SlideShare ist ein Scribd-Unternehmen logo
1 von 20
10 Things to Teach End-Users
Brought to
you by
Progressive
Integrations,
Inc.,
History
• Who is Progressive Integrations,
Inc.,?
• What is the reason for this seminar?
• Where can I get more information?
• When can I get help after this
seminar?
• How are your going to help?
Intro
• To be effective in our everyday computing
and contribute value to business, users
need at least a minimal grasp of
information technology.
• Exactly what you need to know varies from
environment to environment. What I am
about to share with you is what is called
computing best practices, including how to
effectively report problems and how to
safeguard your data.
#1 Rebooting before calling for help
• Simple things like checking cable connections, cords,
and power can quickly get you back up and running.
• Although telling users to reboot when they experience a
problem may seem like a cop out or a delaying tactic, it
is an uncomfortable fact that rebooting apparently fixes
a multitude of both real and perceived pc/mac errors.
• Even if a reboot does not solve the problem, the mere
fact that the problem recurs after a reboot can give a
support tech significant diagnostic information.
• Rebooting is not a panacea for all computer aliments,
and it is even not helpful in some cases.
#2 Reporting a computer problem
• In addition to knowing the correct
procedure for reporting computer problems
– e.g. emailing the help desk– users need
to know what will help expedite the
resolution process.
• Users can easily be trained to effectively
report problems if they are provided with a
form that gathers appropriate information,
such as any error messages, open
applications, what they were doing when
the problem occurred, and whether the
problem can be reproduced.
Example of Support Ticket
#3 Keeping passwords safe
• There is little point in having a
password if it is written down in an
unsecured location or shared among
users, family members and friends.
I have seen passwords written on
post-it notes attached to monitors,
pinned to notice boards, under the
keyboard, and even displayed as the
text of the marquee screen saver.
#4 Constructing Safe Passwords
• A strong password is a password that meets the following
guidelines:
– Be seven or fourteen characters long, due to the way in which encryption
works. For obvious reasons, fourteen characters are preferable.
– Contain both uppercase and lowercase letters.
– Contain numbers.
– Contain symbols, such as ` ! " ? $ ? % ^ & * ( ) _ - + = { [ } ] : ; @ ' ~ # |  < , >
. ? /
– Contain a symbol in the second, third, fourth, fifth or sixth position (due to the
way in which encryption works).
– Not resemble any of your previous passwords.
– Not be your name, your friend's or family member's name, or your login.
– Not be a dictionary word or common name.
• Good software for password generation, archiving, and automatic
fill, are: roboform, lastpass, keepass
• See http://www.microsoft.com/protect/fraud/passwords/create.aspx
for more online information.
Password humor…
#5 Practice safe computing while traveling
• Remote access tokens should not be
carried in the same case as the computer.
• Access codes, names, and passwords
should not be written down and included in
the same case.
• Sensitive data should be encrypted and/or
stored on removable data storage devices,
carried separately from the computer.
• Never leave devices unattended, use open
networks without security software and
protection.
#6 Preventing loss of data
• Users need to know that backups do not
happen by magic, and if they delete a file
before it has been backed up, it may not be
recoverable.
• Users must know what is backed up and
when and not simply assume that every file
they create or modify, regardless of location
will be backed up.
• What is the difference between a local
backups, external backups, online backups,
images, and time machines/capsules?
• Differential? Full? Incremental?
#7 Usage policies
• Home users need usage policies too.
• Difference between roles (admin,
standard, guest).
• Regardless of strength or content of
the policy, generally speaking, such
policies are put in place to protect the
consumer, company and entities from
lawsuits and most importantly to
protect the integrity of the IT
infrastructure. (i.e., EULA, web filters).
#8 Exercise care in sending e-mails
• Think before pressing “reply to all”
• Double check addresses before
clicking send.
• What does CC and BCC mean? When
do you use them?
• If you would not put a ‘stamp’ on it then
maybe you shouldn’t send it?
• Typing in ALL CAPS is yelling to your
recipient and will probably be deleted.
• http://www.netmanners.com/
#9 Protecting against viruses, phising,
malware, and other nasties
• Don’t open e-mails from unknown
sources.
• Just because it looks real doesn’t
mean it is.
• Invest in a good security suite.
• Free is not always better.
• Be careful where you enter your
personal information on websites.
Phishing example
More Phishing examples
#10 Superstitions that will frustrate you and your tech
• Refusing to reboot – if it ain’t broke
don’t fix it mentality.
• Excessive fear of upgrades –
exercising caution with upgrades is a
good idea, however, one bad
experience should not be the gauge of
all upgrades. Upgrades bring features,
security, stability, and reliability.
• Kneejerk repetition of commands – if it
did not respond the last 6 times it
probably will not this time.
#10 cont.
• Insisting on particular hardware or software
when other equally good hardware or
software is available. Uncle Ferd does not
always know best
• “I broke it” – software does not break,
hardware does. Most issues are software
issues, and assuming ‘you broke it’ only
feeds the fear to try again.
• Magical thinking – the temptation to forget
that the computer is a tool to work with
instead of the incomprehensible entity that
must be negotiated with.
#10 cont
• Attributing personality to the
machine – it is not out to get you, it
does not have a mind of its own, and
just because it failed one time does
not mean it is going to do it again.
• It’s the tech’s fault, he/she was the
last one to touch it. Ever since
_____ did, it has not worked right…
Q&A
• Please fill out evaluation – your
feedback will bring the next course
and help serve you better.
• Thank you from Progressive
Integrations, Inc., bringing
tomorrows technology to the home
today.

