10.11.2014 Views

Founder & Editor-in-Chief - Christian Computing Magazine

Founder & Editor-in-Chief - Christian Computing Magazine

Founder & Editor-in-Chief - Christian Computing Magazine

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

very affordable, and we consider it essential on all m<strong>in</strong>istry-owned systems.<br />

• Internet Content Filter<strong>in</strong>g. For those with schools or who offer public <strong>in</strong>ternet access through<br />

wireless cafes, etc, <strong>in</strong>ternet content filter<strong>in</strong>g is a must. Aga<strong>in</strong>, we recommend SonicWALL’s solution<br />

for this. The good news is that it’s all done through the same device as access filter<strong>in</strong>g!<br />

Local Workstation Rights<br />

An area where many go beyond what’s necessary is local workstation security. We have found that<br />

an easy way to empower users is to give each user local adm<strong>in</strong>istrative authority. This does not mean<br />

they have adm<strong>in</strong>istrative authority on the network; only on their local computer. This elim<strong>in</strong>ates a<br />

large percentage of support calls and keeps users from feel<strong>in</strong>g like they’re fenced <strong>in</strong>.<br />

The potential dangers are that users might <strong>in</strong>stall someth<strong>in</strong>g they shouldn’t or that they would do<br />

someth<strong>in</strong>g that requires rebuild<strong>in</strong>g their system. Tra<strong>in</strong><strong>in</strong>g can help the first (though that risk never<br />

completely goes away), and us<strong>in</strong>g a strategy employ<strong>in</strong>g software such as Symantec’s Ghost (www.<br />

ghost.com) to build local workstations reduces the cost of the second threat.<br />

Backup, Backup, Backup!<br />

Enough can never be said for the responsibility to ensure the most critical data is backed up daily<br />

and a copy stored off-site at least weekly. This may be the network adm<strong>in</strong>istrator’s most important<br />

responsibility because it ensures the m<strong>in</strong>istry’s data will not be lost <strong>in</strong> a catastrophe.<br />

That’s our strategy! And anyone can do it! I hope it helps you and your team to do more for less,<br />

and to do it more reliably and without distraction.<br />

Nick Nicholaou is president of MBS, a consult<strong>in</strong>g firm specializ<strong>in</strong>g <strong>in</strong> m<strong>in</strong>istry computer networks, operational policies, and CPA services.<br />

You can reach Nick via email (nick@mbs<strong>in</strong>c.com) and may want to check out his firm’s website (www.mbs<strong>in</strong>c.com) and his unofficial blog<br />

at http://m<strong>in</strong>istry-it.blogspot.com.<br />

<strong>Christian</strong> Comput<strong>in</strong>g® Magaz<strong>in</strong>e<br />

August 2008 14

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!