ManagementSpeak: I’ll get back to you after I can access my database.
Translation: I’m too lazy to pull out my smartphone and check my cloud.
And thanks to this week’s anonymous contributor, who’s got his head in the sky.
ManagementSpeak: I’ll get back to you after I can access my database.
Translation: I’m too lazy to pull out my smartphone and check my cloud.
And thanks to this week’s anonymous contributor, who’s got his head in the sky.
Dear Bob …
I’m the first line of defense when it comes to information technology here, here being a 30-person non-profit. I know you normally advise companies a hundred times our size or bigger, but I’m still hoping you can help me out.
What I’m looking for are … I know, not best practices, I’ve been paying attention … but some tested, reliable practices I can put into place here to keep the joint running, to coin a phrase.
Any suggestions?
– Stretched thin
Stretch …
Not a comprehensive list by any means. These should get you started:
Impress on everyone that being smaller, or an organization that does good works won’t help a bit if there’s an audit. And besides, for many software categories non-profits qualify for very large discounts, so if someone needs a piece of software there’s rarely even a financial case for using an illegitimate copy of something.
Yes, everyone will complain. Empathize, but hold your ground.
And while you’re talking to everyone about passwords, you might as well suggest they have a few different ones for different types of on-line life. The experts say they’re supposed to have a different password for every website they log into, but since that isn’t going to happen, having (for example) one for financial sites, a second for social media and a third for news will provide at least a layer of additional protection.
Phishing attacks are the single most common way passwords are stolen, so this is critical.
And don’t be shy. Most people like to learn a few things so they feel more sophisticated about a topic, so long as you don’t overdo it.
So show them how to find out what’s in a link, and how to spot a URL that looks legitimate but isn’t (example: www.yourbankname.phonyphisher.com/lotsanonsensetohidethings).
They’ll feel good about knowing a bit more, and you’ll be a bit safer.
In particular (and I’m carrying a grudge here), if a site offering free software tries to install a downloader first “to make installing software more convenient,” never (sorry, NEVER) trust that site. It’s easy to get fooled, by the way. I ended up with Mezaa a couple of months ago by missing that this was happening. It’s a nasty piece of malware I ended up with just by trying to upgrade a program I’d been using for some time.
Mezaa is what you might call flashmob software: When it comes in it immediately invites all of its friends to join it.
Don’t get me wrong. I’ve downloaded and used plenty of free software over the years that I’ve found immensely valuable and helpful. What you’re trying to do is to help everyone tell the difference between safe and unsafe free.
MS Office has this as a built-in option; everyone should learn how to use it. Or, most jump drives now come with on-board encryption — all you have to do is enable it.
One complicating factor is that some countries have made it illegal to bring encrypted files through customs. Travelers should check the rules.
That’s what occurs to me. KJR subscribers … what did I miss?