SlideShare a Scribd company logo
1 of 36
Download to read offline
BYOD for Nonprofits
June 20, 2013
Community IT Innovators Webinar Series
presented by…
Johan Hammerstrom
Webinar Tips
• Ask questions
Post questions via chat
• Interact
Respond to polls during webinar
• Focus
Avoid multitasking. You may just miss the best part of the presentation
• Webinar Powerpoint & Recording
Powerpoint and recording links will be shared after the webinar
About Community IT
Community IT Innovators partners with nonprofits to help them solve their
strategic & day-to-day IT challenges.
Strategic
Proactive approach so you can make IT decisions that support your
mission and grow with you
Collaborative
Team of over 40 staff who empower you to make informed IT choices
Invested
We are committed to supporting your mission, and take care of your IT
network as if it were our own
Nonprofit focus
Worked with over 900 nonprofits since 1993
about the presenter
Johan Hammerstrom
Chief Operating Officer
jhammerstrom@communityit.com
@hammerstromj
Agenda
I. BYOD…a brief history
II. Best Practices
III. BYOD Risk Management
IV. BYOD Policy Guidelines
Brief History
Computers used to be big
…and expensive
But then they got smaller
and friendlier…
ubiquitous
and personal.
Consumerization
Best Practices
Best Practices
Best Practices
1. Goal: 90% of 150,000
workforce
2. Custom Authentication
System
3. Reason: Avoid locked-in
corporate environment
Aggressive BYOD
1. 20% use their own device
2. Increasing restrictions on
personal device use
3. Reason: Security concerns
4. Dropsmack!
Conservative BYOD
Risk
Benefits of BYOD
1. Reduce hardware & support costs
2. Work flexibility
3. Employee availability
4. User adoption and satisfaction
Risks of BYOD
1. Information Security
2. Legal
3. Financial
Risks of BYOD
(b)
Personal
(a)
Org
1. Information Security Risks
a) Organization
– Data leakage
– Vector into the company
b) Personal
– Onerous security measures
– Loss of full control of device
2. Legal Risks
a) Organization
– Lack of certainty in case law and legislation
b) Personal
– Personal device could be confiscated
– Personal blurs into the corporate
3. Financial Risks
a) Organization
– Stipends can be more expensive than a single
corporate plan
– IT Support can become entangled
– Mobile Device Management (MDM) can be expensive
b) Personal
– Stipend may not cover full cost…or any at all
– Can be responsible for own support
Risks
• Security
• Legal
• Financial
Benefits
• Cost
• Flexibility
• Adoption
Risk/Benefit Analysis
One Size Fits All?
• Sales
• Accounting
• Executive
Guidelines
1) Identify Benefits
a) Prioritize for your Organization
b) Establish your strategy
2) Identify Risks
a) Risk = Impact * Likelihood
3) Consider a few solutions
4) Summarize in 1-page policy
Program Staff Development Executive
Benefits
Reduce costs 1
Work Flexibility 1 1
Availability 1 1
User adoption 1
Risks
Info Security 2 1 1
Legal 3 3 1
Financial 1 1 3
Policy
provide small stipend
& limited access to
information
provide limited
access to
information from
home
org provided
device, fully
managed access
to info
Generic
1) BYOD by staff role
a) Exec staff, accessible 24x7 stipend of $80/mo
b) Senior staff, accessible 10x7 stipend of $50/mo
c) Line staff, accessible 10x5 stipend of $30/mo
2) Requirement of PIN code on device
3) Acceptable Use policy
4) IT Support policy
the Future
mobile first
authentication
Check out…
www.mobilecitizen.org
Upcoming Webinar
July 25
IT Security Best Practices
Presenter
Steve Longenecker
Mark Kraemer
Next Steps
• Connect with us
• Provide feedback
Short survey after you exit the webinar. Be sure to
include any questions that were not answered.
• Missed anything?
Link to slides & recording will be emailed to you.

