SlideShare une entreprise Scribd logo
1  sur  21
Remote Staff, Office Staff
Tech Tips For Nonprofits
Webinar
Series
June 2020
Johan Hammerstrom
CEO
Presenter
Presenter
Johanny Torrico
COO
Presenter
Steve Longenecker
Dir IT Consulting
About Community IT
Advancing mission
through the effective use
of technology.
100% Employee Owned
Agenda
Remote Work Best Practices
Cybersecurity Landscape
Good Cybersecurity Practices
Reintegrating work
Remote Work Challenges
Management / reporting harder
Remote work opens up security holes
Difficult to access specialized applications
Proactive planning pays off
Remote Work Best Practices
Leverage the cloud
De-centralized equipment
Centralized management
Video and chat to stay in touch
Ecosystems
Video & Chat
Orgs already have
secure tools
available to them
Microsoft Teams
Google Meet
Orgs with significant
Privacy and Security
concerns
Wire
Signal
Jitsi
Using Zoom?
Update your
client
Follow good
meeting security
practices
Includes Video
Conferencing
• Google Meet
• https://support.google.com/a/users/answer
/9282720?hl=en
• Microsoft Teams
• https://communityit.com/microsoft-teams-
for-nonprofits/
Zoom Video
Conferencing
• Easy to use
• Great for peer to peer collaboration
• Follow best practices for keeping meeting
secure
• https://communityit.com/nonprofit-
cybersecurity-tips-zoom/
• Mixed record on privacy and security
CYBERSECURITY LANDSCAPE
Persistent and ongoing
brute force attacks on
identities
Sophisticated spear
phishing
Organizations targeted
because of the work
they do
Attacks targeting
vendors
CYBERSECURITY LANDSCAPE
New security tools available
to combat new threat types.
Organizations more
proactive about asking
where to start improving
their cybersecurity.
60% of Nonprofits don’t
know how their org handles
cybersecurity risk.
Breach response for a small
to medium business is
$149,000
Security Risks
– Remote
Work
• Opens up more remote access with single factor
authentication
• Remote Desktop Server
• VPN
• Work devices being used by family
• Personal devices used for work
• Increase in targeting phishing
• New apps needed to stay connected
Important
Security
Practices
• Update your computers (reboot weekly)
• Make sure your data is backed up
• Enable Multi Factor Authentication
• Use a password manager
• Enroll in Security Awareness Training
• Use organization provided systems
Reintegrating
Remote Work -
Data
• Communicate systems of record
• Rein in data sprawl
• Move data from personal to organizational
systems
• Incorporate new systems
• Train the trainer
• Ensure systems meet org policies
Reintegrating
Remote Work -
Devices
• Make sure systems up to date with patches
• Make sure systems are clean
• Update / remove controls associated with shared use
• Update / rotate local admin credentials
Reintegrating
Remote Work -
Policy
• Revisit Business Continuity Plans
• What worked
• What needs revised
• Revisit IT Policy
• Incorporate new scenarios
• Revise to address changing business landscape
• Update IT Planning
• Accelerate cloud centric computing
• Plan for more mobile workforce
• Invest in tools to manage distributed computers
Upcoming
Webinar
Nonprofit Cybersecurity Risk
Assessment Basics
Wednesday July 15
3:00 – 4:00 PM EST
Questions?

Contenu connexe

Plus de Community IT Innovators

Plus de Community IT Innovators (20)

5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More
 
How Data Quality Defines Your Organization Webinar November 2019
How Data Quality Defines Your Organization Webinar November 2019How Data Quality Defines Your Organization Webinar November 2019
How Data Quality Defines Your Organization Webinar November 2019
 
Nonprofit Cybersecurity Readiness - Community IT Innovators Webinar
Nonprofit Cybersecurity Readiness - Community IT Innovators WebinarNonprofit Cybersecurity Readiness - Community IT Innovators Webinar
Nonprofit Cybersecurity Readiness - Community IT Innovators Webinar
 
5 Steps to Create an Information Strategy for Your Organization
5 Steps to Create an Information Strategy for Your Organization5 Steps to Create an Information Strategy for Your Organization
5 Steps to Create an Information Strategy for Your Organization
 
Server 2008 and Windows 7 End of Life: 3 Things You Need to Know
Server 2008 and Windows 7 End of Life: 3 Things You Need to KnowServer 2008 and Windows 7 End of Life: 3 Things You Need to Know
Server 2008 and Windows 7 End of Life: 3 Things You Need to Know
 
What Makes Nonprofit Tech Projects Succeed?
What Makes Nonprofit Tech Projects Succeed?What Makes Nonprofit Tech Projects Succeed?
What Makes Nonprofit Tech Projects Succeed?
 
Community IT Webinar: Working with an Outsourced IT Manager
Community IT Webinar: Working with an Outsourced IT ManagerCommunity IT Webinar: Working with an Outsourced IT Manager
Community IT Webinar: Working with an Outsourced IT Manager
 
Nonprofit Cybersecurity Incident Report
Nonprofit Cybersecurity Incident ReportNonprofit Cybersecurity Incident Report
Nonprofit Cybersecurity Incident Report
 
Improving Nonprofit CRM Data Management in 2019 - Build Consulting and Commun...
Improving Nonprofit CRM Data Management in 2019 - Build Consulting and Commun...Improving Nonprofit CRM Data Management in 2019 - Build Consulting and Commun...
Improving Nonprofit CRM Data Management in 2019 - Build Consulting and Commun...
 
Community IT Innovators Technology Trends Round Table 2019
Community IT Innovators Technology Trends Round Table 2019Community IT Innovators Technology Trends Round Table 2019
Community IT Innovators Technology Trends Round Table 2019
 
Selecting Nonprofit Software: Technology Comes Last
Selecting Nonprofit Software: Technology Comes LastSelecting Nonprofit Software: Technology Comes Last
Selecting Nonprofit Software: Technology Comes Last
 
IT Security Incident Response for Nonprofits
IT Security Incident Response for NonprofitsIT Security Incident Response for Nonprofits
IT Security Incident Response for Nonprofits
 
Office 365 Security Best Practices
Office 365 Security Best PracticesOffice 365 Security Best Practices
Office 365 Security Best Practices
 
Nonprofit Development, Meet Accounting!
Nonprofit Development, Meet Accounting!Nonprofit Development, Meet Accounting!
Nonprofit Development, Meet Accounting!
 
IT Management Fundamentals
IT Management FundamentalsIT Management Fundamentals
IT Management Fundamentals
 
Encryption 101 for Nonprofits
Encryption 101 for NonprofitsEncryption 101 for Nonprofits
Encryption 101 for Nonprofits
 
Nonprofit Development Operations and Technology
Nonprofit Development Operations and TechnologyNonprofit Development Operations and Technology
Nonprofit Development Operations and Technology
 
18NTC Nonprofit Technology Conference Round Up
18NTC Nonprofit Technology Conference Round Up18NTC Nonprofit Technology Conference Round Up
18NTC Nonprofit Technology Conference Round Up
 
PowerBI for Nonprofits
PowerBI for NonprofitsPowerBI for Nonprofits
PowerBI for Nonprofits
 
Five Hacks to Weave Constituent Experience Into Your Organization
Five Hacks to Weave Constituent Experience Into Your OrganizationFive Hacks to Weave Constituent Experience Into Your Organization
Five Hacks to Weave Constituent Experience Into Your Organization
 

Dernier

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Dernier (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 

