dark web

Dark Web Research: Is Your Personal Data Safe?

These days it seems we can’t go even one week without hearing about another data breach or leak of our personal information. And all too often, these data dumps include very personal information as well as our email addresses, usernames, and even our passwords. But how do IT security researchers find out about these breaches and recapture the data that has been stolen? They…

content filtering

Content & DNS Filtering: A Preventative Approach

While not always understood as such, content filtering is a critical security component of technology environments in churches, ministries, schools, and almost every other organization as well. While your church has probably implemented some content filtering by now, you may not understand the breadth of security benefits it can provide.   What is Content Filtering,…

secure wi-fi

Secure Wi-Fi for Churches: A Necessity, Not A Luxury

The Expectation: Robust, “All-the-time” Internet Access Today, people have an expectation of always-on connectivity and anytime access to Internet resources for information, banking, shopping, research, entertainment, social interaction, reading, communicating and so much more. They can get angry and frustrated when they cannot get online—even when flying in an airplane or traveling in fairly remote…

disk encryption

Disk Encryption: Preventing Unauthorized Access to your Data

In other posts covering the security of your church’s information technology infrastructure, we have covered topics such as multi-factor authentication, UTM firewalls, email security practices, password management, security training, and the implementation of documented security policies. Even if all of these policies are observed conscientiously, there are still opportunities for cybercriminals to wreak havoc on…

utm firewall

UTM Firewall: What is it and How Does it Work?

It is not news to most church staff (or almost anyone else in the developed world) that the instance and potential impact of cyber-attacks is expanding at an exponential level. Not only are churches not immune from this trend, but, with increasing regularity, they are a chosen target of this trend. This heightened cyber threat environment presents…

business continuity

Beyond Backup: Ministry Continuity

The discussion of technology security goes beyond cybercrime and hacking. It also must focus on the backup of important technology data and assets. The importance of data backup is not a new idea. Churches and other organizations have long recognized the importance of backing up their critical data. Your important church data resides in several…

email security

Email Security: The Keys to the Kingdom

You may be familiar with some version of an all too common nightmare email story. A trusted manager receives an urgent email requesting immediate action. Their superior is traveling, does not have cell service, and is unable to connect to the financial accounts or systems. An important payment to a partner, missionary, or vendor is…