More Related Content

Viewers also liked

021013 adecco email (italian)
021013   adecco email (italian)021013   adecco email (italian)
021013 adecco email (italian)VogelDenise
 
021013 adecco email (kannada)
021013   adecco email (kannada)021013   adecco email (kannada)
021013 adecco email (kannada)VogelDenise
 
021013 adecco email (macedonian)
021013   adecco email (macedonian)021013   adecco email (macedonian)
021013 adecco email (macedonian)VogelDenise
 
021013 adecco email (urdu)
021013   adecco email (urdu)021013   adecco email (urdu)
021013 adecco email (urdu)VogelDenise
 
Patrizia Pepe: Perchè Mobile?
Patrizia Pepe: Perchè Mobile? Patrizia Pepe: Perchè Mobile?
Patrizia Pepe: Perchè Mobile? Network Lab
 
Fastweb: Mobile Web Marketing
Fastweb: Mobile Web MarketingFastweb: Mobile Web Marketing
Fastweb: Mobile Web MarketingNetwork Lab
 
BAKER DONELSON - Attorney Layoffs The SINKING OF A TERRORIST REGIME (GALICIAN)
BAKER DONELSON - Attorney Layoffs The SINKING OF A TERRORIST REGIME (GALICIAN)BAKER DONELSON - Attorney Layoffs The SINKING OF A TERRORIST REGIME (GALICIAN)
BAKER DONELSON - Attorney Layoffs The SINKING OF A TERRORIST REGIME (GALICIAN)VogelDenise
 
BAKER DONELSON - Attorney Layoffs The SINKING OF A TERRORIST REGIME (FRISIAN)
BAKER DONELSON - Attorney Layoffs The SINKING OF A TERRORIST REGIME (FRISIAN)BAKER DONELSON - Attorney Layoffs The SINKING OF A TERRORIST REGIME (FRISIAN)
BAKER DONELSON - Attorney Layoffs The SINKING OF A TERRORIST REGIME (FRISIAN)VogelDenise
 
BAKER DONELSON - Attorney Layoffs The SINKING OF A TERRORIST REGIME (FILIPINO)
BAKER DONELSON - Attorney Layoffs The SINKING OF A TERRORIST REGIME (FILIPINO)BAKER DONELSON - Attorney Layoffs The SINKING OF A TERRORIST REGIME (FILIPINO)
BAKER DONELSON - Attorney Layoffs The SINKING OF A TERRORIST REGIME (FILIPINO)VogelDenise
 
031816 - WORLD NEWS RELEASE (Arabic)
031816 - WORLD NEWS RELEASE (Arabic)031816 - WORLD NEWS RELEASE (Arabic)
031816 - WORLD NEWS RELEASE (Arabic)VogelDenise
 
031816 - WORLD NEWS RELEASE (Bulgarian)
031816 - WORLD NEWS RELEASE (Bulgarian)031816 - WORLD NEWS RELEASE (Bulgarian)
031816 - WORLD NEWS RELEASE (Bulgarian)VogelDenise
 
Pp growthanddevelopment
Pp growthanddevelopmentPp growthanddevelopment
Pp growthanddevelopmentPaolaReyesR
 
Ética y atención a la diversidad
Ética y atención a la diversidadÉtica y atención a la diversidad
Ética y atención a la diversidadTania Basantes
 
031816 - WORLD NEWS RELEASE (Russian)
031816 - WORLD NEWS RELEASE (Russian)031816 - WORLD NEWS RELEASE (Russian)
031816 - WORLD NEWS RELEASE (Russian)VogelDenise
 
Community IT Webinar - IT Security for Nonprofits
Community IT Webinar - IT Security for NonprofitsCommunity IT Webinar - IT Security for Nonprofits
Community IT Webinar - IT Security for NonprofitsCommunity IT Innovators
 
05/03/11 USPS MAILING RECEIPTS (Proof of Mailing)
05/03/11 USPS MAILING RECEIPTS (Proof of Mailing)05/03/11 USPS MAILING RECEIPTS (Proof of Mailing)
05/03/11 USPS MAILING RECEIPTS (Proof of Mailing)VogelDenise
 
