4. Security Toolkit: Specific Security Topics: What to Look into and Why

Below is a selection of topics in cybersecurity to guide you in thinking about your current security practices and what to do next. Each section has some information that all staff should know, including leadership and management, as well as some more detailed information that IT staff should know.

 

The toolkit also provides some suggested solutions and some guidance on pricing. These suggestions are not exhaustive. Pricing can be very complex depending on the packages and solutions you pursue, including how they dovetail with the products you already purchase (e.g. an expensive solution might not be as expensive when it’s purchased as an add-on to an ongoing subscription you already pay for). Pricing can also vary depending on non-profit pricing and grant assistance. We’ve also included some outside general resources related to each topic.

 

Endpoint Detection and Response (EDR)

ENDPOINT DETECTION
AND RESPONSE (EDR)

MULTI-FACTOR AUTHENTICATION (MFA)
MULTI-FACTOR
AUTHENTICATION (MFA)

Backups and Securing Backups

BACKUPS AND
SECURING BACKUPS

Email Security
 

EMAIL SECURITY

DATA SHARING
 

DATA SHARING

PASSWORD MANAGEMENT
PASSWORD
MANAGEMENT

ENCRYPTION
 

ENCRYPTION

 

 

OTHER TIPS ON TECHNOLOGY SETUP

 

OTHER TIPS ON
TECHNOLOGY SETUP

 

Last updated on .

Table of Contents

    NEWS

    News & publications

    The news about recent activities for needed peoples.

    More News

    17 Dec 2024

    Megaphone with speech bubble showing the words Speakers Wanted

    Call for Speakers: Project Management, Second Chance Conference Sessions, and More

    LSNTAP is planning our training sessions for 2025 and would like to hear from…

    Continue Reading

    11 Dec 2024

    Resources for Supporting Child Victims & Witnesses Available

    Passing along this message from the Center for Justice Innovation (https://www…

    Continue Reading

    Our Partners