SlideShare a Scribd company logo
1 of 45
COMPUTER BASICS IN THE WORK PLACE
Trainer: Brent Simpers
PARTS OF A COMPUTER YOU SHOULD KNOW
AND BE ABLE TO NAME
IT IS IMPORTANT TO KNOW THE CORRECT
NAMES OF THE PARTS OF YOUR
WORKSTATION SO THAT YOU CAN REPORT
PROBLEMS CORRECTLY
LOGIN IN TO YOUR COMPUTER AND
PERSONAL COMPUTER SAFETY
This Is why we lock our computers
This is the screen you see when you log into your computer
This is a sign in screen on a networked Windows 10 Workstation
RULES FOR A SECURE COMPUTER
RULES FOR A SAFE WORKSTATION
• Keeping a clean machine: Your company should have clear rules for what employees can install
and keep on their work computers. Make sure they understand and abide by these rules.
Unknown outside programs can open security vulnerabilities in your network.
• Following good password practices: A strong password is a sentence that is at least 12 characters
long. Focus on positive sentences or phrases that you like to think about and are easy to
remember (for example, “I love country music.”). On many sites, you can even use spaces!
Additionally, having separate passwords for every account helps to thwart cybercriminals. At a
minimum, they should separate work and personal accounts and make sure that critical accounts
have the strongest passwords. Finally, writing down passwords and keeping them in a safe place
away from the computer and enabling two-step authentication are other important ways to
secure accounts.
• When in doubt, throw it out: Employees should know not to open suspicious links in email,
tweets, posts, online ads, messages or attachments – even if they know the source. Employees
should also be instructed about your company's spam filters and how to use them to prevent
unwanted, harmful email.
• Backing up their work: Whether you set your employees' computers to back up automatically or
ask that they do it themselves, employees should be instructed on their role in protecting their
work.
• Staying watchful and speaking up: Your employees should be encouraged to keep an eye out and
say something if they notice strange happenings on their computer.
VIRUS PROTECTION AND OTHER SOFTWARE
THAT SHOULD NOT BE TOUCHED WITHOUT
WHAT DOES AN ANTI VIRUS
PROGRAM DO?
• Anti-virus software helps to protect your computer from viruses that can destroy
your data, slow your computer's performance, or cause your computer to crash.
Anti-virus software scans your computer for patterns that may indicate an infection.
The patterns it looks for are based on the signatures, or definitions, of known
viruses. Virus authors are continually releasing new and updated viruses, so it is
important that you have the latest definitions installed on your computer.
WHAT IS A FIREWALL?
• A firewall helps to prevent data from entering or leaving your computer without
your permission. It helps make you invisible on the Internet and blocks
communications from unauthorized sources.
• It should never be turned off or messed with.
SURFING THE NET ON COMPANY TIME
INTERNET RULES IN THE WORK PLACE
• Engaging in unlawful or malicious activities;
• Deliberately propagating any virus, worm, Trojan horse, trap-door program code, or other code or file designed to disrupt,
disable, impair, or otherwise harm either the Company's networks or systems or those of any other individual or entity;
• Using abusive, profane, threatening, racist, sexist, or otherwise objectionable language in either public or private messages;
• Sending, receiving, or accessing pornographic materials;
• Becoming involved in partisan politics;
• Causing congestion, disruption, disablement, alteration, or impairment of Company networks or systems;
• Maintaining, organizing, or participating in non-work-related Web logs ("blogs"), Web journals, "chat rooms", or
private/personal/instant messaging;
• Failing to log off any secure, controlled-access computer or other form of electronic data system to which you are assigned,
if you leave such computer or system unattended;
• Using recreational games; and/or
• Defeating or attempting to defeat security restrictions on company systems and applications
RULES CONT.
• Use of Company computers, networks, and Internet access is a privilege granted by management and may be
revoked at any time for inappropriate conduct carried out on such systems, including, but not limited to:
• Sending chain letters or participating in any way in the creation or transmission of unsolicited commercial e-
mail ("spam") that is unrelated to legitimate Company purposes;
• Engaging in private or personal business activities, including excessive use of instant messaging and chat
rooms (see below);
• Accessing networks, servers, drives, folders, or files to which the employee has not been granted access or
authorization from someone with the right to make such a grant;
• Making unauthorized copies of Company files or other Company data;
• Destroying, deleting, erasing, or concealing Company files or other Company data, or otherwise making such
files or data unavailable or inaccessible to the Company or to other authorized users of Company systems;
• Misrepresenting oneself or the Company;
• Violating the laws and regulations of the United States or any other nation or any state, city, province, or
other local jurisdiction in any way;
RULES CONT.
• Important exception: consistent with federal law, you may use the Company's electronic systems in order to discuss with
other employees the terms and conditions of your and your coworkers' employment. However, any such discussions should
take place during non-duty times and should not interfere with your or your coworkers' assigned duties. You must comply
with a coworker's stated request to be left out of such discussions.
•
• Using Company electronic systems to access, create, view, transmit, or receive racist, sexist, threatening, or otherwise
objectionable or illegal material, defined as any visual, textual, or auditory entity, file, or data, is strictly prohibited. Such
material violates the Company anti-harassment policies and subjects the responsible employee to disciplinary action. The
Company's electronic mail system, Internet access, and computer systems must not be used to harm others or to violate the
laws and regulations of the United States or any other nation or any state, city, province, or other local jurisdiction in any