George zimmerman & ebola crisis (bengali)
George zimmerman & ebola crisis (bengali)George zimmerman & ebola crisis (bengali)
George zimmerman & ebola crisis (bengali)VogelDenise
 
BAKER DONELSON - Attorney Layoffs The SINKING OF A TERRORIST REGIME (FINNISH)
BAKER DONELSON - Attorney Layoffs The SINKING OF A TERRORIST REGIME (FINNISH)BAKER DONELSON - Attorney Layoffs The SINKING OF A TERRORIST REGIME (FINNISH)
BAKER DONELSON - Attorney Layoffs The SINKING OF A TERRORIST REGIME (FINNISH)VogelDenise
 

Viewers also liked (20)

021013 adecco email (italian)
021013   adecco email (italian)021013   adecco email (italian)
021013 adecco email (italian)
 
021013 adecco email (kannada)
021013   adecco email (kannada)021013   adecco email (kannada)
021013 adecco email (kannada)
 
021013 adecco email (macedonian)
021013   adecco email (macedonian)021013   adecco email (macedonian)
021013 adecco email (macedonian)
 
021013 adecco email (urdu)
021013   adecco email (urdu)021013   adecco email (urdu)
021013 adecco email (urdu)
 
Patrizia Pepe: Perchè Mobile?
Patrizia Pepe: Perchè Mobile? Patrizia Pepe: Perchè Mobile?
Patrizia Pepe: Perchè Mobile?
 
Fastweb: Mobile Web Marketing
Fastweb: Mobile Web MarketingFastweb: Mobile Web Marketing
Fastweb: Mobile Web Marketing
 
Presentation1
Presentation1Presentation1
Presentation1
 
BAKER DONELSON - Attorney Layoffs The SINKING OF A TERRORIST REGIME (GALICIAN)
BAKER DONELSON - Attorney Layoffs The SINKING OF A TERRORIST REGIME (GALICIAN)BAKER DONELSON - Attorney Layoffs The SINKING OF A TERRORIST REGIME (GALICIAN)
BAKER DONELSON - Attorney Layoffs The SINKING OF A TERRORIST REGIME (GALICIAN)
 
B.Smith Rugs
B.Smith RugsB.Smith Rugs
B.Smith Rugs
 
BAKER DONELSON - Attorney Layoffs The SINKING OF A TERRORIST REGIME (FRISIAN)
BAKER DONELSON - Attorney Layoffs The SINKING OF A TERRORIST REGIME (FRISIAN)BAKER DONELSON - Attorney Layoffs The SINKING OF A TERRORIST REGIME (FRISIAN)
BAKER DONELSON - Attorney Layoffs The SINKING OF A TERRORIST REGIME (FRISIAN)
 
BAKER DONELSON - Attorney Layoffs The SINKING OF A TERRORIST REGIME (FILIPINO)
BAKER DONELSON - Attorney Layoffs The SINKING OF A TERRORIST REGIME (FILIPINO)BAKER DONELSON - Attorney Layoffs The SINKING OF A TERRORIST REGIME (FILIPINO)
BAKER DONELSON - Attorney Layoffs The SINKING OF A TERRORIST REGIME (FILIPINO)
 
031816 - WORLD NEWS RELEASE (Arabic)
031816 - WORLD NEWS RELEASE (Arabic)031816 - WORLD NEWS RELEASE (Arabic)
031816 - WORLD NEWS RELEASE (Arabic)
 
031816 - WORLD NEWS RELEASE (Bulgarian)
031816 - WORLD NEWS RELEASE (Bulgarian)031816 - WORLD NEWS RELEASE (Bulgarian)
031816 - WORLD NEWS RELEASE (Bulgarian)
 
Pp growthanddevelopment
Pp growthanddevelopmentPp growthanddevelopment
Pp growthanddevelopment
 
Ética y atención a la diversidad
Ética y atención a la diversidadÉtica y atención a la diversidad
Ética y atención a la diversidad
 
