With the growing threats that we face today, ensuring the security and efficiency of IT systems is crucial for any organization. These are an essential part of any organization.

As an IT professional working with dozens of nonprofits each year, I’ve seen firsthand that what we don’t know is often what hurts us the most. Too often, nonprofits assume they aren’t targets—but the reality is, we are!

Adopting best practices is just as crucial for nonprofits as it is for any other organization. If you lack essential security policies, it’s not a matter of if you’ll fall victim—it’s a matter of when. And when that happens, your digital environment could come to a standstill until the threat is neutralized.

Ask yourself:

  • Who does this affect?
  • Is our money secure?
  • Has our data been breached?

Even if hackers gain access to just names and phone numbers, that alone can be a gold mine for them. They can use scare tactics via email and phone to shift their focus from your organization to your staff, clients, and donors.

The truth is, nonprofits have been and continue to be targets.

That’s why NEW’s IT Managed Services team works diligently to provide a wide range of IT strategies, including Microsoft and Google solutions, robust backups, strong security measures, dedicated client support, and high-quality service for organizations supporting vulnerable populations. Our goal is to give nonprofit leaders peace of mind so they can focus on the critical work they do. We provide our clients with templates on suggested IT policies to implement.  In addition, we provide for our clients the following services to take some of the burden of IT off their plates.

What good IT Policies and Procedures can provide your organization:

  • Provide a roadmap for day-to-day operations.
  • Ensure compliance with laws and regulations.
  • Guidance for decision making
  • Operational consistency.
  • Guidelines for the use of informational technology within an organization.
  • Actions that are consistent, effective, and efficient.
  • Combat security threats.
  • Preventing system failures.

Microsoft Solutions

Microsoft 365

We utilize Microsoft 365 for some client workspaces, providing access to essential applications like OneDrive, SharePoint, Outlook, Excel, Word, and PowerPoint.

Azure and Entra

Azure and Entra are used for identity and network access management, allowing seamless user access to Windows devices. Our administrators ensure that client devices are properly connected to these networks. This setup provides:

  • Secure and encrypted file storage
  • Easy device reassignment for new employees
  • Strict access control, disabling former employees’ accounts and revoking active sessions

OneDrive

OneDrive serves as a personal workspace for staff members to store drafts, organizational materials, and other documents. Once configured by our administrators, a user’s Desktop, Documents, and Pictures folders are backed up to OneDrive.

SharePoint

SharePoint is utilized for company-wide data storage and sharing, providing:

  • Enhanced security and folder permissions
  • Version control for document changes
  • Real-time co-authoring for collaboration
  • Encrypted file storage and powerful search capabilities
  • Sites for communication and announcements

Additionally, Microsoft backs up OneDrive and SharePoint files for 30 days. We supplement this with incremental backups for extended data protection by AFI. This is explained further below.

Google Solutions

Google Drive

Google Drive allows staff members to store individual work files securely. Once configured, their Desktop, Documents, and Pictures folders backup to Google Drive.

Google Drive Shared

Company data is stored in Google Drive’s shared folders, which offer:

  • Advanced security and folder permissions
  • Seamless document collaboration
  • User control for specific access permissions
  • Syncing shared folders with Windows File Explorer

Additionally, Google backs up files for 30 days. We supplement this with incremental backups for extended data protection by AFI.

Monitoring and consistent Updates:

NEW utilizes Ninja One for monitoring and updating devices, as well as allowing us to remotely administer devices. 

Backup Solutions

We use AFI to provide daily backups for cloud services.

We use CrashPlan for server and virtual machine data backups.

Security and Protection

We have partnered with Judy Security to offer a robust cybersecurity suite, covering endpoint resiliency, identity access, compliance, and threat detection across all devices. Judy Security also includes Ninjio Cybersecurity Training, educating users on how to recognize and avoid cyber threats. Apart from that, Judy Security offers clients an AI-powered email security solution by E-Purifier.

Multi-Factor Authentication (MFA)

MFA is implemented across all accounts to protect against unauthorized access. Even if a hacker obtains a password, they cannot gain entry without the associated phone or authenticator app-generated code.

By continuously evaluating and refining our IT strategies, we ensure that organizations receive top-tier protection and operational efficiency. Our IT policies at NEW prioritize security, accessibility, and proactive management to keep our clients’ technological environments safe and optimized.

Interested in having a conversation about how NEW can protect and support your organization’s sensitive and essential information? Get in touch with us here!