way. Use of company resources for illegal activity can lead to disciplinary action, up to and including dismissal and criminal
prosecution. The Company will comply with reasonable requests from law enforcement and regulatory agencies for logs,
diaries, archives, or files on individual Internet activities, e-mail use, and/or computer use.
•
• Unless specifically granted in this policy, any non-business use of the Company's electronic systems is expressly forbidden.
•
• If you violate these policies, you could be subject to disciplinary action, up to and including dismissal.
WASTED TIME IS LOST TIME
SOCIAL MEDIA IN THE WORK PLACE WHY
SOME CAN AND MOST CAN’T
NO SOCIAL MEDIA
• It’s depressing, and depressed people are
less productive.
• It’s addicting.
• It can be used to spy on you.
• It’s an excuse to procrastinate.
• It waste time you should be working.
BUT SUSAN HAS IT IN SALES
• Why do Some users have access to Social Media and others don’t, Because it is
become part of their job.
• Sites like Facebook, Twitter and other Social Media tend to help Departments like
Sales or Media relations do their job and these department have their own Network
so the bandwidth lose does not effect the company.
• The Facebook that will soon be in these department is called Facebook at Work and
does not allow personal accounts or games.
• If you job or department requires Facebook or other social media you department
head will let you know.
THE COST IN SOCIAL MEDIA
THOUGHT OUT THE COMPANY
• Productivity-One reason why organizations on social networking in the workplace is
the fact that employees spend a great deal of time updating their profiles and sites
throughout the day. If every employee in a 50-strong workforce spent 30 minutes on
a social networking site every day, that would work out to a loss of 6,500 hours of
productivity in one year! Although this may be a generalization, organizations look
very carefully at productivity issues, and 25 hours of non-productive work per day
does not go over well with management. When you factor in the average wage per
hour you get a better (and decisive) picture.
• Resources-Although updates from sites like Facebook or LinkedIn may not take up
huge amounts of bandwidth, the availability of (bandwidth-hungry) video links
posted on these sites creates problems for IT administrators. There is a cost to
Internet browsing, especially when high levels of bandwidth are required.
WHY THE LACK OF SOCIAL MEDIA
• Viruses and Malware-his threat is often overlooked by organizations. Hackers are attracted to social networking
sites because they see the potential to commit fraud and launch spam and malware attacks. There are more than
50,000 applications available for Facebook (according to the company) and while FaceBook may make every
effort to provide protection against malware, these third-party applications may not all be safe. Some have the
potential to be used to infect computers with malicious code, which in turn can be used to collect data from that
user’s site. Messaging on social networking sites is also a concern, and the Koobface worm is just one example
of how messages are used to spread malicious code and worms.
• Reputation and Legal Liability-At then time of authorship, there have been no major corporate lawsuits involving
evidence from social networking sites. However, organizations need to watch for employees who may be
commenting publicly about their employer. For example, one young employee wrote on her profile that her job
was boring and soon received her marching orders from her boss. What if a disgruntled employee decided to
complain about a product or the company’s inefficiencies in his or her profile? There are also serious legal
consequences if employees use these sites and click on links to view objectionable, illicit or offensive content. An
employer could be held liable for failing to protect employees from viewing such material. The legal costs, fines
and damage to the organization’s reputation could be substantial.
LACK CON.
• Social Engineering-Social engineering is becoming a fine art and more and more people are
falling victim to online scams that seem genuine. This can result in data or identity theft. Users
may be convinced to give personal details such as Social Security numbers, employment details
and so on. By collecting such information, data theft becomes a serious risk. On the other hand,
people have a habit of posting details in their social networking profiles. While they would never
disclose certain information when meeting someone for the first time, they see nothing wrong
with posting it online for all to see on their profile, personal blog or other social networking site
account. This data can often be mined by cybercriminals.
• Employers must be on the lookout for information that their employees may post, as this may
have an impact on the company. People often post messages without thinking through what
they’ve have written. A seemingly innocuous message such as “I’m working this weekend because
we’ve found a problem in our front-end product” may be a spur-of-the-moment comment but
could raise concern among customers who may use that system, especially if the company
handles confidential or financial detail.
NETWORK SAVES MY
WORK WHERE?
How a Company Network Saves you work.
WHERE YOU WORK IS SAVED
• Your Work is saved in Three locations every time you tell you computer to save.
• Location One is on your computer in the “docs” folder .
• Location Two is on the Company Servers in a user backup file.
• Location Three is On a secure cloud drive
• All Three location Require a password and user name to access the file, No USB
Drives are needed to Save work and in Fact are Ban For Everyone but The IT
Department.
SECURITY AND THE LITTLE SPY
Why USB drive are a security hazard!
USB DRIVES
They Can Carry Viruses They Can Steal Company Data They Can Carry Malware
USB DRIVES AS A SECURITY
CONCERN
• USB peripherals, such as thumb drives, can be reprogrammed to steal the contents
of anything written to the drive and to spread the firmware-modifying code to any
PCs it touches. The net result could be a self-replicating virus that spreads through
sparing thumb drives, much like the rudimentary viruses that spread by floppy disk
decades ago.
• Instead, like many cyber security threats, the only real mitigation right now is how
