11. RULES FOR A SAFE WORKSTATION
• Keeping a clean machine: Your company should have clear rules for what employees can install
and keep on their work computers. Make sure they understand and abide by these rules.
Unknown outside programs can open security vulnerabilities in your network.
• Following good password practices: A strong password is a sentence that is at least 12 characters
long. Focus on positive sentences or phrases that you like to think about and are easy to
remember (for example, “I love country music.”). On many sites, you can even use spaces!
Additionally, having separate passwords for every account helps to thwart cybercriminals. At a
minimum, they should separate work and personal accounts and make sure that critical accounts
have the strongest passwords. Finally, writing down passwords and keeping them in a safe place
away from the computer and enabling two-step authentication are other important ways to
secure accounts.
• When in doubt, throw it out: Employees should know not to open suspicious links in email,
tweets, posts, online ads, messages or attachments – even if they know the source. Employees
should also be instructed about your company's spam filters and how to use them to prevent
unwanted, harmful email.
• Backing up their work: Whether you set your employees' computers to back up automatically or
ask that they do it themselves, employees should be instructed on their role in protecting their
work.
• Staying watchful and speaking up: Your employees should be encouraged to keep an eye out and
say something if they notice strange happenings on their computer.
13. WHAT DOES AN ANTI VIRUS
PROGRAM DO?
• Anti-virus software helps to protect your computer from viruses that can destroy
your data, slow your computer's performance, or cause your computer to crash.
Anti-virus software scans your computer for patterns that may indicate an infection.
The patterns it looks for are based on the signatures, or definitions, of known
viruses. Virus authors are continually releasing new and updated viruses, so it is
important that you have the latest definitions installed on your computer.
14. WHAT IS A FIREWALL?
• A firewall helps to prevent data from entering or leaving your computer without
your permission. It helps make you invisible on the Internet and blocks
communications from unauthorized sources.
• It should never be turned off or messed with.
16. INTERNET RULES IN THE WORK PLACE
• Engaging in unlawful or malicious activities;
• Deliberately propagating any virus, worm, Trojan horse, trap-door program code, or other code or file designed to disrupt,
disable, impair, or otherwise harm either the Company's networks or systems or those of any other individual or entity;
• Using abusive, profane, threatening, racist, sexist, or otherwise objectionable language in either public or private messages;
• Sending, receiving, or accessing pornographic materials;
• Becoming involved in partisan politics;
• Causing congestion, disruption, disablement, alteration, or impairment of Company networks or systems;
• Maintaining, organizing, or participating in non-work-related Web logs ("blogs"), Web journals, "chat rooms", or
private/personal/instant messaging;
• Failing to log off any secure, controlled-access computer or other form of electronic data system to which you are assigned,
if you leave such computer or system unattended;
• Using recreational games; and/or
• Defeating or attempting to defeat security restrictions on company systems and applications
17. RULES CONT.
• Use of Company computers, networks, and Internet access is a privilege granted by management and may be
revoked at any time for inappropriate conduct carried out on such systems, including, but not limited to:
• Sending chain letters or participating in any way in the creation or transmission of unsolicited commercial e-
mail ("spam") that is unrelated to legitimate Company purposes;
• Engaging in private or personal business activities, including excessive use of instant messaging and chat
rooms (see below);
• Accessing networks, servers, drives, folders, or files to which the employee has not been granted access or
authorization from someone with the right to make such a grant;
• Making unauthorized copies of Company files or other Company data;
• Destroying, deleting, erasing, or concealing Company files or other Company data, or otherwise making such
files or data unavailable or inaccessible to the Company or to other authorized users of Company systems;
• Misrepresenting oneself or the Company;
• Violating the laws and regulations of the United States or any other nation or any state, city, province, or
other local jurisdiction in any way;
18. RULES CONT.
• Important exception: consistent with federal law, you may use the Company's electronic systems in order to discuss with
other employees the terms and conditions of your and your coworkers' employment. However, any such discussions should
take place during non-duty times and should not interfere with your or your coworkers' assigned duties. You must comply
with a coworker's stated request to be left out of such discussions.
•
• Using Company electronic systems to access, create, view, transmit, or receive racist, sexist, threatening, or otherwise
objectionable or illegal material, defined as any visual, textual, or auditory entity, file, or data, is strictly prohibited. Such
material violates the Company anti-harassment policies and subjects the responsible employee to disciplinary action. The
Company's electronic mail system, Internet access, and computer systems must not be used to harm others or to violate the
laws and regulations of the United States or any other nation or any state, city, province, or other local jurisdiction in any
way. Use of company resources for illegal activity can lead to disciplinary action, up to and including dismissal and criminal
prosecution. The Company will comply with reasonable requests from law enforcement and regulatory agencies for logs,
diaries, archives, or files on individual Internet activities, e-mail use, and/or computer use.