031816 - WORLD NEWS RELEASE (Russian)
031816 - WORLD NEWS RELEASE (Russian)031816 - WORLD NEWS RELEASE (Russian)
031816 - WORLD NEWS RELEASE (Russian)
 
Community IT Webinar - IT Security for Nonprofits
Community IT Webinar - IT Security for NonprofitsCommunity IT Webinar - IT Security for Nonprofits
Community IT Webinar - IT Security for Nonprofits
 
05/03/11 USPS MAILING RECEIPTS (Proof of Mailing)
05/03/11 USPS MAILING RECEIPTS (Proof of Mailing)05/03/11 USPS MAILING RECEIPTS (Proof of Mailing)
05/03/11 USPS MAILING RECEIPTS (Proof of Mailing)
 
George zimmerman & ebola crisis (bengali)
George zimmerman & ebola crisis (bengali)George zimmerman & ebola crisis (bengali)
George zimmerman & ebola crisis (bengali)
 
BAKER DONELSON - Attorney Layoffs The SINKING OF A TERRORIST REGIME (FINNISH)
BAKER DONELSON - Attorney Layoffs The SINKING OF A TERRORIST REGIME (FINNISH)BAKER DONELSON - Attorney Layoffs The SINKING OF A TERRORIST REGIME (FINNISH)
BAKER DONELSON - Attorney Layoffs The SINKING OF A TERRORIST REGIME (FINNISH)
 

Similar to Community IT Innovators - BYOD for Nonprofits

Meeting the cyber risk challenge
Meeting the cyber risk challengeMeeting the cyber risk challenge
Meeting the cyber risk challengeFERMA
 
HDI Capital Area Slides August 17, 2018
HDI Capital Area Slides August 17, 2018HDI Capital Area Slides August 17, 2018
HDI Capital Area Slides August 17, 2018hdicapitalarea
 
Challenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act BringsChallenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act BringsRobert 'Bob' Reyes
 
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...AIIM International
 
Role of The Board In IT Governance & Cyber Security-Steve Howse
Role of The Board In IT Governance & Cyber Security-Steve HowseRole of The Board In IT Governance & Cyber Security-Steve Howse
Role of The Board In IT Governance & Cyber Security-Steve HowseCGTI
 
Best practices to mitigate data breach risk
Best practices to mitigate data breach riskBest practices to mitigate data breach risk
Best practices to mitigate data breach riskLivingstone Advisory
 
Staying Safe In A Quickly Evolving World
Staying Safe In A Quickly Evolving WorldStaying Safe In A Quickly Evolving World
Staying Safe In A Quickly Evolving Worldbrian andrews
 
Community IT Innovators - Best of Nonprofit Tech Webinar
Community IT Innovators - Best of Nonprofit Tech WebinarCommunity IT Innovators - Best of Nonprofit Tech Webinar
Community IT Innovators - Best of Nonprofit Tech WebinarCommunity IT Innovators
 
Selling security to the C-level
Selling security to the C-levelSelling security to the C-level
Selling security to the C-levelDonald Tabone
 
Information Security is NOT an IT Issue
Information Security is NOT an IT IssueInformation Security is NOT an IT Issue
Information Security is NOT an IT IssueEvan Francen
 
Ravi i ot-security
Ravi i ot-securityRavi i ot-security
Ravi i ot-securityskumartarget
 
Webinar : Desperately Seeking Transformation - Part 1: Why data will make or ...
Webinar : Desperately Seeking Transformation - Part 1: Why data will make or ...Webinar : Desperately Seeking Transformation - Part 1: Why data will make or ...
Webinar : Desperately Seeking Transformation - Part 1: Why data will make or ...The Digital Insurer
 
BYOD: D for Device or D for Disaster?
BYOD: D for Device or D for Disaster?BYOD: D for Device or D for Disaster?
BYOD: D for Device or D for Disaster?Marketing Team
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education ConferanceTommy Riggins
 
