SlideShare a Scribd company logo
Protecting Your Computer
Best Practices
 Keep Your Files Safe
 Always save files on network drives.
 Never save files on the desktop
 Never save files on the local drive (C:)
 Prepare Your Computer For Nightly Updates
 Completely shut off your computer.
 The update server will update your computer for updates.
 Reboot your computer at least once a week.
 Never give your passwords to anyone else.
 Keep your accounts safe by using passwords
that are impossible to guess.
 Use non-personal information. (Avoid dates, family
names, pet names.)
 Use words that do not appear in the dictionary. ("Cat"
or "dog" is bad, and "Catdog" is bad, as well.)
 Change your passwords frequently.
 Use different IDs/passwords for different systems. (Do
not use your bank PIN for your computer password.)
 Protect your identity
 Never respond to e-mail asking you to send
a password, social security number or other
sensitive info.
 Use secure web sites whenever sharing
private information.
 Learn about how web sites use "cookies" to
store information about you.
 Protect your files
 Lock your screen when you are away from your
desk
 Avoid storing personally identifiable information on
portable media (such as USB drives).
 Use secure file transfer to encrypt your files in transit.
 Establish secure connections with other machines to
encrypt your login credentials and exchange of
information.
 Protect your computer from viruses and
spyware.
 Keep anti-virus features turned on.
 Scan every file you receive for viruses,
including files on removable media.
 Do not open attachments unless the e-mail is
from someone you know.
 Keep automatic operating system updates
running.
 Protect your computer from viruses and
spyware.
 Keep anti-spyware software running.
 Set up E-mail filter quarantine.
 Don't enter sensitive or financial information into pop-
up windows.
 Do not respond to e-mail messages giving you the
opportunity to opt out. (This lets the spammer know
you are alive and well!)
 Download files only from trusted sites. Click on hyperlinks in e-
mail ONLY if you trust the site.
 Know that browser spoofing presents sites that appear to be
trusted sites but are not.

More Related Content

What's hot

Computer Malware
Computer MalwareComputer Malware
Computer Malwareaztechtchr
 
Jeremy Virus Effect
Jeremy   Virus EffectJeremy   Virus Effect
Jeremy Virus Effectguest7b2ba1
 
You Got To Protect Your Computer
You Got To Protect Your ComputerYou Got To Protect Your Computer
You Got To Protect Your Computer
BikashPayeng
 
Introduction to Malware
Introduction to MalwareIntroduction to Malware
Introduction to Malware
amiable_indian
 
Virus Spyware Quiz
Virus Spyware QuizVirus Spyware Quiz
Virus Spyware QuizPEC
 
S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I Kazman21
 
Computer Security
Computer SecurityComputer Security
Computer Security
secrettub
 
Viruses and antiviruses
Viruses and antivirusesViruses and antiviruses
Viruses and antiviruses
Sarhad Baez
 
Internet PC Security by Khalil Jubran Mindspring Networks
Internet PC Security  by Khalil Jubran  Mindspring Networks  Internet PC Security  by Khalil Jubran  Mindspring Networks
Internet PC Security by Khalil Jubran Mindspring Networks
Khalil Jubran
 
10 ways to_increase_your_computer_security
10 ways to_increase_your_computer_security10 ways to_increase_your_computer_security
10 ways to_increase_your_computer_security
Hybrid IT Solutions
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Adeel Younas
 
Malware
MalwareMalware
Malware
Tuhin_Das
 
Safe computing (Tips & Tricks)
Safe computing (Tips & Tricks)Safe computing (Tips & Tricks)
Safe computing (Tips & Tricks)Satyendra Arora
 
Wong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-VirusWong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-Virussharing notes123
 
Computing and ethics
Computing and ethicsComputing and ethics
Computing and ethics
Nikki Shree
 
Safe Computing
Safe ComputingSafe Computing
Computer security
Computer securityComputer security
Computer security
EktaVaswani2
 
Jeopardy
JeopardyJeopardy
Jeopardy
zed_o07
 
WISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS
 
How to Delete plus network.com
How to Delete plus network.comHow to Delete plus network.com
How to Delete plus network.com
mariagoel7
 

What's hot (20)

Computer Malware
Computer MalwareComputer Malware
Computer Malware
 
Jeremy Virus Effect
Jeremy   Virus EffectJeremy   Virus Effect
Jeremy Virus Effect
 
You Got To Protect Your Computer
You Got To Protect Your ComputerYou Got To Protect Your Computer
You Got To Protect Your Computer
 
Introduction to Malware
Introduction to MalwareIntroduction to Malware
Introduction to Malware
 
Virus Spyware Quiz
Virus Spyware QuizVirus Spyware Quiz
Virus Spyware Quiz
 
S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I K
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Viruses and antiviruses
Viruses and antivirusesViruses and antiviruses
Viruses and antiviruses
 
Internet PC Security by Khalil Jubran Mindspring Networks
Internet PC Security  by Khalil Jubran  Mindspring Networks  Internet PC Security  by Khalil Jubran  Mindspring Networks
Internet PC Security by Khalil Jubran Mindspring Networks
 
10 ways to_increase_your_computer_security
10 ways to_increase_your_computer_security10 ways to_increase_your_computer_security
10 ways to_increase_your_computer_security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Malware
MalwareMalware
Malware
 
Safe computing (Tips & Tricks)
Safe computing (Tips & Tricks)Safe computing (Tips & Tricks)
Safe computing (Tips & Tricks)
 
Wong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-VirusWong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-Virus
 
Computing and ethics
Computing and ethicsComputing and ethics
Computing and ethics
 
