4. Security Toolkit: Specific Security Topics: What to Look into and Why

Below is a selection of topics in cybersecurity to guide you in thinking about your current security practices and what to do next. Each section has some information that all staff should know, including leadership and management, as well as some more detailed information that IT staff should know.

 

The toolkit also provides some suggested solutions and some guidance on pricing. These suggestions are not exhaustive. Pricing can be very complex depending on the packages and solutions you pursue, including how they dovetail with the products you already purchase (e.g. an expensive solution might not be as expensive when it’s purchased as an add-on to an ongoing subscription you already pay for). Pricing can also vary depending on non-profit pricing and grant assistance. We’ve also included some outside general resources related to each topic.

 

Endpoint Detection and Response (EDR)

ENDPOINT DETECTION
AND RESPONSE (EDR)

MULTI-FACTOR AUTHENTICATION (MFA)
MULTI-FACTOR
AUTHENTICATION (MFA)

Backups and Securing Backups

BACKUPS AND
SECURING BACKUPS

Email Security
 

EMAIL SECURITY

DATA SHARING
 

DATA SHARING

PASSWORD MANAGEMENT
PASSWORD
MANAGEMENT

ENCRYPTION
 

ENCRYPTION

 

 

OTHER TIPS ON TECHNOLOGY SETUP

 

OTHER TIPS ON
TECHNOLOGY SETUP

 

Last updated on .

Table of Contents

    NEWS

    News & publications

    The news about recent activities for needed peoples.

    More News

    24 Mar 2023

    Billboard with stage lights shining on the UpToCode project.

    Project Spotlight: UpToCode

    Because everyone has a right to a safe home, Northeast Legal Aid (NLA) is…

    Continue Reading

    28 Feb 2023

    Member spotlight of Josh Lazar featuring superhero comic imagery

    Member Spotlight: Josh Lazar

    We are heading south to Florida today to meet community member Josh Lazar, the…

    Continue Reading

    Our Partners