Desktop Security 8 9 07


Published on

Published in: Economy & Finance, Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total Views
On Slideshare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • Desktop Security 8 9 07

    1. 1. Desktop Security & Backup Adam King August 9th, 2007 a program of
    2. 2. NPower is… A network of local nonprofit technology assistance providers that share a common mission, vision and service values. <ul><li>Mission: To ensure all nonprofits can use technology to better serve their communities. </li></ul><ul><li>Vision: A thriving nonprofit sector in which all organizations can use technology to help create healthy, vibrant communities. </li></ul>
    3. 3. LA Since 2003 Charlotte Region Since 2003 Indiana Since 2002 Michigan Since 2001 DC Since 2004 NY Since 2001 PA Since 2003 Texas Since 2007 The NPower network Seattle Since 1999 Portland Since 2002 Colorado Since 2003 Arizona Since 2003 Atlanta Since 2001
    4. 4. NPower Michigan Services <ul><li>Technology Purchasing Guide: </li></ul><ul><li>TechTrek: group technology assessment and planning </li></ul><ul><li>Consulting </li></ul><ul><li>Scheduled Support </li></ul>
    5. 5. Managed Services <ul><li>Help desk </li></ul><ul><li>Security (anti-spyware and anti-virus) </li></ul><ul><li>Windows patches and updates </li></ul><ul><li>System monitoring </li></ul><ul><li>Remote login assistance </li></ul><ul><li>Budgeting and planning </li></ul><ul><li>$40 per desktop / $100 per server </li></ul><ul><li>Additional: IT project management (of either volunteers or IT professionals) at $75 per hour. On-site technician rates vary. </li></ul>
    6. 6. Desktop Security & Backup <ul><li>Viruses, Spyware, & Adware </li></ul><ul><li>Firewalls </li></ul><ul><li>Wireless Security </li></ul><ul><li>Creating Strong Passwords </li></ul><ul><li>Backup, Backup, Backup </li></ul>
    7. 7. Viruses <ul><li>A computer program that can copy itself and infect a computer without permission of the user </li></ul><ul><li>Viruses, Worms, Trojan Horses = MALWARE </li></ul>
    8. 8. Viruses <ul><li>How viruses spread: </li></ul><ul><ul><li>Internet downloads </li></ul></ul><ul><ul><li>Removable media </li></ul></ul><ul><ul><li>Across the network </li></ul></ul><ul><ul><li>Email attachments </li></ul></ul>
    9. 9. Viruses <ul><li>Protecting your system </li></ul><ul><ul><li>Antivirus software </li></ul></ul><ul><ul><ul><li>Standardization </li></ul></ul></ul><ul><ul><ul><li>Definitions </li></ul></ul></ul><ul><ul><ul><li>Subscriptions </li></ul></ul></ul><ul><ul><li>Be smart about email attachments </li></ul></ul><ul><ul><ul><li>Unknown senders </li></ul></ul></ul><ul><ul><ul><li>Known senders </li></ul></ul></ul><ul><ul><li>Firewall </li></ul></ul>
    10. 10. Viruses <ul><li>Recovering from a virus attack </li></ul><ul><ul><li>Run a full system scan (in Safe Mode if necessary) </li></ul></ul><ul><ul><li>Run an “autofix” tool </li></ul></ul><ul><ul><li>Replace infected files </li></ul></ul><ul><ul><li>Reformat hard drive </li></ul></ul>
    11. 11. Antivirus Software
    12. 12. Spyware/Adware <ul><li>Software that covertly gathers user information through your Internet connection without your knowledge, usually for advertising purposes; typically bundled as a hidden component of freeware or shareware programs </li></ul><ul><li>Unwanted pop-up ads and slowed computer performance </li></ul><ul><li>Third party cookies added to your system </li></ul><ul><li>Trick you into buying something </li></ul><ul><li>Personal information can be stolen </li></ul><ul><li>One of the fastest growing threats to computer users </li></ul>
    13. 13. Spyware/Adware <ul><li>Protecting yourself and your PC: </li></ul><ul><ul><li>Proactive software </li></ul></ul><ul><ul><ul><li>Windows Defender ( </li></ul></ul></ul><ul><ul><ul><li>Internet security suites </li></ul></ul></ul><ul><ul><li>Scanning software </li></ul></ul><ul><ul><ul><li>Spybot, Adaware ( ) </li></ul></ul></ul><ul><ul><ul><li>Can also be run in Safe Mode </li></ul></ul></ul><ul><ul><li>Avoid dubious Internet software downloads (especially toolbars) </li></ul></ul>
    14. 14. Firewall <ul><li>Firewall is a barrier to prevent intruders from “hacking”, or breaking into, your computer </li></ul>
    15. 15. Firewall <ul><li>Filters incoming traffic </li></ul><ul><li>Blocks remote access </li></ul><ul><li>Secures the communication ports your computer uses unless you open them </li></ul>
    16. 16. Firewall <ul><li>Can be a hardware device or a software program </li></ul>