you behave. For instance, it's better not to insert one your USB devices into a
computer you don't trust (avoid public computer kiosks, for example), and don't
plug a USB device into your own computer unless you are confident you trust it and
know everywhere it has been.
THE THREAT
• Attackers may also use their USB drives to steal information directly from a computer. If an
attacker can physically access a computer, he or she can download sensitive information
directly onto a USB drive. Even computers that have been turned off may be vulnerable,
because a computer's memory is still active for several minutes without power. If an attacker
can plug a USB drive into the computer during that time, he or she can quickly reboot the
system from the USB drive and copy the computer's memory, including passwords,
encryption keys, and other sensitive data, onto the drive. Victims may not even realize that
their computers were attacked.
• The most obvious security risk for USB drives, though, is that they are easily lost or stolen
(see Protecting Portable Devices: Physical Security for more information). If the data was not
backed up, the loss of a USB drive can mean hours of lost work and the potential that the
information cannot be replicated. And if the information on the drive is not encrypted,
anyone who has the USB drive can access all of the data on it.
LOCK DOWN
Close and protect yourself and your job!
WHAT IS THE LOCK DOWN SOFTWARE
• System lockdown is a protection setting that you can use to control the applications
that can run on the client computer. You can create a file fingerprint list that
contains the checksums and the locations of all the applications that are authorized
for use at your company. The client software includes a Checksum.exe tool that you
can use to create a file fingerprint list. The advantage of system lockdown is that it
can be enforced whether or not the user is connected to the network. You can use
system lockdown to block almost any Trojan horse, spyware, or malware that tries to
run or load itself into an existing application. For example, you can prevent these
files from loading into Internet Explorer. System lockdown ensures that your system
stays in a known and trusted state.
HELP DESK HEROES;
How to call for help when you need it.
WHEN TO CALL
• I got an error message.
• OK, did you write the error message down or perhaps take a screenshot? No? Well,
the help desk is going to need a little more to go on. If you write it down or make a
screen cap, you can include the error message information in your question for the
help desk, making it far easier to diagnose and fix your problem.
WHEN TO CALL
• I don’t have to read the dialog box that popped up unexpectedly. That’s IT’s
job.
• If you unexpectedly have a dialog box pop up, here’s an idea: read it. You
may, in fact, know whether to click on “OK” or “Cancel.” If you don’t, then you
can relay the contents of the dialog box to the help desk, and they will help
you decide.
WHEN TO CALL• I need the IT department to
speed up the internet.
• Before getting in touch with
the help desk, it’s a good idea
to ask yourself if what you’re
asking is actually possible. Do
you want IT to remove the
pictures of your daughter that
her boyfriend posted on
Facebook? Do you want them
to install OS X on your new
Windows PC? A web help desk
worker can do lots of things,
but some things are impossible
without supernatural powers.
WHEN TO CALL
• I’ll just submit this request before leaving
on vacation so it will be fixed when I get
back.
• This wouldn’t be a terrible idea, except
these “requests” invariably define the
problem as “My computer doesn’t work,”
or consist of a mysterious one-word
description like, “Printer.” What’s more, if
the help desk makes an attempt to fix your
issue, they’re going to want to find out if it
worked, and that’s not possible if you’re in
Key West slurping margaritas.
WHEN TO CALL
• 4. Nothing shows up on my screen.
• Have you tried the obvious things,
like turning it on? Is your monitor, in
fact, connected to your computer?
What about the keyboard? If you’re
typing like a banshee and nothing is
showing up, perhaps the keyboard
isn’t connected. Believe it or not,
checking to see that everything is
properly plugged in and turned on
fixes a lot of “IT” problems.
WHEN TO CALL
• It’s Friday at 4:30. If I submit a ticket
now, they’ll have all weekend to fix it,
especially if I mark it “URGENT.”
• Not only do IT workers often need to
discuss the problem with you, they
don’t always work on weekends. And
they won’t be kindly disposed if your
“URGENT” problem is something like,
“Can you get around the company
controls so I can log onto
Facebook?”
WHEN TO CALL
• All my IT requests are urgent.
• How very helpful to mark all your IT help desk requests with
terms like “ASAP,” “urgent,” and “very important.” It helps
the workers put them ahead of all those requests labeled
“Just fix this if you feel like it,” and “This isn’t really
important.” If every single one of your IT requests is
“urgent,” then you’re the kid who cried wolf and the day you
see flames shooting from your keyboard, nobody will take
you seriously.
CHROME WOULDN’T OPEN, SO THE INTERNET
MUST BE DOWN.
• A surprising number of reasonably intelligent people give up at the first sign of a
problem. But if you close Chrome and open it back up again, it might work. And if
Chrome doesn’t work, there’s almost certainly a copy of IE on your computer that
you can use till the help desk can get to your call
WHEN TO CALL
THE PLEASE DO NOT DO
• If I submit a ticket, email the help desk, and call them, they’ll prioritize my problem.
• In fact, if you regularly carpet bomb the IT department, supplementing your help desk ticket
with emails and phone calls, they won’t prioritize your problem. They’ll just avoid you. Use
the ticket submission procedure; or better yet, check the self-service portal first. The answer
you need might be in front of your face.
• Today’s web help desk software can’t help you with people who are inconsiderate or proudly
clueless, but it can help you use your time as efficiently as possible. When your help desk
software is cloud-hosted, you’re always running the latest version and are constantly
building your knowledge base and improving the end user experience. Believe it or not,
most of them really do appreciate it.
THANKS FOR YOUR TIME
Any Questions?

