4. Security Toolkit: Specific Security Topics: What to Look into and Why

Below is a selection of topics in cybersecurity to guide you in thinking about your current security practices and what to do next. Each section has some information that all staff should know, including leadership and management, as well as some more detailed information that IT staff should know.

 

The toolkit also provides some suggested solutions and some guidance on pricing. These suggestions are not exhaustive. Pricing can be very complex depending on the packages and solutions you pursue, including how they dovetail with the products you already purchase (e.g. an expensive solution might not be as expensive when it’s purchased as an add-on to an ongoing subscription you already pay for). Pricing can also vary depending on non-profit pricing and grant assistance. We’ve also included some outside general resources related to each topic.

 

Endpoint Detection and Response (EDR)

ENDPOINT DETECTION
AND RESPONSE (EDR)

MULTI-FACTOR AUTHENTICATION (MFA)
MULTI-FACTOR
AUTHENTICATION (MFA)

Backups and Securing Backups

BACKUPS AND
SECURING BACKUPS

Email Security
 

EMAIL SECURITY

DATA SHARING
 

DATA SHARING

PASSWORD MANAGEMENT
PASSWORD
MANAGEMENT

ENCRYPTION
 

ENCRYPTION

 

 

OTHER TIPS ON TECHNOLOGY SETUP

 

OTHER TIPS ON
TECHNOLOGY SETUP

 

Last updated on .

Table of Contents

    NEWS

    News & publications

    The news about recent activities for needed peoples.

    More News

    10 Oct 2024

    LSNTAP Announces Access to Comprehensive Technology Initiative Grants Database

    Ypsilanti, MI – October 10, 2024 – Legal Services National Technology…

    Continue Reading

    18 Jul 2024

    Blue file cabinet drawers are shown with some drawers open with colorful file folders inside

    LSNTAP Launches a New Resource for the Community: the RFP Library

    Over the last two years, LSNTAP staff has pored over the listserv archive to…

    Continue Reading

    Our Partners