Remote Staff, Office Staff - Tech Tips for Nonprofits

  • 1. Remote Staff, Office Staff Tech Tips For Nonprofits Webinar Series June 2020
  • 5. About Community IT Advancing mission through the effective use of technology. 100% Employee Owned
  • 6. Agenda Remote Work Best Practices Cybersecurity Landscape Good Cybersecurity Practices Reintegrating work
  • 7. Remote Work Challenges Management / reporting harder Remote work opens up security holes Difficult to access specialized applications Proactive planning pays off
  • 8. Remote Work Best Practices Leverage the cloud De-centralized equipment Centralized management Video and chat to stay in touch
  • 10. Video & Chat Orgs already have secure tools available to them Microsoft Teams Google Meet Orgs with significant Privacy and Security concerns Wire Signal Jitsi Using Zoom? Update your client Follow good meeting security practices
  • 11. Includes Video Conferencing • Google Meet • https://support.google.com/a/users/answer /9282720?hl=en • Microsoft Teams • https://communityit.com/microsoft-teams- for-nonprofits/
  • 12. Zoom Video Conferencing • Easy to use • Great for peer to peer collaboration • Follow best practices for keeping meeting secure • https://communityit.com/nonprofit- cybersecurity-tips-zoom/ • Mixed record on privacy and security
  • 13. CYBERSECURITY LANDSCAPE Persistent and ongoing brute force attacks on identities Sophisticated spear phishing Organizations targeted because of the work they do Attacks targeting vendors
  • 14. CYBERSECURITY LANDSCAPE New security tools available to combat new threat types. Organizations more proactive about asking where to start improving their cybersecurity. 60% of Nonprofits don’t know how their org handles cybersecurity risk. Breach response for a small to medium business is $149,000
  • 15. Security Risks – Remote Work • Opens up more remote access with single factor authentication • Remote Desktop Server • VPN • Work devices being used by family • Personal devices used for work • Increase in targeting phishing • New apps needed to stay connected
  • 16. Important Security Practices • Update your computers (reboot weekly) • Make sure your data is backed up • Enable Multi Factor Authentication • Use a password manager • Enroll in Security Awareness Training • Use organization provided systems
  • 17. Reintegrating Remote Work - Data • Communicate systems of record • Rein in data sprawl • Move data from personal to organizational systems • Incorporate new systems • Train the trainer • Ensure systems meet org policies
  • 18. Reintegrating Remote Work - Devices • Make sure systems up to date with patches • Make sure systems are clean • Update / remove controls associated with shared use • Update / rotate local admin credentials
  • 19. Reintegrating Remote Work - Policy • Revisit Business Continuity Plans • What worked • What needs revised • Revisit IT Policy • Incorporate new scenarios • Revise to address changing business landscape • Update IT Planning • Accelerate cloud centric computing • Plan for more mobile workforce • Invest in tools to manage distributed computers
  • 20. Upcoming Webinar Nonprofit Cybersecurity Risk Assessment Basics Wednesday July 15 3:00 – 4:00 PM EST

Notes de l'éditeur

  1. Access to specialized applications Fundraising/Donor databases Accounting software SL - Getting IT Support can be harder.
  2. Access to specialized applications Fundraising/Donor databases Accounting software SL - Clients in best shape are the ones that have already converted over to the cloud and have settled on the laptop as the standard company-provided device given to users. By choosing company-provided over BYOD, the centralized management is much easier and ownership of data (less data leakage) is clearer. SL – Meetings used to be a break from screens. In a remote work environment they are not. So one of the unspoken benefits of meetings is taken away. It probably means there should be fewer meetings and the purpose of meetings should be well-defined. SL – Because there are no built-in breaks from screens, flexible schedules are really beneficial if operational requirements can allow for it.
  3. Define Spear Phishing - the fraudulent practice of sending emails ostensibly from a known or trusted sender in order to induce targeted individuals to reveal confidential information. Can be one technique of Business Email Compromise the fraudulent practice of sending emails ostensibly from a known or trusted sender in order to induce targeted individuals to reveal confidential information. Organizations Targeted – because of lists and donors
  4. SL – Cybersecurity INSURANCE is getting to be more and more of a requirement?
  5. Get Mary to talk about her experience with Security Awareness Training MFA https://communityit.com/nonprofits-should-require-multi-factor-authentication-mfa-three-reasons/ Our big picture guide is https://communityit.com/nonprofit-cybersecurity/
  6. Look at IT Policy Identify systems of records - Example of now using Dropbox, or Slack. How to What are the requirements? Support MFA Have strong data privacy Able to backup Ensure data ownership Ensure auditing / reporting