SlideShare a Scribd company logo
1 of 36
Keep Your Computers Safe and Secure ©2008 Rob Clement All Rights Reserved www.boysbach.com
Introduction Beware you can lose your data sooner than you think. One lightning strike could be a catastrophe for you. A computer is “cheap” and easily replaced. The information may be irreplaceable.
What Is The Real Problem Challenge: Switch off your computer/s for a day. Keep the machine turned off  –  no cheating See what you need to have right now. How much is that information worth? Options: Use Internet at Cyber cafe or library. What if you had your PC stolen or it was destroyed?
Keep Your Computer Safe 1 Place your computer in a secure location. Check out your security video Avoid high-visibility locations
Keep Your Computer Safe 2 Is your power supply safe? Surge protection Battery backup Generator
Keep Your Computer Safe 3 Drinks and floods Get a new keyboard don't fix it! Portables and liquids do not mix! Keep your desktop off the floor!
Keep Your Computer Safe 4 Cleaning sprays can be deadly Fires and explosions happen: keep your computer data safe.
Traveling With Your Portable Backup data before traveling. One backup with you One backup leave behind Don't lose the portable Don't have the portable stolen.
Protect Your Passwords If you use a computer at the coffee shop or Cyber cafe Log off e-mail and your bank account when you finish Protect your bank and personal details Your use of a computer at a Cyber cafe or coffee shop it could be monitored.
Backup Options and Priorities 1 Backups are essential. Backup to magnetic tape is best. DVD or CD R/W discs otherwise Check the results of your backup from time to time.
Backup Options and Priorities 2 Backup: Documents (My Document pre-Vista)‏ E-mails Other software's data:   e.g. The accounts package.
Backup Options and Priorities 3 Check the warranty on a fireproof safe. Make a decision do not leave to chance.
Backup Options and Priorities 4 Keep optical discs away from heat or light. Replace optical discs if they show problems. Keep backup away from computer. Keep the original software discs safely. Backup any software you have downloaded. Always rotate a number of discs.
Magnets Why are magnets so dangerous to computers? To wipe your data from a floppy disc or hard drive use fixed magnet.
Computer Operating System Discs Collect the boot and recovery discs for your PC Put them in a CD holder If you use a portable take these discs with you.
Your PDA Is “Part” Of A Computer. Do not forget your PDA. It is always vulnerable. Copy all data onto your PC regularly. Back up your telephone numbers
Simple Settings on Your Computer 1 Apply updates to your system Turn on your firewall. Include Vista Windows Defender. Set your browser for max security. Consider an alternative browser
Simple Settings on Your Computer 2 Install software protection Anti-virus Internet Security Evaluate choices not just prices Do not open unknown e-mail attachments. Do not run programs, you do not know where they came from. Disconnect from Internet when not in use.
Simple Settings on Your Computer 3 Think about where to locate physical firewalls Turn off your computer when not in use
Spam Is Coming 1 What is Spam? Unwanted or junk e-mail. Beware of becoming a spammer. Check your spam folder often   or miss important mail. Do not release your e-mail address to the Internet.
Spam Is Coming 2 Use spam blocking software. Use multiple e-mail addresses Get an e-mail provider who will stop spam.
Adware, Spyware and Malware 1 Spyware is software that enables an individual or company to see what web sites you are accessing, search your hard disc for “useful information” and also what your account numbers and passwords are.
Adware, Spyware and Malware 2 Adware on the other hand will display adverts for various types of products and services available on the Internet. Adware is annoying; spyware can be catastrophic to your computer and to you.
Adware, Spyware and Malware 3 Malware is spyware in its worst forms, where in the end the malware will give all of your computer information to a third party, mess up your web browser settings and your Internet sites and prevent you from using your computer as it runs so slowly.
Phishing and Identity Theft 1 Phishing and identity theft is big business. Ever received an e-mail from a reputable business or bank? Are they real? No they are Phishing for bank or credit card info?
Phishing and Identity Theft 2 Identity theft someone steals your ID and passwords and then pretend to be you, stealing money and arranging bank loans. Ask for personal advice for software to combat this
A Computer Virus 1 A computer virus is a program (or script)‏ it causes worry to the user or harm to the computer or both Computer virus detection is big business. Beware of special days   like Friday 13 th , 9/11 etc
A Computer Virus 2 Always have anti-virus updates paid for. Always update your anti-virus A Trojan horse appears harmless or even helpful but it is harmful and may be deadly. Switch the Firewall on now.
A Computer Virus 3 Access the Internet without anti-virus etc is playing Russian Roulette Use the free service offered by Symantec or Kaspersky to  check your computer. Shop around and ask for advice.
Online Scams 1 Do not trust everyone on the Internet. You cannot see their faces You cannot see their body language.
Online Scams 2 If someone appears too good to be true they probably are. They may appear a novice. They may appear an expert. They may appear to be average.
Online Scams 3 Do not give out your personal details Not your home address Not your date of birth Not your bank details Not your credit card details
Online Scams 4 Check their ISP to see what country they are in. Check business address Check website pictures Check company registration Check list of directors Before accepting any business  proposal ALL THIS IS DUE DILIGENCE
Conclusion Protect your computer. Secure your computer. Protect from virus, spam, spyware, adware, and malware. Make back up so you never lose the data.
To Purchase a full copy of “ PC Safety and Security Manual” By Rob Clement Go to www.boysbach.com
Keep Your Computers Safe and Secure ,[object Object],[object Object],[object Object]

