Keep Up with the Demands of IT Security on a Nonprofit Budget

BVU
BVUDirector, Communications and Technology at BVU em BVU
Encompass Group, LLC
Keeping up with the
demands of IT Security on a
nonprofit budget.
www.encompassgroupllc.com
Tyler Village 3615 Superior Avenue, Suite 3103F Cleveland, OH 44114 216.539.0100
Who are we to talk?
2
enCompass is a team of business and
compliance technologists providing Managed IT
Services to regulated organizations, with a
concentration on:
 Financial Industry
 Healthcare
 Nonprofits
3
Brandon Shaw
Managing Partner, Lead Engineer
 18 years industry experience
 Consulted for many SMB’s,
public school systems,
Government branches,
Senatorial campaigns and even
a Presidential campaign
 Just received his Pilot license
Mary Katherine Donnelly
Business Development Director
 Background in IT Product
Marketing & Enterprise Sales
to Fortune 500 companies
 Director of a DC nonprofit,
marketing Director for a local
nonprofit, and Chair of the
Board for local YMCA
 Is NOT a pilot
Experience
4
*Source: The Global State of Information
Security® Survey 2016
The State of IT Security
5
The State of IT Security
6
5 Points about Mobile and BYOD
1
2
3
4
5
Source: Crowd Research Partners: BYOD and Mobile
Security 2016 report
Increased mobility, satisfaction and productivity are the top drivers of
BYOD.
Security and employee privacy are the biggest inhibitors of BYOD.
1 in 5 organizations suffered a mobile security breach, primarily driven
by Malware and malicious WiFi
BYOD Security threats pose heavy burdens on IT resources and help
desk workloads
Despite all this, only 30% of organizations are increasing security
budgets for BYOD in the next 12 months
7
Nonprofit Challenge(s)
Boards (Process and Approval)
Regulatory Environment
Government
Healthcare
Protecting the data of both those you
serve and those who donate
Volunteers access to data
8
Nonprofit Other Challenges
9
Where Your IT Security Should Be
Today to be Ready for Tomorrow
THREAT SOLUTION
Viruses Centrally Managed AntiVirus
RansomWare User Education/Training, Backups
Unauthorized Network Access Firewalls, Penetration Testing & Vulnerability Scans, IDPS
BYOD Clear Policy, MDM
Disaster Planning Backup and Recovery, onsite and offsite
Internal – accidental or malicious Written policies and procedures, training, device control
Theft/Loss Mobile Device Management, centrally managed
encryption
Hackers IDPS, Encryption
Out of Date Software Patch Management
“Rogue” Downloads User access and privileges, non-critical application
patches
10
Layered Security
1. Patch your systems
2. Educate your users
3. Backup files
4. Invest in layered security
Firewalls AntiVirus AntiMalware IDPS
Device Control
Security Tools
Email Encryption MDM
11
Firewalls/Antivirus/AntiMalware
 Malware is a broad term used to describe all
sorts of malicious software including viruses,
spyware, trojans, worms, and more.
 Anti-virus prevents and gets rid of viruses by
preventing harmful software from installing and
damaging your computer; protects and detects
when a file has some kind of malicious
behavior and prevent it from executing.
 A firewall controls network traffic
acting as a filter between the
internet and your
network servers.
12
IDPS
Intrusion
Detection System
Intrusion
Prevention System
Capable of stopping
first packet of an attack
Analyzes traffic for
anomalies
Issues alarms when
attack occurs
Sits directly in line of
network traffic
VISIBILITY & CONTROL
13
Device Control
Restricts user access to devices by access
rules:
• data storage media
• removable devices
• CD/DVDs
• modems
• external network adapters
• printers
• multi-function peripherals
• USB
Before investing, see if your AV Solution has
Device Control (also called Access Control)
14
Mobile Device Management
15
Email Encryption
There are many different types of
email encryption, but one gaining
popularity due to simplicity and
cost structure is Office 365
Message Encryption:
 Fill regulatory requirements
 Policy based encryption
 First building block in a Data
Loss Prevention strategy
16
Office 365 for Nonprofits
Many of the products and tools we discussed are either free or heavily
discounted as part of Office 365: https://products.office.com/en-
us/nonprofit/office-365-nonprofit-plans-and-pricing#seemore
Rule of thumb: 8-10 people
Chronic problems occur (unable to access
email, network outages, etc.)
Cybersecurity attack
17
When Your Nonprofit Outgrows
Homegrown IT
$2500-$4000/mo:
average salary for
dedicated IT staff
$750/mo average for
Managed IT Services in
10 person office*
*Source: TechSoup
18
enCompass Would Like to be
Your Partner in IT Security…
Experience
Managed IT Services and Support in
Northeast Ohio and Nationwide for
10+ years, gaining the trust of our
client base with every interaction.
Compliance
We take a comprehensive approach
to IT operations so our clients feel
confident that IT is under control, risk
is managed and regulations are met.
Budget
We strive to strike just the right
balance between the business
requirements that drive results
and the budget constraints faced
by nonprofits.
Exceptional Client Experience
At each interaction point:
• Ownership
• Clear Expectations
• Friendly & Personable Service
• Bigger Picture Reference
Encompass Group, LLC
Brandon Shaw
bshaw@encompassgroupllc.com
www.encompassgroupllc.com
Tyler Village 3615 Superior Avenue, Suite 3103F Cleveland, OH 44114 216.539.0100
Mary K. Donnelly
mdonnelly@encompassgroupllc.com
1 de 19

