Data security threats come in many forms. Foreign governments, organized crime or bored teenagers can wreak havoc. A careless employee using a default password can compromise and leave an entire organization vulnerable. The result can be the annoyance of a hijacked browser, erasure of organizational data, or access to bank accounts and financial loss.
Though threats can be sophisticated, in most cases they can be avoided. Because all organizations have a duty to protect the data of their customers, staff and donors, it’s important that those who are managing the IT resources take steps needed to secure the data they have.
Our IT Services team can proceed with security projects to update router firewalls and/or upgrade Wi-Fi access points to more secure protocols and separation of guest and staff networks. Our recommendations may include enforcement of password policies or recommendations for password management software. We can help implement multifactor authentication from Microsoft and Google for your critical accounts.
With a Managed IT agreement from Alternative, your organization automatically gets antivirus and malware protection, as well as web filtering to help prevent phishing attacks. Included in a Managed IT agreement: security awareness training for staff, patches and updates for drivers and hardware bios, and Windows OS patching as necessary for other licensed software (Adobe, Java, etc.) We’ll also make sure your organization has a backup system in place.
Alternative Technologies’ IT Services team can work with you to explore your organization’s unique needs and help get answers to the following questions:
- What data need to be protected (and where is it located)?
- Do we have password policies – and how are they enforced?
- Do we close accounts when staff leave or are terminated?
- Are remote employees using VPNs to access data securely?
- How can we mitigate the risks associated with laptops that leave the office?
- Is our firewall effectively protecting you from hackers?
- Is our Wi-Fi truly secure?
- How can we be sure that the hardware, software and operating systems that you use every day are not exposing us to vulnerabilities?
- How can we be sure that one employee clicking on one wrong link doesn’t bring the whole organization down (ransomware)?
A Security Assessment can help identify concrete practical steps you can take to make your organization more secure. Our tailored assessments are customized to management concerns, staff size and devices used. Our inquiry will identify weaknesses and viable steps to remedy them. Our written security assessment report will serve as a blueprint for action.
Backups are not optional in the workplace. Real risks posed by hardware failure, earthquakes, keystroke errors and malevolent hackers can have catastrophic effects on operations. Because clients, customers, customers and staff depend on computer systems and data, IT managers have the obligation and responsibility to have backup policies and systems in place. (Many funders and donors require it.)
Recovering from a data loss or data access failure is critical for nonprofit organizations, businesses and government. If you have concerns about your reliance on your computer systems and resilience in disaster, talk to us.
Every organization relies on timely access to data. Depending on the quantity and sensitivity of the data, size of the organization, and the nature of their service, each organization will have different requirements to provide cost effective, secure backups. A properly configured backup system can provide peace of mind to management and ensure that your team becomes operational quickly under a variety of failure scenarios.
We can help you take concrete action steps by walking you through the answers to these questions:
- How often should I back up? How frequently should we set “recovery points”?
- How long would it take us to recover from a data loss?
- Is there a reliable online backup system that won’t slow our network or require a change to our internet service?
- If we use the cloud, do we need backup? Should we also be backing up locally?
- Is our backup is secure in the cloud? Should we be using encryption?
- Is there an affordable local backup solution?
- How do I know that our backup solution actually works?
- How can I test recovery? Who should be in charge of monitoring?
“Set It and Forget It”
In addition to online offerings, Alternative Technologies offers a “Safety Net” Backup system that combines online and onsite recovery options for organizations that need fast recovery to catastrophic data loss.
Customers who have Managed IT agreements know that they can “set it and forget it”. Our online backup monitoring service checks your backups daily and alerts us when there is a problem. If a problem is detected, our back up specialists will work with you to get the backup system working properly again. If there is ever a need for recovery (knock on wood) our team will get to work restoring data files and systems to get your team up quickly.
Technology's #1 Crime: E-Waste
As technology gets better, society’s e-waste problem gets bigger.
We handle tons of obsolete electronics every year. With our e-waste partners, you can be sure that your old electronics will be responsibly repurposed or recycled.