SlideShare a Scribd company logo
1 of 18
Download to read offline
How to Assess your IT
Needs and Implement
Technology
at your Nonprofit
Presented by Enzo Logozzo and Eric Neufeld, 365 iT Solutions
March 17th, 2016
Hi, we’re from
TechSoup Canada
Our mission is to help
nonprofits use tech
effectively
We make technology more affordable
through the Technology Donations Program
Register your charity, nonprofit or library to see which products
you’re eligible for: www.TechSoupCanada.ca/Getting_Started
We create and curate tech resources
facebook.com/techsoupcanada
techsoupcanada.ca/blog
meetup.com/toronto-net-tuesday
@techsoupcanada
1. Close/expand GoToWebinar panel
2. Submit a question/comment via Chat
3. View and select your audio
• You can hear us, but we can’t hear you!
• Can’t hear? Try turning up your volume or call in
• Have a question? Use the Q&A box
• Recording will be available post-webinar
• Please fill in the post-webinar survey!
1 3
2
Webinar Logistics
Today’s speakers are
Enzo Logozzo
Director, Sales and Marketing, 365 iT SOLUTIONS
• Provides managed IT services, IT outsourcing, tech support
services and cloud services to non-profit organizations
Eric Neufeld
Senior Project Manager, 365 iT SOLUTIONS
• 14 years experience in IT industry
• Previously worked as a consultant with Deloitte
Who is 365 iT SOLUTIONS?
 Company founded in 2003
 Based in Toronto, Ontario
 100% Canadian Team
 Responsible for connecting companies
worldwide
 We work with various nonprofits and
charities
 We believe in our brand, image and
reputation. Better yet, we believe in our
clients.
 “We make IT Simple!”
What is a Network Assessment?
A network assessment provides a snapshot of the entire IT
network.
It creates an effective IT strategy including recommendations
and pain points.
The network and security assessment will cover the following:
Infrastructure, Performance, Availability, Management
and Security
Step 1 = Assess Your Entire Company
To get a “TRUE” picture of your entire business, you need a solid foundation to build
on and you should collect the following information within a excel sheet with your
management team.
1. Size?
2. Geography?
3. Business Goals?
4. New technology?
5. Pain points?
Step 2 = Assess Your Network Assets
This will show any vulnerability in your network that might be exploited by a security
threat. Risks include potential consequences and vulnerabilities including loss of
data, downtime and security breach.
The assessment should cover the
following areas:
 Firewalls & Routers
 Network Switches
 Wireless Access Points
Step 3 = Assess Your Server
Your server manages, stores and processes your data 24x7x365. Your servers need
to be reliable as it is the heart of your business and network. It is important to know
your server is healthy.
The assessment should cover the
following areas:
 Warranty?
 Operating systems?
 Network services?
 Security updates?
 Performance?
 Disaster recovery?
Step 4 = Assess Your Workstations
Workstations and laptops keep your organizations running and employees
productive however they also are the source of most downtime, lost productivity
and security risk.
The assessment should cover the
following areas:
 Operating systems?
 Endpoint security?
 Central Antivirus management?
 Local administrator access?
 Business software?
Step 5 = Assess Your LOB Software
LOB stands for “line-of-business” software. Every organization has one as it is
needed to run you business however there are many areas the assessment should
cover in respects to your LOB.
The assessment should cover the
following areas:
 Support contract?
 Hosted location?
 Future proof?
 Reliability and accessibility?
Step 6 = Assess Your Policies & Procedures
Do you have an Acceptable Use Policy (AUP)?
Is a set of rules for the network that outlines how network can be used and sets
guide lines. This will reduce the potential for legal action that may be taken by a
user, and often protect the organization.
Do you have an Email and Computer Monitoring policy?
Monitoring workplace computer activity can protect your business. This policy will
outline that the company can monitor email and/or computer activity any time.
Do you have an BYOD Policy?
If an employee leaves/terminated, phone must given to IT to delete email/data or
phone can be remotely wiped causing complete data loss. Organization is not
responsible for data lost if policy is violated.
Step 7 = Choose the right IT Consultant
Step 1 - Define objectives, timeline, and budget.
Step 2 - Write a Request for Proposal (RFP) that lays
out the terms of the engagement, objectives, timeline,
and a budget.
Step 3 – Contact IT consultants with proven industry experience and
understanding of Canadian privacy laws.
Step 4 – Evaluate RFP response including the following areas:
 Have they addressed your business goals?
 Are they delivering a well planned and documented proposal?
 Are they engaged?
 Do they guarantee their proposal?
Step 8 = Do your due diligence
 Do your due
diligence
 Take your time
 Check references
 Ask questions
 Bring in the experts
365 iT SOLUTIONS Special Offer
 Up to 10% discount on Lenovo server and storage
 Up to 5% discount on Lenovo ThinkPad workstations,
laptops and tablets
 Complimentary Network Assessment
 Complimentary Review of IT proposals
 Up to 20% discount on MIP programs
(Migration, Integration, Project Programs)
Questions?