Recomendados

The Changing Role of IT Staff por
The Changing Role of IT StaffThe Changing Role of IT Staff
The Changing Role of IT StaffBVU
813 visualizações58 slides
Empowering the evolving workforce with virtual workspaces por
Empowering the evolving workforce with virtual workspacesEmpowering the evolving workforce with virtual workspaces
Empowering the evolving workforce with virtual workspacesDell World
374 visualizações12 slides
Roadmap for Desktop Support's Future por
Roadmap for Desktop Support's FutureRoadmap for Desktop Support's Future
Roadmap for Desktop Support's FutureSan Francisco Bay Area
2.3K visualizações14 slides
Service Delivery Beyond IT - Customer Case Study Webinar por
Service Delivery Beyond IT - Customer Case Study WebinarService Delivery Beyond IT - Customer Case Study Webinar
Service Delivery Beyond IT - Customer Case Study WebinarIvanti
540 visualizações41 slides
NorthCoast HDI September 2014 por
NorthCoast HDI September 2014NorthCoast HDI September 2014
NorthCoast HDI September 2014NorthCoastHDI
1.3K visualizações15 slides
Security For Business: Are You And Your Customers Safe por
Security For Business:  Are You And Your Customers SafeSecurity For Business:  Are You And Your Customers Safe
Security For Business: Are You And Your Customers Safewoodsy01
222 visualizações34 slides

Mais conteúdo relacionado

Mais procurados

The Three Critical Steps for Effective BYOD Management por
The Three Critical Steps for Effective BYOD Management The Three Critical Steps for Effective BYOD Management
The Three Critical Steps for Effective BYOD Management Kaseya
1K visualizações26 slides
Securing your digital world cybersecurity for sb es por
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb esSonny Hashmi
714 visualizações21 slides
5 Essential Tips for Creating An Effective BYOD Policy por
5 Essential Tips for Creating An Effective BYOD Policy5 Essential Tips for Creating An Effective BYOD Policy
5 Essential Tips for Creating An Effective BYOD PolicyKaseya
1.2K visualizações40 slides
Mobile Security por
Mobile Security Mobile Security
Mobile Security James Sutter
1.9K visualizações24 slides
Panel Discussion: Why IT Service and IT Asset Management are Better Together por
Panel Discussion: Why IT Service and IT Asset Management are Better TogetherPanel Discussion: Why IT Service and IT Asset Management are Better Together
Panel Discussion: Why IT Service and IT Asset Management are Better TogetherIvanti
615 visualizações21 slides
Contextual Security and Application Control for Virtualized Desktops por
Contextual Security and Application Control for Virtualized DesktopsContextual Security and Application Control for Virtualized Desktops
Contextual Security and Application Control for Virtualized DesktopsIvanti
627 visualizações28 slides

Mais procurados(20)

