SlideShare une entreprise Scribd logo
1  sur  49
Keep Your Connected Nonprofit or
Library Secure
October 1, 2015
Using ReadyTalk
• Chat to ask questions
• All lines are muted
• If you lose your Internet
connection, reconnect using
the link emailed to you.
• If you lose your phone
connection, re-dial
the phone number
and re-join.
• ReadyTalk support:
800-843-9166
Your audio will play through your computer’s speakers. Hear an echo? You
may be logged in twice and will need to close one instance of ReadyTalk.
2
You Are Being Recorded…
• This webinar will be available on the TechSoup website
along with past webinars:
www.techsoup.org/community/events-webinars
• You can also view recorded webinars and videos on our
YouTube channel:
https://www.youtube.com/TechSoupVideo
• You will receive an email with this presentation,
recording, and links within a day.
• Tweet us @TechSoup or using hashtag: #techsoup or
#TechedUp
3
Keep Your Connected Nonprofit or
Library Secure
October 1, 2015
Presenters
5
Assisting with chat: Allyson Bliss and Ale Bezdikian, TechSoup
Becky Wiegand
Webinar Program Manager
TechSoup Global
Kelley Bray
Employee Trust Lead
Symantec
Where Are
You?
We Are Here
6
We Are He
Agenda
• Introduction to TechSoup
• The Problem – Quiz Time!
• The Common Approach to Solutions
• How Symantec Does It Differently
• Simple Security
• Donated Symantec and Other Security
• Q&A
7
About TechSoup Global
We are a global network of 63 partner NGOs that provide the
best technology resources to over a half-million organizations in
121 countries.
8
We connect organizations and people with the resources,
support, and technology they need to change the world.
Learn more from our 2014 Year in Review.
9
We are working toward a time when every social benefit
organization on the planet has the technology, resources, and
knowledge it needs to operate at its full potential.
121
countries
served
63
partner
NGOs
41
Net2 local
groups
615k
NGOs
reached
Our Reach
Our Impact
10
Together, we build a stronger, more resilient civil society.
$4.8B
in technology
products and grants
employed by NGOs
for the greater good
35
languages used
to provide
education and
support
100+
corporate and
foundation partners
connected with the
causes and
communities they
care about
5.9M
annual visits to
our websites
600,000
newsletter
subscribers
empowered with
actionable knowledge
79%
of NGOs have
improved organizational
efficiency with
TechSoup Global's
resource offering*
*Source: = survey conducted among TechSoup members in 2013.
Our Product Donation Programs
Donated technology, education, and community forum resources
for NGOs save costs, magnify impact, and extend reach.
11
Participant Poll
Which of the following security tools are you using? (select
any)
• Avast! Free Antivirus
• Microsoft Security Essentials
• Windows Defender
• AVG Free Anti-Virus Free Edition
• Avira Free Antivirus
• Symantec Endpoint Protection
• McAfee VirusScan
• Norton Security
• AVG Internet Security
• Kaspersky Internet Security
12
13
Simple Security
Kelley Bray
Employee Trust Lead – Symantec Corporation
A little bit about me
• 5 years of Federal service
– Used to doing a lot with very little
• 2 years at SYMC
– Securing the company that secures the world
– Army of 1
• 3 kids growing up in the digital world
• kelley_bray@symantec.com
14
Agenda
• The problem
– Trivia
• The common approach to a solution
• How we do it differently at SYMC
• Simple Security
15
The Problem
• Rather than a lot of scary bullets, let’s play a little game
16
Question 1
• How many zero day vulnerabilities were reported in
2014?
– A) 18
– B) 24
– C) 12
– D) 8
2006 2007 2008 2009 2010 2011 2012
0
2
4
6
8
10
12
14
16
Answer: B
24 zero-day vulnerabilities were discovered
in 2014.
18
2013 2014
14
13
15
9
12
14
8
24
23
Question 2
• The top 5 zero-days left companies vulnerable for how
long?
– A) 1 day
– B) 2 weeks
– C) 180 days
– D) 295 days
Answer: D
20
Question 3
What were the top three causes of data
breaches in 2014?
22
49%
43%
8% Malicious Attackers
Accidentally
Exposed/ Theft
or Loss of Device
Insider Theft
Answer:
Question 4
In 2014, Symantec analyzed over 6 million
Android apps and found that 1 in ____
contained malware
Answer:
6.3 million apps for Android devices were
analyzed.
1 in 6 were classified with malware.
24
You get it – the cyber world is bad
• Protection strategies vary
• Funds are limited
• Tech-speak isn’t for everyone.
25
SYMC – Our requirements
• Secure our network and user data
• Meet our compliance requirements
• Protect our brand
• Spend our money wisely
• Show improvement and impact
• New Hire and Annual Training
• National Cyber Security Awareness Month/Other Activities
• Employee Engagement
26
The difference in our model
Compliance
Awareness
Talking “At”
Security
Change in Behavior
Talking “To”
27
Our definition of program success
• Good Security Behavior is natural… like wearing a seatbelt.
– Employees identify with the security
of the company and do the right thing
– Risk profile greatly reduced
– Full program implementation = Symantec
Human Firewall
28
Simple security
• Basic security
– Anti Virus, Firewalls…and that’s about all the tech I know..
• Protecting your people is easier!
– And, it’s free!
– Good behavior transcends the walls of work and home
• Believe it or not, the basics go a long way
– Everyone is a target
29
Passwords
• Simple rules to creating and remembering a strong password
– Complexity: create a password that includes upper and lower case letters,
numbers and special characters
– Do not use PII: A lot of people use names and important dates from their
family and friends. Most of this information can be found online, so avoid
using initials, birthdays, address information and other PII in passwords.
Never use information that can be found (like your birthday) on Facebook
or other social media sites.
– Change your password every 30 days and Never use the same password
for your work computer that you use for home or website access.
– Use a passphrase to create (and help you remember!) your password.
Example: a song lyric, with complexity added, is an easy password to
remember, but difficult to detect. Use the first letter of each word:
• “New York State of Mind” becomes NYSOM, and then NYS0M123!
30
Beware!
• If it’s too good to be true…
– Airports and Starbucks are a hackers amusement park
– All those free USB’s
• Physical Security: Beware of your surroundings
– Do not process sensitive data in areas that are visible by others.
– Lock your computer and phone out of sight when necessary
• Manage sensitive data correctly
– Never leave sensitive documents on your desk or in the printer
31
Social Media
• We love the internet, but the internet doesn’t love us back
• If you wouldn’t post it on your front door, do not post it on
Facebook
• Would you share a bottle of water with a stranger?
• Do you know what geotagging is?
32
Phishing
• Be aware of how to recognize a phishing attempt! Basic security
awareness can go a long way in preventing hackers from
accessing your network and data:
– Do not open emails from people or email addresses that you do not
recognize. If you must do this, verify the email address prior to clicking on
any links or opening any attachments to the message.
– Read the message carefully and consider the content. If it seems
suspicious (would the CIO be contacting you directly?) it’s probably a
phishing attempt.
– Watch out for spelling and grammatical errors and avoid any requests for
financial transactions or other inappropriate requests.
– Remember – if it seems to good to be true – it probably is!
– When in doubt, do NOT click on any links. Pick up the phone and contact
the sender directly.
33
34
How to get started
• Free Resources!
– Use these slides and provide basic education to your coworkers and
families
– National Cyber Security Alliance: www.staysafeonline.org
• Strategies for individuals and businesses
• Training
• Free virus scans
– Baseline Training (like what you see here)
• Or – on YouTube, check out the Norton #30SecTech videos for simple explanations to a lot
of technical terms
– Baseline Policy (you have to let people know what they are/not allowed
to do
– Basic software/network protection – keep those patches up to date!
35
Thank you!
• Questions?
36
Symantec Donation Program
37
www.techsoup.org/symantec
38
www.techsoup.org/symantec-catalog
39
www.techsoup.org/symantec-catalog
Additional Donated and Discounted Security Options
40
www.techsoup.org/comodo
Bitdefender
41
www.techsoup.org/bitdefender
42
www.techsoup.org/mailshell
43
www.techsoup.org/red-earth-software
Q & A
Please type your
questions in the
chat window.
Continue the discussion in
our Security forum.
56
Additional Resources
• Symantec Internet Security Threat Report 2015
• Celebrate National Cybersecurity Month with TechSoup
• 12 Steps to Stay Safer Online Guide (PDF)
• TechSoup’s Security Category
• Security Articles and How-Tos
• Symantec’s Norton Security for Nonprofits and Libraries
(webinar archive)
45
Learn and Share!
• Chat in one thing that you learned in today’s webinar that
you will try to implement.
• Will you share this information with your colleagues and
within your network?
46
Upcoming Webinars and Events
• 10/6: #NPTechChat: Civil Society Under Threat
• 10/14: Pinterest for Libraries: Building Community Through
Social Media
• 10/15: Do You Need the New Microsoft Office 2016 for
Windows?
• 10/15: Deadline for Next Adobe Creative Cloud Submissions!
• 10/22: Microsoft Office 2016 for Mac
Explore our webinar archives for more!
47
Connect with Us!
www.techsoupglobal.org
www.techsoup.org
facebook.com/techsoupglobal
twitter.com/techsoup
48
ReadyTalk offers dedicated product demos for
TechSoup organizations 4 times per week.
For more information: www.techsoup.org/readytalk
Please complete the post-event survey that will
pop up once you close this window.
Thank You to Our Webinar Sponsor!
49