More Related Content

What's hot

Axceler eBook for Non-Ipads
Axceler eBook for Non-IpadsAxceler eBook for Non-Ipads
Axceler eBook for Non-Ipads
Claudine Bianchi
 
Crisis to calm - An eLearning experience - Vesa Pekkarinen
Crisis to calm - An eLearning experience - Vesa PekkarinenCrisis to calm - An eLearning experience - Vesa Pekkarinen
Crisis to calm - An eLearning experience - Vesa Pekkarinen
Connecting Up
 

What's hot (20)

Assess Your Organization's Digital Capability
Assess Your Organization's Digital CapabilityAssess Your Organization's Digital Capability
Assess Your Organization's Digital Capability
 
The Very Best Intranets & Digital Workplace from the 2016 Intranet Global Forum
The Very Best Intranets & Digital Workplace from the 2016 Intranet Global ForumThe Very Best Intranets & Digital Workplace from the 2016 Intranet Global Forum
The Very Best Intranets & Digital Workplace from the 2016 Intranet Global Forum
 
Office 365 choices for content and collaboration
Office 365 choices for content and collaborationOffice 365 choices for content and collaboration
Office 365 choices for content and collaboration
 
Governing Office 365 Webinar - ClearBox with Debble
Governing Office 365 Webinar - ClearBox with DebbleGoverning Office 365 Webinar - ClearBox with Debble
Governing Office 365 Webinar - ClearBox with Debble
 
Leading Nordic IT-services Company, Tieto, Uses Enterprise Social Networking ...
Leading Nordic IT-services Company, Tieto, Uses Enterprise Social Networking ...Leading Nordic IT-services Company, Tieto, Uses Enterprise Social Networking ...
Leading Nordic IT-services Company, Tieto, Uses Enterprise Social Networking ...
 
How to Make New Nonprofit Videos from Old Content Using Adobe Rush
How to Make New Nonprofit Videos from Old Content Using Adobe RushHow to Make New Nonprofit Videos from Old Content Using Adobe Rush
How to Make New Nonprofit Videos from Old Content Using Adobe Rush
 
A feature guide to QUT's Digital Workplace (Intranets2016)
A feature guide to QUT's Digital Workplace (Intranets2016)A feature guide to QUT's Digital Workplace (Intranets2016)
A feature guide to QUT's Digital Workplace (Intranets2016)
 
Axceler eBook for Non-Ipads
Axceler eBook for Non-IpadsAxceler eBook for Non-Ipads
Axceler eBook for Non-Ipads
 
It solution company - Survin IT Solutions
It solution company - Survin IT SolutionsIt solution company - Survin IT Solutions
It solution company - Survin IT Solutions
 
HDI Capital Area Announcements and Meeting Presentation 2.20.2015
HDI Capital Area Announcements and Meeting Presentation 2.20.2015HDI Capital Area Announcements and Meeting Presentation 2.20.2015
HDI Capital Area Announcements and Meeting Presentation 2.20.2015
 