•
• Unless specifically granted in this policy, any non-business use of the Company's electronic systems is expressly forbidden.
•
• If you violate these policies, you could be subject to disciplinary action, up to and including dismissal.
21. NO SOCIAL MEDIA
• It’s depressing, and depressed people are
less productive.
• It’s addicting.
• It can be used to spy on you.
• It’s an excuse to procrastinate.
• It waste time you should be working.
22. BUT SUSAN HAS IT IN SALES
• Why do Some users have access to Social Media and others don’t, Because it is
become part of their job.
• Sites like Facebook, Twitter and other Social Media tend to help Departments like
Sales or Media relations do their job and these department have their own Network
so the bandwidth lose does not effect the company.
• The Facebook that will soon be in these department is called Facebook at Work and
does not allow personal accounts or games.
• If you job or department requires Facebook or other social media you department
head will let you know.
23. THE COST IN SOCIAL MEDIA
THOUGHT OUT THE COMPANY
• Productivity-One reason why organizations on social networking in the workplace is
the fact that employees spend a great deal of time updating their profiles and sites
throughout the day. If every employee in a 50-strong workforce spent 30 minutes on
a social networking site every day, that would work out to a loss of 6,500 hours of
productivity in one year! Although this may be a generalization, organizations look
very carefully at productivity issues, and 25 hours of non-productive work per day
does not go over well with management. When you factor in the average wage per
hour you get a better (and decisive) picture.
• Resources-Although updates from sites like Facebook or LinkedIn may not take up
huge amounts of bandwidth, the availability of (bandwidth-hungry) video links
posted on these sites creates problems for IT administrators. There is a cost to
Internet browsing, especially when high levels of bandwidth are required.
24. WHY THE LACK OF SOCIAL MEDIA
• Viruses and Malware-his threat is often overlooked by organizations. Hackers are attracted to social networking
sites because they see the potential to commit fraud and launch spam and malware attacks. There are more than
50,000 applications available for Facebook (according to the company) and while FaceBook may make every
effort to provide protection against malware, these third-party applications may not all be safe. Some have the
potential to be used to infect computers with malicious code, which in turn can be used to collect data from that
user’s site. Messaging on social networking sites is also a concern, and the Koobface worm is just one example
of how messages are used to spread malicious code and worms.
• Reputation and Legal Liability-At then time of authorship, there have been no major corporate lawsuits involving
evidence from social networking sites. However, organizations need to watch for employees who may be
commenting publicly about their employer. For example, one young employee wrote on her profile that her job
was boring and soon received her marching orders from her boss. What if a disgruntled employee decided to
complain about a product or the company’s inefficiencies in his or her profile? There are also serious legal
consequences if employees use these sites and click on links to view objectionable, illicit or offensive content. An
employer could be held liable for failing to protect employees from viewing such material. The legal costs, fines
and damage to the organization’s reputation could be substantial.
25. LACK CON.
• Social Engineering-Social engineering is becoming a fine art and more and more people are
falling victim to online scams that seem genuine. This can result in data or identity theft. Users
may be convinced to give personal details such as Social Security numbers, employment details
and so on. By collecting such information, data theft becomes a serious risk. On the other hand,
people have a habit of posting details in their social networking profiles. While they would never
disclose certain information when meeting someone for the first time, they see nothing wrong
with posting it online for all to see on their profile, personal blog or other social networking site
account. This data can often be mined by cybercriminals.
• Employers must be on the lookout for information that their employees may post, as this may
have an impact on the company. People often post messages without thinking through what
they’ve have written. A seemingly innocuous message such as “I’m working this weekend because
we’ve found a problem in our front-end product” may be a spur-of-the-moment comment but
could raise concern among customers who may use that system, especially if the company
handles confidential or financial detail.
27. WHERE YOU WORK IS SAVED
• Your Work is saved in Three locations every time you tell you computer to save.
• Location One is on your computer in the “docs” folder .
• Location Two is on the Company Servers in a user backup file.
• Location Three is On a secure cloud drive
• All Three location Require a password and user name to access the file, No USB
Drives are needed to Save work and in Fact are Ban For Everyone but The IT
Department.