Contenu connexe

Tendances

Webinar - QuickBooks 2016 for Existing Nonprofit Users - 2016-03-03
Webinar -  QuickBooks 2016 for Existing Nonprofit Users - 2016-03-03Webinar -  QuickBooks 2016 for Existing Nonprofit Users - 2016-03-03
Webinar - QuickBooks 2016 for Existing Nonprofit Users - 2016-03-03TechSoup
 
Webinar: Seven Strategic fundraising tips for your nonprofit-2016-01-20
Webinar: Seven Strategic fundraising tips for your nonprofit-2016-01-20Webinar: Seven Strategic fundraising tips for your nonprofit-2016-01-20
Webinar: Seven Strategic fundraising tips for your nonprofit-2016-01-20TechSoup
 
Webinar - Coding Clubs: Youth Programming for Public Libraries - 2016-09-28
Webinar - Coding Clubs: Youth Programming for Public Libraries - 2016-09-28Webinar - Coding Clubs: Youth Programming for Public Libraries - 2016-09-28
Webinar - Coding Clubs: Youth Programming for Public Libraries - 2016-09-28TechSoup
 
Webinar - QuickBooks for Newer Nonprofit Desktop Users - 2016-07-19
Webinar - QuickBooks for Newer Nonprofit Desktop Users - 2016-07-19Webinar - QuickBooks for Newer Nonprofit Desktop Users - 2016-07-19
Webinar - QuickBooks for Newer Nonprofit Desktop Users - 2016-07-19TechSoup
 
Webinar - 5 Things You Didn't Know About TechSoup's Donation Programs - 2016-...
Webinar - 5 Things You Didn't Know About TechSoup's Donation Programs - 2016-...Webinar - 5 Things You Didn't Know About TechSoup's Donation Programs - 2016-...
Webinar - 5 Things You Didn't Know About TechSoup's Donation Programs - 2016-...TechSoup
 
Webinar - Storymakers 4: Using Photos to Tell Your Organization's Story - 201...
Webinar - Storymakers 4: Using Photos to Tell Your Organization's Story - 201...Webinar - Storymakers 4: Using Photos to Tell Your Organization's Story - 201...
Webinar - Storymakers 4: Using Photos to Tell Your Organization's Story - 201...TechSoup
 
Webinar: Technology Skills Training Programs for Library Staff - 2016-01-27
Webinar: Technology Skills Training Programs for Library Staff - 2016-01-27Webinar: Technology Skills Training Programs for Library Staff - 2016-01-27
Webinar: Technology Skills Training Programs for Library Staff - 2016-01-27TechSoup
 
Webinar - The Changing Landscape of Library Privacy - 2016-06-15
Webinar - The Changing Landscape of Library Privacy - 2016-06-15Webinar - The Changing Landscape of Library Privacy - 2016-06-15
Webinar - The Changing Landscape of Library Privacy - 2016-06-15TechSoup
 