Digital Workplace Case Studies (Intranet)
Digital Workplace Case Studies (Intranet)Digital Workplace Case Studies (Intranet)
Digital Workplace Case Studies (Intranet)
 
Taking the fastest journey to the digital workplace
Taking the fastest journey to the digital workplaceTaking the fastest journey to the digital workplace
Taking the fastest journey to the digital workplace
 
About Paperless Business Systems
About Paperless Business SystemsAbout Paperless Business Systems
About Paperless Business Systems
 
TechSoup Connect Texas: Creating a Tech Stack Built Around QBO
TechSoup Connect Texas: Creating a Tech Stack Built Around QBOTechSoup Connect Texas: Creating a Tech Stack Built Around QBO
TechSoup Connect Texas: Creating a Tech Stack Built Around QBO
 
Conquer Your Inbox: Tips & Tricks for Managing Email
Conquer Your Inbox: Tips & Tricks for Managing EmailConquer Your Inbox: Tips & Tricks for Managing Email
Conquer Your Inbox: Tips & Tricks for Managing Email
 
Camden Insider_Digital news_v6
Camden Insider_Digital news_v6Camden Insider_Digital news_v6
Camden Insider_Digital news_v6
 
Business Case: Ozitem Groupe, where 80% of the company is working remotely. R...
Business Case: Ozitem Groupe, where 80% of the company is working remotely. R...Business Case: Ozitem Groupe, where 80% of the company is working remotely. R...
Business Case: Ozitem Groupe, where 80% of the company is working remotely. R...
 
SharePoint Saturday - SharePoint Success
SharePoint Saturday - SharePoint SuccessSharePoint Saturday - SharePoint Success
SharePoint Saturday - SharePoint Success
 
Your first choice high speed internet connections today at lv.net
Your first choice high speed internet connections today at lv.netYour first choice high speed internet connections today at lv.net
Your first choice high speed internet connections today at lv.net
 
Crisis to calm - An eLearning experience - Vesa Pekkarinen
Crisis to calm - An eLearning experience - Vesa PekkarinenCrisis to calm - An eLearning experience - Vesa Pekkarinen
Crisis to calm - An eLearning experience - Vesa Pekkarinen
 

Viewers also liked

Crowdfunding: how it works, why it works and how you can make it work for you
Crowdfunding:  how it works, why it works and how you can make it work for you Crowdfunding:  how it works, why it works and how you can make it work for you
Crowdfunding: how it works, why it works and how you can make it work for you
TechSoup Canada
 

Viewers also liked (14)

Finding Meaning in the Numbers
Finding Meaning in the NumbersFinding Meaning in the Numbers
Finding Meaning in the Numbers
 
How to Develop and Deliver an Effective Pitch
How to Develop and Deliver an Effective PitchHow to Develop and Deliver an Effective Pitch
How to Develop and Deliver an Effective Pitch
 
Crowdfunding: how it works, why it works and how you can make it work for you
Crowdfunding:  how it works, why it works and how you can make it work for you Crowdfunding:  how it works, why it works and how you can make it work for you
Crowdfunding: how it works, why it works and how you can make it work for you
 
June 2015 Toronto Net Tuesday: Crowdfunding
June 2015 Toronto Net Tuesday: CrowdfundingJune 2015 Toronto Net Tuesday: Crowdfunding
June 2015 Toronto Net Tuesday: Crowdfunding
 
Intro to TechSoup Canada for National Sports Federations
Intro to TechSoup Canada for National Sports FederationsIntro to TechSoup Canada for National Sports Federations
Intro to TechSoup Canada for National Sports Federations
 
Building Online Communities: Are You Using the Right Channels for Your Audience?
Building Online Communities: Are You Using the Right Channels for Your Audience?Building Online Communities: Are You Using the Right Channels for Your Audience?
Building Online Communities: Are You Using the Right Channels for Your Audience?
 
