All Resources


MFA (Multi-Factor Authentication) - Why, How?

April 11, 2025

Check out this downloadable presentation on MFA (2FA)


Housing Central 2024 - Technology and Cybersecurity Risk

November 27, 2024

Here you will find a downloadable PDF of the 2024 Housing Central Technology and Cybersecurity Risk presentation by BC Housing VP of IM&T, Mike Klein


Housing Central 2024 - Generative AI

November 19, 2024

Here you will find a downloadable PDF of the 2024 Housing Central Generative AI session presented by BC Housing VP of IM&T, Mike Klein


Uptick in BEC (Business Email Compromise) Fraud

June 13, 2024

Business Email Compromise (BEC) is a sophisticated scam targeting organizations by attacking legitimate business email accounts to conduct unauthorized fund transfers.


IT Strategic Plan Template

January 28, 2024

Use this simple template to do an IT Strategic Plan for your organization.


RFP Templates

January 22, 2024

Use the following templates to create a Request for Proposal


Nonprofit Strategic Technology Planning Guide

January 8, 2024

A step by step guide to help nonprofit organizations get more from their technology


Technology Policy Templates

December 20, 2023

These are policy templates for an AUP, Information Management, CIRP, and Information Security Classification, by IronSpear.


Implementing Change Management Practices

November 17, 2023

In collaboration with BC Housing's Change Management team, we have put together the following resources to get you and your organization familiar with Change Management Practices!


Microsoft: Check out these quick How-to guides for MS Apps!

November 14, 2023

Finding it difficult to navigate Microsoft Apps? Check out the below How-to Guides to strengthen your Microsoft knowledge!


6 Items to Include in an IT Assessment

September 12, 2023

Add these 6 important items to your IT assessment checklist to stay one step ahead.


Housing Central Conference 2022

December 13, 2022

IT Strategic Planning


Housing Central 2022 Privacy Breaches

December 13, 2022

Privacy Breaches: Best Practices and Lessons Learned


GMAIL Security Procedures

December 13, 2022

Protecting your Google account is essential since you share all kinds of data through the site.


Apple iOS Security Advisory

August 23, 2022

Apple has disclosed serious security vulnerabilities for iPhones, iPads and Macs that could potentially allow attackers to take complete control of these devices.