utm firewall

UTM Firewall: What is it and How Does it Work?

It is not news to most church staff (or almost anyone else in the developed world) that the instance and potential impact of cyber-attacks is expanding at an exponential level. Not only are churches not immune from this trend, but, with increasing regularity, they are a chosen target of this trend. This heightened cyber threat environment presents…

business continuity

Beyond Backup: Ministry Continuity

The discussion of technology security goes beyond cybercrime and hacking. It also must focus on the backup of important technology data and assets. The importance of data backup is not a new idea. Churches and other organizations have long recognized the importance of backing up their critical data. Your important church data resides in several…

email security

Email Security: The Keys to the Kingdom

You may be familiar with some version of an all too common nightmare email story. A trusted manager receives an urgent email requesting immediate action. Their superior is traveling, does not have cell service, and is unable to connect to the financial accounts or systems. An important payment to a partner, missionary, or vendor is…

employee training

Employee Security Training: Your Most Powerful Tool in the Cybersecurity Fight

Imagine that you have installed the most expensive, state-of-the-art security system available to protect your home. A technology marvel, it combines heat sensors, motion detection, hair-trigger alarms, sophisticated locks, intrusion barriers—the whole works. It is a system capable of frustrating and bewildering the most seasoned criminal. But such a system can actually be defeated quite…