CRM for Nonprofits
CRM for NonprofitsCRM for Nonprofits
CRM for Nonprofits
 
Understanding Your Nonprofit Technology Needs (November 5, 2013)
Understanding Your Nonprofit Technology Needs (November 5, 2013)Understanding Your Nonprofit Technology Needs (November 5, 2013)
Understanding Your Nonprofit Technology Needs (November 5, 2013)
 
IT Governance for Nonprofits
IT Governance for NonprofitsIT Governance for Nonprofits
IT Governance for Nonprofits
 
Social Media for community performing arts groups
Social Media for community performing arts groupsSocial Media for community performing arts groups
Social Media for community performing arts groups
 
Intro to the TechSoup Canada donations program
Intro to the TechSoup Canada donations programIntro to the TechSoup Canada donations program
Intro to the TechSoup Canada donations program
 
Building Communities: Increasing Online Engagement and Awareness
Building Communities: Increasing Online Engagement and AwarenessBuilding Communities: Increasing Online Engagement and Awareness
Building Communities: Increasing Online Engagement and Awareness
 
10 Tech & Design Trends for Nonprofits in 2015
10 Tech & Design Trends for Nonprofits in 201510 Tech & Design Trends for Nonprofits in 2015
10 Tech & Design Trends for Nonprofits in 2015
 
A look back A look ahead at Nonprofit Technology
A look back A look ahead at Nonprofit TechnologyA look back A look ahead at Nonprofit Technology
A look back A look ahead at Nonprofit Technology
 

Similar to How to assess your it needs and implement technology at your nonprofit

Fldn resource -_impact_of_the_use_of_it_on_business_systems_18
Fldn resource -_impact_of_the_use_of_it_on_business_systems_18Fldn resource -_impact_of_the_use_of_it_on_business_systems_18
Fldn resource -_impact_of_the_use_of_it_on_business_systems_18
Natasha Ali
 
NARCA Presentation - IT Best Practice
NARCA Presentation - IT Best PracticeNARCA Presentation - IT Best Practice
NARCA Presentation - IT Best Practice
Brenda Majewski
 
360 IT Infra Mng&Support by Business Goals
360 IT Infra Mng&Support by Business Goals360 IT Infra Mng&Support by Business Goals
360 IT Infra Mng&Support by Business Goals
Alexandru Golosoiu
 
Temperfied 360 Infrastrucure Management & Support -- By Business Goals - web-...
Temperfied 360 Infrastrucure Management & Support -- By Business Goals - web-...Temperfied 360 Infrastrucure Management & Support -- By Business Goals - web-...
Temperfied 360 Infrastrucure Management & Support -- By Business Goals - web-...
Calin DAMIAN TANASE (open to invites)
 
2006 Best Customer Presentation 1 The Worst Way To Run A Business
2006 Best   Customer Presentation 1   The Worst Way To Run A Business2006 Best   Customer Presentation 1   The Worst Way To Run A Business
2006 Best Customer Presentation 1 The Worst Way To Run A Business
treparks
 
Week Four JournalObjectiveYou will identify key ethical proble.docx
Week Four JournalObjectiveYou will identify key ethical proble.docxWeek Four JournalObjectiveYou will identify key ethical proble.docx
Week Four JournalObjectiveYou will identify key ethical proble.docx
alanfhall8953
 

Similar to How to assess your it needs and implement technology at your nonprofit (20)

Handy Guide to IT Service Implementation
Handy Guide to IT Service ImplementationHandy Guide to IT Service Implementation
Handy Guide to IT Service Implementation
 
Fldn resource -_impact_of_the_use_of_it_on_business_systems_18
Fldn resource -_impact_of_the_use_of_it_on_business_systems_18Fldn resource -_impact_of_the_use_of_it_on_business_systems_18
Fldn resource -_impact_of_the_use_of_it_on_business_systems_18
 
Endpoint Security & Why It Matters!
Endpoint Security & Why It Matters!Endpoint Security & Why It Matters!
Endpoint Security & Why It Matters!
 