More Related Content

What's hot

BASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESSBASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESS
Md Abu Syeem Dipu
 
Who's that knocking on my firewall door?
Who's that knocking on my firewall door?Who's that knocking on my firewall door?
Who's that knocking on my firewall door?
Bruce Wolfe
 
Issues with computers
Issues with computersIssues with computers
Issues with computers
ayerssaa
 
The Dark Side Of The Web
The Dark Side Of The WebThe Dark Side Of The Web
The Dark Side Of The Web
mshin
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
Sadaf Walliyani
 
Acceptable Use Policy
Acceptable Use PolicyAcceptable Use Policy
Acceptable Use Policy
Chase Hubbard
 

What's hot (20)

Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
BASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESSBASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESS
 
Computing and ethics
Computing and ethicsComputing and ethics
Computing and ethics
 
Protect
ProtectProtect
Protect
 
Safe and Responsible Use of ICT
Safe and Responsible Use of ICTSafe and Responsible Use of ICT
Safe and Responsible Use of ICT
 
Safe Computing
Safe ComputingSafe Computing
Safe Computing
 
Understanding security and safe computing
Understanding security and safe computingUnderstanding security and safe computing
Understanding security and safe computing
 
PART 2 TYPES OF CYBER CRIMES
PART 2 TYPES OF CYBER CRIMESPART 2 TYPES OF CYBER CRIMES
PART 2 TYPES OF CYBER CRIMES
 
part 3 cyber crimes
part 3 cyber crimes part 3 cyber crimes
part 3 cyber crimes
 
Types of cyber crimes
Types of cyber crimesTypes of cyber crimes
Types of cyber crimes
 
Who's that knocking on my firewall door?
Who's that knocking on my firewall door?Who's that knocking on my firewall door?
Who's that knocking on my firewall door?
 
The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is Dangerous
 
Issues with computers
Issues with computersIssues with computers
Issues with computers
 
The Dark Side Of The Web
The Dark Side Of The WebThe Dark Side Of The Web
The Dark Side Of The Web
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
 
IT Security booklet
IT Security bookletIT Security booklet
IT Security booklet
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
 
Acceptable Use Policy
Acceptable Use PolicyAcceptable Use Policy
Acceptable Use Policy
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness Training
 

Viewers also liked

DealTrak Presentation
DealTrak PresentationDealTrak Presentation
DealTrak Presentation
Steve Verwey
 
KTubeTech.com-Danh-sach-bang-phat-minh
KTubeTech.com-Danh-sach-bang-phat-minhKTubeTech.com-Danh-sach-bang-phat-minh
KTubeTech.com-Danh-sach-bang-phat-minh
ktubetech
 
**FINAL Flyer 8x10
**FINAL Flyer 8x10**FINAL Flyer 8x10
**FINAL Flyer 8x10
Haley Russo
 
KTubeTech.com-poster1
KTubeTech.com-poster1KTubeTech.com-poster1
KTubeTech.com-poster1
ktubetech
 
MSc Desertation Sanjit
MSc Desertation SanjitMSc Desertation Sanjit
MSc Desertation Sanjit
Sanjit Vinayak
 

Viewers also liked (20)

doc02529920160227101152
doc02529920160227101152doc02529920160227101152
doc02529920160227101152
 
DealTrak Presentation
DealTrak PresentationDealTrak Presentation
DealTrak Presentation
 
KTubeTech.com-Danh-sach-bang-phat-minh
KTubeTech.com-Danh-sach-bang-phat-minhKTubeTech.com-Danh-sach-bang-phat-minh
KTubeTech.com-Danh-sach-bang-phat-minh
 
**FINAL Flyer 8x10
**FINAL Flyer 8x10**FINAL Flyer 8x10
**FINAL Flyer 8x10
 
Máy Phát Điện Sạch - KtubeTech.com
Máy Phát Điện Sạch - KtubeTech.comMáy Phát Điện Sạch - KtubeTech.com
Máy Phát Điện Sạch - KtubeTech.com
 
Energy crises in pakistan
Energy crises in pakistanEnergy crises in pakistan
Energy crises in pakistan
 
Dilsen-Stokkem
Dilsen-StokkemDilsen-Stokkem
Dilsen-Stokkem
 
Buen uso de la red y el internet sofia henao 8 4
Buen uso de la red y el internet sofia henao 8 4Buen uso de la red y el internet sofia henao 8 4
Buen uso de la red y el internet sofia henao 8 4
 
doc02529820160227101131
doc02529820160227101131doc02529820160227101131
doc02529820160227101131
 
India
India India
India
 
KTubeTech.com-poster1
KTubeTech.com-poster1KTubeTech.com-poster1
KTubeTech.com-poster1
 
Akshata bhoir's ppt
Akshata bhoir's pptAkshata bhoir's ppt
Akshata bhoir's ppt
 
intership report
intership reportintership report
intership report
 
Particle and field based methods for complex fluids and soft materials
Particle and field based methods for complex fluids and soft materialsParticle and field based methods for complex fluids and soft materials
Particle and field based methods for complex fluids and soft materials
 
B2 License 2016
B2 License 2016B2 License 2016
B2 License 2016
 
MSc Desertation Sanjit
MSc Desertation SanjitMSc Desertation Sanjit
MSc Desertation Sanjit
 
Spain and the stereotypes
Spain and the stereotypesSpain and the stereotypes
Spain and the stereotypes
 
Temperature measure 28.feb.2014
Temperature measure 28.feb.2014Temperature measure 28.feb.2014
Temperature measure 28.feb.2014
 
Farmacología Hipertensión
Farmacología Hipertensión  Farmacología Hipertensión
Farmacología Hipertensión
 
Infecciones bacterianas
Infecciones bacterianas Infecciones bacterianas
Infecciones bacterianas
 

