Heartbleed

You have probably heard about the newly discovered Heartbleed vulnerability, widely considered to be one of the most widespread and potentially damaging security flaws of all time. Potentially being the operative word. There is currently no known hack or exploit of any system using this vulnerability.

Webinar: March 27, 2014 – Best of Nonprofit Tech: Slides & Audio

Every year we celebrate the best of nonprofit technology at the Nonprofit Technology Conference (NTC), held in DC this year from March 13-15. During this webinar hosted on March 27, 2014, Johan Hammerstrom, COO, and Matthew Eshleman, CTO, shared conference highlights, including their favorite speakers, sessions, technologies, aha moments and more.

Office for iPad

Last week, newly-minted Microsoft CEO, Satya Nadella, introduced Office for iPad. In addition to the immediate benefit of finally having, well, Office on our iPads, it also signals a possible shift in Microsoft’s strategy. I have discussed Microsoft’s strategic woes in a previous blog post, and can only hope that this is the beginning in a long series of needed changes. For now, nonprofits may be wondering how this impacts them. There are a few key things to realize when considering the iPad version of Office for your organization.

Webinar: April 24, IT Planning for Disasters

Is your organization prepared for the worst? IT planning is critical to ensure that your organization is ready when disaster strikes. This process is often referred to “business continuity.” What are the steps involved in creating a business continuity plan for your organization? Community IT COO Johan Hammerstrom and CTO Matthew Eshleman will walk you through the essentials of planning for everything from natural disasters, inevitable down times and everything in between.

Best of Nonprofit Tech, 14NTC

This year’s Nonprofit Technology Conference (#14NTC) did not have an official theme, but informal themes could be found everywhere you looked. Beth Kanter launched a vigorous Facebook thread by indirectly suggesting that Franken Panel had emerged as a possible theme for #14NTC.

DC Nonprofit Tech Summit

Community IT Innovators enjoyed participating in the Do Something Better – A Nonprofit Technology Summit on March 25, 2014. David Deal, CEO, moderated a panel discussion on Faster, Smoother, Slimmer Nonprofit Operations. Here are some resources shared during the session.

IT Security Essentials & Best Practices: Part 2

In Part 1, I provided an overview of IT security essentials and best practices. In this post, I provide some additional details. So after backups, antivirus and patching, what’s next? Let’s consider how we can extend our protection of data and devices and see what else we may be missing. In broad strokes, let’s look at the following: Network, Data, Devices and Applications.

Webinar: March 27, 2014 – Best of Nonprofit Tech

Every year we celebrate the best of nonprofit technology at the Nonprofit Technology Conference (NTC), held in DC this year from March 13-15. Join Johan Hammerstrom, COO, and Matthew Eshleman, CTO, for an exciting discussion about the conference highlights. They will talk about their favorite speakers, sessions, technologies, aha moments and more. They will also share the highlights from sessions they presented at.

Windows XP End-of-Life: Understanding Your Options

There has been a lot in the news lately about the life of Windows XP coming to an end. Community IT has put together a brief FAQ to address the issue. Please contact your technical lead if you have additional questions or want to take action.

IT Security Essentials & Best Practices – Part 1

It’s an interesting time to be working in information security. Really advanced security is within reach of even the smallest organization. With commonly available approaches and many more becoming more accessible, which technologies are right for your organization as it considers important issues of security and privacy? Which approaches are the most effective at ensuring that your data is safe? In this blog post, I will start with specific ways to build this foundation and then look at a broad survey of approaches to layer on security.