NARCA Presentation - IT Best Practice
NARCA Presentation - IT Best PracticeNARCA Presentation - IT Best Practice
NARCA Presentation - IT Best Practice
 
360 IT Infra Mng&Support by Business Goals
360 IT Infra Mng&Support by Business Goals360 IT Infra Mng&Support by Business Goals
360 IT Infra Mng&Support by Business Goals
 
Temperfied 360 Infrastrucure Management & Support -- By Business Goals - web-...
Temperfied 360 Infrastrucure Management & Support -- By Business Goals - web-...Temperfied 360 Infrastrucure Management & Support -- By Business Goals - web-...
Temperfied 360 Infrastrucure Management & Support -- By Business Goals - web-...
 
2006 Best Customer Presentation 1 The Worst Way To Run A Business
2006 Best   Customer Presentation 1   The Worst Way To Run A Business2006 Best   Customer Presentation 1   The Worst Way To Run A Business
2006 Best Customer Presentation 1 The Worst Way To Run A Business
 
Week Four JournalObjectiveYou will identify key ethical proble.docx
Week Four JournalObjectiveYou will identify key ethical proble.docxWeek Four JournalObjectiveYou will identify key ethical proble.docx
Week Four JournalObjectiveYou will identify key ethical proble.docx
 
Incident, Problem, Change, Knowledge…and Service Catalog? A Powerful Circle.
Incident, Problem, Change, Knowledge…and Service Catalog? A Powerful Circle. Incident, Problem, Change, Knowledge…and Service Catalog? A Powerful Circle.
Incident, Problem, Change, Knowledge…and Service Catalog? A Powerful Circle.
 
Do You Need Your IT Up and Running?
Do You Need Your IT Up and Running?Do You Need Your IT Up and Running?
Do You Need Your IT Up and Running?
 
CEO's Guide to Effective IT Management
CEO's Guide to Effective IT ManagementCEO's Guide to Effective IT Management
CEO's Guide to Effective IT Management
 
CEO's Guide Effective IT Management
CEO's Guide Effective IT ManagementCEO's Guide Effective IT Management
CEO's Guide Effective IT Management
 
How To Up-Skill in IT
How To Up-Skill in ITHow To Up-Skill in IT
How To Up-Skill in IT
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back
 
Webinar - 8 ways to align IT to your business
Webinar - 8 ways to align IT to your businessWebinar - 8 ways to align IT to your business
Webinar - 8 ways to align IT to your business
 
WCDS Career Day Presentation - IT
WCDS Career Day Presentation - ITWCDS Career Day Presentation - IT
WCDS Career Day Presentation - IT
 
NLOGIX
NLOGIXNLOGIX
NLOGIX
 
What skills are essential for a successful career in information technology.docx
What skills are essential for a successful career in information technology.docxWhat skills are essential for a successful career in information technology.docx
What skills are essential for a successful career in information technology.docx
 
Initiating a Successful Project for VoIP in 2016
Initiating a Successful Project for VoIP in 2016Initiating a Successful Project for VoIP in 2016
Initiating a Successful Project for VoIP in 2016
 
IT Intranet
IT IntranetIT Intranet
IT Intranet
 

More from TechSoup Canada

More from TechSoup Canada (18)

How Nonprofits Can Work with Online Volunteers
How Nonprofits Can Work with Online VolunteersHow Nonprofits Can Work with Online Volunteers
How Nonprofits Can Work with Online Volunteers
 
Power BI for TechSoup Canada
Power BI for TechSoup CanadaPower BI for TechSoup Canada
Power BI for TechSoup Canada
 
Google Ads 101: Increase Your Nonprofit’s Presence With $10,000 a month Of Ads
Google Ads 101: Increase Your Nonprofit’s Presence With $10,000 a month Of AdsGoogle Ads 101: Increase Your Nonprofit’s Presence With $10,000 a month Of Ads
Google Ads 101: Increase Your Nonprofit’s Presence With $10,000 a month Of Ads
 
Growth Strategies To Scale Up Your Small Nonprofit
Growth Strategies To Scale Up Your Small NonprofitGrowth Strategies To Scale Up Your Small Nonprofit
Growth Strategies To Scale Up Your Small Nonprofit
 