The Three Critical Steps for Effective BYOD Management por Kaseya
The Three Critical Steps for Effective BYOD Management The Three Critical Steps for Effective BYOD Management
The Three Critical Steps for Effective BYOD Management
Kaseya1K visualizações
Securing your digital world cybersecurity for sb es por Sonny Hashmi
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb es
Sonny Hashmi714 visualizações
5 Essential Tips for Creating An Effective BYOD Policy por Kaseya
5 Essential Tips for Creating An Effective BYOD Policy5 Essential Tips for Creating An Effective BYOD Policy
5 Essential Tips for Creating An Effective BYOD Policy
Kaseya1.2K visualizações
Mobile Security por James Sutter
Mobile Security Mobile Security
Mobile Security
James Sutter1.9K visualizações
Panel Discussion: Why IT Service and IT Asset Management are Better Together por Ivanti
Panel Discussion: Why IT Service and IT Asset Management are Better TogetherPanel Discussion: Why IT Service and IT Asset Management are Better Together
Panel Discussion: Why IT Service and IT Asset Management are Better Together
Ivanti615 visualizações
Contextual Security and Application Control for Virtualized Desktops por Ivanti
Contextual Security and Application Control for Virtualized DesktopsContextual Security and Application Control for Virtualized Desktops
Contextual Security and Application Control for Virtualized Desktops
Ivanti627 visualizações
Are Your PCs and Laptops Recovery and Discovery Ready? por Iron Mountain
Are Your PCs and Laptops Recovery and Discovery Ready?Are Your PCs and Laptops Recovery and Discovery Ready?
Are Your PCs and Laptops Recovery and Discovery Ready?
Iron Mountain2.1K visualizações
Flexible and Secure Workspaces for the Modern Enterprise por RES
Flexible and Secure Workspaces for the Modern EnterpriseFlexible and Secure Workspaces for the Modern Enterprise
Flexible and Secure Workspaces for the Modern Enterprise
RES 487 visualizações
The Best Way to Get Trained on Ivanti Products por Ivanti
The Best Way to Get Trained on Ivanti ProductsThe Best Way to Get Trained on Ivanti Products
The Best Way to Get Trained on Ivanti Products
Ivanti1.5K visualizações
Applied mobile chaos theory por SecureITExperts
Applied mobile chaos theoryApplied mobile chaos theory
Applied mobile chaos theory
SecureITExperts373 visualizações
Conquer the Barriers to Self-Service Adoption por RES
Conquer the Barriers to Self-Service AdoptionConquer the Barriers to Self-Service Adoption
Conquer the Barriers to Self-Service Adoption
RES 592 visualizações
Ditch the Surplus Software and Hardware Spend that's Weighing you Down por Ivanti
Ditch the Surplus Software and Hardware Spend that's Weighing you DownDitch the Surplus Software and Hardware Spend that's Weighing you Down
Ditch the Surplus Software and Hardware Spend that's Weighing you Down
Ivanti583 visualizações
The Business Value of Shadow IT por Cloud Sherpas
The Business Value of Shadow ITThe Business Value of Shadow IT
The Business Value of Shadow IT
Cloud Sherpas615 visualizações
Empower Your Workforce Through Self Service por RES
Empower Your Workforce Through Self ServiceEmpower Your Workforce Through Self Service
Empower Your Workforce Through Self Service
RES 567 visualizações
Bring Your Own Device (BYOD) por k33a
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
k33a9.8K visualizações
BYOD (Bring Your Own Device) Risks And Benefits por Modis
BYOD (Bring Your Own Device) Risks And BenefitsBYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And Benefits
Modis 3.4K visualizações
SLVA - Top IT Trends and Priorities for 2014 por SLVA Information Security
SLVA - Top IT Trends and Priorities for 2014SLVA - Top IT Trends and Priorities for 2014
SLVA - Top IT Trends and Priorities for 2014
SLVA Information Security271 visualizações
An Introduction on Design and Implementation on BYOD and Mobile Security por Sina Manavi
An Introduction on Design and Implementation on BYOD and Mobile SecurityAn Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile Security
Sina Manavi1.4K visualizações

Destaque

galeria wolontariatu por
galeria wolontariatugaleria wolontariatu
galeria wolontariatukamula77
700 visualizações72 slides
What do you do por
What do you doWhat do you do
What do you doD Askey
404 visualizações17 slides
Cantos Jovenes 2 por
Cantos Jovenes 2Cantos Jovenes 2
Cantos Jovenes 2ivonnemendozam
473 visualizações24 slides
Eekels Brochure (Nederlands) por
Eekels Brochure (Nederlands)Eekels Brochure (Nederlands)
Eekels Brochure (Nederlands)Leenart
530 visualizações20 slides
Av Introduction To The Elijah Challenge 2009 For Web por
Av Introduction To The Elijah Challenge 2009 For WebAv Introduction To The Elijah Challenge 2009 For Web
Av Introduction To The Elijah Challenge 2009 For Web'Davy Hermanus
440 visualizações13 slides
Photos por
PhotosPhotos
Photosnsoleima
247 visualizações61 slides

