Topic: IT Security – New and Emerging Best Practices
Date: October 23, 2014
If you shopped at Target last Christmas or have googled starlet photos recently, you know the risks to personal information online are great.  If you work at a nonprofit you may not have thought of the data you hold as hack-worthy, but the days are past when your data on rainforest clearing, or your list of cabinet ministers you’ll be meeting with, or your volunteer contact list files are safe on paper in your locked filing cabinet.
As recent hacks and security breaches have demonstrated, organizations can never let their guard down when it comes to keeping their information secure. Most of us are familiar with basic security best practices, such as strong passwords and careful clicking, but the next generation of threats are going to require even more vigilance.
Join us for a discussion of the next generation of security best practices. Whether your data is on your laptop, on your server or in the cloud, we will review what you can do to keep it confidential and available.
As the CMatthew Eshlemanhief Technology Officer at Community IT, Matthew Eshleman is responsible for shaping Community IT’s strategy in assessing and recommending technology solutions to clients. With a deep background in network infrastructure technology he fundamentally understands how technology works and interoperates both in the office and in the cloud.
SteveLongeneckerAs Project Manager, Steve Longenecker divides his time at Community IT between project managing client projects and consulting with clients on IT planning. Steve’s appreciation for working at Community IT Innovators is rooted in respect for the company’s dream.