More Related Content

What's hot

Ten Important Rules
Ten Important RulesTen Important Rules
Ten Important Rulesritz482
 
Internet safety guide
Internet safety guideInternet safety guide
Internet safety guidemjtheman
 
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesMark Jhon Oxillo
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awarenessMichel Bitter
 
Infosec 4 The Home
Infosec 4 The HomeInfosec 4 The Home
Infosec 4 The Homejaysonstreet
 
Jeopardy
JeopardyJeopardy
Jeopardyzed_o07
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and securityjovellconde1
 
Network security primer
Network security primerNetwork security primer
Network security primeraeroman7
 
Computer based crime
Computer based crimeComputer based crime
Computer based crimeTaylor_Marie
 
Online Security and Safety
Online Security and SafetyOnline Security and Safety
Online Security and SafetyConor O'Neill
 
Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Jay Nagar
 
Notes to The Ten Commandments of Online Security and Privacy
Notes to The Ten Commandments of Online Security and PrivacyNotes to The Ten Commandments of Online Security and Privacy
Notes to The Ten Commandments of Online Security and PrivacyJonathan Bacon
 
Remote administration tools
Remote administration toolsRemote administration tools
Remote administration toolslondon b o r d a
 

What's hot (19)

Ten Important Rules
Ten Important RulesTen Important Rules
Ten Important Rules
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet safety guide
Internet safety guideInternet safety guide
Internet safety guide
 
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
 
Infosec 4 The Home
Infosec 4 The HomeInfosec 4 The Home
Infosec 4 The Home
 
Jeopardy
JeopardyJeopardy
Jeopardy
 
List of Malwares
List of MalwaresList of Malwares
List of Malwares
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and security
 
Network security primer
Network security primerNetwork security primer
Network security primer
 
Email Security Tips
Email Security TipsEmail Security Tips
Email Security Tips
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Cybersecurity Awareness
Cybersecurity AwarenessCybersecurity Awareness
Cybersecurity Awareness
 
Computer based crime
Computer based crimeComputer based crime
Computer based crime
 
Online Security and Safety
Online Security and SafetyOnline Security and Safety
Online Security and Safety
 
Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual
 
Presented to Compass
Presented to CompassPresented to Compass
Presented to Compass
 
Notes to The Ten Commandments of Online Security and Privacy
Notes to The Ten Commandments of Online Security and PrivacyNotes to The Ten Commandments of Online Security and Privacy
Notes to The Ten Commandments of Online Security and Privacy
 
Remote administration tools
Remote administration toolsRemote administration tools
Remote administration tools
 

Similar to Keep Your Computers Safe And Secure

Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014B2BPlanner Ltd.
 
