Posts Tagged ‘IT Security’
Protecting IT from Disasters
“Only the flexible survive.” It’s a phrase we’ve heard– and possibly said– many times. Life is unpredictable, and challenges do come our way, so how should uncertainty affect the way we approach information technology (IT) in our churches and ministries? We are dependent on our computers today in ways we might never have imagined. We rely on them to store contact information, process financial transactions, communicate– many of the nuts and bolts that enable and hold ministry together. Therefore we should do all that is reasonable and cost-effective to protect our organizations from being shut down by a disastrous event. Planning now gives the flexibility needed for ministry survival. And in the ever-changing legal and financial regulatory landscapes, IT disaster recovery plans are even more necessary.
Read MoreReasonable Network Security
Church and ministry networks have unique security needs. Many mistakenly approach network security in our niche like they would a club or hobby, and thus don’t go far enough to protect our data and our team. Others mistakenly go so far they impede the team and increase their support call volume unnecessarily. We have worked or consulted on hundreds of networks in churches and ministries, and we have developed an approach that protects and empowers while minimizing support needs. I’ll share it with you so you can enjoy the same results.
Read MoreCPA Audits Now Focusing on IT
Church and ministry computer systems and networks have grown in response to perceived needs over the years, and most have grown with very little intentionality or strategy. The results are often higher than necessary complexity, cost, and risk. CPAs are now being required to look at IT during audits for fiscal years ending 12/15/2007 and later. Are you ready?
Read MoreProtecting Data– Is It Really Worth the Hassle?
Some church assets are difficult to assess. Personnel, congregational goodwill, and data are just a few examples of assets whose value is usually understood only once it’s gone. None of us would say our data has no value to the organization, but trying to figure out what it’s worth so we can adequately protect it is challenging. Data is one of the most valuable assets a church has. Protecting it isn’t difficult, but must be approached as deliberately as the fire and security protection we apply to our church buildings.
Read MoreManaging Security vs Controlling Users
Computers and data networks are vulnerable, and wise IT Directors establish policies to protect them. They are guided by their research and experience in protecting these systems that contain valuable and sensitive data. But many go further than necessary, and without ever intending to, frustrate their staff. So let’s talk about some ‘best practices’ ministry security strategies.
Read MoreBiometrics
Those of us who love watching 24 and other high-tech shows can’t help noticing the use of biometrics to enhance their computer system security. Of course, it makes sense for those with top secret files to use such devices as fingerprint scanners, retina scanners, and voice print analyzers to protect them. Surprisingly, that technology is very affordable, and has a use in ministries!
Read MoreComputer Security
It’s not a matter of if a computer will crash, but when. Thus it’s important to protect computer systems from problems that will arise.
Read MoreSorry, Charlie!
Charlie the Tuna® is, according to StarKist® (his “sponsor”), America’s favorite tuna. Growing up we saw Charlie left behind in the water time after time only to be told, “Sorry, Charlie!” Too many are hearing that same kind of disappointing line these days because someone has “phished” (pronounced fished) their identity information and taken all their cash and assets before moving on. This has become the number one threat to consumers and financial institutions on the Internet. What exactly is phishing? How can we recognize it? What can we do about it?
Read MoreQuit Sending Me Viruses!
Are you tired of getting those emails too? Most people don’t realize that modern viruses are able to spoof the From email address. That means you may not have been the source of the virus you’ve just been told you sent.
Read More