SlideShare ist ein Scribd-Unternehmen logo
1 von 50
PC Safety and Security Manual
         A Summary
        © 2007 Rob Clement
         all rights reserved
        www.boysbach.com

              with thanks to
         www.powerbacks.com
           for the background
Introduction

Beware you can lose your data sooner
than you think.

One lightning strike could be a catastrophe
for you.

A computer is “cheap” and easily replaced.
The information may be irreplaceable.
What if I lost my computer -
          permanently?

Challenge:

   Switch off your computer/s for a day.
   Keep the machine turned off
   See what you need to have right now.
   How much is that information worth?
What if I lost my computer -
        permanently? II


Options are to use the Internet at
Cyber cafe or library.

What if you had your PC stolen or it
was destroyed?
Keep Your Computer Safe.


Place your computer in a secure place.

Check out your security video.

Avoid high-visibility locations.
Keep Your Computer Safe. II


Is your power supply safe?

Consider         Surge protection
                 Battery backup
                 Generator
Keep Your Computer Safe. III


Drinks and floods

      Get a new keyboard don't fix it
      Portables and liquids do not mix.
      Keep your desktop off the floor.
Keep Your Computer Safe. IV



Cleaning sprays can be deadly

Fires and explosions happen
       keep your computer data safe.
Traveling With Your Portable

Backup data twice before traveling.
   One backup with you
   One backup leave behind

Don't lose it

Don't have it stolen.
Protect Your Passwords.


If you use a computer
     at the coffee shop or Cyber cafe

   Log off e-mail at the end.
   Log off your bank account at the end.
Protect Your Passwords. II



Protect your bank and personal details

Your use of a computer at a Cyber cafe or
coffee shop could be being monitored.
Backup Options and Priorities


Backups are essential.

Backup to magnetic tape is best.
   DVD or CD R/W discs otherwise

Check your backup from time to time.
Backup Options and Priorities II


Backup
   Documents (My Document before Vista)
   E-mails
   other software's data
       (e.g. The accounts package.)
Backup Options and Priorities III

Keep optical discs away from heat or light.
Replace optical discs if they show problem.
Keep backup away from computer.

Check the warranty on a fireproof safe.

Make a decision do not leave to chance.
Backup Options and Priorities IV


Keep original software discs safely.

Backup any software you downloaded.

Always rotate a number of copies of the
backup.
Magnets


Why are magnets so dangerous to
computers?

Answer To wipe your data from a floppy disc
or hard drive use fixed magnet. It can never
be recovered.
Computer Operating System
    and Software Discs


Collect the boot and recovery discs for
your PC
Put them in a CD holder
If you use a portable take them with
you when traveling.
Your PDA Is “Part” Of Your
         Computer.

Do not forget your PDA.
   It is always in danger of damage or loss.
   Copy all the data onto your PC often.

Do not forget to back up your telephone
numbers
Simple Settings on Your
           Computer


Apply updates to your computer system

Turn on your firewall.
   Include Vista Windows Defender.
Simple Settings on Your
         Computer II
Set browser to maximum security.
Consider an alternative browser

Install software protection
    Anti-virus
    Internet Security
Evaluate the choices not just the prices
Simple Settings on Your
         Computer III

Do not open unknown e-mail attachments.

Do not run programs, you do not know
where they came from.

Disconnect from the Internet when not
using it.
Simple Settings on Your
         Computer IV


Think about where to locate physical
firewalls

Turn off your computer when not in use
Spam Is Coming.

What is Spam?
  Unwanted or junk e-mail.
  Beware of becoming a spammer.

Check your spam folder often or miss
important mail.
Spam Is Coming. II

Do not release your e-mail address to
the Internet.

Use spam blocking software.
Use multiple e-mail addresses

Get an e-mail provider who will stop
spam.
Adware, Spyware and Malware
What is the difference between adware,
spyware and malware?

Spyware is software that enables an
individual or company to see what web
sites you are accessing, search your
hard disc for “useful information” and
also what your account numbers and
passwords are.
Adware, Spyware and Malware II


Adware on the other hand will display
adverts for various types of products
and services available on the Internet.
Adware is annoying; spyware can be
catastrophic to your computer and to
you.
Adware, Spyware and Malware III

Malware is spyware in its worst forms,
where in the end the malware will give
all of your computer information to a
third party, mess up your web browser
settings and your Internet sites and
prevent you from using your computer
as it runs so slowly.
Phishing and Identity Theft

Phishing and identity theft is big
business.