Destaque(20)

galeria wolontariatu por kamula77
galeria wolontariatugaleria wolontariatu
galeria wolontariatu
kamula77700 visualizações
What do you do por D Askey
What do you doWhat do you do
What do you do
D Askey404 visualizações
Cantos Jovenes 2 por ivonnemendozam
Cantos Jovenes 2Cantos Jovenes 2
Cantos Jovenes 2
ivonnemendozam473 visualizações
Eekels Brochure (Nederlands) por Leenart
Eekels Brochure (Nederlands)Eekels Brochure (Nederlands)
Eekels Brochure (Nederlands)
Leenart530 visualizações
Av Introduction To The Elijah Challenge 2009 For Web por 'Davy Hermanus
Av Introduction To The Elijah Challenge 2009 For WebAv Introduction To The Elijah Challenge 2009 For Web
Av Introduction To The Elijah Challenge 2009 For Web
'Davy Hermanus440 visualizações
Photos por nsoleima
PhotosPhotos
Photos
nsoleima247 visualizações
Camp Low Week 3 por kltitus
Camp Low Week 3Camp Low Week 3
Camp Low Week 3
kltitus324 visualizações
Connecting Communities por emmotive
Connecting CommunitiesConnecting Communities
Connecting Communities
emmotive600 visualizações
Indonesian Basic Training Juni 2009 por 'Davy Hermanus
Indonesian Basic Training Juni 2009Indonesian Basic Training Juni 2009
Indonesian Basic Training Juni 2009
'Davy Hermanus4.5K visualizações
The human digestive system por adisg
The human digestive systemThe human digestive system
The human digestive system
adisg325 visualizações
The Philosophy Of T por tdutton
The Philosophy Of TThe Philosophy Of T
The Philosophy Of T
tdutton282 visualizações
The Carbon Conversation, February 2010: Carbon Voyage por Emily Wearmouth
The Carbon Conversation, February 2010: Carbon VoyageThe Carbon Conversation, February 2010: Carbon Voyage
The Carbon Conversation, February 2010: Carbon Voyage
Emily Wearmouth559 visualizações
I Pv6 Addressing por Ram Dutt Shukla
I Pv6 AddressingI Pv6 Addressing
I Pv6 Addressing
Ram Dutt Shukla738 visualizações
AdvancedWord01 por adisg
AdvancedWord01AdvancedWord01
AdvancedWord01
adisg442 visualizações
1 intro to logic por Fidelfo Moral
1 intro to logic1 intro to logic
1 intro to logic
Fidelfo Moral403 visualizações
OnGuard Hou Vast por JohnnyBeenes
OnGuard Hou VastOnGuard Hou Vast
OnGuard Hou Vast
JohnnyBeenes423 visualizações
Presentation Annual Luncheon2009 por bmconnolly
Presentation Annual Luncheon2009Presentation Annual Luncheon2009
Presentation Annual Luncheon2009
bmconnolly267 visualizações

Similar a Keep Up with the Demands of IT Security on a Nonprofit Budget

5 Questions Executives Should Be Asking Their Security Teams por
5 Questions Executives Should Be Asking Their Security Teams 5 Questions Executives Should Be Asking Their Security Teams
5 Questions Executives Should Be Asking Their Security Teams Arun Chinnaraju MBA, PMP, CSM, CSPO, SA
73 visualizações16 slides
Measures to Avoid Cyber-attacks por
Measures to Avoid Cyber-attacksMeasures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacksSkillmine Technology Consulting
20 visualizações13 slides
Measure To Avoid Cyber Attacks por
Measure To Avoid Cyber AttacksMeasure To Avoid Cyber Attacks
Measure To Avoid Cyber AttacksSkillmine Technology Consulting
8 visualizações13 slides
Securing Your Intellectual Property: Preventing Business IP Leaks por
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksHokme
3 visualizações6 slides
Protecting the Core of Your Network por
Protecting the Core of Your Network Protecting the Core of Your Network
Protecting the Core of Your Network Mighty Guides, Inc.
2K visualizações16 slides
Small Business Administration Recommendations por
Small Business Administration RecommendationsSmall Business Administration Recommendations
Small Business Administration RecommendationsMeg Weber
512 visualizações9 slides

Similar a Keep Up with the Demands of IT Security on a Nonprofit Budget(20)