Weitere ähnliche Inhalte

Was ist angesagt?

INTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDSINTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDS
Camille Hazellie
 
Computer security basics
Computer security  basicsComputer security  basics
Computer security basics
Srinu Potnuru
 
Anti Whaling Hardening Up Your Net Presence
Anti   Whaling   Hardening Up Your Net PresenceAnti   Whaling   Hardening Up Your Net Presence
Anti Whaling Hardening Up Your Net Presence
gueste0b5fe
 

Was ist angesagt? (12)

INTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDSINTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDS
 
Best practices in NIPS - Brighttalk - January 2010
Best practices in NIPS - Brighttalk - January 2010Best practices in NIPS - Brighttalk - January 2010
Best practices in NIPS - Brighttalk - January 2010
 
The New Normal: Managing the constant stream of new vulnerabilities
The New Normal: Managing the constant stream of new vulnerabilitiesThe New Normal: Managing the constant stream of new vulnerabilities
The New Normal: Managing the constant stream of new vulnerabilities
 
Thought Leader Global 2014 Amsterdam: Taking Security seriously -> Going beyo...
Thought Leader Global 2014 Amsterdam: Taking Security seriously -> Going beyo...Thought Leader Global 2014 Amsterdam: Taking Security seriously -> Going beyo...
Thought Leader Global 2014 Amsterdam: Taking Security seriously -> Going beyo...
 
Practical approaches to IoT security
Practical approaches to IoT securityPractical approaches to IoT security
Practical approaches to IoT security
 
The Safest Way To Interact Online
The Safest Way To Interact OnlineThe Safest Way To Interact Online
The Safest Way To Interact Online
 
Cyber security
Cyber securityCyber security
Cyber security
 
Computer security basics
Computer security  basicsComputer security  basics
Computer security basics
 
2019 FRSecure CISSP Mentor Program: Class Eleven
2019 FRSecure CISSP Mentor Program: Class Eleven2019 FRSecure CISSP Mentor Program: Class Eleven
2019 FRSecure CISSP Mentor Program: Class Eleven
 
Anti Whaling Hardening Up Your Net Presence
Anti   Whaling   Hardening Up Your Net PresenceAnti   Whaling   Hardening Up Your Net Presence
Anti Whaling Hardening Up Your Net Presence
 
Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 

Andere mochten auch

Science bird
Science birdScience bird
Science bird
heathscience
 
Unit23
Unit23Unit23
Unit23
sayed30
 
Presentation1
Presentation1Presentation1
Presentation1
heathscience
 
Science presentatiion
Science presentatiionScience presentatiion
Science presentatiion
heathscience
 
10.1.1.120.7375
10.1.1.120.737510.1.1.120.7375
10.1.1.120.7375
sayed30
 
Fungi presentation
Fungi presentationFungi presentation
Fungi presentation
heathscience
 
Mcsp presentation pics only
Mcsp presentation pics onlyMcsp presentation pics only
Mcsp presentation pics only
heathscience
 
Fire forest powerpoint finnal
Fire forest powerpoint finnalFire forest powerpoint finnal
Fire forest powerpoint finnal
heathscience
 
Behind the scenes
Behind the scenesBehind the scenes
Behind the scenes
heathscience
 
Annotated pictures of egyptian sculptures
Annotated pictures of egyptian sculpturesAnnotated pictures of egyptian sculptures
Annotated pictures of egyptian sculptures
amarkhan122
 
Powerpoint4project ahhhh
Powerpoint4project ahhhhPowerpoint4project ahhhh
Powerpoint4project ahhhh
heathscience
 
Science powerpointt
Science powerpointtScience powerpointt
Science powerpointt
heathscience
 
Tipp-Ex - retombĂŠes
Tipp-Ex - retombĂŠesTipp-Ex - retombĂŠes
Tipp-Ex - retombĂŠes
buzzmantime
 
что такое авторское право
что такое авторское правочто такое авторское право
что такое авторское право
pnvpnvpnv
 

Andere mochten auch (18)

Science bird
Science birdScience bird
Science bird
 
Unit23
Unit23Unit23
Unit23
 
Presentation1
Presentation1Presentation1
Presentation1
 
Blue hillsfinal
Blue hillsfinalBlue hillsfinal
Blue hillsfinal
 
Science presentatiion
Science presentatiionScience presentatiion
Science presentatiion
 
10.1.1.120.7375
10.1.1.120.737510.1.1.120.7375
10.1.1.120.7375
 
Fungi presentation
Fungi presentationFungi presentation
Fungi presentation
 
Mcsp presentation pics only
Mcsp presentation pics onlyMcsp presentation pics only
Mcsp presentation pics only
 
Fire forest powerpoint finnal
Fire forest powerpoint finnalFire forest powerpoint finnal
Fire forest powerpoint finnal
 
Behind the scenes
Behind the scenesBehind the scenes
Behind the scenes
 
Annotated pictures of egyptian sculptures
Annotated pictures of egyptian sculpturesAnnotated pictures of egyptian sculptures
Annotated pictures of egyptian sculptures
 
Powerpoint4project ahhhh
Powerpoint4project ahhhhPowerpoint4project ahhhh
Powerpoint4project ahhhh
 
Science powerpointt
Science powerpointtScience powerpointt
Science powerpointt
 
Tipp-Ex - retombĂŠes
Tipp-Ex - retombĂŠesTipp-Ex - retombĂŠes
Tipp-Ex - retombĂŠes
 
Rural Economic Action Plan in Central Oklahoma | 2010
Rural Economic Action Plan in Central Oklahoma | 2010Rural Economic Action Plan in Central Oklahoma | 2010
Rural Economic Action Plan in Central Oklahoma | 2010
 
что такое авторское право
что такое авторское правочто такое авторское право
что такое авторское право
 
BUZZMAN - AD AGE - SMALL AGENCY AWARD
BUZZMAN - AD AGE - SMALL AGENCY AWARDBUZZMAN - AD AGE - SMALL AGENCY AWARD
BUZZMAN - AD AGE - SMALL AGENCY AWARD
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 

Ähnlich wie 10 things to teach end users

Basic_computerHygiene
Basic_computerHygieneBasic_computerHygiene
Basic_computerHygiene
EricK Gasana
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
Randy Bowman
 
Pci compliance training agents
Pci compliance training  agentsPci compliance training  agents
Pci compliance training agents
ocinc
 
