Skip to content
Snippets Groups Projects
Commit 836c58d0 authored by Nate Haug's avatar Nate Haug
Browse files

Clarify "powered" as being CPU-power, not battery power.

parent 115a090e
No related branches found
No related tags found
No related merge requests found
......@@ -24,8 +24,8 @@ This checklist contains baseline, ongoing information systems and technology pra
:heavy_check_mark:     **Have a recurrent line item for technology in your budget**
*Security is an ongoing process and will require ongoing investments in computer equipment and software to be effective. Work with your technical support provider to determine an appropriate amount to put into this line item.*
:heavy_check_mark:     **Provide relatively new and adequately powered computers to all staff**
*Industry standard best practice is to replace laptops and desktops every 3 to 5 years. Encryption tools use a lot of power and can bring older, inadequately powered computers to a near halt, making some security steps untenable for staff. Money for replacing 1/3 to 1/5 of your computers each year should be part of your recurring technology budgeting.*
:heavy_check_mark:     **Provide relatively new and adequately powerful computers to all staff**
*Industry standard best practice is to replace laptops and desktops every 3 to 5 years. Encryption tools use a lot of CPU cycles and can bring older, less-powerful computers to a near halt, making some security steps untenable for staff. Money for replacing 1/3 to 1/5 of your computers each year should be part of your recurring technology budgeting.*
:heavy_check_mark:     **Have some baseline non-technical security practices**
*If you do not control your office space and access to your computers, your other digital security steps can be easily circumvented by walking into your office. Rotate alarm system codes, door codes, wireless network passwords and other sensitive access procedures such as emergency building access when staff leave the organization.*
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment