Churches may be easy targets for data theft. In a recent Church Executive article, author David A. Jones noted, “Frugal budgeting and limited resources in technological intelligence inherent with religious organizations often lead to weak security controls. The risk of losing data is high, given the scope of programs happening at all hours on and off campus.”
Not long ago, a locked file cabinet was all the data security a church needed. Now, it’s a different world. In April 2012, Robert Mueller III, director of the FBI, reported to The New York Times, “Cyber attacks [will] soon replace terrorism as the agency’s No. 1 concern.”
Is your church vulnerable to a cyber-attack? Take our quiz “Is Our Church Computer Safe?” to find out. Further training on this important topic is only a click away with Church Computer Safety, Preventing High-Tech Fraud, and Best Practices for Technology Usage.
Is Our Church Computer Secure?
If you answer “no” to any of these questions, consider those the areas your church needs to improve.
1 |
Have you designated a church computer supervisor to oversee software, hardware, and usage? |
|
|
2 |
Do you have written policies outlining computer usage? |
|
|
3 |
Are employees and volunteers required to sign off that they have read and understand the policies? |
|
|
4 |
Is there a clear process on what equipment may and may not be used (e.g. personal computers, laptops, printers, etc.) and how the equipment may be used? |
|
|
5 |
Has there been money budgeted for software and hardware upgrades and maintenance? |
|
|
6 |
Is there a clearly defined policy on what files may be accessed, what sites are restricted, use of e-mail, and which software may be accessed? |
|
|
7 |
Does the administrator or technical person have access to all church-owned computers? |
|
|
8 |
Have spyware and anti-virus software been installed on all computers? |
|
|
9 |
Is there a method for backing up data on a regular basis to prevent a crash and loss of data? |
|
|
10 |
Are passwords assigned to every person that has access to computers? |
|
|
11 |
Are there clear guidelines as to what consequences there are for violating the church computer usage policies? |
|
|
12 |
Is all equipment physically secured to prevent theft? |
|
|
13 |
Is all computer equipment listed and covered on the church’s insurance policy, and is new equipment added when purchased? |
|
|
Click “Submit” to see your results. |
Related