Skip to content

Protecting Your Data– Is It Really Worth the Hassle?

The value of some church assets is difficult to assess. Personnel, congregational goodwill, and data are just a few examples of assets whose value is usually understood only once it’s gone. None of us would say our data has no value to the organization, but trying to figure out what it’s worth so we can adequately protect it is challenging.

Data is one of the most valuable assets a church has. Protecting it isn’t difficult, but must be approached as deliberately and strategically as fire and security protection.

Read More

Church WiFi Strategies

Many churches offer or want to offer WiFi throughout their campuses. It’s a good way to serve your congregation, empower your team, and even attract larger events to your campus. There are strategies worth considering– some technical and some with legal implications.

Read More

Wise Cloud Strategies

Church and ministry leaders are being tasked with making Cloud decisions, but need to know whether their decisions are good or bad, wise or unwise. This brief article will give you a framework for working through Cloud decisions.

Read More

Three Things…

Our team does a lot of network engineering, and we run into some common issues in Christian churches and ministries. We find ourselves saying, “Now that needs to be an article!” The problem is, they’re usually topics that won’t make a full article by themselves, so they never make it as an article idea. In this article I’m going to address three of those issues: Macs in Active Directory, Who Owns Your Domain?, and How’s Your Cable?

Read More

Handling Online Activities with Care

Every year more organizations and people fall victim to cybercrime. Last year more than 300,000 reported cybercrimes to the FBI with losses in the hundreds of millions of dollars. Whether it’s simple theft, fraud, or identity theft, this is a significant area of opportunity for criminals. Let’s shed some light on how to protect your church office and those you know from cybercrime.

Read More

Security Vulnerabilities

While at a conference recently I met a specialist in system security. He works in that role for one of the largest enterprise-class computer manufacturers. As we talked about security issues, I was surprised to learn how vulnerable many systems are! We met again by phone and video conference, and he shared some specifics with me.

Read More
Scroll To Top