0
PC Safety and Security Manual
         A Summary
        © 2007 Rob Clement
         all rights reserved
        www.boysb...
Introduction

Beware you can lose your data sooner
than you think.

One lightning strike could be a catastrophe
for you.

...
What if I lost my computer -
          permanently?

Challenge:

   Switch off your computer/s for a day.
   Keep the mach...
What if I lost my computer -
        permanently? II


Options are to use the Internet at
Cyber cafe or library.

What if ...
Keep Your Computer Safe.


Place your computer in a secure place.

Check out your security video.

Avoid high-visibility l...
Keep Your Computer Safe. II


Is your power supply safe?

Consider         Surge protection
                 Battery backu...
Keep Your Computer Safe. III


Drinks and floods

      Get a new keyboard don't fix it
      Portables and liquids do not...
Keep Your Computer Safe. IV



Cleaning sprays can be deadly

Fires and explosions happen
       keep your computer data s...
Traveling With Your Portable

Backup data twice before traveling.
   One backup with you
   One backup leave behind

Don't...
Protect Your Passwords.


If you use a computer
     at the coffee shop or Cyber cafe

   Log off e-mail at the end.
   Lo...
Protect Your Passwords. II



Protect your bank and personal details

Your use of a computer at a Cyber cafe or
coffee sho...
Backup Options and Priorities


Backups are essential.

Backup to magnetic tape is best.
   DVD or CD R/W discs otherwise
...
Backup Options and Priorities II


Backup
   Documents (My Document before Vista)
   E-mails
   other software's data
    ...
Backup Options and Priorities III

Keep optical discs away from heat or light.
Replace optical discs if they show problem....
Backup Options and Priorities IV


Keep original software discs safely.

Backup any software you downloaded.

Always rotat...
Magnets


Why are magnets so dangerous to
computers?

Answer To wipe your data from a floppy disc
or hard drive use fixed ...
Computer Operating System
    and Software Discs


Collect the boot and recovery discs for
your PC
Put them in a CD holder...
Your PDA Is “Part” Of Your
         Computer.

Do not forget your PDA.
   It is always in danger of damage or loss.
   Cop...
Simple Settings on Your
           Computer


Apply updates to your computer system

Turn on your firewall.
   Include Vis...
Simple Settings on Your
         Computer II
Set browser to maximum security.
Consider an alternative browser

Install sof...
Simple Settings on Your
         Computer III

Do not open unknown e-mail attachments.

Do not run programs, you do not kn...
Simple Settings on Your
         Computer IV


Think about where to locate physical
firewalls

Turn off your computer when...
Spam Is Coming.

What is Spam?
  Unwanted or junk e-mail.
  Beware of becoming a spammer.

Check your spam folder often or...
Spam Is Coming. II

Do not release your e-mail address to
the Internet.

Use spam blocking software.
Use multiple e-mail a...
Adware, Spyware and Malware
What is the difference between adware,
spyware and malware?

Spyware is software that enables ...
Adware, Spyware and Malware II


Adware on the other hand will display
adverts for various types of products
and services ...
Adware, Spyware and Malware III

Malware is spyware in its worst forms,
where in the end the malware will give
all of your...
Phishing and Identity Theft

Phishing and identity theft is big
business.

Ever received an e-mail from a
reputable busine...
Phishing and Identity Theft II

Identity theft someone steals your ID
and passwords and then pretend to be
you, stealing m...
Computer Virus or a Cold
A computer virus is a program
    (or a script)
   it causes worry to the user
   or harm to the ...
Computer Virus or a Cold II

Always have anti-virus updates paid for.
Always update your anti-virus

A Trojan horse appear...
Computer Virus or a Cold III



Switch the Firewall on now.

To access the Internet without anti-
virus etc is playing Rus...
Computer Virus or a Cold IV


Use the free service offered by
Symantec or Kaspersky to check your
computer.

Shop around a...
Online Scams


Do not trust everyone on the Internet.

   You cannot see their faces

   You cannot see their body language.
Online Scams II

If someone appears too good to be true
they probably are.

   They may appear a novice.

   They may appe...
Online Scams III
Do not give out your personal details

   Not your home address

   Not your date of birth

   Not your b...
Online Scams IV
Check their ISP to see where they are.

   Check   business address
   Check   website pictures
   Check  ...
Disaster recovery.


Disaster recovery is mainly for businesses
   Includes non-profit organizations
   Includes clubs
   ...
Disaster recovery II.


 Disaster


A disaster is an event that means you
cannot continue to run your business
and need to...
Disaster recovery III.


We take a disaster audit.

   List of computers and their software.
   What would happen if any o...
Disaster recovery IV.


How long from the loss of that
computer would the replacement be
working with all the information ...
Disaster recovery V.


