1 minute read

Technology & Training

By Zeb Worth

Information Systems is responsible for the technology used in the daily operations of the Texas Conference office. We supply and manage the computers used by all department directors, associates and staff. We install, manage and maintain the computer network devices to allow and restrict access as necessary for security. We negotiate with service providers and suppliers for telecommunications services and equipment (i.e., internet service, phone service, hosting, management, computers, servers, switches and phones).

In addition to the office staff, we manage and supply all Texas Conference employees with Microsoft 365 email accounts. For business continuity, we manage, maintain, secure and back up all files generated by Texas Conference office employees. Since people are our greatest security asset, we manage ongoing security awareness training for all Texas Conference employees who have access to the Texas Conference office network.

Throughout the past four years, we implemented in-depth, encrypted, redundant, and offline backups for files and virtual machines. We have implemented multifactor authentication for any remote network access for file access security. We have contracted with a third party for network security to manage, monitor and secure external network access. For user sanity and happiness in case of accidents, we started keeping backup copies of all files every 30 minutes during the workday.

Our goal is to continually improve the services we support, while being vigilant to conserve the resources we are given for accomplishing these tasks.