Marketing Program Overview_Sal A _2012 v2.1
Marketing Program Overview_Sal A _2012 v2.1Marketing Program Overview_Sal A _2012 v2.1
Marketing Program Overview_Sal A _2012 v2.1Sal Abramo
 
BSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessBSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessJoel Cardella
 
BYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And BenefitsBYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And BenefitsModis
 

Similar to Community IT Innovators - BYOD for Nonprofits (20)

Meeting the cyber risk challenge
Meeting the cyber risk challengeMeeting the cyber risk challenge
Meeting the cyber risk challenge
 
HDI Capital Area Slides August 17, 2018
HDI Capital Area Slides August 17, 2018HDI Capital Area Slides August 17, 2018
HDI Capital Area Slides August 17, 2018
 
Challenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act BringsChallenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act Brings
 
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
 
Role of The Board In IT Governance & Cyber Security-Steve Howse
Role of The Board In IT Governance & Cyber Security-Steve HowseRole of The Board In IT Governance & Cyber Security-Steve Howse
Role of The Board In IT Governance & Cyber Security-Steve Howse
 
Information & Cyber Security Risk
Information & Cyber Security RiskInformation & Cyber Security Risk
Information & Cyber Security Risk
 
Best practices to mitigate data breach risk
Best practices to mitigate data breach riskBest practices to mitigate data breach risk
Best practices to mitigate data breach risk
 
Staying Safe In A Quickly Evolving World
Staying Safe In A Quickly Evolving WorldStaying Safe In A Quickly Evolving World
Staying Safe In A Quickly Evolving World
 
Community IT Innovators - Best of Nonprofit Tech Webinar
Community IT Innovators - Best of Nonprofit Tech WebinarCommunity IT Innovators - Best of Nonprofit Tech Webinar
Community IT Innovators - Best of Nonprofit Tech Webinar
 
Selling security to the C-level
Selling security to the C-levelSelling security to the C-level
Selling security to the C-level
 
Information Security is NOT an IT Issue
Information Security is NOT an IT IssueInformation Security is NOT an IT Issue
Information Security is NOT an IT Issue
 
Ravi i ot-security
Ravi i ot-securityRavi i ot-security
Ravi i ot-security
 
Webinar : Desperately Seeking Transformation - Part 1: Why data will make or ...
Webinar : Desperately Seeking Transformation - Part 1: Why data will make or ...Webinar : Desperately Seeking Transformation - Part 1: Why data will make or ...
Webinar : Desperately Seeking Transformation - Part 1: Why data will make or ...
 
BYOD: D for Device or D for Disaster?
BYOD: D for Device or D for Disaster?BYOD: D for Device or D for Disaster?
BYOD: D for Device or D for Disaster?
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education Conferance
 
Marketing Program Overview_Sal A _2012 v2.1
Marketing Program Overview_Sal A _2012 v2.1Marketing Program Overview_Sal A _2012 v2.1
Marketing Program Overview_Sal A _2012 v2.1
 
BSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessBSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing business
 
BYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And BenefitsBYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And Benefits
 
BYOD
BYODBYOD
BYOD
 
Byod final (2)
Byod   final (2)Byod   final (2)
Byod final (2)
 

More from Community IT Innovators

Slack, Microsoft Teams, Zoom: What Works Best for Nonprofits?
Slack, Microsoft Teams, Zoom: What Works Best for Nonprofits?Slack, Microsoft Teams, Zoom: What Works Best for Nonprofits?
Slack, Microsoft Teams, Zoom: What Works Best for Nonprofits?Community IT Innovators
 
2021 Nonprofit Cybersecurity Incident Report
2021 Nonprofit Cybersecurity Incident Report2021 Nonprofit Cybersecurity Incident Report
2021 Nonprofit Cybersecurity Incident ReportCommunity IT Innovators
 
Microsoft Dynamics and Salesforce: What You Need To Know Before Choosing a Pl...
Microsoft Dynamics and Salesforce: What You Need To Know Before Choosing a Pl...Microsoft Dynamics and Salesforce: What You Need To Know Before Choosing a Pl...
Microsoft Dynamics and Salesforce: What You Need To Know Before Choosing a Pl...Community IT Innovators
 