Webinar - Digital Skills for Older Adults: Teaching Technology in Public Libr...
Webinar - Digital Skills for Older Adults: Teaching Technology in Public Libr...Webinar - Digital Skills for Older Adults: Teaching Technology in Public Libr...
Webinar - Digital Skills for Older Adults: Teaching Technology in Public Libr...TechSoup
 
Free Webinar - Disaster Prep and Recovery for Nonprofits and Libraries - 2017...
Free Webinar - Disaster Prep and Recovery for Nonprofits and Libraries - 2017...Free Webinar - Disaster Prep and Recovery for Nonprofits and Libraries - 2017...
Free Webinar - Disaster Prep and Recovery for Nonprofits and Libraries - 2017...TechSoup
 
Webinar - Media Mentors: Helping Children Build Literacy Skills for the Digit...
Webinar - Media Mentors: Helping Children Build Literacy Skills for the Digit...Webinar - Media Mentors: Helping Children Build Literacy Skills for the Digit...
Webinar - Media Mentors: Helping Children Build Literacy Skills for the Digit...TechSoup
 
Webinar - Nonprofit Technology Basics: PC Troubleshooting and Maintenance - ...
Webinar -  Nonprofit Technology Basics: PC Troubleshooting and Maintenance - ...Webinar -  Nonprofit Technology Basics: PC Troubleshooting and Maintenance - ...
Webinar - Nonprofit Technology Basics: PC Troubleshooting and Maintenance - ...TechSoup
 
Webinar: Measuring Program Outcomes: A Toolkit for Small Libraries-2016-05-04
Webinar: Measuring Program Outcomes: A Toolkit for Small Libraries-2016-05-04Webinar: Measuring Program Outcomes: A Toolkit for Small Libraries-2016-05-04
Webinar: Measuring Program Outcomes: A Toolkit for Small Libraries-2016-05-04TechSoup
 
Webinar - Excel for Beginners - 2016-03-31
Webinar - Excel for Beginners - 2016-03-31Webinar - Excel for Beginners - 2016-03-31
Webinar - Excel for Beginners - 2016-03-31TechSoup
 
Webinar - 15 Ways to improve your library's Facebook page 2015 12-16
Webinar - 15 Ways to improve your library's Facebook page 2015 12-16Webinar - 15 Ways to improve your library's Facebook page 2015 12-16
Webinar - 15 Ways to improve your library's Facebook page 2015 12-16TechSoup
 
Webinar: Microsoft Azure-2016-10-19
Webinar: Microsoft Azure-2016-10-19Webinar: Microsoft Azure-2016-10-19
Webinar: Microsoft Azure-2016-10-19TechSoup
 
Webinar - What Can Libraries Count? Getting a Grip on Social Media Numbers - ...
Webinar - What Can Libraries Count? Getting a Grip on Social Media Numbers - ...Webinar - What Can Libraries Count? Getting a Grip on Social Media Numbers - ...
Webinar - What Can Libraries Count? Getting a Grip on Social Media Numbers - ...TechSoup
 
Webinar - Should You Contract Out Your Nonprofit's Tech? IT Assist and Manage...
Webinar - Should You Contract Out Your Nonprofit's Tech? IT Assist and Manage...Webinar - Should You Contract Out Your Nonprofit's Tech? IT Assist and Manage...
Webinar - Should You Contract Out Your Nonprofit's Tech? IT Assist and Manage...TechSoup
 
Webinar- Computer and Tech Hardware for Nonprofits and Libraries 2017-04-13
Webinar- Computer and Tech Hardware for Nonprofits and Libraries 2017-04-13Webinar- Computer and Tech Hardware for Nonprofits and Libraries 2017-04-13
Webinar- Computer and Tech Hardware for Nonprofits and Libraries 2017-04-13TechSoup
 
Webinar - Maximize Your Technology Donations Through TechSoup - 2017-03-28
Webinar - Maximize Your Technology Donations Through TechSoup - 2017-03-28Webinar - Maximize Your Technology Donations Through TechSoup - 2017-03-28
Webinar - Maximize Your Technology Donations Through TechSoup - 2017-03-28TechSoup
 

Tendances (20)

Webinar - QuickBooks 2016 for Existing Nonprofit Users - 2016-03-03
Webinar -  QuickBooks 2016 for Existing Nonprofit Users - 2016-03-03Webinar -  QuickBooks 2016 for Existing Nonprofit Users - 2016-03-03
Webinar - QuickBooks 2016 for Existing Nonprofit Users - 2016-03-03
 
Webinar: Seven Strategic fundraising tips for your nonprofit-2016-01-20
Webinar: Seven Strategic fundraising tips for your nonprofit-2016-01-20Webinar: Seven Strategic fundraising tips for your nonprofit-2016-01-20
Webinar: Seven Strategic fundraising tips for your nonprofit-2016-01-20
 
Webinar - Coding Clubs: Youth Programming for Public Libraries - 2016-09-28
Webinar - Coding Clubs: Youth Programming for Public Libraries - 2016-09-28Webinar - Coding Clubs: Youth Programming for Public Libraries - 2016-09-28
Webinar - Coding Clubs: Youth Programming for Public Libraries - 2016-09-28
 
Webinar - QuickBooks for Newer Nonprofit Desktop Users - 2016-07-19
Webinar - QuickBooks for Newer Nonprofit Desktop Users - 2016-07-19Webinar - QuickBooks for Newer Nonprofit Desktop Users - 2016-07-19
Webinar - QuickBooks for Newer Nonprofit Desktop Users - 2016-07-19
 
Webinar - 5 Things You Didn't Know About TechSoup's Donation Programs - 2016-...
Webinar - 5 Things You Didn't Know About TechSoup's Donation Programs - 2016-...Webinar - 5 Things You Didn't Know About TechSoup's Donation Programs - 2016-...
Webinar - 5 Things You Didn't Know About TechSoup's Donation Programs - 2016-...
 
Webinar - Storymakers 4: Using Photos to Tell Your Organization's Story - 201...
Webinar - Storymakers 4: Using Photos to Tell Your Organization's Story - 201...Webinar - Storymakers 4: Using Photos to Tell Your Organization's Story - 201...
Webinar - Storymakers 4: Using Photos to Tell Your Organization's Story - 201...
 