28. SECURITY AND THE LITTLE SPY
Why USB drive are a security hazard!
29. USB DRIVES
They Can Carry Viruses They Can Steal Company Data They Can Carry Malware
30. USB DRIVES AS A SECURITY
CONCERN
• USB peripherals, such as thumb drives, can be reprogrammed to steal the contents
of anything written to the drive and to spread the firmware-modifying code to any
PCs it touches. The net result could be a self-replicating virus that spreads through
sparing thumb drives, much like the rudimentary viruses that spread by floppy disk
decades ago.
• Instead, like many cyber security threats, the only real mitigation right now is how
you behave. For instance, it's better not to insert one your USB devices into a
computer you don't trust (avoid public computer kiosks, for example), and don't
plug a USB device into your own computer unless you are confident you trust it and
know everywhere it has been.
31. THE THREAT
• Attackers may also use their USB drives to steal information directly from a computer. If an
attacker can physically access a computer, he or she can download sensitive information
directly onto a USB drive. Even computers that have been turned off may be vulnerable,
because a computer's memory is still active for several minutes without power. If an attacker
can plug a USB drive into the computer during that time, he or she can quickly reboot the
system from the USB drive and copy the computer's memory, including passwords,
encryption keys, and other sensitive data, onto the drive. Victims may not even realize that
their computers were attacked.
• The most obvious security risk for USB drives, though, is that they are easily lost or stolen
(see Protecting Portable Devices: Physical Security for more information). If the data was not
backed up, the loss of a USB drive can mean hours of lost work and the potential that the
information cannot be replicated. And if the information on the drive is not encrypted,
anyone who has the USB drive can access all of the data on it.
33. WHAT IS THE LOCK DOWN SOFTWARE
• System lockdown is a protection setting that you can use to control the applications
that can run on the client computer. You can create a file fingerprint list that
contains the checksums and the locations of all the applications that are authorized
for use at your company. The client software includes a Checksum.exe tool that you
can use to create a file fingerprint list. The advantage of system lockdown is that it
can be enforced whether or not the user is connected to the network. You can use
system lockdown to block almost any Trojan horse, spyware, or malware that tries to
run or load itself into an existing application. For example, you can prevent these
files from loading into Internet Explorer. System lockdown ensures that your system
stays in a known and trusted state.
35. WHEN TO CALL
• I got an error message.
• OK, did you write the error message down or perhaps take a screenshot? No? Well,
the help desk is going to need a little more to go on. If you write it down or make a
screen cap, you can include the error message information in your question for the
help desk, making it far easier to diagnose and fix your problem.
36. WHEN TO CALL
• I don’t have to read the dialog box that popped up unexpectedly. That’s IT’s
job.
• If you unexpectedly have a dialog box pop up, here’s an idea: read it. You
may, in fact, know whether to click on “OK” or “Cancel.” If you don’t, then you
can relay the contents of the dialog box to the help desk, and they will help
you decide.
37. WHEN TO CALL• I need the IT department to
speed up the internet.
• Before getting in touch with
the help desk, it’s a good idea
to ask yourself if what you’re
asking is actually possible. Do
you want IT to remove the
pictures of your daughter that
her boyfriend posted on
Facebook? Do you want them
to install OS X on your new
Windows PC? A web help desk
worker can do lots of things,
but some things are impossible
without supernatural powers.
38.
39. WHEN TO CALL
• I’ll just submit this request before leaving
on vacation so it will be fixed when I get
back.
• This wouldn’t be a terrible idea, except
these “requests” invariably define the
problem as “My computer doesn’t work,”
or consist of a mysterious one-word
description like, “Printer.” What’s more, if
the help desk makes an attempt to fix your
issue, they’re going to want to find out if it
worked, and that’s not possible if you’re in
Key West slurping margaritas.
40. WHEN TO CALL
• 4. Nothing shows up on my screen.
• Have you tried the obvious things,
like turning it on? Is your monitor, in
fact, connected to your computer?
What about the keyboard? If you’re
typing like a banshee and nothing is
showing up, perhaps the keyboard
isn’t connected. Believe it or not,
checking to see that everything is
properly plugged in and turned on
fixes a lot of “IT” problems.
41. WHEN TO CALL
• It’s Friday at 4:30. If I submit a ticket
now, they’ll have all weekend to fix it,
especially if I mark it “URGENT.”
• Not only do IT workers often need to
discuss the problem with you, they
don’t always work on weekends. And
they won’t be kindly disposed if your
“URGENT” problem is something like,
“Can you get around the company
controls so I can log onto
Facebook?”