Securing Mobile Devices in the Workplace - Six Tips For Midsize Businesses
Securing Mobile Devices in the Workplace - Six Tips For Midsize BusinessesSecuring Mobile Devices in the Workplace - Six Tips For Midsize Businesses
Securing Mobile Devices in the Workplace - Six Tips For Midsize Businesses
MidmarketIBM
 

Ähnlich wie 10 things to teach end users (20)

Lock it or Lose It: Why Every Company Should be Concerned About Data Security
Lock it or Lose It: Why Every Company Should be Concerned About Data SecurityLock it or Lose It: Why Every Company Should be Concerned About Data Security
Lock it or Lose It: Why Every Company Should be Concerned About Data Security
 
Survey Presentation About Application Security
Survey Presentation About Application SecuritySurvey Presentation About Application Security
Survey Presentation About Application Security
 
Executive Directors Chat:It's easy to stay safe online.pdf
Executive Directors Chat:It's easy to stay safe online.pdfExecutive Directors Chat:It's easy to stay safe online.pdf
Executive Directors Chat:It's easy to stay safe online.pdf
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online Privacy
 
Basic_computerHygiene
Basic_computerHygieneBasic_computerHygiene
Basic_computerHygiene
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
 
SANS OUCH Newsletter April 2016
SANS OUCH Newsletter April 2016SANS OUCH Newsletter April 2016
SANS OUCH Newsletter April 2016
 
Presentation 10.pptx
Presentation 10.pptxPresentation 10.pptx
Presentation 10.pptx
 
Internet
InternetInternet
Internet
 
Secure End User
Secure End UserSecure End User
Secure End User
 
Intro to INFOSEC
Intro to INFOSECIntro to INFOSEC
Intro to INFOSEC
 
Welcome to files
Welcome to filesWelcome to files
Welcome to files
 
Information security
Information securityInformation security
Information security
 
Physician Office Presentation
Physician Office PresentationPhysician Office Presentation
Physician Office Presentation
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureApp
 
Basic Security Training for End Users
Basic Security Training for End UsersBasic Security Training for End Users
Basic Security Training for End Users
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back
 
Pci compliance training agents
Pci compliance training  agentsPci compliance training  agents
Pci compliance training agents
 
Securing Mobile Devices in the Workplace - Six Tips For Midsize Businesses
Securing Mobile Devices in the Workplace - Six Tips For Midsize BusinessesSecuring Mobile Devices in the Workplace - Six Tips For Midsize Businesses
Securing Mobile Devices in the Workplace - Six Tips For Midsize Businesses
 
7 Things People Do To Endanger Their Networks
7 Things People Do To Endanger Their Networks7 Things People Do To Endanger Their Networks
7 Things People Do To Endanger Their Networks
 