Nonprofit Cybersecurity Risk Assessment Basics
Nonprofit Cybersecurity Risk Assessment BasicsNonprofit Cybersecurity Risk Assessment Basics
Nonprofit Cybersecurity Risk Assessment BasicsCommunity IT Innovators
 
Does Your Organization Need a Better Technology Roadmap?
Does Your Organization Need a Better Technology Roadmap?Does Your Organization Need a Better Technology Roadmap?
Does Your Organization Need a Better Technology Roadmap?Community IT Innovators
 
2020 Nonprofit Technology Trends Roundtable
2020 Nonprofit Technology Trends Roundtable2020 Nonprofit Technology Trends Roundtable
2020 Nonprofit Technology Trends RoundtableCommunity IT Innovators
 
5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and MoreCommunity IT Innovators
 
How Data Quality Defines Your Organization Webinar November 2019
How Data Quality Defines Your Organization Webinar November 2019How Data Quality Defines Your Organization Webinar November 2019
How Data Quality Defines Your Organization Webinar November 2019Community IT Innovators
 
Nonprofit Cybersecurity Readiness - Community IT Innovators Webinar
Nonprofit Cybersecurity Readiness - Community IT Innovators WebinarNonprofit Cybersecurity Readiness - Community IT Innovators Webinar
Nonprofit Cybersecurity Readiness - Community IT Innovators WebinarCommunity IT Innovators
 
5 Steps to Create an Information Strategy for Your Organization
5 Steps to Create an Information Strategy for Your Organization5 Steps to Create an Information Strategy for Your Organization
5 Steps to Create an Information Strategy for Your OrganizationCommunity IT Innovators
 
Server 2008 and Windows 7 End of Life: 3 Things You Need to Know
Server 2008 and Windows 7 End of Life: 3 Things You Need to KnowServer 2008 and Windows 7 End of Life: 3 Things You Need to Know
Server 2008 and Windows 7 End of Life: 3 Things You Need to KnowCommunity IT Innovators
 
What Makes Nonprofit Tech Projects Succeed?
What Makes Nonprofit Tech Projects Succeed?What Makes Nonprofit Tech Projects Succeed?
What Makes Nonprofit Tech Projects Succeed?Community IT Innovators
 
Community IT Webinar: Working with an Outsourced IT Manager
Community IT Webinar: Working with an Outsourced IT ManagerCommunity IT Webinar: Working with an Outsourced IT Manager
Community IT Webinar: Working with an Outsourced IT ManagerCommunity IT Innovators
 
Improving Nonprofit CRM Data Management in 2019 - Build Consulting and Commun...
Improving Nonprofit CRM Data Management in 2019 - Build Consulting and Commun...Improving Nonprofit CRM Data Management in 2019 - Build Consulting and Commun...
Improving Nonprofit CRM Data Management in 2019 - Build Consulting and Commun...Community IT Innovators
 
Community IT Innovators Technology Trends Round Table 2019
Community IT Innovators Technology Trends Round Table 2019Community IT Innovators Technology Trends Round Table 2019
Community IT Innovators Technology Trends Round Table 2019Community IT Innovators
 
Selecting Nonprofit Software: Technology Comes Last
Selecting Nonprofit Software: Technology Comes LastSelecting Nonprofit Software: Technology Comes Last
Selecting Nonprofit Software: Technology Comes LastCommunity IT Innovators
 
IT Security Incident Response for Nonprofits
IT Security Incident Response for NonprofitsIT Security Incident Response for Nonprofits
IT Security Incident Response for NonprofitsCommunity IT Innovators
 

More from Community IT Innovators (20)

Slack, Microsoft Teams, Zoom: What Works Best for Nonprofits?
Slack, Microsoft Teams, Zoom: What Works Best for Nonprofits?Slack, Microsoft Teams, Zoom: What Works Best for Nonprofits?
Slack, Microsoft Teams, Zoom: What Works Best for Nonprofits?
 