42. WHEN TO CALL
• All my IT requests are urgent.
• How very helpful to mark all your IT help desk requests with
terms like “ASAP,” “urgent,” and “very important.” It helps
the workers put them ahead of all those requests labeled
“Just fix this if you feel like it,” and “This isn’t really
important.” If every single one of your IT requests is
“urgent,” then you’re the kid who cried wolf and the day you
see flames shooting from your keyboard, nobody will take
you seriously.
43. CHROME WOULDN’T OPEN, SO THE INTERNET
MUST BE DOWN.
• A surprising number of reasonably intelligent people give up at the first sign of a
problem. But if you close Chrome and open it back up again, it might work. And if
Chrome doesn’t work, there’s almost certainly a copy of IE on your computer that
you can use till the help desk can get to your call
44. WHEN TO CALL
THE PLEASE DO NOT DO
• If I submit a ticket, email the help desk, and call them, they’ll prioritize my problem.
• In fact, if you regularly carpet bomb the IT department, supplementing your help desk ticket
with emails and phone calls, they won’t prioritize your problem. They’ll just avoid you. Use
the ticket submission procedure; or better yet, check the self-service portal first. The answer
you need might be in front of your face.
• Today’s web help desk software can’t help you with people who are inconsiderate or proudly
clueless, but it can help you use your time as efficiently as possible. When your help desk
software is cloud-hosted, you’re always running the latest version and are constantly
building your knowledge base and improving the end user experience. Believe it or not,
most of them really do appreciate it.
Welcome to computer basics in the work place. In this class you will learn the difference between the pc you have at home and the computer your use here . I am your trainer Brent Simpers.
Here are a list of Computer parts thank you really need to know the real names for the parts for your computer. The monitor is not a TV
Here is a list of parts and there names as use by your help desk.
Computer Safety is not the same as Workshop safety . Safety on the computer will keep your and your money safe, in the workshop you can lose a finger in the computer you can lose you and all your money.
One of the biggest ways you can have your ID stolen is not lock your pc every time you leave your office.
This is a standard lock screen on windows Enterprise computer.
This is the Login In screen It is seen when you login and relog in after you computer is unlocked
Here are some rules for a safe computer and a safe internet experience.
I have a hand out with all these rules so you can safe your pens.
Virus scanner are our friends. Never Turn them off with out IT approval.
We all get down time and we all get bored but surf the net is not a good thing because of the dark things people do on the net.
If you have nothing to do ask a team mate if you can help them , idle hands are the devils workshop and the internet loves idle hands.
Why can’t we have Facebook or other social media on our office computers. While this is the same reason we do not allow gaming websites and other time wastes. These sites have virus are addictive and can spy on you and allow other to get in to our company network.
Some departments use it as a tool and they have a special Facebook called Facebook for the workplace. It has now games and only has company account access.
Here are some reason some companies have banned Facebook.
Just because a website or social media is not on the block list yet does not mean it is safe.
Some Socail media site are used to train your mind to think in a certain way and get you to do things you would not do.
Being a big network has its up side too. You work is saved 3 time at least these locations this is for several reasons such as computer crash, network down in our department, or fire or other disaster that destroys the building. Your work product is safe.
Usb drive thumb drive or jump drive what ever you call them they are dangerous. They can be used to steal and spy can have virus or malware so here at this company we say no.
This company uses Lock Down software to stop security breeches, If the software finds a security breech it shuts down that computer and that department to safe guard company assets.
Tell the help desk what the message that poped up says can save time and alert them to any security thetas.
There are request that the IT department can do and some that are just impossible. We can fix almost anything.
but we are not Genies
Most things we need you there to fix and make sure it is what you wanted asking us to do something before you leave not good.
Ask your self this question are there lights on the case and on the monitor if not one may be turned off.
Call the Help Desk on Friday at 4:30 pm is not funny or a good joke. They have max hours they can work before it causes problems with payroll and if you have using this to leave early we need you their to talk us though the problem.
Urgent is I am about to lose 6 weeks work not I can’t log in to my gaming site to play Donkey Kong.
Sometimes programs like chrome get stuck in a loop so it best to make sure all copies of chrome are not running in the background and I will show you how on the computer after this lecture.
Submitting all more than one call or request to work on the same problem does not get it fixed, in many cases it mess the ticket order of your call up and put you at the end of the que.
Thanks for spending the morning with me and not let switch over to you computers for some hands on learning.