Edu352 week1discussion2technologysafetyoct2011crs
Edu352 week1discussion2technologysafetyoct2011crsEdu352 week1discussion2technologysafetyoct2011crs
Edu352 week1discussion2technologysafetyoct2011crssapphirecrs
 
How to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, VirusHow to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, VirusHabFg
 
Computer Security Guide to Pc Security
Computer Security Guide to Pc SecurityComputer Security Guide to Pc Security
Computer Security Guide to Pc SecurityMallTake
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Programdavidcurriecia
 
Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4leahg118
 
3 summer computer tips
3 summer computer tips3 summer computer tips
3 summer computer tipsar-rifke.com
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & securitypinkutinku26
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pestspeterhitch
 
Safety Plano Library June 4 Main
Safety   Plano Library June 4 MainSafety   Plano Library June 4 Main
Safety Plano Library June 4 Mainsmeech
 
10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.Khalil Jubran
 
101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!
101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!
101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!EMBplc.com
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingWilliam Mann
 
Keeping Your Computer Secure
Keeping Your Computer SecureKeeping Your Computer Secure
Keeping Your Computer SecureNiall Roche
 
The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is DangerousGihan Dias
 

Similar to Keep Your Computers Safe And Secure (20)

Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014
 
Edu352 week1discussion2technologysafetyoct2011crs
Edu352 week1discussion2technologysafetyoct2011crsEdu352 week1discussion2technologysafetyoct2011crs
Edu352 week1discussion2technologysafetyoct2011crs
 
How to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, VirusHow to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, Virus
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Guide to pc_security
Guide to pc_securityGuide to pc_security
Guide to pc_security
 
Computer Security Guide to Pc Security
Computer Security Guide to Pc SecurityComputer Security Guide to Pc Security
Computer Security Guide to Pc Security
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4
 
3 summer computer tips
3 summer computer tips3 summer computer tips
3 summer computer tips
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
 
Safety Plano Library June 4 Main
Safety   Plano Library June 4 MainSafety   Plano Library June 4 Main
Safety Plano Library June 4 Main
 
10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.
 
Protecting Your Computer
Protecting Your ComputerProtecting Your Computer
Protecting Your Computer
 
101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!
101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!
101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Keeping Your Computer Secure
Keeping Your Computer SecureKeeping Your Computer Secure
Keeping Your Computer Secure
 
The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is Dangerous
 

Recently uploaded

Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst SummitHolger Mueller
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessAggregage
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 
Best Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaBest Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaShree Krishna Exports
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsApsara Of India
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth MarketingShawn Pang
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 

Recently uploaded (20)

Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst Summit
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for Success
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
Best Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaBest Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in India
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
 
