{"id":639,"date":"2011-04-29T07:20:36","date_gmt":"2011-04-29T13:20:36","guid":{"rendered":"http:\/\/blogs.icta.net\/slty\/?page_id=639"},"modified":"2014-06-30T10:27:32","modified_gmt":"2014-06-30T16:27:32","slug":"how-it-works","status":"publish","type":"page","link":"https:\/\/blogs.icta.net\/slty\/donations\/avplan\/how-it-works\/","title":{"rendered":"AVPlan: How it works"},"content":{"rendered":"<p><strong>AVPlan: <a href=\"https:\/\/blogs.icta.net\/slty\/donations\/avplan\/\">Products<\/a> | <a href=\"https:\/\/blogs.icta.net\/slty\/donations\/avplan\/what-it-is\">What it is<\/a> | How it works | <a href=\"https:\/\/blogs.icta.net\/slty\/donations\/avplan\/how-to-help\">How to help<\/a><\/strong><\/p>\n<h2><strong>How The ICTA Community Computer Security Plan Really Works<\/strong><\/h2>\n<p>Computer security is of vital importance today. Unfortunately, many  are not technically or financially able to properly address this issue  for themselves.<\/p>\n<p>We know that many users do not have time, desire or skill to properly  address the typical antivirus &#8220;pop up&#8221; security questions, nor are they  disciplined to carefully monitor to ensure their computer protection is  always up to date.<\/p>\n<p>As part of ICTA&#8217;s <em>Safe Computing Initiative, <\/em>we have prayerfully evaluated the available Anti Virus\/ malware protection products and negotiated a way to accomplish the following goals:<\/p>\n<ul class=\"unIndentedList\">\n<li> World Class antivirus\/malware protection<\/li>\n<li> Extraordinary simplicity for the individual user, with no tech infrastructure needed<\/li>\n<li> Allow qualified tech people to handle the tech aspects<\/li>\n<li> Very low cost<\/li>\n<\/ul>\n<p>There are two simple elements to this Plan: Administrators and Software.<\/p>\n<h3>Plan Administrators<\/h3>\n<p>These volunteers, approved through ICTA staff (with available online  certification by the software vendor), provide ongoing management and  monitoring of security status for all user computers. At least once a  week, they review a set of centralized administrative reports to ensure  each user&#8217;s security is working properly.<\/p>\n<p>This has a side benefit for traveling and at-risk workers: their plan  administrator can independently verify that the user&#8217;s computer has  been online recently, and can make inquiries if it appears something  might be amiss.<\/p>\n<p>Larger organizations normally provide their Plan Administrator(s).  Qualified tech volunteers provide this service for individual users and  small organizations in various parts of the world.<\/p>\n<h3>Intel Security\/McAfee <em>SaaS Endpoint Protection<\/em><em> <\/em>(Enterprise security software)<\/h3>\n<p>These software services, upgraded to meet the needs of communities like ours, provide special capabilities such as:<\/p>\n<ul class=\"unIndentedList\">\n<li>Level one (AntiVirus and AntiSpyware) installation is a simple  one-click process on any Windows computer (including Windows servers).  (Bulk network installation is also available for organizations.)<\/li>\n<li>Solid protection from typical (Virus, spyware, malware) attacks.<\/li>\n<li> Completely automated and silent handling of most security issues.  The user is only informed when a file or email attachment must be  deleted.<\/li>\n<\/ul>\n<ul class=\"unIndentedList\">\n<li> Vendor-supplied central reporting and administration. This makes  the system incredibly easy to set up (nothing to configure at all!),  eliminates many costs, and provides additional security for at-risk  users, because administration is through a major corporation rather than  a ministry agency.<\/li>\n<\/ul>\n<ul class=\"unIndentedList\">\n<li> Supports one or thousands of users. (Large installations benefit  from zero-click &#8220;push install,&#8221; local updating, admin-controlled tuning,  and much more.)<\/li>\n<\/ul>\n<ul class=\"unIndentedList\">\n<li> 24&#215;7 emergency telephone support is available, although our Plan Administrators provide a first line of trustworthy support.<\/li>\n<\/ul>\n<p><strong>AVPlan: <a href=\"https:\/\/blogs.icta.net\/slty\/donations\/avplan\/\">Products<\/a> | <a href=\"https:\/\/blogs.icta.net\/slty\/donations\/avplan\/what-it-is\">What it is<\/a> | <a href=\"https:\/\/blogs.icta.net\/slty\/donations\/avplan\/how-it-works\">How it works<\/a> | <a href=\"https:\/\/blogs.icta.net\/slty\/donations\/avplan\/how-to-help\">How to help<\/a><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>AVPlan: Products | What it is | How it works | How to help How The ICTA Community Computer Security Plan Really Works Computer security is of vital importance today. Unfortunately, many are not technically or financially able to properly address this issue for themselves. We know that many users do not have time, desire [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":693,"menu_order":5,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"coauthors":[],"class_list":["post-639","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/blogs.icta.net\/slty\/wp-json\/wp\/v2\/pages\/639","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.icta.net\/slty\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/blogs.icta.net\/slty\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.icta.net\/slty\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.icta.net\/slty\/wp-json\/wp\/v2\/comments?post=639"}],"version-history":[{"count":15,"href":"https:\/\/blogs.icta.net\/slty\/wp-json\/wp\/v2\/pages\/639\/revisions"}],"predecessor-version":[{"id":711,"href":"https:\/\/blogs.icta.net\/slty\/wp-json\/wp\/v2\/pages\/639\/revisions\/711"}],"up":[{"embeddable":true,"href":"https:\/\/blogs.icta.net\/slty\/wp-json\/wp\/v2\/pages\/693"}],"wp:attachment":[{"href":"https:\/\/blogs.icta.net\/slty\/wp-json\/wp\/v2\/media?parent=639"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"https:\/\/blogs.icta.net\/slty\/wp-json\/wp\/v2\/coauthors?post=639"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}