Securing Your Intellectual Property: Preventing Business IP Leaks por Hokme
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP Leaks
Hokme3 visualizações
Protecting the Core of Your Network por Mighty Guides, Inc.
Protecting the Core of Your Network Protecting the Core of Your Network
Protecting the Core of Your Network
Mighty Guides, Inc.2K visualizações
Small Business Administration Recommendations por Meg Weber
Small Business Administration RecommendationsSmall Business Administration Recommendations
Small Business Administration Recommendations
Meg Weber512 visualizações
En msft-scrty-cntnt-e book-protectyourdata por Online Business
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdata
Online Business 133 visualizações
ITExpertUS Corporate (CyberSecurity) 2023.pptx por hoshangvashisht1
ITExpertUS Corporate (CyberSecurity) 2023.pptxITExpertUS Corporate (CyberSecurity) 2023.pptx
ITExpertUS Corporate (CyberSecurity) 2023.pptx
hoshangvashisht12 visualizações
5 steps-to-mobile-risk-management-whitepaper-golden-gekko por DMI
5 steps-to-mobile-risk-management-whitepaper-golden-gekko5 steps-to-mobile-risk-management-whitepaper-golden-gekko
5 steps-to-mobile-risk-management-whitepaper-golden-gekko
DMI3.5K visualizações
Internal or insider threats are far more dangerous than the external - bala g... por Bala Guntipalli ♦ MBA
Internal or insider threats are far more dangerous than the external - bala g...Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...
Bala Guntipalli ♦ MBA37 visualizações
Annotated Bibliography On Database Security por Lisa Diaz
Annotated Bibliography On Database SecurityAnnotated Bibliography On Database Security
Annotated Bibliography On Database Security
Lisa Diaz2 visualizações
The BYOD Security Battleground por Watchful Software
The BYOD Security BattlegroundThe BYOD Security Battleground
The BYOD Security Battleground
Watchful Software248 visualizações
Cybersecurity in Shared Services Organizations por ScottMadden, Inc.
Cybersecurity in Shared Services OrganizationsCybersecurity in Shared Services Organizations
Cybersecurity in Shared Services Organizations
ScottMadden, Inc.1.9K visualizações
Top 6 things_small_businesses_q12015 por anpapathanasiou
Top 6 things_small_businesses_q12015Top 6 things_small_businesses_q12015
Top 6 things_small_businesses_q12015
anpapathanasiou279 visualizações
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds por Happiest Minds Technologies
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest MindsWhitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
Happiest Minds Technologies288 visualizações
Microsoft 365 | Modern workplace por Siddick Elaheebocus
Microsoft 365 | Modern workplaceMicrosoft 365 | Modern workplace
Microsoft 365 | Modern workplace
Siddick Elaheebocus156 visualizações
(Slides) What's Yours Is Mine: How Employess Are Putting Your Sensitive Data ... por infoLock Technologies
(Slides) What's Yours Is Mine: How Employess Are Putting Your Sensitive Data ...(Slides) What's Yours Is Mine: How Employess Are Putting Your Sensitive Data ...
(Slides) What's Yours Is Mine: How Employess Are Putting Your Sensitive Data ...
infoLock Technologies1.3K visualizações

Mais de BVU

Nonprofit Collaborations - Brian Broadbent and Brandon Miller por
Nonprofit Collaborations - Brian Broadbent and Brandon Miller Nonprofit Collaborations - Brian Broadbent and Brandon Miller
Nonprofit Collaborations - Brian Broadbent and Brandon Miller BVU
50 visualizações25 slides
board diversity - biz, randy and gregory por
board diversity - biz, randy and gregoryboard diversity - biz, randy and gregory
board diversity - biz, randy and gregoryBVU
28 visualizações6 slides
Cleveland leadership center - Marianne Crosley and Rachel Ciomcia por
Cleveland leadership center - Marianne Crosley and Rachel CiomciaCleveland leadership center - Marianne Crosley and Rachel Ciomcia
Cleveland leadership center - Marianne Crosley and Rachel CiomciaBVU
42 visualizações11 slides
Power of pro bono - Julie Clark, BVU por
Power of pro bono - Julie Clark, BVUPower of pro bono - Julie Clark, BVU
Power of pro bono - Julie Clark, BVUBVU
26 visualizações10 slides
Succession planning breakout - Julie Clark, BVU por
Succession planning breakout - Julie Clark, BVUSuccession planning breakout - Julie Clark, BVU
Succession planning breakout - Julie Clark, BVUBVU
40 visualizações30 slides
Nonprofit Email Marketing 101 por
Nonprofit Email Marketing 101 Nonprofit Email Marketing 101
Nonprofit Email Marketing 101 BVU
193 visualizações25 slides

Mais de BVU(10)

Nonprofit Collaborations - Brian Broadbent and Brandon Miller por BVU
Nonprofit Collaborations - Brian Broadbent and Brandon Miller Nonprofit Collaborations - Brian Broadbent and Brandon Miller
Nonprofit Collaborations - Brian Broadbent and Brandon Miller
BVU50 visualizações
board diversity - biz, randy and gregory por BVU
board diversity - biz, randy and gregoryboard diversity - biz, randy and gregory
board diversity - biz, randy and gregory
BVU28 visualizações
Cleveland leadership center - Marianne Crosley and Rachel Ciomcia por BVU
Cleveland leadership center - Marianne Crosley and Rachel CiomciaCleveland leadership center - Marianne Crosley and Rachel Ciomcia
Cleveland leadership center - Marianne Crosley and Rachel Ciomcia
BVU42 visualizações
Power of pro bono - Julie Clark, BVU por BVU
Power of pro bono - Julie Clark, BVUPower of pro bono - Julie Clark, BVU
Power of pro bono - Julie Clark, BVU
BVU26 visualizações
Succession planning breakout - Julie Clark, BVU por BVU
Succession planning breakout - Julie Clark, BVUSuccession planning breakout - Julie Clark, BVU
Succession planning breakout - Julie Clark, BVU
BVU40 visualizações
Nonprofit Email Marketing 101 por BVU
Nonprofit Email Marketing 101 Nonprofit Email Marketing 101
Nonprofit Email Marketing 101
BVU193 visualizações
BVU Technology and Communications Summit Plenary Powerpoint por BVU
BVU Technology and Communications Summit Plenary PowerpointBVU Technology and Communications Summit Plenary Powerpoint
BVU Technology and Communications Summit Plenary Powerpoint
BVU924 visualizações
2014 Business Engagement por BVU
2014 Business Engagement2014 Business Engagement
2014 Business Engagement
BVU244 visualizações
Northeast Ohio Business Community Impact por BVU
Northeast Ohio Business Community ImpactNortheast Ohio Business Community Impact
Northeast Ohio Business Community Impact
BVU1.5K visualizações
Moves Management por BVU
Moves ManagementMoves Management
Moves Management
BVU2K visualizações

Último

UAE's 52nd National Day, 2023 por
UAE's 52nd National Day, 2023UAE's 52nd National Day, 2023
UAE's 52nd National Day, 2023sri24ram2024
7 visualizações58 slides
PPT - SIGMA-GIZ Academies - Topic 4 - Moldova - National center for Personal ... por
PPT - SIGMA-GIZ Academies - Topic 4 - Moldova - National center for Personal ...PPT - SIGMA-GIZ Academies - Topic 4 - Moldova - National center for Personal ...
PPT - SIGMA-GIZ Academies - Topic 4 - Moldova - National center for Personal ...Support for Improvement in Governance and Management SIGMA
48 visualizações9 slides
Mukhya Mantri Gramin Peyjal Nishchay Yojana (MGPNY) – Bihar_Pankaj Kumar_AKRS... por
Mukhya Mantri Gramin Peyjal Nishchay Yojana (MGPNY) – Bihar_Pankaj Kumar_AKRS...Mukhya Mantri Gramin Peyjal Nishchay Yojana (MGPNY) – Bihar_Pankaj Kumar_AKRS...
Mukhya Mantri Gramin Peyjal Nishchay Yojana (MGPNY) – Bihar_Pankaj Kumar_AKRS...India Water Portal
22 visualizações15 slides
Social behavioural change to drive community ownership_ Divyang Waghela_Tata ... por
Social behavioural change to drive community ownership_ Divyang Waghela_Tata ...Social behavioural change to drive community ownership_ Divyang Waghela_Tata ...
Social behavioural change to drive community ownership_ Divyang Waghela_Tata ...India Water Portal
13 visualizações16 slides
CCVS AGM - Volunteer Cambs .pdf por
CCVS AGM - Volunteer Cambs .pdfCCVS AGM - Volunteer Cambs .pdf
CCVS AGM - Volunteer Cambs .pdfCambridge Council for Voluntary Service
5 visualizações14 slides
Case study of Gokarna Multi-village scheme, Kumta, Karnataka_IIM-B_2023.pdf por
Case study of Gokarna Multi-village scheme, Kumta, Karnataka_IIM-B_2023.pdfCase study of Gokarna Multi-village scheme, Kumta, Karnataka_IIM-B_2023.pdf
Case study of Gokarna Multi-village scheme, Kumta, Karnataka_IIM-B_2023.pdfIndia Water Portal
9 visualizações31 slides

Último(20)

UAE's 52nd National Day, 2023 por sri24ram2024
UAE's 52nd National Day, 2023UAE's 52nd National Day, 2023
UAE's 52nd National Day, 2023
sri24ram20247 visualizações
Mukhya Mantri Gramin Peyjal Nishchay Yojana (MGPNY) – Bihar_Pankaj Kumar_AKRS... por India Water Portal
Mukhya Mantri Gramin Peyjal Nishchay Yojana (MGPNY) – Bihar_Pankaj Kumar_AKRS...Mukhya Mantri Gramin Peyjal Nishchay Yojana (MGPNY) – Bihar_Pankaj Kumar_AKRS...
Mukhya Mantri Gramin Peyjal Nishchay Yojana (MGPNY) – Bihar_Pankaj Kumar_AKRS...
India Water Portal22 visualizações
Social behavioural change to drive community ownership_ Divyang Waghela_Tata ... por India Water Portal
Social behavioural change to drive community ownership_ Divyang Waghela_Tata ...Social behavioural change to drive community ownership_ Divyang Waghela_Tata ...
Social behavioural change to drive community ownership_ Divyang Waghela_Tata ...
India Water Portal13 visualizações
Case study of Gokarna Multi-village scheme, Kumta, Karnataka_IIM-B_2023.pdf por India Water Portal
Case study of Gokarna Multi-village scheme, Kumta, Karnataka_IIM-B_2023.pdfCase study of Gokarna Multi-village scheme, Kumta, Karnataka_IIM-B_2023.pdf
Case study of Gokarna Multi-village scheme, Kumta, Karnataka_IIM-B_2023.pdf
India Water Portal9 visualizações
AABS project overview por WorldFish
AABS project overviewAABS project overview
AABS project overview
WorldFish38 visualizações
Support Girl students with Education por SERUDS INDIA
Support Girl students with EducationSupport Girl students with Education
Support Girl students with Education
SERUDS INDIA7 visualizações
Monitoring and Evaluation Plan (Theory of change, results framework, Logframe... por Scoffy Wangang
Monitoring and Evaluation Plan (Theory of change, results framework, Logframe...Monitoring and Evaluation Plan (Theory of change, results framework, Logframe...
Monitoring and Evaluation Plan (Theory of change, results framework, Logframe...
Scoffy Wangang5 visualizações
Mapping location and co-location of industries at the neighborhood level - A... por OECD CFE
Mapping location and co-location of industries at the neighborhood level  - A...Mapping location and co-location of industries at the neighborhood level  - A...
Mapping location and co-location of industries at the neighborhood level - A...
OECD CFE7 visualizações
ΕΚΘΕΣΗ ΚΟΜΙΣΙΟΝ ΓΙΑ ΤΟΥΡΚΙΑ por ssuser9e6212
ΕΚΘΕΣΗ ΚΟΜΙΣΙΟΝ ΓΙΑ ΤΟΥΡΚΙΑΕΚΘΕΣΗ ΚΟΜΙΣΙΟΝ ΓΙΑ ΤΟΥΡΚΙΑ
ΕΚΘΕΣΗ ΚΟΜΙΣΙΟΝ ΓΙΑ ΤΟΥΡΚΙΑ
ssuser9e6212172 visualizações
The National Security Framework of Spain por Miguel A. Amutio
The National Security Framework of SpainThe National Security Framework of Spain
The National Security Framework of Spain
Miguel A. Amutio33 visualizações
COP28 President Launches Global Decarbonization Accelerator por Energy for One World
COP28 President Launches Global Decarbonization AcceleratorCOP28 President Launches Global Decarbonization Accelerator
COP28 President Launches Global Decarbonization Accelerator
Energy for One World38 visualizações
Ending Stagnation: A New Economic Strategy for Britain por ResolutionFoundation
Ending Stagnation: A New Economic Strategy for BritainEnding Stagnation: A New Economic Strategy for Britain
Ending Stagnation: A New Economic Strategy for Britain
ResolutionFoundation1.4K visualizações