Ten Years of TechSoup Canada: Insights, ideas, and tips from a decade of #nptech
Ten Years of TechSoup Canada: Insights, ideas, and tips from a decade of #nptechTen Years of TechSoup Canada: Insights, ideas, and tips from a decade of #nptech
Ten Years of TechSoup Canada: Insights, ideas, and tips from a decade of #nptech
 
How to be CASL & GDPR Compliant for the New Year 2019
How to be CASL & GDPR Compliant for the New Year 2019How to be CASL & GDPR Compliant for the New Year 2019
How to be CASL & GDPR Compliant for the New Year 2019
 
Phil Downe - Avoiding Shady IT Vendors (final version)
Phil Downe - Avoiding Shady IT Vendors (final version)Phil Downe - Avoiding Shady IT Vendors (final version)
Phil Downe - Avoiding Shady IT Vendors (final version)
 
Phil Downe - Avoiding Shady IT Vendors (full)
Phil Downe - Avoiding Shady IT Vendors (full)Phil Downe - Avoiding Shady IT Vendors (full)
Phil Downe - Avoiding Shady IT Vendors (full)
 
Digital Storytelling: Understanding Social Media and Visual Storytelling Tool...
Digital Storytelling: Understanding Social Media and Visual Storytelling Tool...Digital Storytelling: Understanding Social Media and Visual Storytelling Tool...
Digital Storytelling: Understanding Social Media and Visual Storytelling Tool...
 
How To Optimize Your Year End Fundraising
How To Optimize Your Year End Fundraising How To Optimize Your Year End Fundraising
How To Optimize Your Year End Fundraising
 
Creating a Content Strategy for your Nonprofit Website
Creating a Content Strategy for your Nonprofit WebsiteCreating a Content Strategy for your Nonprofit Website
Creating a Content Strategy for your Nonprofit Website
 
Avoiding "Shady" IT Vendors: Doing Cloud-based Software Deals with Confidence
Avoiding "Shady" IT Vendors: Doing Cloud-based Software Deals with ConfidenceAvoiding "Shady" IT Vendors: Doing Cloud-based Software Deals with Confidence
Avoiding "Shady" IT Vendors: Doing Cloud-based Software Deals with Confidence
 
Strategies for Donor Retention Using Your CRM Software
Strategies for Donor Retention Using Your CRM SoftwareStrategies for Donor Retention Using Your CRM Software
Strategies for Donor Retention Using Your CRM Software
 
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
 
How your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacyHow your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacy
 
#nptech 2018: Trends, Insights, and Possibilities
#nptech 2018: Trends, Insights, and Possibilities#nptech 2018: Trends, Insights, and Possibilities
#nptech 2018: Trends, Insights, and Possibilities
 
Using QuickBooks to Audit-proof Your Nonprofit
Using QuickBooks to Audit-proof Your NonprofitUsing QuickBooks to Audit-proof Your Nonprofit
Using QuickBooks to Audit-proof Your Nonprofit
 
Finding Meaning in the Numbers: Making Data-Informed Decisions Across Your Or...
Finding Meaning in the Numbers: Making Data-Informed Decisions Across Your Or...Finding Meaning in the Numbers: Making Data-Informed Decisions Across Your Or...
Finding Meaning in the Numbers: Making Data-Informed Decisions Across Your Or...
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

