content filtering

Content & DNS Filtering: A Preventative Approach

While not always understood as such, content filtering is a critical security component of technology environments in churches, ministries, schools, and almost every other organization as well. While your church has probably implemented some content filtering by now, you may not understand the breadth of security benefits it can provide.   What is Content Filtering,…

secure wi-fi

Secure Wi-Fi for Churches: A Necessity, Not A Luxury

The Expectation: Robust, “All-the-time” Internet Access Today, people have an expectation of always-on connectivity and anytime access to Internet resources for information, banking, shopping, research, entertainment, social interaction, reading, communicating and so much more. They can get angry and frustrated when they cannot get online—even when flying in an airplane or traveling in fairly remote…

IT budget

How do I Create an IT Budget for my Church?

Technology as a Ministry Enabler Today, technology assumes a prominent place in the work of ministry. Education, communication, collaboration, evangelism, discipleship, training, operations, financial management, events, human resource management, compliance, and many other areas are all supported by technology. A myriad of hardware, software, technology processes, equipment, applications, and other options exist to help church…

church cyber insurance

Does My Church Need Cyber Liability Insurance?

An All-Too Common Scenario At this point in 2019, the scenario is becoming all too familiar. Cybercriminals use social engineering to bypass technology safeguards and security protection to infiltrate email systems, bank accounts, credit card accounts, member databases, and other areas containing sensitive data. The criminals then utilize the data to steal money and identities, create…

disk encryption

Disk Encryption: Preventing Unauthorized Access to your Data

In other posts covering the security of your church’s information technology infrastructure, we have covered topics such as multi-factor authentication, UTM firewalls, email security practices, password management, security training, and the implementation of documented security policies. Even if all of these policies are observed conscientiously, there are still opportunities for cybercriminals to wreak havoc on…