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 

Keep Your Computers Safe And Secure

  • 1. Keep Your Computers Safe and Secure ©2008 Rob Clement All Rights Reserved www.boysbach.com
  • 2. Introduction Beware you can lose your data sooner than you think. One lightning strike could be a catastrophe for you. A computer is “cheap” and easily replaced. The information may be irreplaceable.
  • 3. What Is The Real Problem Challenge: Switch off your computer/s for a day. Keep the machine turned off – no cheating See what you need to have right now. How much is that information worth? Options: Use Internet at Cyber cafe or library. What if you had your PC stolen or it was destroyed?
  • 4. Keep Your Computer Safe 1 Place your computer in a secure location. Check out your security video Avoid high-visibility locations
  • 5. Keep Your Computer Safe 2 Is your power supply safe? Surge protection Battery backup Generator
  • 6. Keep Your Computer Safe 3 Drinks and floods Get a new keyboard don't fix it! Portables and liquids do not mix! Keep your desktop off the floor!
  • 7. Keep Your Computer Safe 4 Cleaning sprays can be deadly Fires and explosions happen: keep your computer data safe.
  • 8. Traveling With Your Portable Backup data before traveling. One backup with you One backup leave behind Don't lose the portable Don't have the portable stolen.
  • 9. Protect Your Passwords If you use a computer at the coffee shop or Cyber cafe Log off e-mail and your bank account when you finish Protect your bank and personal details Your use of a computer at a Cyber cafe or coffee shop it could be monitored.
  • 10. Backup Options and Priorities 1 Backups are essential. Backup to magnetic tape is best. DVD or CD R/W discs otherwise Check the results of your backup from time to time.
  • 11. Backup Options and Priorities 2 Backup: Documents (My Document pre-Vista)‏ E-mails Other software's data: e.g. The accounts package.
  • 12. Backup Options and Priorities 3 Check the warranty on a fireproof safe. Make a decision do not leave to chance.
  • 13. Backup Options and Priorities 4 Keep optical discs away from heat or light. Replace optical discs if they show problems. Keep backup away from computer. Keep the original software discs safely. Backup any software you have downloaded. Always rotate a number of discs.
  • 14. Magnets Why are magnets so dangerous to computers? To wipe your data from a floppy disc or hard drive use fixed magnet.
  • 15. Computer Operating System Discs Collect the boot and recovery discs for your PC Put them in a CD holder If you use a portable take these discs with you.
  • 16. Your PDA Is “Part” Of A Computer. Do not forget your PDA. It is always vulnerable. Copy all data onto your PC regularly. Back up your telephone numbers
  • 17. Simple Settings on Your Computer 1 Apply updates to your system Turn on your firewall. Include Vista Windows Defender. Set your browser for max security. Consider an alternative browser
  • 18. Simple Settings on Your Computer 2 Install software protection Anti-virus Internet Security Evaluate choices not just prices Do not open unknown e-mail attachments. Do not run programs, you do not know where they came from. Disconnect from Internet when not in use.
  • 19. Simple Settings on Your Computer 3 Think about where to locate physical firewalls Turn off your computer when not in use
  • 20. Spam Is Coming 1 What is Spam? Unwanted or junk e-mail. Beware of becoming a spammer. Check your spam folder often or miss important mail. Do not release your e-mail address to the Internet.
  • 21. Spam Is Coming 2 Use spam blocking software. Use multiple e-mail addresses Get an e-mail provider who will stop spam.
  • 22. Adware, Spyware and Malware 1 Spyware is software that enables an individual or company to see what web sites you are accessing, search your hard disc for “useful information” and also what your account numbers and passwords are.
  • 23. Adware, Spyware and Malware 2 Adware on the other hand will display adverts for various types of products and services available on the Internet. Adware is annoying; spyware can be catastrophic to your computer and to you.
  • 24. Adware, Spyware and Malware 3 Malware is spyware in its worst forms, where in the end the malware will give all of your computer information to a third party, mess up your web browser settings and your Internet sites and prevent you from using your computer as it runs so slowly.
  • 25. Phishing and Identity Theft 1 Phishing and identity theft is big business. Ever received an e-mail from a reputable business or bank? Are they real? No they are Phishing for bank or credit card info?
  • 26. Phishing and Identity Theft 2 Identity theft someone steals your ID and passwords and then pretend to be you, stealing money and arranging bank loans. Ask for personal advice for software to combat this
  • 27. A Computer Virus 1 A computer virus is a program (or script)‏ it causes worry to the user or harm to the computer or both Computer virus detection is big business. Beware of special days like Friday 13 th , 9/11 etc
  • 28. A Computer Virus 2 Always have anti-virus updates paid for. Always update your anti-virus A Trojan horse appears harmless or even helpful but it is harmful and may be deadly. Switch the Firewall on now.
  • 29. A Computer Virus 3 Access the Internet without anti-virus etc is playing Russian Roulette Use the free service offered by Symantec or Kaspersky to check your computer. Shop around and ask for advice.
  • 30. Online Scams 1 Do not trust everyone on the Internet. You cannot see their faces You cannot see their body language.
  • 31. Online Scams 2 If someone appears too good to be true they probably are. They may appear a novice. They may appear an expert. They may appear to be average.
  • 32. Online Scams 3 Do not give out your personal details Not your home address Not your date of birth Not your bank details Not your credit card details
  • 33. Online Scams 4 Check their ISP to see what country they are in. Check business address Check website pictures Check company registration Check list of directors Before accepting any business proposal ALL THIS IS DUE DILIGENCE
  • 34. Conclusion Protect your computer. Secure your computer. Protect from virus, spam, spyware, adware, and malware. Make back up so you never lose the data.
  • 35. To Purchase a full copy of “ PC Safety and Security Manual” By Rob Clement Go to www.boysbach.com
  • 36.