How to assess your it needs and implement technology at your nonprofit

  • 1. How to Assess your IT Needs and Implement Technology at your Nonprofit Presented by Enzo Logozzo and Eric Neufeld, 365 iT Solutions March 17th, 2016
  • 2. Hi, we’re from TechSoup Canada Our mission is to help nonprofits use tech effectively
  • 3. We make technology more affordable through the Technology Donations Program Register your charity, nonprofit or library to see which products you’re eligible for: www.TechSoupCanada.ca/Getting_Started
  • 4. We create and curate tech resources facebook.com/techsoupcanada techsoupcanada.ca/blog meetup.com/toronto-net-tuesday @techsoupcanada
  • 5. 1. Close/expand GoToWebinar panel 2. Submit a question/comment via Chat 3. View and select your audio • You can hear us, but we can’t hear you! • Can’t hear? Try turning up your volume or call in • Have a question? Use the Q&A box • Recording will be available post-webinar • Please fill in the post-webinar survey! 1 3 2 Webinar Logistics
  • 6. Today’s speakers are Enzo Logozzo Director, Sales and Marketing, 365 iT SOLUTIONS • Provides managed IT services, IT outsourcing, tech support services and cloud services to non-profit organizations Eric Neufeld Senior Project Manager, 365 iT SOLUTIONS • 14 years experience in IT industry • Previously worked as a consultant with Deloitte
  • 7. Who is 365 iT SOLUTIONS?  Company founded in 2003  Based in Toronto, Ontario  100% Canadian Team  Responsible for connecting companies worldwide  We work with various nonprofits and charities  We believe in our brand, image and reputation. Better yet, we believe in our clients.  “We make IT Simple!”
  • 8. What is a Network Assessment? A network assessment provides a snapshot of the entire IT network. It creates an effective IT strategy including recommendations and pain points. The network and security assessment will cover the following: Infrastructure, Performance, Availability, Management and Security
  • 9. Step 1 = Assess Your Entire Company To get a “TRUE” picture of your entire business, you need a solid foundation to build on and you should collect the following information within a excel sheet with your management team. 1. Size? 2. Geography? 3. Business Goals? 4. New technology? 5. Pain points?
  • 10. Step 2 = Assess Your Network Assets This will show any vulnerability in your network that might be exploited by a security threat. Risks include potential consequences and vulnerabilities including loss of data, downtime and security breach. The assessment should cover the following areas:  Firewalls & Routers  Network Switches  Wireless Access Points
  • 11. Step 3 = Assess Your Server Your server manages, stores and processes your data 24x7x365. Your servers need to be reliable as it is the heart of your business and network. It is important to know your server is healthy. The assessment should cover the following areas:  Warranty?  Operating systems?  Network services?  Security updates?  Performance?  Disaster recovery?
  • 12. Step 4 = Assess Your Workstations Workstations and laptops keep your organizations running and employees productive however they also are the source of most downtime, lost productivity and security risk. The assessment should cover the following areas:  Operating systems?  Endpoint security?  Central Antivirus management?  Local administrator access?  Business software?
  • 13. Step 5 = Assess Your LOB Software LOB stands for “line-of-business” software. Every organization has one as it is needed to run you business however there are many areas the assessment should cover in respects to your LOB. The assessment should cover the following areas:  Support contract?  Hosted location?  Future proof?  Reliability and accessibility?
  • 14. Step 6 = Assess Your Policies & Procedures Do you have an Acceptable Use Policy (AUP)? Is a set of rules for the network that outlines how network can be used and sets guide lines. This will reduce the potential for legal action that may be taken by a user, and often protect the organization. Do you have an Email and Computer Monitoring policy? Monitoring workplace computer activity can protect your business. This policy will outline that the company can monitor email and/or computer activity any time. Do you have an BYOD Policy? If an employee leaves/terminated, phone must given to IT to delete email/data or phone can be remotely wiped causing complete data loss. Organization is not responsible for data lost if policy is violated.
  • 15. Step 7 = Choose the right IT Consultant Step 1 - Define objectives, timeline, and budget. Step 2 - Write a Request for Proposal (RFP) that lays out the terms of the engagement, objectives, timeline, and a budget. Step 3 – Contact IT consultants with proven industry experience and understanding of Canadian privacy laws. Step 4 – Evaluate RFP response including the following areas:  Have they addressed your business goals?  Are they delivering a well planned and documented proposal?  Are they engaged?  Do they guarantee their proposal?
  • 16. Step 8 = Do your due diligence  Do your due diligence  Take your time  Check references  Ask questions  Bring in the experts
  • 17. 365 iT SOLUTIONS Special Offer  Up to 10% discount on Lenovo server and storage  Up to 5% discount on Lenovo ThinkPad workstations, laptops and tablets  Complimentary Network Assessment  Complimentary Review of IT proposals  Up to 20% discount on MIP programs (Migration, Integration, Project Programs)