Similar to Computer Basics in the Work Place

Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training Open
Fred Beck MBA, CPA
 
BUS105 Needs Improvement (1) Satisfactory (2) Ex.docx
BUS105 Needs Improvement (1) Satisfactory (2) Ex.docxBUS105 Needs Improvement (1) Satisfactory (2) Ex.docx
BUS105 Needs Improvement (1) Satisfactory (2) Ex.docx
humphrieskalyn
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
Randy Bowman
 

Similar to Computer Basics in the Work Place (20)

Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policy
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training Open
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end users
 
CyberSecurity Cyber24x7.pdf
CyberSecurity Cyber24x7.pdfCyberSecurity Cyber24x7.pdf
CyberSecurity Cyber24x7.pdf
 
Cybersecurity Training
Cybersecurity TrainingCybersecurity Training
Cybersecurity Training
 
ComputingEthics.pptx
ComputingEthics.pptxComputingEthics.pptx
ComputingEthics.pptx
 
Liabilty
LiabiltyLiabilty
Liabilty
 
ISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptxISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptx
 
Ethics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxEthics and safety measures in computing.pptx
Ethics and safety measures in computing.pptx
 
Back to school - CYBER SAFETY
Back to school - CYBER SAFETYBack to school - CYBER SAFETY
Back to school - CYBER SAFETY
 
CyberSecurity Series Malware slides
CyberSecurity Series Malware slidesCyberSecurity Series Malware slides
CyberSecurity Series Malware slides
 
Cyber security for small businesses
Cyber security for small businessesCyber security for small businesses
Cyber security for small businesses
 
Free_business_IT_security_policy_template_v5.pdf
Free_business_IT_security_policy_template_v5.pdfFree_business_IT_security_policy_template_v5.pdf
Free_business_IT_security_policy_template_v5.pdf
 
BUS105 Needs Improvement (1) Satisfactory (2) Ex.docx
BUS105 Needs Improvement (1) Satisfactory (2) Ex.docxBUS105 Needs Improvement (1) Satisfactory (2) Ex.docx
BUS105 Needs Improvement (1) Satisfactory (2) Ex.docx
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Newsletter connect - June 2016
Newsletter connect - June 2016Newsletter connect - June 2016
Newsletter connect - June 2016
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
 
Meeting the Cybersecurity Challenge
Meeting the Cybersecurity ChallengeMeeting the Cybersecurity Challenge
Meeting the Cybersecurity Challenge
 
computer ethics.pptx
computer ethics.pptxcomputer ethics.pptx
computer ethics.pptx
 
Iconuk 2016 - IBM Connections adoption Worst practices!
Iconuk 2016 - IBM Connections adoption Worst practices!Iconuk 2016 - IBM Connections adoption Worst practices!
Iconuk 2016 - IBM Connections adoption Worst practices!
 