Ever received an e-mail from a
reputable business or bank?
Are they real? No they are Phishing for
bank or credit card info?
Phishing and Identity Theft II

Identity theft someone steals your ID
and passwords and then pretend to be
you, stealing money and arranging
bank loans.

Ask for personal advice for software to
combat this
Computer Virus or a Cold
A computer virus is a program
    (or a script)
   it causes worry to the user
   or harm to the computer
   or both

Computer virus detection is big
business.
       Beware of special days like
Friday 13th, 9/11 etc
Computer Virus or a Cold II

Always have anti-virus updates paid for.
Always update your anti-virus

A Trojan horse appears harmless or even
helpful
   but it is harmful and may be deadly.
Computer Virus or a Cold III



Switch the Firewall on now.

To access the Internet without anti-
virus etc is playing Russian Roulette
Computer Virus or a Cold IV


Use the free service offered by
Symantec or Kaspersky to check your
computer.

Shop around and ask for advice.
Online Scams


Do not trust everyone on the Internet.

   You cannot see their faces

   You cannot see their body language.
Online Scams II

If someone appears too good to be true
they probably are.

   They may appear a novice.

   They may appear an expert.

   They may appear to be average.
Online Scams III
Do not give out your personal details

   Not your home address

   Not your date of birth

   Not your bank details

   Not your credit card details
Online Scams IV
Check their ISP to see where they are.

   Check   business address
   Check   website pictures
   Check   company registration
   Check   list of directors

   Before accepting any proposal

   ALL THIS IS DUE DILIGENCE
Disaster recovery.


Disaster recovery is mainly for businesses
   Includes non-profit organizations
   Includes clubs
        and special interest groups.

How do we define a disaster?
How do we recover from it?
Disaster recovery II.


 Disaster


A disaster is an event that means you
cannot continue to run your business
and need to recover.
Disaster recovery III.


We take a disaster audit.

   List of computers and their software.
   What would happen if any of these
       computers failed?
   What information would you lose?
   What correspondence would you lose?
Disaster recovery IV.


How long from the loss of that
computer would the replacement be
working with all the information that
you have on it today up to date (and
that does not allow for any information
waiting to be input)

Document all this in one place.
Disaster recovery V.


List all the computers you use that if
they failed today you could roll in a new
computer onto the desk and within an
hour or two everything would be fine.
Disaster recovery VI.
Now the hard part!
One or more computers that are vital to
your operation that you need to have
available now.
Define how many hours a week they
need to be available (24x7 or business
hours seven days a week or business
hours Monday to Friday.)
Document how long your business can
do without that computer before it hits
problems.
Disaster recovery V.



Finally    in your disaster audit
    list   all telephones
    list   Fax machines
    list   modems
    list   routers and their connections
Disaster recovery VI.


Decision time
Do you have too many eggs in one basket?
Do you need to spread the computer load?
Do you need a computer to mirror another?

Back up every computer in your business
                now!
Disaster recovery VII.
 Recovery
The decisions need to made and written
down then make a plan.

Get someone as an IT resource even if
only for a disaster

Do you have a support contract for
your computers?
    Get support you cannot recover a
disaster single handed.
Disaster recovery VIII.
Define your disaster and get a feel for
timescales and prices.

Balance between the costs of
immediate recovery and 2 to 3 days of
downtime before all services are
resumed.

Draw up of a network diagram for the
current systems and computers. Keep
this up to date.
Disaster recovery IX.


Keep multiple copies of the disaster
recovery plan so everyone knows what
to and who to contact.

Review and update the plan at least
every year.
Conclusion


Protect your computer.
Secure your computer.
Protect from virus, spam, spyware,
adware, and malware.
Make back up so you never lose data.
Make a plan for a disaster.
PC Safety and Security


         The end of the Book

The start of protecting your computer.

         www.boysbach.com
 for copies of the complete manual.