2021 Nonprofit Cybersecurity Incident Report
2021 Nonprofit Cybersecurity Incident Report2021 Nonprofit Cybersecurity Incident Report
2021 Nonprofit Cybersecurity Incident Report
 
Cybersecurity Training for Nonprofits
Cybersecurity Training for NonprofitsCybersecurity Training for Nonprofits
Cybersecurity Training for Nonprofits
 
SharePoint Online for Nonprofits
SharePoint Online for NonprofitsSharePoint Online for Nonprofits
SharePoint Online for Nonprofits
 
Microsoft Dynamics and Salesforce: What You Need To Know Before Choosing a Pl...
Microsoft Dynamics and Salesforce: What You Need To Know Before Choosing a Pl...Microsoft Dynamics and Salesforce: What You Need To Know Before Choosing a Pl...
Microsoft Dynamics and Salesforce: What You Need To Know Before Choosing a Pl...
 
Nonprofit Cybersecurity Risk Assessment Basics
Nonprofit Cybersecurity Risk Assessment BasicsNonprofit Cybersecurity Risk Assessment Basics
Nonprofit Cybersecurity Risk Assessment Basics
 
Does Your Organization Need a Better Technology Roadmap?
Does Your Organization Need a Better Technology Roadmap?Does Your Organization Need a Better Technology Roadmap?
Does Your Organization Need a Better Technology Roadmap?
 
2020 Nonprofit Technology Trends Roundtable
2020 Nonprofit Technology Trends Roundtable2020 Nonprofit Technology Trends Roundtable
2020 Nonprofit Technology Trends Roundtable
 
5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More
 
How Data Quality Defines Your Organization Webinar November 2019
How Data Quality Defines Your Organization Webinar November 2019How Data Quality Defines Your Organization Webinar November 2019
How Data Quality Defines Your Organization Webinar November 2019
 
Nonprofit Cybersecurity Readiness - Community IT Innovators Webinar
Nonprofit Cybersecurity Readiness - Community IT Innovators WebinarNonprofit Cybersecurity Readiness - Community IT Innovators Webinar
Nonprofit Cybersecurity Readiness - Community IT Innovators Webinar
 
5 Steps to Create an Information Strategy for Your Organization
5 Steps to Create an Information Strategy for Your Organization5 Steps to Create an Information Strategy for Your Organization
5 Steps to Create an Information Strategy for Your Organization
 
Server 2008 and Windows 7 End of Life: 3 Things You Need to Know
Server 2008 and Windows 7 End of Life: 3 Things You Need to KnowServer 2008 and Windows 7 End of Life: 3 Things You Need to Know
Server 2008 and Windows 7 End of Life: 3 Things You Need to Know
 
What Makes Nonprofit Tech Projects Succeed?
What Makes Nonprofit Tech Projects Succeed?What Makes Nonprofit Tech Projects Succeed?
What Makes Nonprofit Tech Projects Succeed?
 
Community IT Webinar: Working with an Outsourced IT Manager
Community IT Webinar: Working with an Outsourced IT ManagerCommunity IT Webinar: Working with an Outsourced IT Manager
Community IT Webinar: Working with an Outsourced IT Manager
 
Nonprofit Cybersecurity Incident Report
Nonprofit Cybersecurity Incident ReportNonprofit Cybersecurity Incident Report
Nonprofit Cybersecurity Incident Report
 
Improving Nonprofit CRM Data Management in 2019 - Build Consulting and Commun...
Improving Nonprofit CRM Data Management in 2019 - Build Consulting and Commun...Improving Nonprofit CRM Data Management in 2019 - Build Consulting and Commun...
Improving Nonprofit CRM Data Management in 2019 - Build Consulting and Commun...
 