Computer Basics in the Work Place

  • 1. COMPUTER BASICS IN THE WORK PLACE Trainer: Brent Simpers
  • 2. PARTS OF A COMPUTER YOU SHOULD KNOW AND BE ABLE TO NAME
  • 3.
  • 4. IT IS IMPORTANT TO KNOW THE CORRECT NAMES OF THE PARTS OF YOUR WORKSTATION SO THAT YOU CAN REPORT PROBLEMS CORRECTLY
  • 5. LOGIN IN TO YOUR COMPUTER AND PERSONAL COMPUTER SAFETY
  • 6.
  • 7. This Is why we lock our computers
  • 8. This is the screen you see when you log into your computer
  • 9. This is a sign in screen on a networked Windows 10 Workstation
  • 10. RULES FOR A SECURE COMPUTER
  • 11. RULES FOR A SAFE WORKSTATION • Keeping a clean machine: Your company should have clear rules for what employees can install and keep on their work computers. Make sure they understand and abide by these rules. Unknown outside programs can open security vulnerabilities in your network. • Following good password practices: A strong password is a sentence that is at least 12 characters long. Focus on positive sentences or phrases that you like to think about and are easy to remember (for example, “I love country music.”). On many sites, you can even use spaces! Additionally, having separate passwords for every account helps to thwart cybercriminals. At a minimum, they should separate work and personal accounts and make sure that critical accounts have the strongest passwords. Finally, writing down passwords and keeping them in a safe place away from the computer and enabling two-step authentication are other important ways to secure accounts. • When in doubt, throw it out: Employees should know not to open suspicious links in email, tweets, posts, online ads, messages or attachments – even if they know the source. Employees should also be instructed about your company's spam filters and how to use them to prevent unwanted, harmful email. • Backing up their work: Whether you set your employees' computers to back up automatically or ask that they do it themselves, employees should be instructed on their role in protecting their work. • Staying watchful and speaking up: Your employees should be encouraged to keep an eye out and say something if they notice strange happenings on their computer.
  • 12. VIRUS PROTECTION AND OTHER SOFTWARE THAT SHOULD NOT BE TOUCHED WITHOUT
  • 13. WHAT DOES AN ANTI VIRUS PROGRAM DO? • Anti-virus software helps to protect your computer from viruses that can destroy your data, slow your computer's performance, or cause your computer to crash. Anti-virus software scans your computer for patterns that may indicate an infection. The patterns it looks for are based on the signatures, or definitions, of known viruses. Virus authors are continually releasing new and updated viruses, so it is important that you have the latest definitions installed on your computer.
  • 14. WHAT IS A FIREWALL? • A firewall helps to prevent data from entering or leaving your computer without your permission. It helps make you invisible on the Internet and blocks communications from unauthorized sources. • It should never be turned off or messed with.
  • 15. SURFING THE NET ON COMPANY TIME
  • 16. INTERNET RULES IN THE WORK PLACE • Engaging in unlawful or malicious activities; • Deliberately propagating any virus, worm, Trojan horse, trap-door program code, or other code or file designed to disrupt, disable, impair, or otherwise harm either the Company's networks or systems or those of any other individual or entity; • Using abusive, profane, threatening, racist, sexist, or otherwise objectionable language in either public or private messages; • Sending, receiving, or accessing pornographic materials; • Becoming involved in partisan politics; • Causing congestion, disruption, disablement, alteration, or impairment of Company networks or systems; • Maintaining, organizing, or participating in non-work-related Web logs ("blogs"), Web journals, "chat rooms", or private/personal/instant messaging; • Failing to log off any secure, controlled-access computer or other form of electronic data system to which you are assigned, if you leave such computer or system unattended; • Using recreational games; and/or • Defeating or attempting to defeat security restrictions on company systems and applications
  • 17. RULES CONT. • Use of Company computers, networks, and Internet access is a privilege granted by management and may be revoked at any time for inappropriate conduct carried out on such systems, including, but not limited to: • Sending chain letters or participating in any way in the creation or transmission of unsolicited commercial e- mail ("spam") that is unrelated to legitimate Company purposes; • Engaging in private or personal business activities, including excessive use of instant messaging and chat rooms (see below); • Accessing networks, servers, drives, folders, or files to which the employee has not been granted access or authorization from someone with the right to make such a grant; • Making unauthorized copies of Company files or other Company data; • Destroying, deleting, erasing, or concealing Company files or other Company data, or otherwise making such files or data unavailable or inaccessible to the Company or to other authorized users of Company systems; • Misrepresenting oneself or the Company; • Violating the laws and regulations of the United States or any other nation or any state, city, province, or other local jurisdiction in any way;
  • 18. RULES CONT. • Important exception: consistent with federal law, you may use the Company's electronic systems in order to discuss with other employees the terms and conditions of your and your coworkers' employment. However, any such discussions should take place during non-duty times and should not interfere with your or your coworkers' assigned duties. You must comply with a coworker's stated request to be left out of such discussions. • • Using Company electronic systems to access, create, view, transmit, or receive racist, sexist, threatening, or otherwise objectionable or illegal material, defined as any visual, textual, or auditory entity, file, or data, is strictly prohibited. Such material violates the Company anti-harassment policies and subjects the responsible employee to disciplinary action. The Company's electronic mail system, Internet access, and computer systems must not be used to harm others or to violate the laws and regulations of the United States or any other nation or any state, city, province, or other local jurisdiction in any way. Use of company resources for illegal activity can lead to disciplinary action, up to and including dismissal and criminal prosecution. The Company will comply with reasonable requests from law enforcement and regulatory agencies for logs, diaries, archives, or files on individual Internet activities, e-mail use, and/or computer use. • • Unless specifically granted in this policy, any non-business use of the Company's electronic systems is expressly forbidden. • • If you violate these policies, you could be subject to disciplinary action, up to and including dismissal.
  • 19. WASTED TIME IS LOST TIME
  • 20. SOCIAL MEDIA IN THE WORK PLACE WHY SOME CAN AND MOST CAN’T
  • 21. NO SOCIAL MEDIA • It’s depressing, and depressed people are less productive. • It’s addicting. • It can be used to spy on you. • It’s an excuse to procrastinate. • It waste time you should be working.
  • 22. BUT SUSAN HAS IT IN SALES • Why do Some users have access to Social Media and others don’t, Because it is become part of their job. • Sites like Facebook, Twitter and other Social Media tend to help Departments like Sales or Media relations do their job and these department have their own Network so the bandwidth lose does not effect the company. • The Facebook that will soon be in these department is called Facebook at Work and does not allow personal accounts or games. • If you job or department requires Facebook or other social media you department head will let you know.
  • 23. THE COST IN SOCIAL MEDIA THOUGHT OUT THE COMPANY • Productivity-One reason why organizations on social networking in the workplace is the fact that employees spend a great deal of time updating their profiles and sites throughout the day. If every employee in a 50-strong workforce spent 30 minutes on a social networking site every day, that would work out to a loss of 6,500 hours of productivity in one year! Although this may be a generalization, organizations look very carefully at productivity issues, and 25 hours of non-productive work per day does not go over well with management. When you factor in the average wage per hour you get a better (and decisive) picture. • Resources-Although updates from sites like Facebook or LinkedIn may not take up huge amounts of bandwidth, the availability of (bandwidth-hungry) video links posted on these sites creates problems for IT administrators. There is a cost to Internet browsing, especially when high levels of bandwidth are required.
