Posts Tagged ‘IT Security’
Protecting Your Data– Is It Really Worth the Hassle?
The value of some church assets is difficult to assess. Personnel, congregational goodwill, and data are just a few examples of assets whose value is usually understood only once it’s gone. None of us would say our data has no value to the organization, but trying to figure out what it’s worth so we can adequately protect it is challenging.
Data is one of the most valuable assets a church has. Protecting it isn’t difficult, but must be approached as deliberately and strategically as fire and security protection.
Read MoreThe Impact of Windows XP Support Ending
Microsoft announced the date they will stop supporting Windows XP is April 8, 2014; and it’s almost here! What do you need to do?
Read MoreThe Latest in Evangelistic Trends: International Arms Trafficking!
Some time ago an article caught my eye about folks going to jail because they took computers outside of the U.S. The problem was that, because of computer processor capabilities and the built-in cryptographic capabilities of common off-the-shelf software, doing so violated Export Administration Regulations.
Read MoreChurch WiFi Strategies
Many churches offer or want to offer WiFi throughout their campuses. It’s a good way to serve your congregation, empower your team, and even attract larger events to your campus. There are strategies worth considering– some technical and some with legal implications.
Read MoreShould Your Church Move to Google Apps?
A common discussion these days is whether a move to Google Apps makes sense. Is it a good option compared to Microsoft Office?
Read MoreWise Cloud Strategies
Church and ministry leaders are being tasked with making Cloud decisions, but need to know whether their decisions are good or bad, wise or unwise. This brief article will give you a framework for working through Cloud decisions.
Read MoreThree Things…
Our team does a lot of network engineering, and we run into some common issues in Christian churches and ministries. We find ourselves saying, “Now that needs to be an article!” The problem is, they’re usually topics that won’t make a full article by themselves, so they never make it as an article idea. In this article I’m going to address three of those issues: Macs in Active Directory, Who Owns Your Domain?, and How’s Your Cable?
Read MoreHandling Online Activities with Care
Every year more organizations and people fall victim to cybercrime. Last year more than 300,000 reported cybercrimes to the FBI with losses in the hundreds of millions of dollars. Whether it’s simple theft, fraud, or identity theft, this is a significant area of opportunity for criminals. Let’s shed some light on how to protect your church office and those you know from cybercrime.
Read MoreChanging the Username on a Mac
Ever wanted to change the username on a Mac? We need to do it fairly often, and though it’s not as simple as one would think, it is easy if you know the steps.
Read MoreSecurity Vulnerabilities
While at a conference recently I met a specialist in system security. He works in that role for one of the largest enterprise-class computer manufacturers. As we talked about security issues, I was surprised to learn how vulnerable many systems are! We met again by phone and video conference, and he shared some specifics with me.
Read More