Webinar: Technology Skills Training Programs for Library Staff - 2016-01-27
Webinar: Technology Skills Training Programs for Library Staff - 2016-01-27Webinar: Technology Skills Training Programs for Library Staff - 2016-01-27
Webinar: Technology Skills Training Programs for Library Staff - 2016-01-27
 
Webinar - The Changing Landscape of Library Privacy - 2016-06-15
Webinar - The Changing Landscape of Library Privacy - 2016-06-15Webinar - The Changing Landscape of Library Privacy - 2016-06-15
Webinar - The Changing Landscape of Library Privacy - 2016-06-15
 
Webinar - Digital Skills for Older Adults: Teaching Technology in Public Libr...
Webinar - Digital Skills for Older Adults: Teaching Technology in Public Libr...Webinar - Digital Skills for Older Adults: Teaching Technology in Public Libr...
Webinar - Digital Skills for Older Adults: Teaching Technology in Public Libr...
 
Free Webinar - Disaster Prep and Recovery for Nonprofits and Libraries - 2017...
Free Webinar - Disaster Prep and Recovery for Nonprofits and Libraries - 2017...Free Webinar - Disaster Prep and Recovery for Nonprofits and Libraries - 2017...
Free Webinar - Disaster Prep and Recovery for Nonprofits and Libraries - 2017...
 
Webinar - Media Mentors: Helping Children Build Literacy Skills for the Digit...
Webinar - Media Mentors: Helping Children Build Literacy Skills for the Digit...Webinar - Media Mentors: Helping Children Build Literacy Skills for the Digit...
Webinar - Media Mentors: Helping Children Build Literacy Skills for the Digit...
 
Webinar - Nonprofit Technology Basics: PC Troubleshooting and Maintenance - ...
Webinar -  Nonprofit Technology Basics: PC Troubleshooting and Maintenance - ...Webinar -  Nonprofit Technology Basics: PC Troubleshooting and Maintenance - ...
Webinar - Nonprofit Technology Basics: PC Troubleshooting and Maintenance - ...
 
Webinar: Measuring Program Outcomes: A Toolkit for Small Libraries-2016-05-04
Webinar: Measuring Program Outcomes: A Toolkit for Small Libraries-2016-05-04Webinar: Measuring Program Outcomes: A Toolkit for Small Libraries-2016-05-04
Webinar: Measuring Program Outcomes: A Toolkit for Small Libraries-2016-05-04
 
Webinar - Excel for Beginners - 2016-03-31
Webinar - Excel for Beginners - 2016-03-31Webinar - Excel for Beginners - 2016-03-31
Webinar - Excel for Beginners - 2016-03-31
 
Webinar - 15 Ways to improve your library's Facebook page 2015 12-16
Webinar - 15 Ways to improve your library's Facebook page 2015 12-16Webinar - 15 Ways to improve your library's Facebook page 2015 12-16
Webinar - 15 Ways to improve your library's Facebook page 2015 12-16
 
Webinar: Microsoft Azure-2016-10-19
Webinar: Microsoft Azure-2016-10-19Webinar: Microsoft Azure-2016-10-19
Webinar: Microsoft Azure-2016-10-19
 
Webinar - What Can Libraries Count? Getting a Grip on Social Media Numbers - ...
Webinar - What Can Libraries Count? Getting a Grip on Social Media Numbers - ...Webinar - What Can Libraries Count? Getting a Grip on Social Media Numbers - ...
Webinar - What Can Libraries Count? Getting a Grip on Social Media Numbers - ...
 
Webinar - Should You Contract Out Your Nonprofit's Tech? IT Assist and Manage...
Webinar - Should You Contract Out Your Nonprofit's Tech? IT Assist and Manage...Webinar - Should You Contract Out Your Nonprofit's Tech? IT Assist and Manage...
Webinar - Should You Contract Out Your Nonprofit's Tech? IT Assist and Manage...
 
Webinar- Computer and Tech Hardware for Nonprofits and Libraries 2017-04-13
Webinar- Computer and Tech Hardware for Nonprofits and Libraries 2017-04-13Webinar- Computer and Tech Hardware for Nonprofits and Libraries 2017-04-13
Webinar- Computer and Tech Hardware for Nonprofits and Libraries 2017-04-13
 
Webinar - Maximize Your Technology Donations Through TechSoup - 2017-03-28
Webinar - Maximize Your Technology Donations Through TechSoup - 2017-03-28Webinar - Maximize Your Technology Donations Through TechSoup - 2017-03-28
Webinar - Maximize Your Technology Donations Through TechSoup - 2017-03-28
 

En vedette

Lead team dec 18 mtg heat v2
Lead team dec 18 mtg   heat v2Lead team dec 18 mtg   heat v2
Lead team dec 18 mtg heat v2Nicole Lakusta
 
Символика архитектуры православного храма
Символика архитектуры православного храмаСимволика архитектуры православного храма
Символика архитектуры православного храмаNinel Kek
 
Melinda granhold - World's Most Romantic Destinations (Romance and Honeymoons)
Melinda granhold - World's Most Romantic Destinations (Romance and Honeymoons)Melinda granhold - World's Most Romantic Destinations (Romance and Honeymoons)
Melinda granhold - World's Most Romantic Destinations (Romance and Honeymoons)Melinda Granhold
 
Scalaの文字列処理 Day 5 ミュータビリティとフォーマット
Scalaの文字列処理 Day 5 ミュータビリティとフォーマットScalaの文字列処理 Day 5 ミュータビリティとフォーマット
Scalaの文字列処理 Day 5 ミュータビリティとフォーマットynupc
 
правописание приставок пре и при- урок №2
правописание приставок пре  и при-   урок №2правописание приставок пре  и при-   урок №2
правописание приставок пре и при- урок №2HomichAlla
 
мнемотехнIка у вивченнi словникових слiв та слiв важких для написання
мнемотехнIка у вивченнi словникових слiв та слiв важких для написаннямнемотехнIка у вивченнi словникових слiв та слiв важких для написання
мнемотехнIка у вивченнi словникових слiв та слiв важких для написанняЛюдмила Шведенко
 
PRPL Pattern with Webpack and React
PRPL Pattern with Webpack and ReactPRPL Pattern with Webpack and React
PRPL Pattern with Webpack and ReactGrgur Grisogono
 