Weitere Àhnliche Inhalte

KĂŒrzlich hochgeladen

Business Model Canvas (BMC)- A new venture concept
Business Model Canvas (BMC)-  A new venture conceptBusiness Model Canvas (BMC)-  A new venture concept
Business Model Canvas (BMC)- A new venture conceptP&CO
 
Chandigarh Escorts Service 📞8868886958📞 JustđŸ“Č Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 JustđŸ“Č Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 JustđŸ“Č Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 JustđŸ“Č Call Nihal Chandigarh Call Girl...Sheetaleventcompany
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangaloreamitlee9823
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...amitlee9823
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentationuneakwhite
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfAdmir Softic
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptxnandhinijagan9867
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableSeo
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...amitlee9823
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
Falcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in indiaFalcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in indiaFalcon Invoice Discounting
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityEric T. Tung
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperityhemanthkumar470700
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756dollysharma2066
 

KĂŒrzlich hochgeladen (20)

Business Model Canvas (BMC)- A new venture concept
Business Model Canvas (BMC)-  A new venture conceptBusiness Model Canvas (BMC)-  A new venture concept
Business Model Canvas (BMC)- A new venture concept
 
Chandigarh Escorts Service 📞8868886958📞 JustđŸ“Č Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 JustđŸ“Č Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 JustđŸ“Č Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 JustđŸ“Č Call Nihal Chandigarh Call Girl...
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Falcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in indiaFalcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in india
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperity
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 

Empfohlen

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by HubspotMarius Sescu
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data ScienceChristy Abraham Joy
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 

