run you business however there are many areas the assessment should
cover in respects to your LOB.
The assessment should cover the
following areas:
Support contract?
Hosted location?
Future proof?
Reliability and accessibility?
14. Step 6 = Assess Your Policies & Procedures
Do you have an Acceptable Use Policy (AUP)?
Is a set of rules for the network that outlines how network can be used and sets
guide lines. This will reduce the potential for legal action that may be taken by a
user, and often protect the organization.
Do you have an Email and Computer Monitoring policy?
Monitoring workplace computer activity can protect your business. This policy will
outline that the company can monitor email and/or computer activity any time.
Do you have an BYOD Policy?
If an employee leaves/terminated, phone must given to IT to delete email/data or
phone can be remotely wiped causing complete data loss. Organization is not
responsible for data lost if policy is violated.
15. Step 7 = Choose the right IT Consultant
Step 1 - Define objectives, timeline, and budget.
Step 2 - Write a Request for Proposal (RFP) that lays
out the terms of the engagement, objectives, timeline,
and a budget.
Step 3 – Contact IT consultants with proven industry experience and
understanding of Canadian privacy laws.
Step 4 – Evaluate RFP response including the following areas:
Have they addressed your business goals?
Are they delivering a well planned and documented proposal?
Are they engaged?
Do they guarantee their proposal?
16. Step 8 = Do your due diligence
Do your due
diligence
Take your time
Check references
Ask questions
Bring in the experts
17. 365 iT SOLUTIONS Special Offer
Up to 10% discount on Lenovo server and storage
Up to 5% discount on Lenovo ThinkPad workstations,
laptops and tablets
Complimentary Network Assessment
Complimentary Review of IT proposals
Up to 20% discount on MIP programs
(Migration, Integration, Project Programs)