1 mm l_u_2012
1 mm l_u_20121 mm l_u_2012
1 mm l_u_20124book
 
Regras da sala de aula: PowerPoint
Regras da sala de aula: PowerPointRegras da sala de aula: PowerPoint
Regras da sala de aula: PowerPointA. Simoes
 

En vedette (20)

З роси й води
З роси й водиЗ роси й води
З роси й води
 
Lead team dec 18 mtg heat v2
Lead team dec 18 mtg   heat v2Lead team dec 18 mtg   heat v2
Lead team dec 18 mtg heat v2
 
Символика архитектуры православного храма
Символика архитектуры православного храмаСимволика архитектуры православного храма
Символика архитектуры православного храма
 
Melinda granhold - World's Most Romantic Destinations (Romance and Honeymoons)
Melinda granhold - World's Most Romantic Destinations (Romance and Honeymoons)Melinda granhold - World's Most Romantic Destinations (Romance and Honeymoons)
Melinda granhold - World's Most Romantic Destinations (Romance and Honeymoons)
 
Scalaの文字列処理 Day 5 ミュータビリティとフォーマット
Scalaの文字列処理 Day 5 ミュータビリティとフォーマットScalaの文字列処理 Day 5 ミュータビリティとフォーマット
Scalaの文字列処理 Day 5 ミュータビリティとフォーマット
 
Конспект уроку фізичної культури з використанням технології "Фітбол" в 2 класі
Конспект уроку фізичної культури з використанням технології "Фітбол" в 2 класіКонспект уроку фізичної культури з використанням технології "Фітбол" в 2 класі
Конспект уроку фізичної культури з використанням технології "Фітбол" в 2 класі
 
правописание приставок пре и при- урок №2
правописание приставок пре  и при-   урок №2правописание приставок пре  и при-   урок №2
правописание приставок пре и при- урок №2
 
Хрестоматія 1, 2
Хрестоматія 1, 2Хрестоматія 1, 2
Хрестоматія 1, 2
 
Математика Частина ІІ. Профільне навчання
Математика Частина ІІ. Профільне навчанняМатематика Частина ІІ. Профільне навчання
Математика Частина ІІ. Профільне навчання
 
Тиждень математики в Білозоринській ЗОШ І - ІІ ст.
Тиждень математики в Білозоринській ЗОШ І - ІІ ст.Тиждень математики в Білозоринській ЗОШ І - ІІ ст.
Тиждень математики в Білозоринській ЗОШ І - ІІ ст.
 
Навчальний проект "Геометричні перетворення на площині"
Навчальний проект "Геометричні перетворення на площині"Навчальний проект "Геометричні перетворення на площині"
Навчальний проект "Геометричні перетворення на площині"
 
Java On Docker
Java On DockerJava On Docker
Java On Docker
 
Майстер-клас на тему: «Виготовлення об’ємних сніжинок»
Майстер-клас на тему: «Виготовлення об’ємних сніжинок»Майстер-клас на тему: «Виготовлення об’ємних сніжинок»
Майстер-клас на тему: «Виготовлення об’ємних сніжинок»
 
Портфоліо вчителя початкових класів Букатюк Марії Василівни
Портфоліо вчителя початкових класів Букатюк Марії ВасилівниПортфоліо вчителя початкових класів Букатюк Марії Василівни
Портфоліо вчителя початкових класів Букатюк Марії Василівни
 
мнемотехнIка у вивченнi словникових слiв та слiв важких для написання
мнемотехнIка у вивченнi словникових слiв та слiв важких для написаннямнемотехнIка у вивченнi словникових слiв та слiв важких для написання
мнемотехнIка у вивченнi словникових слiв та слiв важких для написання
 
майстер клас
майстер класмайстер клас
майстер клас
 
PRPL Pattern with Webpack and React
PRPL Pattern with Webpack and ReactPRPL Pattern with Webpack and React
PRPL Pattern with Webpack and React
 
1 mm l_u_2012
1 mm l_u_20121 mm l_u_2012
1 mm l_u_2012
 
1 om k_u
1 om k_u1 om k_u
1 om k_u
 
Regras da sala de aula: PowerPoint
Regras da sala de aula: PowerPointRegras da sala de aula: PowerPoint
Regras da sala de aula: PowerPoint
 

Similaire à Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01

itsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfitsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfMansoorAhmed57263
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptOoXair
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online PrivacyKazi Sarwar Hossain
 
4 . future uni presentation
4 . future uni presentation4 . future uni presentation
4 . future uni presentationRashid Khatmey
 
Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)Hannah Jane del Castillo
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersStephen Thomas, CISSP
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersStephen Thomas, CISSP
 
CyberSecurity.ppt
CyberSecurity.pptCyberSecurity.ppt
CyberSecurity.pptFork6
 
The 5 ws of Cyber Security
The 5 ws of Cyber SecurityThe 5 ws of Cyber Security
The 5 ws of Cyber SecurityMisha Hanin
 
Community IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best PracticesCommunity IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best PracticesCommunity IT Innovators
 
Phish training final
Phish training finalPhish training final
Phish training finalJen Ruhman
 
Community IT Webinar - IT Security for Nonprofits
Community IT Webinar - IT Security for NonprofitsCommunity IT Webinar - IT Security for Nonprofits
Community IT Webinar - IT Security for NonprofitsCommunity IT Innovators
 
Top Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessTop Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessNicholas Davis
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber securityKaushal Solanki
 
Lock it or Lose It: Why Every Company Should be Concerned About Data Security
Lock it or Lose It: Why Every Company Should be Concerned About Data SecurityLock it or Lose It: Why Every Company Should be Concerned About Data Security
Lock it or Lose It: Why Every Company Should be Concerned About Data SecuritySmartCompliance
 
Digital literacy
Digital literacyDigital literacy
Digital literacyLuísa Lima
 
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19TechSoup
 

Similaire à Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01 (20)

Judy Taylour's Digital Privacy Day 2014 Presentation
Judy Taylour's Digital Privacy Day 2014 PresentationJudy Taylour's Digital Privacy Day 2014 Presentation
Judy Taylour's Digital Privacy Day 2014 Presentation
 