Keep Up with the Demands of IT Security on a Nonprofit Budget

  • 1. Encompass Group, LLC Keeping up with the demands of IT Security on a nonprofit budget. www.encompassgroupllc.com Tyler Village 3615 Superior Avenue, Suite 3103F Cleveland, OH 44114 216.539.0100
  • 2. Who are we to talk? 2 enCompass is a team of business and compliance technologists providing Managed IT Services to regulated organizations, with a concentration on:  Financial Industry  Healthcare  Nonprofits
  • 3. 3 Brandon Shaw Managing Partner, Lead Engineer  18 years industry experience  Consulted for many SMB’s, public school systems, Government branches, Senatorial campaigns and even a Presidential campaign  Just received his Pilot license Mary Katherine Donnelly Business Development Director  Background in IT Product Marketing & Enterprise Sales to Fortune 500 companies  Director of a DC nonprofit, marketing Director for a local nonprofit, and Chair of the Board for local YMCA  Is NOT a pilot Experience
  • 4. 4 *Source: The Global State of Information Security® Survey 2016 The State of IT Security
  • 5. 5 The State of IT Security
  • 6. 6 5 Points about Mobile and BYOD 1 2 3 4 5 Source: Crowd Research Partners: BYOD and Mobile Security 2016 report Increased mobility, satisfaction and productivity are the top drivers of BYOD. Security and employee privacy are the biggest inhibitors of BYOD. 1 in 5 organizations suffered a mobile security breach, primarily driven by Malware and malicious WiFi BYOD Security threats pose heavy burdens on IT resources and help desk workloads Despite all this, only 30% of organizations are increasing security budgets for BYOD in the next 12 months
  • 8. Boards (Process and Approval) Regulatory Environment Government Healthcare Protecting the data of both those you serve and those who donate Volunteers access to data 8 Nonprofit Other Challenges
  • 9. 9 Where Your IT Security Should Be Today to be Ready for Tomorrow THREAT SOLUTION Viruses Centrally Managed AntiVirus RansomWare User Education/Training, Backups Unauthorized Network Access Firewalls, Penetration Testing & Vulnerability Scans, IDPS BYOD Clear Policy, MDM Disaster Planning Backup and Recovery, onsite and offsite Internal – accidental or malicious Written policies and procedures, training, device control Theft/Loss Mobile Device Management, centrally managed encryption Hackers IDPS, Encryption Out of Date Software Patch Management “Rogue” Downloads User access and privileges, non-critical application patches
  • 10. 10 Layered Security 1. Patch your systems 2. Educate your users 3. Backup files 4. Invest in layered security Firewalls AntiVirus AntiMalware IDPS Device Control Security Tools Email Encryption MDM
  • 11. 11 Firewalls/Antivirus/AntiMalware  Malware is a broad term used to describe all sorts of malicious software including viruses, spyware, trojans, worms, and more.  Anti-virus prevents and gets rid of viruses by preventing harmful software from installing and damaging your computer; protects and detects when a file has some kind of malicious behavior and prevent it from executing.  A firewall controls network traffic acting as a filter between the internet and your network servers.
  • 12. 12 IDPS Intrusion Detection System Intrusion Prevention System Capable of stopping first packet of an attack Analyzes traffic for anomalies Issues alarms when attack occurs Sits directly in line of network traffic VISIBILITY & CONTROL
  • 13. 13 Device Control Restricts user access to devices by access rules: • data storage media • removable devices • CD/DVDs • modems • external network adapters • printers • multi-function peripherals • USB Before investing, see if your AV Solution has Device Control (also called Access Control)
  • 15. 15 Email Encryption There are many different types of email encryption, but one gaining popularity due to simplicity and cost structure is Office 365 Message Encryption:  Fill regulatory requirements  Policy based encryption  First building block in a Data Loss Prevention strategy
  • 16. 16 Office 365 for Nonprofits Many of the products and tools we discussed are either free or heavily discounted as part of Office 365: https://products.office.com/en- us/nonprofit/office-365-nonprofit-plans-and-pricing#seemore
  • 17. Rule of thumb: 8-10 people Chronic problems occur (unable to access email, network outages, etc.) Cybersecurity attack 17 When Your Nonprofit Outgrows Homegrown IT $2500-$4000/mo: average salary for dedicated IT staff $750/mo average for Managed IT Services in 10 person office* *Source: TechSoup
  • 18. 18 enCompass Would Like to be Your Partner in IT Security… Experience Managed IT Services and Support in Northeast Ohio and Nationwide for 10+ years, gaining the trust of our client base with every interaction. Compliance We take a comprehensive approach to IT operations so our clients feel confident that IT is under control, risk is managed and regulations are met. Budget We strive to strike just the right balance between the business requirements that drive results and the budget constraints faced by nonprofits. Exceptional Client Experience At each interaction point: • Ownership • Clear Expectations • Friendly & Personable Service • Bigger Picture Reference
  • 19. Encompass Group, LLC Brandon Shaw bshaw@encompassgroupllc.com www.encompassgroupllc.com Tyler Village 3615 Superior Avenue, Suite 3103F Cleveland, OH 44114 216.539.0100 Mary K. Donnelly mdonnelly@encompassgroupllc.com