    17. 17. Firewall <ul><li>What kind of Firewall do you need? </li></ul><ul><ul><li>Hardware firewall absolutely required! </li></ul></ul><ul><ul><ul><li>Basic router with built-in firewall capabilities okay for simple connection to internet </li></ul></ul></ul><ul><ul><ul><li>Advanced firewall device required for specific needs (i.e. VPN or hosting your own email) </li></ul></ul></ul><ul><ul><li>Software firewall is supplemental </li></ul></ul><ul><ul><ul><li>Exception: Laptop with wireless that often connects to strange wifi networks </li></ul></ul></ul>
    18. 18. Wireless Security <ul><li>Make sure your wireless network isn’t wide open! </li></ul><ul><ul><li>Change default password on the router or access point </li></ul></ul><ul><ul><li>Secure the connection </li></ul></ul><ul><ul><ul><li>WEP – crackable! </li></ul></ul></ul><ul><ul><ul><li>WPA – best option </li></ul></ul></ul>
    19. 19. Wireless Security <ul><li>Change default password </li></ul>
    20. 20. Wireless Security <ul><li>Secure the connection </li></ul>
    21. 21. Strong Passwords <ul><li>6 to 8 characters long using lower/upper case letters, numbers, and symbols (Microsoft recommends 14…) </li></ul><ul><ul><li>4 characters – 14 million possible passwords – 2 seconds </li></ul></ul><ul><ul><li>8 characters – 200 trillion possible passwords – 1 year </li></ul></ul><ul><ul><li>9 characters – 13 quadrillion possible passwords – 70 years </li></ul></ul><ul><ul><li>10 characters – 840 quadrillion possible passwords – 4000 years </li></ul></ul><ul><li>Avoid words in the dictionary (easier to guess) </li></ul><ul><li>Use a sentence that means something to you </li></ul><ul><ul><li>Every Sunday I go to church at 9 </li></ul></ul><ul><ul><li>E$igtc@9 </li></ul></ul><ul><li>Change passwords regularly </li></ul>
    22. 22. Backup <ul><li>Scary Statistics: </li></ul><ul><ul><li>A computer hard drive fails every 15 seconds </li></ul></ul><ul><ul><li>Over 2000 laptops are stolen or lost everyday </li></ul></ul><ul><ul><li>1 in 5 computers suffer hard drive failure during their normal useful life </li></ul></ul><ul><ul><li>Eventually , 100% of all hard drives will fail </li></ul></ul>Source: Realty Times
    23. 23. Backup <ul><li>My Documents </li></ul><ul><li>Shared files </li></ul><ul><li>Database files </li></ul><ul><li>Email files </li></ul><ul><li>Accounting data </li></ul><ul><li>Organizational pictures </li></ul><ul><li>Music </li></ul><ul><li>Personal files & pictures </li></ul>What to Backup? What to Not Backup?
    24. 24. Backup <ul><li>Central file storage location: </li></ul>Server or networked PC
    25. 25. Backup <ul><li>Tape Backup </li></ul><ul><li>Pros </li></ul><ul><li>Easy to archive (many years) </li></ul><ul><li>Many tapes = many backups </li></ul><ul><li>Easy to take offsite </li></ul><ul><li>Cons </li></ul><ul><li>Slower </li></ul><ul><li>Device + Many Tapes = Expensive </li></ul><ul><li>Large capacity tapes also expensive </li></ul><ul><li>Must replace tapes regularly for reliability </li></ul>
    26. 26. Backup <ul><li>External Hard Drive </li></ul><ul><li>Pros </li></ul><ul><li>Inexpensive </li></ul><ul><li>LARGE capacity </li></ul><ul><li>Cons </li></ul><ul><li>Fewer “points of failure” </li></ul><ul><li>Sometimes difficult to take offsite </li></ul>4 external drives -- 1 week each -- rotate -- offsite
    27. 27. Backup <ul><li>For tape and hard drive backups – need some sort of automatic backup software </li></ul><ul><li>Using the NTBackup program </li></ul><ul><ul><li>Start  All Programs  Accessories  System Tools  Backup </li></ul></ul>
    28. 28. Backup <ul><li>Internet </li></ul><ul><li>Pros </li></ul><ul><li>Automatic and incremental </li></ul><ul><li>Versioning </li></ul><ul><li>Affordable option </li></ul><ul><li>Offsite </li></ul><ul><li>Cons </li></ul><ul><li>Relies on your Internet connection </li></ul><ul><li>Initial backup is slow </li></ul><ul><li>Recurring fee </li></ul>
    29. 29. Backup <ul><li>Other Internet backup providers: </li></ul><ul><ul><li> </li></ul></ul><ul><ul><li> </li></ul></ul><ul><ul><li> </li></ul></ul>
    30. 30. Backup <ul><li>Disk Imaging </li></ul><ul><ul><li>Software that creates an exact image of your hard drive </li></ul></ul><ul><ul><li>Needs additional hard drive (built-in or external) </li></ul></ul><ul><ul><li>$50-60 </li></ul></ul>
    31. 31. Desktop Security & Backup <ul><li>Protect yourself from: </li></ul><ul><ul><li>Viruses </li></ul></ul><ul><ul><li>Spyware </li></ul></ul><ul><li>Firewalls </li></ul><ul><li>Wireless Security </li></ul><ul><li>Creating Strong Passwords </li></ul><ul><li>Backup methods </li></ul>
    32. 32. Thank You! <ul><li>Adam King </li></ul><ul><li>[email_address] </li></ul>
    1. A particular slide catching your eye?

      Clipping is a handy way to collect important slides you want to go back to later.