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfitsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online Privacy
 
4 . future uni presentation
4 . future uni presentation4 . future uni presentation
4 . future uni presentation
 
Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th Graders
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th Graders
 
CyberSecurity.ppt
CyberSecurity.pptCyberSecurity.ppt
CyberSecurity.ppt
 
The 5 ws of Cyber Security
The 5 ws of Cyber SecurityThe 5 ws of Cyber Security
The 5 ws of Cyber Security
 
Community IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best PracticesCommunity IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best Practices
 
Phish training final
Phish training finalPhish training final
Phish training final
 
Community IT Webinar - IT Security for Nonprofits
Community IT Webinar - IT Security for NonprofitsCommunity IT Webinar - IT Security for Nonprofits
Community IT Webinar - IT Security for Nonprofits
 
12990739.ppt
12990739.ppt12990739.ppt
12990739.ppt
 
Top Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessTop Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your Business
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Lock it or Lose It: Why Every Company Should be Concerned About Data Security
Lock it or Lose It: Why Every Company Should be Concerned About Data SecurityLock it or Lose It: Why Every Company Should be Concerned About Data Security
Lock it or Lose It: Why Every Company Should be Concerned About Data Security
 
Digital literacy
Digital literacyDigital literacy
Digital literacy
 
Team black
Team blackTeam black
Team black
 
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
 

Plus de TechSoup

Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use CasesTechSoup
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Executive Directors Chat Embracing Diversity and Cultural Differences
Executive Directors Chat  Embracing Diversity and Cultural DifferencesExecutive Directors Chat  Embracing Diversity and Cultural Differences
Executive Directors Chat Embracing Diversity and Cultural DifferencesTechSoup
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Building the Commons: Community Archiving & Decentralized Storage
Building the Commons: Community Archiving & Decentralized StorageBuilding the Commons: Community Archiving & Decentralized Storage
Building the Commons: Community Archiving & Decentralized StorageTechSoup
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
Welcome to TechSoup - New Member Orientation and Q & A (April 2024)
Welcome to TechSoup - New Member Orientation and Q & A (April 2024)Welcome to TechSoup - New Member Orientation and Q & A (April 2024)
Welcome to TechSoup - New Member Orientation and Q & A (April 2024)TechSoup
 
Executive Directors Chat Initiating Equity for Impact.pdf
Executive Directors Chat  Initiating Equity for Impact.pdfExecutive Directors Chat  Initiating Equity for Impact.pdf
Executive Directors Chat Initiating Equity for Impact.pdfTechSoup
 
Set the Path Forward with Smart Technology Decisions.pdf
Set the Path Forward with Smart Technology Decisions.pdfSet the Path Forward with Smart Technology Decisions.pdf
Set the Path Forward with Smart Technology Decisions.pdfTechSoup
 
What is the Future of QuickBooks DeskTop?
What is the Future of QuickBooks DeskTop?What is the Future of QuickBooks DeskTop?
What is the Future of QuickBooks DeskTop?TechSoup
 
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdfMaximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdfTechSoup
 
Hitting the Inbox: Email Authentication Changes and What You Need to Know
Hitting the Inbox: Email Authentication Changes and What You Need to KnowHitting the Inbox: Email Authentication Changes and What You Need to Know
Hitting the Inbox: Email Authentication Changes and What You Need to KnowTechSoup
 
Welcome to TechSoup New Member Orientation March 2024
Welcome to TechSoup New Member Orientation March 2024Welcome to TechSoup New Member Orientation March 2024
Welcome to TechSoup New Member Orientation March 2024TechSoup
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
 
Celebrate National Library Lovers Month with TechSoup! We love libraries!.pdf
Celebrate National Library Lovers Month with TechSoup! We love libraries!.pdfCelebrate National Library Lovers Month with TechSoup! We love libraries!.pdf
Celebrate National Library Lovers Month with TechSoup! We love libraries!.pdfTechSoup
 
Google Ad Grants Services at TechSoup.pdf
Google Ad Grants Services at TechSoup.pdfGoogle Ad Grants Services at TechSoup.pdf
Google Ad Grants Services at TechSoup.pdfTechSoup
 
Techsoup_ Prompt Strategy _ Template.docx.pdf
Techsoup_ Prompt Strategy _ Template.docx.pdfTechsoup_ Prompt Strategy _ Template.docx.pdf
Techsoup_ Prompt Strategy _ Template.docx.pdfTechSoup
 
Ask the Exerts - Focus on AI Prompt Engineering.pdf
Ask the Exerts - Focus on AI Prompt Engineering.pdfAsk the Exerts - Focus on AI Prompt Engineering.pdf
Ask the Exerts - Focus on AI Prompt Engineering.pdfTechSoup
 
Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use CasesTechSoup
 
Grantseeking Solo- Securing Awards with Limited Staff PDF.pdf
Grantseeking Solo- Securing Awards with Limited Staff  PDF.pdfGrantseeking Solo- Securing Awards with Limited Staff  PDF.pdf
Grantseeking Solo- Securing Awards with Limited Staff PDF.pdfTechSoup
 

Plus de TechSoup (20)

Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use Cases
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Executive Directors Chat Embracing Diversity and Cultural Differences
Executive Directors Chat  Embracing Diversity and Cultural DifferencesExecutive Directors Chat  Embracing Diversity and Cultural Differences
Executive Directors Chat Embracing Diversity and Cultural Differences
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Building the Commons: Community Archiving & Decentralized Storage
Building the Commons: Community Archiving & Decentralized StorageBuilding the Commons: Community Archiving & Decentralized Storage
Building the Commons: Community Archiving & Decentralized Storage
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
Welcome to TechSoup - New Member Orientation and Q & A (April 2024)
Welcome to TechSoup - New Member Orientation and Q & A (April 2024)Welcome to TechSoup - New Member Orientation and Q & A (April 2024)
Welcome to TechSoup - New Member Orientation and Q & A (April 2024)
 
Executive Directors Chat Initiating Equity for Impact.pdf
Executive Directors Chat  Initiating Equity for Impact.pdfExecutive Directors Chat  Initiating Equity for Impact.pdf
Executive Directors Chat Initiating Equity for Impact.pdf
 
Set the Path Forward with Smart Technology Decisions.pdf
Set the Path Forward with Smart Technology Decisions.pdfSet the Path Forward with Smart Technology Decisions.pdf
Set the Path Forward with Smart Technology Decisions.pdf
 
What is the Future of QuickBooks DeskTop?
What is the Future of QuickBooks DeskTop?What is the Future of QuickBooks DeskTop?
What is the Future of QuickBooks DeskTop?
 