KĂźrzlich hochgeladen

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

KĂźrzlich hochgeladen (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 

10 things to teach end users

  • 1. 10 Things to Teach End-Users Brought to you by Progressive Integrations, Inc.,
  • 2. History • Who is Progressive Integrations, Inc.,? • What is the reason for this seminar? • Where can I get more information? • When can I get help after this seminar? • How are your going to help?
  • 3. Intro • To be effective in our everyday computing and contribute value to business, users need at least a minimal grasp of information technology. • Exactly what you need to know varies from environment to environment. What I am about to share with you is what is called computing best practices, including how to effectively report problems and how to safeguard your data.
  • 4. #1 Rebooting before calling for help • Simple things like checking cable connections, cords, and power can quickly get you back up and running. • Although telling users to reboot when they experience a problem may seem like a cop out or a delaying tactic, it is an uncomfortable fact that rebooting apparently fixes a multitude of both real and perceived pc/mac errors. • Even if a reboot does not solve the problem, the mere fact that the problem recurs after a reboot can give a support tech significant diagnostic information. • Rebooting is not a panacea for all computer aliments, and it is even not helpful in some cases.
  • 5. #2 Reporting a computer problem • In addition to knowing the correct procedure for reporting computer problems – e.g. emailing the help desk– users need to know what will help expedite the resolution process. • Users can easily be trained to effectively report problems if they are provided with a form that gathers appropriate information, such as any error messages, open applications, what they were doing when the problem occurred, and whether the problem can be reproduced.
  • 7. #3 Keeping passwords safe • There is little point in having a password if it is written down in an unsecured location or shared among users, family members and friends. I have seen passwords written on post-it notes attached to monitors, pinned to notice boards, under the keyboard, and even displayed as the text of the marquee screen saver.
  • 8. #4 Constructing Safe Passwords • A strong password is a password that meets the following guidelines: – Be seven or fourteen characters long, due to the way in which encryption works. For obvious reasons, fourteen characters are preferable. – Contain both uppercase and lowercase letters. – Contain numbers. – Contain symbols, such as ` ! " ? $ ? % ^ & * ( ) _ - + = { [ } ] : ; @ ' ~ # | < , > . ? / – Contain a symbol in the second, third, fourth, fifth or sixth position (due to the way in which encryption works). – Not resemble any of your previous passwords. – Not be your name, your friend's or family member's name, or your login. – Not be a dictionary word or common name. • Good software for password generation, archiving, and automatic fill, are: roboform, lastpass, keepass • See http://www.microsoft.com/protect/fraud/passwords/create.aspx for more online information.
  • 10. #5 Practice safe computing while traveling • Remote access tokens should not be carried in the same case as the computer. • Access codes, names, and passwords should not be written down and included in the same case. • Sensitive data should be encrypted and/or stored on removable data storage devices, carried separately from the computer. • Never leave devices unattended, use open networks without security software and protection.
  • 11. #6 Preventing loss of data • Users need to know that backups do not happen by magic, and if they delete a file before it has been backed up, it may not be recoverable. • Users must know what is backed up and when and not simply assume that every file they create or modify, regardless of location will be backed up. • What is the difference between a local backups, external backups, online backups, images, and time machines/capsules? • Differential? Full? Incremental?
  • 12. #7 Usage policies • Home users need usage policies too. • Difference between roles (admin, standard, guest). • Regardless of strength or content of the policy, generally speaking, such policies are put in place to protect the consumer, company and entities from lawsuits and most importantly to protect the integrity of the IT infrastructure. (i.e., EULA, web filters).
  • 13. #8 Exercise care in sending e-mails • Think before pressing “reply to all” • Double check addresses before clicking send. • What does CC and BCC mean? When do you use them? • If you would not put a ‘stamp’ on it then maybe you shouldn’t send it? • Typing in ALL CAPS is yelling to your recipient and will probably be deleted. • http://www.netmanners.com/
  • 14. #9 Protecting against viruses, phising, malware, and other nasties • Don’t open e-mails from unknown sources. • Just because it looks real doesn’t mean it is. • Invest in a good security suite. • Free is not always better. • Be careful where you enter your personal information on websites.
  • 17. #10 Superstitions that will frustrate you and your tech • Refusing to reboot – if it ain’t broke don’t fix it mentality. • Excessive fear of upgrades – exercising caution with upgrades is a good idea, however, one bad experience should not be the gauge of all upgrades. Upgrades bring features, security, stability, and reliability. • Kneejerk repetition of commands – if it did not respond the last 6 times it probably will not this time.
  • 18. #10 cont. • Insisting on particular hardware or software when other equally good hardware or software is available. Uncle Ferd does not always know best • “I broke it” – software does not break, hardware does. Most issues are software issues, and assuming ‘you broke it’ only feeds the fear to try again. • Magical thinking – the temptation to forget that the computer is a tool to work with instead of the incomprehensible entity that must be negotiated with.
  • 19. #10 cont • Attributing personality to the machine – it is not out to get you, it does not have a mind of its own, and just because it failed one time does not mean it is going to do it again. • It’s the tech’s fault, he/she was the last one to touch it. Ever since _____ did, it has not worked right…
  • 20. Q&A • Please fill out evaluation – your feedback will bring the next course and help serve you better. • Thank you from Progressive Integrations, Inc., bringing tomorrows technology to the home today.