Jonathan Smith

Jonathan Smith is the Director of Technology at Faith Ministries in Lafayette, IN and the President of MBS, Inc. He is an author and frequent conference speaker. You can reach Jonathan at jsmith@faithlafayette.org and follow him on Twitter @JonathanESmith.

Do Not Disturb Setting – The Surprising Secret To Sanity

Over the past few months I’ve tried a little experiment to limit interruptions and distractions. I keep my phone on the Do Not Disturb setting DND all the time. Wait! What? That’s madness! How do you survive?

AI Policy for Churches and Ministries

It would be wise for churches and ministries to address the appropriate use of AI and at minimum understand who owns the information being put into and generated out of these language models. Every church needs an AI policy.

Lessons Learned Fron the LastPass Hack

Using a password manager is important and the LastPass hack reinforces the need to use a password manager properly, both individually and corporately. 

The Human Firewall: Our Only Hope

In war against nefarious uses of the Internet, the human firewall is our only hope. The fate of the Republic is in your hands, literally, in your index finger. What, you think this language is too exalted?

Please: Protect Your Mac!

The myth that Macs don’t need protected continues to live and the bad guys know it. So you must protect your Mac.

How to Use ChMS Without Turning it Into BigBrother Software

ChMS shouldn't be the ministry version of bigbrother software. The goal here is not to spy on anyone or violate anyone’s privacy. The goal is to have data accessible to show people that the ministry cares.

Tech Policies are Cyber Security, Too: Do You Have Any?

How do we provide maximum Kingdom impact while also being good stewards of the data God has entrusted to us? One overlooked aspect of church tech using wise tech policies and procedures.

Human Error: the Security Trick That Breached LastPass

LastPass was compromised because a software engineer fell for a security trick that tricked him into giving access to his personal computer to the bad actor.

Join our community of SUBSCRIBERS and be part of the conversation.

To subscribe, simply enter your email address on our website or click the subscribe button below. Don't worry, we respect your privacy and won't spam your inbox. Your information is safe with us.