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdfMaximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
 
Hitting the Inbox: Email Authentication Changes and What You Need to Know
Hitting the Inbox: Email Authentication Changes and What You Need to KnowHitting the Inbox: Email Authentication Changes and What You Need to Know
Hitting the Inbox: Email Authentication Changes and What You Need to Know
 
Welcome to TechSoup New Member Orientation March 2024
Welcome to TechSoup New Member Orientation March 2024Welcome to TechSoup New Member Orientation March 2024
Welcome to TechSoup New Member Orientation March 2024
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Celebrate National Library Lovers Month with TechSoup! We love libraries!.pdf
Celebrate National Library Lovers Month with TechSoup! We love libraries!.pdfCelebrate National Library Lovers Month with TechSoup! We love libraries!.pdf
Celebrate National Library Lovers Month with TechSoup! We love libraries!.pdf
 
Google Ad Grants Services at TechSoup.pdf
Google Ad Grants Services at TechSoup.pdfGoogle Ad Grants Services at TechSoup.pdf
Google Ad Grants Services at TechSoup.pdf
 
Techsoup_ Prompt Strategy _ Template.docx.pdf
Techsoup_ Prompt Strategy _ Template.docx.pdfTechsoup_ Prompt Strategy _ Template.docx.pdf
Techsoup_ Prompt Strategy _ Template.docx.pdf
 
Ask the Exerts - Focus on AI Prompt Engineering.pdf
Ask the Exerts - Focus on AI Prompt Engineering.pdfAsk the Exerts - Focus on AI Prompt Engineering.pdf
Ask the Exerts - Focus on AI Prompt Engineering.pdf
 
Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use Cases
 
Grantseeking Solo- Securing Awards with Limited Staff PDF.pdf
Grantseeking Solo- Securing Awards with Limited Staff  PDF.pdfGrantseeking Solo- Securing Awards with Limited Staff  PDF.pdf
Grantseeking Solo- Securing Awards with Limited Staff PDF.pdf
 

Dernier

This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseAnaAcapella
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdfssuserdda66b
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 

Dernier (20)

