Desktop Security 8 9 07
Upcoming SlideShare
Loading in...5
×
 

Desktop Security 8 9 07

on

  • 911 views

 

Statistics

Views

Total Views
911
Views on SlideShare
910
Embed Views
1

Actions

Likes
0
Downloads
36
Comments
0

1 Embed 1

http://www.slideshare.net 1

Accessibility

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Desktop Security 8 9 07 Desktop Security 8 9 07 Presentation Transcript

  • Desktop Security & Backup Adam King August 9th, 2007 a program of
  • NPower is… A network of local nonprofit technology assistance providers that share a common mission, vision and service values.
    • Mission: To ensure all nonprofits can use technology to better serve their communities.
    • Vision: A thriving nonprofit sector in which all organizations can use technology to help create healthy, vibrant communities.
  • LA Since 2003 Charlotte Region Since 2003 Indiana Since 2002 Michigan Since 2001 DC Since 2004 NY Since 2001 PA Since 2003 Texas Since 2007 The NPower network Seattle Since 1999 Portland Since 2002 Colorado Since 2003 Arizona Since 2003 Atlanta Since 2001
  • NPower Michigan Services
    • Technology Purchasing Guide: www.npowermichigan.org/resources/
    • TechTrek: group technology assessment and planning
    • Consulting
    • Scheduled Support
  • Managed Services
    • Help desk
    • Security (anti-spyware and anti-virus)
    • Windows patches and updates
    • System monitoring
    • Remote login assistance
    • Budgeting and planning
    • $40 per desktop / $100 per server
    • Additional: IT project management (of either volunteers or IT professionals) at $75 per hour. On-site technician rates vary.
  • Desktop Security & Backup
    • Viruses, Spyware, & Adware
    • Firewalls
    • Wireless Security
    • Creating Strong Passwords
    • Backup, Backup, Backup
  • Viruses
    • A computer program that can copy itself and infect a computer without permission of the user
    • Viruses, Worms, Trojan Horses = MALWARE
  • Viruses
    • How viruses spread:
      • Internet downloads
      • Removable media
      • Across the network
      • Email attachments
  • Viruses
    • Protecting your system
      • Antivirus software
        • Standardization
        • Definitions
        • Subscriptions
      • Be smart about email attachments
        • Unknown senders
        • Known senders
      • Firewall
  • Viruses
    • Recovering from a virus attack
      • Run a full system scan (in Safe Mode if necessary)
      • Run an “autofix” tool
      • Replace infected files
      • Reformat hard drive
  • Antivirus Software
  • Spyware/Adware
    • Software that covertly gathers user information through your Internet connection without your knowledge, usually for advertising purposes; typically bundled as a hidden component of freeware or shareware programs
    • Unwanted pop-up ads and slowed computer performance
    • Third party cookies added to your system
    • Trick you into buying something
    • Personal information can be stolen
    • One of the fastest growing threats to computer users
  • Spyware/Adware
    • Protecting yourself and your PC:
      • Proactive software
        • Windows Defender (www.microsoft.com)
        • Internet security suites
      • Scanning software
        • Spybot, Adaware ( www.download.com )
        • Can also be run in Safe Mode
      • Avoid dubious Internet software downloads (especially toolbars)
  • Firewall
    • Firewall is a barrier to prevent intruders from “hacking”, or breaking into, your computer
  • Firewall
    • Filters incoming traffic
    • Blocks remote access
    • Secures the communication ports your computer uses unless you open them
  • Firewall
    • Can be a hardware device or a software program
  • Firewall
    • What kind of Firewall do you need?
      • Hardware firewall absolutely required!
        • Basic router with built-in firewall capabilities okay for simple connection to internet
        • Advanced firewall device required for specific needs (i.e. VPN or hosting your own email)
      • Software firewall is supplemental
        • Exception: Laptop with wireless that often connects to strange wifi networks
  • Wireless Security
    • Make sure your wireless network isn’t wide open!
      • Change default password on the router or access point
      • Secure the connection
        • WEP – crackable!
        • WPA – best option
  • Wireless Security
    • Change default password
  • Wireless Security
    • Secure the connection
  • Strong Passwords
    • 6 to 8 characters long using lower/upper case letters, numbers, and symbols (Microsoft recommends 14…)
      • 4 characters – 14 million possible passwords – 2 seconds
      • 8 characters – 200 trillion possible passwords – 1 year
      • 9 characters – 13 quadrillion possible passwords – 70 years
      • 10 characters – 840 quadrillion possible passwords – 4000 years
    • Avoid words in the dictionary (easier to guess)
    • Use a sentence that means something to you
      • Every Sunday I go to church at 9
      • E$igtc@9
    • Change passwords regularly
  • Backup
    • Scary Statistics:
      • A computer hard drive fails every 15 seconds
      • Over 2000 laptops are stolen or lost everyday
      • 1 in 5 computers suffer hard drive failure during their normal useful life
      • Eventually , 100% of all hard drives will fail
    Source: Realty Times
  • Backup
    • My Documents
    • Shared files
    • Database files
    • Email files
    • Accounting data
    • Organizational pictures
    • Music
    • Personal files & pictures
    What to Backup? What to Not Backup?
  • Backup
    • Central file storage location:
    Server or networked PC
  • Backup
    • Tape Backup
    • Pros
    • Easy to archive (many years)
    • Many tapes = many backups
    • Easy to take offsite
    • Cons
    • Slower
    • Device + Many Tapes = Expensive
    • Large capacity tapes also expensive
    • Must replace tapes regularly for reliability
  • Backup
    • External Hard Drive
    • Pros
    • Inexpensive
    • LARGE capacity
    • Cons
    • Fewer “points of failure”
    • Sometimes difficult to take offsite
    4 external drives -- 1 week each -- rotate -- offsite
  • Backup
    • For tape and hard drive backups – need some sort of automatic backup software
    • Using the NTBackup program
      • Start  All Programs  Accessories  System Tools  Backup
  • Backup
    • Internet
    • Pros
    • Automatic and incremental
    • Versioning
    • Affordable option
    • Offsite
    • Cons
    • Relies on your Internet connection
    • Initial backup is slow
    • Recurring fee
  • Backup
    • Other Internet backup providers:
      • Connected.com
      • Carbonite.com
      • IBackup.com
  • Backup
    • Disk Imaging
      • Software that creates an exact image of your hard drive
      • Needs additional hard drive (built-in or external)
      • $50-60
  • Desktop Security & Backup
    • Protect yourself from:
      • Viruses
      • Spyware
    • Firewalls
    • Wireless Security
    • Creating Strong Passwords
    • Backup methods
  • Thank You!
    • Adam King
    • [email_address]