List all the computers you use that if
they failed today you could roll in a new
computer onto the ...
Disaster recovery VI.
Now the hard part!
One or more computers that are vital to
your operation that you need to have
avai...
Disaster recovery V.



Finally    in your disaster audit
    list   all telephones
    list   Fax machines
    list   mod...
Disaster recovery VI.


Decision time
Do you have too many eggs in one basket?
Do you need to spread the computer load?
Do...
Disaster recovery VII.
 Recovery
The decisions need to made and written
down then make a plan.

Get someone as an IT resou...
Disaster recovery VIII.
Define your disaster and get a feel for
timescales and prices.

Balance between the costs of
immed...
Disaster recovery IX.


Keep multiple copies of the disaster
recovery plan so everyone knows what
to and who to contact.

...
Conclusion


Protect your computer.
Secure your computer.
Protect from virus, spam, spyware,
adware, and malware.
Make bac...
PC Safety and Security


         The end of the Book

The start of protecting your computer.

         www.boysbach.com
 ...
Upcoming SlideShare
Loading in...5
×

PC Safety & Security

1,366

Published on

Have you been scammed online? Do you use your computer for both personal use and business? What would happen if your computer totally died, would you be able to function without it?
No idea then you need to read the whole book to get the answers to these questions.
Download your copy from www.boysbach.com

Published in: Business, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
1,366
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
89
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Transcript of "PC Safety & Security"