  • 24. WHY THE LACK OF SOCIAL MEDIA • Viruses and Malware-his threat is often overlooked by organizations. Hackers are attracted to social networking sites because they see the potential to commit fraud and launch spam and malware attacks. There are more than 50,000 applications available for Facebook (according to the company) and while FaceBook may make every effort to provide protection against malware, these third-party applications may not all be safe. Some have the potential to be used to infect computers with malicious code, which in turn can be used to collect data from that user’s site. Messaging on social networking sites is also a concern, and the Koobface worm is just one example of how messages are used to spread malicious code and worms. • Reputation and Legal Liability-At then time of authorship, there have been no major corporate lawsuits involving evidence from social networking sites. However, organizations need to watch for employees who may be commenting publicly about their employer. For example, one young employee wrote on her profile that her job was boring and soon received her marching orders from her boss. What if a disgruntled employee decided to complain about a product or the company’s inefficiencies in his or her profile? There are also serious legal consequences if employees use these sites and click on links to view objectionable, illicit or offensive content. An employer could be held liable for failing to protect employees from viewing such material. The legal costs, fines and damage to the organization’s reputation could be substantial.
  • 25. LACK CON. • Social Engineering-Social engineering is becoming a fine art and more and more people are falling victim to online scams that seem genuine. This can result in data or identity theft. Users may be convinced to give personal details such as Social Security numbers, employment details and so on. By collecting such information, data theft becomes a serious risk. On the other hand, people have a habit of posting details in their social networking profiles. While they would never disclose certain information when meeting someone for the first time, they see nothing wrong with posting it online for all to see on their profile, personal blog or other social networking site account. This data can often be mined by cybercriminals. • Employers must be on the lookout for information that their employees may post, as this may have an impact on the company. People often post messages without thinking through what they’ve have written. A seemingly innocuous message such as “I’m working this weekend because we’ve found a problem in our front-end product” may be a spur-of-the-moment comment but could raise concern among customers who may use that system, especially if the company handles confidential or financial detail.
  • 26. NETWORK SAVES MY WORK WHERE? How a Company Network Saves you work.
  • 27. WHERE YOU WORK IS SAVED • Your Work is saved in Three locations every time you tell you computer to save. • Location One is on your computer in the “docs” folder . • Location Two is on the Company Servers in a user backup file. • Location Three is On a secure cloud drive • All Three location Require a password and user name to access the file, No USB Drives are needed to Save work and in Fact are Ban For Everyone but The IT Department.
  • 28. SECURITY AND THE LITTLE SPY Why USB drive are a security hazard!
  • 29. USB DRIVES They Can Carry Viruses They Can Steal Company Data They Can Carry Malware
  • 30. USB DRIVES AS A SECURITY CONCERN • USB peripherals, such as thumb drives, can be reprogrammed to steal the contents of anything written to the drive and to spread the firmware-modifying code to any PCs it touches. The net result could be a self-replicating virus that spreads through sparing thumb drives, much like the rudimentary viruses that spread by floppy disk decades ago. • Instead, like many cyber security threats, the only real mitigation right now is how you behave. For instance, it's better not to insert one your USB devices into a computer you don't trust (avoid public computer kiosks, for example), and don't plug a USB device into your own computer unless you are confident you trust it and know everywhere it has been.
  • 31. THE THREAT • Attackers may also use their USB drives to steal information directly from a computer. If an attacker can physically access a computer, he or she can download sensitive information directly onto a USB drive. Even computers that have been turned off may be vulnerable, because a computer's memory is still active for several minutes without power. If an attacker can plug a USB drive into the computer during that time, he or she can quickly reboot the system from the USB drive and copy the computer's memory, including passwords, encryption keys, and other sensitive data, onto the drive. Victims may not even realize that their computers were attacked. • The most obvious security risk for USB drives, though, is that they are easily lost or stolen (see Protecting Portable Devices: Physical Security for more information). If the data was not backed up, the loss of a USB drive can mean hours of lost work and the potential that the information cannot be replicated. And if the information on the drive is not encrypted, anyone who has the USB drive can access all of the data on it.
  • 32. LOCK DOWN Close and protect yourself and your job!
  • 33. WHAT IS THE LOCK DOWN SOFTWARE • System lockdown is a protection setting that you can use to control the applications that can run on the client computer. You can create a file fingerprint list that contains the checksums and the locations of all the applications that are authorized for use at your company. The client software includes a Checksum.exe tool that you can use to create a file fingerprint list. The advantage of system lockdown is that it can be enforced whether or not the user is connected to the network. You can use system lockdown to block almost any Trojan horse, spyware, or malware that tries to run or load itself into an existing application. For example, you can prevent these files from loading into Internet Explorer. System lockdown ensures that your system stays in a known and trusted state.
  • 34. HELP DESK HEROES; How to call for help when you need it.
  • 35. WHEN TO CALL • I got an error message. • OK, did you write the error message down or perhaps take a screenshot? No? Well, the help desk is going to need a little more to go on. If you write it down or make a screen cap, you can include the error message information in your question for the help desk, making it far easier to diagnose and fix your problem.
  • 36. WHEN TO CALL • I don’t have to read the dialog box that popped up unexpectedly. That’s IT’s job. • If you unexpectedly have a dialog box pop up, here’s an idea: read it. You may, in fact, know whether to click on “OK” or “Cancel.” If you don’t, then you can relay the contents of the dialog box to the help desk, and they will help you decide.
  • 37. WHEN TO CALL• I need the IT department to speed up the internet. • Before getting in touch with the help desk, it’s a good idea to ask yourself if what you’re asking is actually possible. Do you want IT to remove the pictures of your daughter that her boyfriend posted on Facebook? Do you want them to install OS X on your new Windows PC? A web help desk worker can do lots of things, but some things are impossible without supernatural powers.
  • 38.
  • 39. WHEN TO CALL • I’ll just submit this request before leaving on vacation so it will be fixed when I get back. • This wouldn’t be a terrible idea, except these “requests” invariably define the problem as “My computer doesn’t work,” or consist of a mysterious one-word description like, “Printer.” What’s more, if the help desk makes an attempt to fix your issue, they’re going to want to find out if it worked, and that’s not possible if you’re in Key West slurping margaritas.
  • 40. WHEN TO CALL • 4. Nothing shows up on my screen. • Have you tried the obvious things, like turning it on? Is your monitor, in fact, connected to your computer? What about the keyboard? If you’re typing like a banshee and nothing is showing up, perhaps the keyboard isn’t connected. Believe it or not, checking to see that everything is properly plugged in and turned on fixes a lot of “IT” problems.
  • 41. WHEN TO CALL • It’s Friday at 4:30. If I submit a ticket now, they’ll have all weekend to fix it, especially if I mark it “URGENT.” • Not only do IT workers often need to discuss the problem with you, they don’t always work on weekends. And they won’t be kindly disposed if your “URGENT” problem is something like, “Can you get around the company controls so I can log onto Facebook?”
  • 42. WHEN TO CALL • All my IT requests are urgent. • How very helpful to mark all your IT help desk requests with terms like “ASAP,” “urgent,” and “very important.” It helps the workers put them ahead of all those requests labeled “Just fix this if you feel like it,” and “This isn’t really important.” If every single one of your IT requests is “urgent,” then you’re the kid who cried wolf and the day you see flames shooting from your keyboard, nobody will take you seriously.
  • 43. CHROME WOULDN’T OPEN, SO THE INTERNET MUST BE DOWN. • A surprising number of reasonably intelligent people give up at the first sign of a problem. But if you close Chrome and open it back up again, it might work. And if Chrome doesn’t work, there’s almost certainly a copy of IE on your computer that you can use till the help desk can get to your call
  • 44. WHEN TO CALL THE PLEASE DO NOT DO • If I submit a ticket, email the help desk, and call them, they’ll prioritize my problem. • In fact, if you regularly carpet bomb the IT department, supplementing your help desk ticket with emails and phone calls, they won’t prioritize your problem. They’ll just avoid you. Use the ticket submission procedure; or better yet, check the self-service portal first. The answer you need might be in front of your face. • Today’s web help desk software can’t help you with people who are inconsiderate or proudly clueless, but it can help you use your time as efficiently as possible. When your help desk software is cloud-hosted, you’re always running the latest version and are constantly building your knowledge base and improving the end user experience. Believe it or not, most of them really do appreciate it.
  • 45. THANKS FOR YOUR TIME Any Questions?