Community IT Innovators Technology Trends Round Table 2019
Community IT Innovators Technology Trends Round Table 2019Community IT Innovators Technology Trends Round Table 2019
Community IT Innovators Technology Trends Round Table 2019
 
Selecting Nonprofit Software: Technology Comes Last
Selecting Nonprofit Software: Technology Comes LastSelecting Nonprofit Software: Technology Comes Last
Selecting Nonprofit Software: Technology Comes Last
 
IT Security Incident Response for Nonprofits
IT Security Incident Response for NonprofitsIT Security Incident Response for Nonprofits
IT Security Incident Response for Nonprofits
 

Recently uploaded

Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 

Recently uploaded (20)

Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

Community IT Innovators - BYOD for Nonprofits

  • 1. BYOD for Nonprofits June 20, 2013 Community IT Innovators Webinar Series presented by… Johan Hammerstrom
  • 2. Webinar Tips • Ask questions Post questions via chat • Interact Respond to polls during webinar • Focus Avoid multitasking. You may just miss the best part of the presentation • Webinar Powerpoint & Recording Powerpoint and recording links will be shared after the webinar
  • 3. About Community IT Community IT Innovators partners with nonprofits to help them solve their strategic & day-to-day IT challenges. Strategic Proactive approach so you can make IT decisions that support your mission and grow with you Collaborative Team of over 40 staff who empower you to make informed IT choices Invested We are committed to supporting your mission, and take care of your IT network as if it were our own Nonprofit focus Worked with over 900 nonprofits since 1993
  • 4. about the presenter Johan Hammerstrom Chief Operating Officer jhammerstrom@communityit.com @hammerstromj
  • 5. Agenda I. BYOD…a brief history II. Best Practices III. BYOD Risk Management IV. BYOD Policy Guidelines
  • 9. But then they got smaller
  • 17. 1. Goal: 90% of 150,000 workforce 2. Custom Authentication System 3. Reason: Avoid locked-in corporate environment Aggressive BYOD
  • 18. 1. 20% use their own device 2. Increasing restrictions on personal device use 3. Reason: Security concerns 4. Dropsmack! Conservative BYOD
  • 19. Risk
  • 20. Benefits of BYOD 1. Reduce hardware & support costs 2. Work flexibility 3. Employee availability 4. User adoption and satisfaction
  • 21. Risks of BYOD 1. Information Security 2. Legal 3. Financial
  • 23. 1. Information Security Risks a) Organization – Data leakage – Vector into the company b) Personal – Onerous security measures – Loss of full control of device
  • 24. 2. Legal Risks a) Organization – Lack of certainty in case law and legislation b) Personal – Personal device could be confiscated – Personal blurs into the corporate
  • 25. 3. Financial Risks a) Organization – Stipends can be more expensive than a single corporate plan – IT Support can become entangled – Mobile Device Management (MDM) can be expensive b) Personal – Stipend may not cover full cost…or any at all – Can be responsible for own support
  • 26. Risks • Security • Legal • Financial Benefits • Cost • Flexibility • Adoption Risk/Benefit Analysis
  • 27. One Size Fits All? • Sales • Accounting • Executive
  • 28. Guidelines 1) Identify Benefits a) Prioritize for your Organization b) Establish your strategy 2) Identify Risks a) Risk = Impact * Likelihood 3) Consider a few solutions 4) Summarize in 1-page policy
  • 29. Program Staff Development Executive Benefits Reduce costs 1 Work Flexibility 1 1 Availability 1 1 User adoption 1 Risks Info Security 2 1 1 Legal 3 3 1 Financial 1 1 3 Policy provide small stipend & limited access to information provide limited access to information from home org provided device, fully managed access to info
  • 30. Generic 1) BYOD by staff role a) Exec staff, accessible 24x7 stipend of $80/mo b) Senior staff, accessible 10x7 stipend of $50/mo c) Line staff, accessible 10x5 stipend of $30/mo 2) Requirement of PIN code on device 3) Acceptable Use policy 4) IT Support policy
  • 35. Upcoming Webinar July 25 IT Security Best Practices Presenter Steve Longenecker Mark Kraemer
  • 36. Next Steps • Connect with us • Provide feedback Short survey after you exit the webinar. Be sure to include any questions that were not answered. • Missed anything? Link to slides & recording will be emailed to you.