  1. 1. PC Safety and Security Manual A Summary © 2007 Rob Clement all rights reserved www.boysbach.com with thanks to www.powerbacks.com for the background
  2. 2. Introduction Beware you can lose your data sooner than you think. One lightning strike could be a catastrophe for you. A computer is “cheap” and easily replaced. The information may be irreplaceable.
  3. 3. What if I lost my computer - permanently? Challenge: Switch off your computer/s for a day. Keep the machine turned off See what you need to have right now. How much is that information worth?
  4. 4. What if I lost my computer - permanently? II Options are to use the Internet at Cyber cafe or library. What if you had your PC stolen or it was destroyed?
  5. 5. Keep Your Computer Safe. Place your computer in a secure place. Check out your security video. Avoid high-visibility locations.
  6. 6. Keep Your Computer Safe. II Is your power supply safe? Consider Surge protection Battery backup Generator
  7. 7. Keep Your Computer Safe. III Drinks and floods Get a new keyboard don't fix it Portables and liquids do not mix. Keep your desktop off the floor.
  8. 8. Keep Your Computer Safe. IV Cleaning sprays can be deadly Fires and explosions happen keep your computer data safe.
  9. 9. Traveling With Your Portable Backup data twice before traveling. One backup with you One backup leave behind Don't lose it Don't have it stolen.
  10. 10. Protect Your Passwords. If you use a computer at the coffee shop or Cyber cafe Log off e-mail at the end. Log off your bank account at the end.
  11. 11. Protect Your Passwords. II Protect your bank and personal details Your use of a computer at a Cyber cafe or coffee shop could be being monitored.
  12. 12. Backup Options and Priorities Backups are essential. Backup to magnetic tape is best. DVD or CD R/W discs otherwise Check your backup from time to time.
  13. 13. Backup Options and Priorities II Backup Documents (My Document before Vista) E-mails other software's data (e.g. The accounts package.)
  14. 14. Backup Options and Priorities III Keep optical discs away from heat or light. Replace optical discs if they show problem. Keep backup away from computer. Check the warranty on a fireproof safe. Make a decision do not leave to chance.
  15. 15. Backup Options and Priorities IV Keep original software discs safely. Backup any software you downloaded. Always rotate a number of copies of the backup.
  16. 16. Magnets Why are magnets so dangerous to computers? Answer To wipe your data from a floppy disc or hard drive use fixed magnet. It can never be recovered.
  17. 17. Computer Operating System and Software Discs Collect the boot and recovery discs for your PC Put them in a CD holder If you use a portable take them with you when traveling.
  18. 18. Your PDA Is “Part” Of Your Computer. Do not forget your PDA. It is always in danger of damage or loss. Copy all the data onto your PC often. Do not forget to back up your telephone numbers
  19. 19. Simple Settings on Your Computer Apply updates to your computer system Turn on your firewall. Include Vista Windows Defender.
  20. 20. Simple Settings on Your Computer II Set browser to maximum security. Consider an alternative browser Install software protection Anti-virus Internet Security Evaluate the choices not just the prices
  21. 21. Simple Settings on Your Computer III Do not open unknown e-mail attachments. Do not run programs, you do not know where they came from. Disconnect from the Internet when not using it.
  22. 22. Simple Settings on Your Computer IV Think about where to locate physical firewalls Turn off your computer when not in use
  23. 23. Spam Is Coming. What is Spam? Unwanted or junk e-mail. Beware of becoming a spammer. Check your spam folder often or miss important mail.
  24. 24. Spam Is Coming. II Do not release your e-mail address to the Internet. Use spam blocking software. Use multiple e-mail addresses Get an e-mail provider who will stop spam.
  25. 25. Adware, Spyware and Malware What is the difference between adware, spyware and malware? Spyware is software that enables an individual or company to see what web sites you are accessing, search your hard disc for “useful information” and also what your account numbers and passwords are.
  26. 26. Adware, Spyware and Malware II Adware on the other hand will display adverts for various types of products and services available on the Internet. Adware is annoying; spyware can be catastrophic to your computer and to you.
  27. 27. Adware, Spyware and Malware III Malware is spyware in its worst forms, where in the end the malware will give all of your computer information to a third party, mess up your web browser settings and your Internet sites and prevent you from using your computer as it runs so slowly.
  28. 28. Phishing and Identity Theft Phishing and identity theft is big business. Ever received an e-mail from a reputable business or bank? Are they real? No they are Phishing for bank or credit card info?
  29. 29. Phishing and Identity Theft II Identity theft someone steals your ID and passwords and then pretend to be you, stealing money and arranging bank loans. Ask for personal advice for software to combat this
  30. 30. Computer Virus or a Cold A computer virus is a program (or a script) it causes worry to the user or harm to the computer or both Computer virus detection is big business. Beware of special days like Friday 13th, 9/11 etc
  31. 31. Computer Virus or a Cold II Always have anti-virus updates paid for. Always update your anti-virus A Trojan horse appears harmless or even helpful but it is harmful and may be deadly.
  32. 32. Computer Virus or a Cold III Switch the Firewall on now. To access the Internet without anti- virus etc is playing Russian Roulette
  33. 33. Computer Virus or a Cold IV Use the free service offered by Symantec or Kaspersky to check your computer. Shop around and ask for advice.
  34. 34. Online Scams Do not trust everyone on the Internet. You cannot see their faces You cannot see their body language.
  35. 35. Online Scams II If someone appears too good to be true they probably are. They may appear a novice. They may appear an expert. They may appear to be average.
  36. 36. Online Scams III Do not give out your personal details Not your home address Not your date of birth Not your bank details Not your credit card details
  37. 37. Online Scams IV Check their ISP to see where they are. Check business address Check website pictures Check company registration Check list of directors Before accepting any proposal ALL THIS IS DUE DILIGENCE
  38. 38. Disaster recovery. Disaster recovery is mainly for businesses Includes non-profit organizations Includes clubs and special interest groups. How do we define a disaster? How do we recover from it?
  39. 39. Disaster recovery II. Disaster A disaster is an event that means you cannot continue to run your business and need to recover.
  40. 40. Disaster recovery III. We take a disaster audit. List of computers and their software. What would happen if any of these computers failed? What information would you lose? What correspondence would you lose?
  41. 41. Disaster recovery IV. How long from the loss of that computer would the replacement be working with all the information that you have on it today up to date (and that does not allow for any information waiting to be input) Document all this in one place.
  42. 42. Disaster recovery V. List all the computers you use that if they failed today you could roll in a new computer onto the desk and within an hour or two everything would be fine.
  43. 43. Disaster recovery VI. Now the hard part! One or more computers that are vital to your operation that you need to have available now. Define how many hours a week they need to be available (24x7 or business hours seven days a week or business hours Monday to Friday.) Document how long your business can do without that computer before it hits problems.
  44. 44. Disaster recovery V. Finally in your disaster audit list all telephones list Fax machines list modems list routers and their connections
  45. 45. Disaster recovery VI. Decision time Do you have too many eggs in one basket? Do you need to spread the computer load? Do you need a computer to mirror another? Back up every computer in your business now!
  46. 46. Disaster recovery VII. Recovery The decisions need to made and written down then make a plan. Get someone as an IT resource even if only for a disaster Do you have a support contract for your computers? Get support you cannot recover a disaster single handed.
  47. 47. Disaster recovery VIII. Define your disaster and get a feel for timescales and prices. Balance between the costs of immediate recovery and 2 to 3 days of downtime before all services are resumed. Draw up of a network diagram for the current systems and computers. Keep this up to date.
  48. 48. Disaster recovery IX. Keep multiple copies of the disaster recovery plan so everyone knows what to and who to contact. Review and update the plan at least every year.
  49. 49. Conclusion Protect your computer. Secure your computer. Protect from virus, spam, spyware, adware, and malware. Make back up so you never lose data. Make a plan for a disaster.
  50. 50. PC Safety and Security The end of the Book The start of protecting your computer. www.boysbach.com for copies of the complete manual.
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×