Editor's Notes

  1. Welcome to computer basics in the work place. In this class you will learn the difference between the pc you have at home and the computer your use here . I am your trainer Brent Simpers.
  2. Here are a list of Computer parts thank you really need to know the real names for the parts for your computer. The monitor is not a TV
  3. Here is a list of parts and there names as use by your help desk.
  4. Computer Safety is not the same as Workshop safety . Safety on the computer will keep your and your money safe, in the workshop you can lose a finger in the computer you can lose you and all your money.
  5. One of the biggest ways you can have your ID stolen is not lock your pc every time you leave your office.
  6. This is a standard lock screen on windows Enterprise computer.
  7. This is the Login In screen It is seen when you login and relog in after you computer is unlocked
  8. Here are some rules for a safe computer and a safe internet experience.
  9. I have a hand out with all these rules so you can safe your pens.
  10. Virus scanner are our friends. Never Turn them off with out IT approval.
  11. We all get down time and we all get bored but surf the net is not a good thing because of the dark things people do on the net.
  12. If you have nothing to do ask a team mate if you can help them , idle hands are the devils workshop and the internet loves idle hands.
  13. Why can’t we have Facebook or other social media on our office computers. While this is the same reason we do not allow gaming websites and other time wastes. These sites have virus are addictive and can spy on you and allow other to get in to our company network.
  14. Some departments use it as a tool and they have a special Facebook called Facebook for the workplace. It has now games and only has company account access.
  15. Here are some reason some companies have banned Facebook.
  16. Just because a website or social media is not on the block list yet does not mean it is safe.
  17. Some Socail media site are used to train your mind to think in a certain way and get you to do things you would not do.
  18. Being a big network has its up side too. You work is saved 3 time at least these locations this is for several reasons such as computer crash, network down in our department, or fire or other disaster that destroys the building. Your work product is safe.
  19. Usb drive thumb drive or jump drive what ever you call them they are dangerous. They can be used to steal and spy can have virus or malware so here at this company we say no.
  20. This company uses Lock Down software to stop security breeches, If the software finds a security breech it shuts down that computer and that department to safe guard company assets.
  21. Tell the help desk what the message that poped up says can save time and alert them to any security thetas.
  22. There are request that the IT department can do and some that are just impossible. We can fix almost anything.
  23. but we are not Genies
  24. Most things we need you there to fix and make sure it is what you wanted asking us to do something before you leave not good.
  25. Ask your self this question are there lights on the case and on the monitor if not one may be turned off.
  26. Call the Help Desk on Friday at 4:30 pm is not funny or a good joke. They have max hours they can work before it causes problems with payroll and if you have using this to leave early we need you their to talk us though the problem.
  27. Urgent is I am about to lose 6 weeks work not I can’t log in to my gaming site to play Donkey Kong.
  28. Sometimes programs like chrome get stuck in a loop so it best to make sure all copies of chrome are not running in the background and I will show you how on the computer after this lecture.
  29. Submitting all more than one call or request to work on the same problem does not get it fixed, in many cases it mess the ticket order of your call up and put you at the end of the que.
  30. Thanks for spending the morning with me and not let switch over to you computers for some hands on learning.