This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 

Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01

  • 1. Keep Your Connected Nonprofit or Library Secure October 1, 2015
  • 2. Using ReadyTalk • Chat to ask questions • All lines are muted • If you lose your Internet connection, reconnect using the link emailed to you. • If you lose your phone connection, re-dial the phone number and re-join. • ReadyTalk support: 800-843-9166 Your audio will play through your computer’s speakers. Hear an echo? You may be logged in twice and will need to close one instance of ReadyTalk. 2
  • 3. You Are Being Recorded… • This webinar will be available on the TechSoup website along with past webinars: www.techsoup.org/community/events-webinars • You can also view recorded webinars and videos on our YouTube channel: https://www.youtube.com/TechSoupVideo • You will receive an email with this presentation, recording, and links within a day. • Tweet us @TechSoup or using hashtag: #techsoup or #TechedUp 3
  • 4. Keep Your Connected Nonprofit or Library Secure October 1, 2015
  • 5. Presenters 5 Assisting with chat: Allyson Bliss and Ale Bezdikian, TechSoup Becky Wiegand Webinar Program Manager TechSoup Global Kelley Bray Employee Trust Lead Symantec
  • 6. Where Are You? We Are Here 6 We Are He
  • 7. Agenda • Introduction to TechSoup • The Problem – Quiz Time! • The Common Approach to Solutions • How Symantec Does It Differently • Simple Security • Donated Symantec and Other Security • Q&A 7
  • 8. About TechSoup Global We are a global network of 63 partner NGOs that provide the best technology resources to over a half-million organizations in 121 countries. 8 We connect organizations and people with the resources, support, and technology they need to change the world. Learn more from our 2014 Year in Review.
  • 9. 9 We are working toward a time when every social benefit organization on the planet has the technology, resources, and knowledge it needs to operate at its full potential. 121 countries served 63 partner NGOs 41 Net2 local groups 615k NGOs reached Our Reach
  • 10. Our Impact 10 Together, we build a stronger, more resilient civil society. $4.8B in technology products and grants employed by NGOs for the greater good 35 languages used to provide education and support 100+ corporate and foundation partners connected with the causes and communities they care about 5.9M annual visits to our websites 600,000 newsletter subscribers empowered with actionable knowledge 79% of NGOs have improved organizational efficiency with TechSoup Global's resource offering* *Source: = survey conducted among TechSoup members in 2013.
  • 11. Our Product Donation Programs Donated technology, education, and community forum resources for NGOs save costs, magnify impact, and extend reach. 11
  • 12. Participant Poll Which of the following security tools are you using? (select any) • Avast! Free Antivirus • Microsoft Security Essentials • Windows Defender • AVG Free Anti-Virus Free Edition • Avira Free Antivirus • Symantec Endpoint Protection • McAfee VirusScan • Norton Security • AVG Internet Security • Kaspersky Internet Security 12
  • 13. 13 Simple Security Kelley Bray Employee Trust Lead – Symantec Corporation
  • 14. A little bit about me • 5 years of Federal service – Used to doing a lot with very little • 2 years at SYMC – Securing the company that secures the world – Army of 1 • 3 kids growing up in the digital world • kelley_bray@symantec.com 14
  • 15. Agenda • The problem – Trivia • The common approach to a solution • How we do it differently at SYMC • Simple Security 15
  • 16. The Problem • Rather than a lot of scary bullets, let’s play a little game 16
  • 17. Question 1 • How many zero day vulnerabilities were reported in 2014? – A) 18 – B) 24 – C) 12 – D) 8
  • 18. 2006 2007 2008 2009 2010 2011 2012 0 2 4 6 8 10 12 14 16 Answer: B 24 zero-day vulnerabilities were discovered in 2014. 18 2013 2014 14 13 15 9 12 14 8 24 23
  • 19. Question 2 • The top 5 zero-days left companies vulnerable for how long? – A) 1 day – B) 2 weeks – C) 180 days – D) 295 days
  • 21. Question 3 What were the top three causes of data breaches in 2014?
  • 22. 22 49% 43% 8% Malicious Attackers Accidentally Exposed/ Theft or Loss of Device Insider Theft Answer:
  • 23. Question 4 In 2014, Symantec analyzed over 6 million Android apps and found that 1 in ____ contained malware
  • 24. Answer: 6.3 million apps for Android devices were analyzed. 1 in 6 were classified with malware. 24
  • 25. You get it – the cyber world is bad • Protection strategies vary • Funds are limited • Tech-speak isn’t for everyone. 25
  • 26. SYMC – Our requirements • Secure our network and user data • Meet our compliance requirements • Protect our brand • Spend our money wisely • Show improvement and impact • New Hire and Annual Training • National Cyber Security Awareness Month/Other Activities • Employee Engagement 26
  • 27. The difference in our model Compliance Awareness Talking “At” Security Change in Behavior Talking “To” 27
  • 28. Our definition of program success • Good Security Behavior is natural… like wearing a seatbelt. – Employees identify with the security of the company and do the right thing – Risk profile greatly reduced – Full program implementation = Symantec Human Firewall 28
  • 29. Simple security • Basic security – Anti Virus, Firewalls…and that’s about all the tech I know.. • Protecting your people is easier! – And, it’s free! – Good behavior transcends the walls of work and home • Believe it or not, the basics go a long way – Everyone is a target 29
  • 30. Passwords • Simple rules to creating and remembering a strong password – Complexity: create a password that includes upper and lower case letters, numbers and special characters – Do not use PII: A lot of people use names and important dates from their family and friends. Most of this information can be found online, so avoid using initials, birthdays, address information and other PII in passwords. Never use information that can be found (like your birthday) on Facebook or other social media sites. – Change your password every 30 days and Never use the same password for your work computer that you use for home or website access. – Use a passphrase to create (and help you remember!) your password. Example: a song lyric, with complexity added, is an easy password to remember, but difficult to detect. Use the first letter of each word: • “New York State of Mind” becomes NYSOM, and then NYS0M123! 30
  • 31. Beware! • If it’s too good to be true… – Airports and Starbucks are a hackers amusement park – All those free USB’s • Physical Security: Beware of your surroundings – Do not process sensitive data in areas that are visible by others. – Lock your computer and phone out of sight when necessary • Manage sensitive data correctly – Never leave sensitive documents on your desk or in the printer 31
  • 32. Social Media • We love the internet, but the internet doesn’t love us back • If you wouldn’t post it on your front door, do not post it on Facebook • Would you share a bottle of water with a stranger? • Do you know what geotagging is? 32
  • 33. Phishing • Be aware of how to recognize a phishing attempt! Basic security awareness can go a long way in preventing hackers from accessing your network and data: – Do not open emails from people or email addresses that you do not recognize. If you must do this, verify the email address prior to clicking on any links or opening any attachments to the message. – Read the message carefully and consider the content. If it seems suspicious (would the CIO be contacting you directly?) it’s probably a phishing attempt. – Watch out for spelling and grammatical errors and avoid any requests for financial transactions or other inappropriate requests. – Remember – if it seems to good to be true – it probably is! – When in doubt, do NOT click on any links. Pick up the phone and contact the sender directly. 33
  • 34. 34
  • 35. How to get started • Free Resources! – Use these slides and provide basic education to your coworkers and families – National Cyber Security Alliance: www.staysafeonline.org • Strategies for individuals and businesses • Training • Free virus scans – Baseline Training (like what you see here) • Or – on YouTube, check out the Norton #30SecTech videos for simple explanations to a lot of technical terms – Baseline Policy (you have to let people know what they are/not allowed to do – Basic software/network protection – keep those patches up to date! 35
  • 40. Additional Donated and Discounted Security Options 40 www.techsoup.org/comodo
  • 44. Q & A Please type your questions in the chat window. Continue the discussion in our Security forum. 56
  • 45. Additional Resources • Symantec Internet Security Threat Report 2015 • Celebrate National Cybersecurity Month with TechSoup • 12 Steps to Stay Safer Online Guide (PDF) • TechSoup’s Security Category • Security Articles and How-Tos • Symantec’s Norton Security for Nonprofits and Libraries (webinar archive) 45
  • 46. Learn and Share! • Chat in one thing that you learned in today’s webinar that you will try to implement. • Will you share this information with your colleagues and within your network? 46
  • 47. Upcoming Webinars and Events • 10/6: #NPTechChat: Civil Society Under Threat • 10/14: Pinterest for Libraries: Building Community Through Social Media • 10/15: Do You Need the New Microsoft Office 2016 for Windows? • 10/15: Deadline for Next Adobe Creative Cloud Submissions! • 10/22: Microsoft Office 2016 for Mac Explore our webinar archives for more! 47
  • 49. ReadyTalk offers dedicated product demos for TechSoup organizations 4 times per week. For more information: www.techsoup.org/readytalk Please complete the post-event survey that will pop up once you close this window. Thank You to Our Webinar Sponsor! 49

Notes de l'éditeur

  1. This is a look at zero-day vulnerabilities since 2006. Between 2006 and 2012, zero-day vulnerabilities have been discovered at a fairly consistent rate. While we have seen highs of 15 in a year and lows of 8, they have bounced around each year between these two numbers. Then in 2013, that number shot up to 23 zero-day vulnerabilities discovered. We believe this is based on a new professionalization of zero-day discovery. There was demand and an active market for buying and selling these vulnerabilities – people could make money finding zero-day vulnerabilities. Again in 2014 we see that highs hit in 2013 were not an aberration, but a new plateau. 2014 had an all time high in 0-day vulnerabilities, confirming what we found in 2013.
  2. If we look at the top causes of data breaches, we’ve also seen a shift here. If you look at total incidents that were an accident (breaches in which data was accidentally exposed or devices like laptops and USB sticks were lost or stolen) – in 2013, that was 58% of all data breaches and in 2014, those accidental exposures dropped to 43%. In 2014, this shifted dramatically – where attackers are now being responsible for the majority of data breaches with 49%.
  3. 49