Empfohlen (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

PC Safety & Security

  • 1. PC Safety and Security Manual A Summary © 2007 Rob Clement all rights reserved www.boysbach.com with thanks to www.powerbacks.com for the background
  • 2. Introduction Beware you can lose your data sooner than you think. One lightning strike could be a catastrophe for you. A computer is “cheap” and easily replaced. The information may be irreplaceable.
  • 3. What if I lost my computer - permanently? Challenge: Switch off your computer/s for a day. Keep the machine turned off See what you need to have right now. How much is that information worth?
  • 4. What if I lost my computer - permanently? II Options are to use the Internet at Cyber cafe or library. What if you had your PC stolen or it was destroyed?
  • 5. Keep Your Computer Safe. Place your computer in a secure place. Check out your security video. Avoid high-visibility locations.
  • 6. Keep Your Computer Safe. II Is your power supply safe? Consider Surge protection Battery backup Generator
  • 7. Keep Your Computer Safe. III Drinks and floods Get a new keyboard don't fix it Portables and liquids do not mix. Keep your desktop off the floor.
  • 8. Keep Your Computer Safe. IV Cleaning sprays can be deadly Fires and explosions happen keep your computer data safe.
  • 9. Traveling With Your Portable Backup data twice before traveling. One backup with you One backup leave behind Don't lose it Don't have it stolen.
  • 10. Protect Your Passwords. If you use a computer at the coffee shop or Cyber cafe Log off e-mail at the end. Log off your bank account at the end.
  • 11. Protect Your Passwords. II Protect your bank and personal details Your use of a computer at a Cyber cafe or coffee shop could be being monitored.
  • 12. Backup Options and Priorities Backups are essential. Backup to magnetic tape is best. DVD or CD R/W discs otherwise Check your backup from time to time.
  • 13. Backup Options and Priorities II Backup Documents (My Document before Vista) E-mails other software's data (e.g. The accounts package.)
  • 14. Backup Options and Priorities III Keep optical discs away from heat or light. Replace optical discs if they show problem. Keep backup away from computer. Check the warranty on a fireproof safe. Make a decision do not leave to chance.
  • 15. Backup Options and Priorities IV Keep original software discs safely. Backup any software you downloaded. Always rotate a number of copies of the backup.
  • 16. Magnets Why are magnets so dangerous to computers? Answer To wipe your data from a floppy disc or hard drive use fixed magnet. It can never be recovered.
  • 17. Computer Operating System and Software Discs Collect the boot and recovery discs for your PC Put them in a CD holder If you use a portable take them with you when traveling.
  • 18. Your PDA Is “Part” Of Your Computer. Do not forget your PDA. It is always in danger of damage or loss. Copy all the data onto your PC often. Do not forget to back up your telephone numbers
  • 19. Simple Settings on Your Computer Apply updates to your computer system Turn on your firewall. Include Vista Windows Defender.
  • 20. Simple Settings on Your Computer II Set browser to maximum security. Consider an alternative browser Install software protection Anti-virus Internet Security Evaluate the choices not just the prices
  • 21. Simple Settings on Your Computer III Do not open unknown e-mail attachments. Do not run programs, you do not know where they came from. Disconnect from the Internet when not using it.
  • 22. Simple Settings on Your Computer IV Think about where to locate physical firewalls Turn off your computer when not in use
  • 23. Spam Is Coming. What is Spam? Unwanted or junk e-mail. Beware of becoming a spammer. Check your spam folder often or miss important mail.
  • 24. Spam Is Coming. II Do not release your e-mail address to the Internet. Use spam blocking software. Use multiple e-mail addresses Get an e-mail provider who will stop spam.
  • 25. Adware, Spyware and Malware What is the difference between adware, spyware and malware? Spyware is software that enables an individual or company to see what web sites you are accessing, search your hard disc for “useful information” and also what your account numbers and passwords are.
  • 26. Adware, Spyware and Malware II Adware on the other hand will display adverts for various types of products and services available on the Internet. Adware is annoying; spyware can be catastrophic to your computer and to you.
  • 27. Adware, Spyware and Malware III Malware is spyware in its worst forms, where in the end the malware will give all of your computer information to a third party, mess up your web browser settings and your Internet sites and prevent you from using your computer as it runs so slowly.
  • 28. Phishing and Identity Theft Phishing and identity theft is big business. Ever received an e-mail from a reputable business or bank? Are they real? No they are Phishing for bank or credit card info?
  • 29. Phishing and Identity Theft II Identity theft someone steals your ID and passwords and then pretend to be you, stealing money and arranging bank loans. Ask for personal advice for software to combat this
  • 30. Computer Virus or a Cold A computer virus is a program (or a script) it causes worry to the user or harm to the computer or both Computer virus detection is big business. Beware of special days like Friday 13th, 9/11 etc
  • 31. Computer Virus or a Cold II Always have anti-virus updates paid for. Always update your anti-virus A Trojan horse appears harmless or even helpful but it is harmful and may be deadly.
  • 32. Computer Virus or a Cold III Switch the Firewall on now. To access the Internet without anti- virus etc is playing Russian Roulette
  • 33. Computer Virus or a Cold IV Use the free service offered by Symantec or Kaspersky to check your computer. Shop around and ask for advice.
  • 34. Online Scams Do not trust everyone on the Internet. You cannot see their faces You cannot see their body language.
  • 35. Online Scams II If someone appears too good to be true they probably are. They may appear a novice. They may appear an expert. They may appear to be average.
  • 36. Online Scams III Do not give out your personal details Not your home address Not your date of birth Not your bank details Not your credit card details
  • 37. Online Scams IV Check their ISP to see where they are. Check business address Check website pictures Check company registration Check list of directors Before accepting any proposal ALL THIS IS DUE DILIGENCE
  • 38. Disaster recovery. Disaster recovery is mainly for businesses Includes non-profit organizations Includes clubs and special interest groups. How do we define a disaster? How do we recover from it?
  • 39. Disaster recovery II. Disaster A disaster is an event that means you cannot continue to run your business and need to recover.
  • 40. Disaster recovery III. We take a disaster audit. List of computers and their software. What would happen if any of these computers failed? What information would you lose? What correspondence would you lose?
  • 41. Disaster recovery IV. How long from the loss of that computer would the replacement be working with all the information that you have on it today up to date (and that does not allow for any information waiting to be input) Document all this in one place.
  • 42. Disaster recovery V. List all the computers you use that if they failed today you could roll in a new computer onto the desk and within an hour or two everything would be fine.
  • 43. Disaster recovery VI. Now the hard part! One or more computers that are vital to your operation that you need to have available now. Define how many hours a week they need to be available (24x7 or business hours seven days a week or business hours Monday to Friday.) Document how long your business can do without that computer before it hits problems.
  • 44. Disaster recovery V. Finally in your disaster audit list all telephones list Fax machines list modems list routers and their connections
  • 45. Disaster recovery VI. Decision time Do you have too many eggs in one basket? Do you need to spread the computer load? Do you need a computer to mirror another? Back up every computer in your business now!
  • 46. Disaster recovery VII. Recovery The decisions need to made and written down then make a plan. Get someone as an IT resource even if only for a disaster Do you have a support contract for your computers? Get support you cannot recover a disaster single handed.
  • 47. Disaster recovery VIII. Define your disaster and get a feel for timescales and prices. Balance between the costs of immediate recovery and 2 to 3 days of downtime before all services are resumed. Draw up of a network diagram for the current systems and computers. Keep this up to date.
  • 48. Disaster recovery IX. Keep multiple copies of the disaster recovery plan so everyone knows what to and who to contact. Review and update the plan at least every year.
  • 49. Conclusion Protect your computer. Secure your computer. Protect from virus, spam, spyware, adware, and malware. Make back up so you never lose data. Make a plan for a disaster.
  • 50. PC Safety and Security The end of the Book The start of protecting your computer. www.boysbach.com for copies of the complete manual.