Upload
techsoup-canada
View
506
Download
3
Embed Size (px)
Citation preview
How to Assess your IT Needs and Implement Technologyat your NonprofitPresented by Enzo Logozzo and Eric Neufeld, 365 iT Solutions
March 17th, 2016
Hi, we’re from TechSoup Canada
Our mission is to help nonprofits use tech
effectively
We make technology more affordable through the Technology Donations Program
Register your charity, nonprofit or library to see which products you’re eligible for: www.TechSoupCanada.ca/Getting_Started
We create and curate tech resources
facebook.com/techsoupcanada
techsoupcanada.ca/blog
meetup.com/toronto-net-tuesday
@techsoupcanada
1. Close/expand GoToWebinar panel
2. Submit a question/comment via Chat
3. View and select your audio
• You can hear us, but we can’t hear you!• Can’t hear? Try turning up your volume or call in
• Have a question? Use the Q&A box
• Recording will be available post-webinar
• Please fill in the post-webinar survey!
1 3
2
Webinar Logistics
Today’s speakers are
Enzo LogozzoDirector, Sales and Marketing, 365 iT SOLUTIONS
• Provides managed IT services, IT outsourcing, tech support services and cloud services to non-profit organizations
Eric NeufeldSenior Project Manager, 365 iT SOLUTIONS
• 14 years experience in IT industry
• Previously worked as a consultant with Deloitte
Who is 365 iT SOLUTIONS?
Company founded in 2003
Based in Toronto, Ontario
100% Canadian Team
Responsible for connecting companies
worldwide
We work with various nonprofits and
charities
We believe in our brand, image and
reputation. Better yet, we believe in our
clients.
“We make IT Simple!”
What is a Network Assessment?
A network assessment provides a snapshot of the entire IT network.
It creates an effective IT strategy including recommendations and pain points.
The network and security assessment will cover the following:
Infrastructure, Performance, Availability, Managementand Security
Step 1 = Assess Your Entire Company
To get a “TRUE” picture of your entire business, you need a solid foundation to build
on and you should collect the following information within a excel sheet with your
management team.
1. Size?
2. Geography?
3. Business Goals?
4. New technology?
5. Pain points?
Step 2 = Assess Your Network Assets
This will show any vulnerability in your network that might be exploited by a security
threat. Risks include potential consequences and vulnerabilities including loss of
data, downtime and security breach.
The assessment should cover the
following areas:
Firewalls & Routers
Network Switches
Wireless Access Points
Step 3 = Assess Your Server
Your server manages, stores and processes your data 24x7x365. Your servers need
to be reliable as it is the heart of your business and network. It is important to know
your server is healthy.The assessment should cover the
following areas:
Warranty?
Operating systems?
Network services?
Security updates?
Performance?
Disaster recovery?
Step 4 = Assess Your Workstations
Workstations and laptops keep your organizations running and employees
productive however they also are the source of most downtime, lost productivity
and security risk.The assessment should cover the
following areas:
Operating systems?
Endpoint security?
Central Antivirus management?
Local administrator access?
Business software?
Step 5 = Assess Your LOB Software
LOB stands for “line-of-business” software. Every organization has one as it is
needed to run you business however there are many areas the assessment should
cover in respects to your LOB.The assessment should cover the
following areas:
Support contract?
Hosted location?
Future proof?
Reliability and accessibility?
Step 6 = Assess Your Policies & Procedures
Do you have an Acceptable Use Policy (AUP)?
Is a set of rules for the network that outlines how network can be used and sets
guide lines. This will reduce the potential for legal action that may be taken by a
user, and often protect the organization.
Do you have an Email and Computer Monitoring policy?
Monitoring workplace computer activity can protect your business. This policy will
outline that the company can monitor email and/or computer activity any time.
Do you have an BYOD Policy?
If an employee leaves/terminated, phone must given to IT to delete email/data or
phone can be remotely wiped causing complete data loss. Organization is not
responsible for data lost if policy is violated.
Step 7 = Choose the right IT Consultant
Step 1 - Define objectives, timeline, and budget.
Step 2 - Write a Request for Proposal (RFP) that lays out the terms of the engagement, objectives, timeline, and a budget.
Step 3 – Contact IT consultants with proven industry experience and understanding of Canadian privacy laws.
Step 4 – Evaluate RFP response including the following areas:
Have they addressed your business goals? Are they delivering a well planned and documented proposal? Are they engaged? Do they guarantee their proposal?
Step 8 = Do your due diligence
Do your due diligence
Take your time
Check references
Ask questions
Bring in the experts
365 iT SOLUTIONS Special Offer
Up to 10% discount on Lenovo server and storage Up to 5% discount on Lenovo ThinkPad workstations,
laptops and tablets
Complimentary Network Assessment Complimentary Review of IT proposals Up to 20% discount on MIP programs
(Migration, Integration, Project Programs)
Questions?