Safe Computing
Safe ComputingSafe Computing
Safe Computing
 
Computer security
Computer securityComputer security
Computer security
 
Jeopardy
JeopardyJeopardy
Jeopardy
 
WISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurity
 
How to Delete plus network.com
How to Delete plus network.comHow to Delete plus network.com
How to Delete plus network.com
 

Viewers also liked

Protecting Your Computer
Protecting Your ComputerProtecting Your Computer
Protecting Your Computernorzaini
 
Introduction to Reading Comprehension
Introduction to Reading ComprehensionIntroduction to Reading Comprehension
Introduction to Reading Comprehension
missfifit
 
02 computer parts and ports
02 computer parts  and ports02 computer parts  and ports
02 computer parts and ports
Melchor Balolong
 
Lesson 3 Basic Parts Of The Computer
Lesson 3   Basic Parts Of The ComputerLesson 3   Basic Parts Of The Computer
Lesson 3 Basic Parts Of The Computerguevarra_2000
 
Introduction to computer hardware
Introduction to computer hardwareIntroduction to computer hardware
Introduction to computer hardware
mite6025.hku
 
Simple present tense
Simple present tenseSimple present tense
Simple present tenseiraidahj
 
Internal pc components v2
Internal pc components v2Internal pc components v2
Internal pc components v2tomrussso
 
Building a computer in virtual desktop.
Building a computer in virtual desktop.Building a computer in virtual desktop.
Building a computer in virtual desktop.
OriginalGSM
 
Building a computer virtual desktop computer components
Building a computer virtual desktop computer componentsBuilding a computer virtual desktop computer components
Building a computer virtual desktop computer components
OriginalGSM
 
computer Hardware components
computer  Hardware componentscomputer  Hardware components
computer Hardware components
Thea Vstr
 
Computer Hardware-Part 1
Computer Hardware-Part 1Computer Hardware-Part 1
Computer Hardware-Part 1
Coky Fauzi Alfi
 
Internal PC Components explained
Internal PC Components explainedInternal PC Components explained
Internal PC Components explained
tomrussso
 
Memory(RAM ROM FLASH MEMORY)
Memory(RAM ROM FLASH MEMORY)Memory(RAM ROM FLASH MEMORY)
Memory(RAM ROM FLASH MEMORY)
smkhan
 
Future tense
Future tenseFuture tense
Future tense
Asra Qadeer
 
Future tense
Future tenseFuture tense
Future tense
guerina3
 
Computers7 Ch4 2
Computers7 Ch4 2Computers7 Ch4 2
Computers7 Ch4 2
miuitprofessor
 
Components of a PC
Components of a PCComponents of a PC
Components of a PC
avilab
 

Viewers also liked (20)

Protecting Your Computer
Protecting Your ComputerProtecting Your Computer
Protecting Your Computer
 
Introduction to Reading Comprehension
Introduction to Reading ComprehensionIntroduction to Reading Comprehension
Introduction to Reading Comprehension
 
02 computer parts and ports
02 computer parts  and ports02 computer parts  and ports
02 computer parts and ports
 
Lesson 3 Basic Parts Of The Computer
Lesson 3   Basic Parts Of The ComputerLesson 3   Basic Parts Of The Computer
Lesson 3 Basic Parts Of The Computer
 
Introduction to computer hardware
Introduction to computer hardwareIntroduction to computer hardware
Introduction to computer hardware
 
Simple present tense
Simple present tenseSimple present tense
Simple present tense
 
Internal pc components v2
Internal pc components v2Internal pc components v2
Internal pc components v2
 
Internal parts
Internal partsInternal parts
Internal parts
 
Future tense.
Future tense.Future tense.
Future tense.
 
Building a computer in virtual desktop.
Building a computer in virtual desktop.Building a computer in virtual desktop.
Building a computer in virtual desktop.
 
Building a computer virtual desktop computer components
Building a computer virtual desktop computer componentsBuilding a computer virtual desktop computer components
Building a computer virtual desktop computer components
 
Future tense
Future tenseFuture tense
Future tense
 
computer Hardware components
computer  Hardware componentscomputer  Hardware components
computer Hardware components
 
Computer Hardware-Part 1
Computer Hardware-Part 1Computer Hardware-Part 1
Computer Hardware-Part 1
 
Internal PC Components explained
Internal PC Components explainedInternal PC Components explained
Internal PC Components explained
 
Memory(RAM ROM FLASH MEMORY)
Memory(RAM ROM FLASH MEMORY)Memory(RAM ROM FLASH MEMORY)
Memory(RAM ROM FLASH MEMORY)
 
Future tense
Future tenseFuture tense
Future tense
 
Future tense
Future tenseFuture tense
Future tense
 
Computers7 Ch4 2
Computers7 Ch4 2Computers7 Ch4 2
Computers7 Ch4 2
 
Components of a PC
Components of a PCComponents of a PC
Components of a PC
 

Similar to 6 protecting your computer

CYBER SECURITY AWARENESS.pptx
CYBER SECURITY AWARENESS.pptxCYBER SECURITY AWARENESS.pptx
CYBER SECURITY AWARENESS.pptx
Tapan Khilar
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014
B2BPlanner Ltd.
 
Dark Alleys Part1
Dark Alleys Part1Dark Alleys Part1
Dark Alleys Part1
Anne Adrian
 
Dark Alleys Part1740
Dark Alleys Part1740Dark Alleys Part1740
Dark Alleys Part1740
guest2bd2b2
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System Threats
Drishti Bhalla
 
Cyber-savvy Cyber-safety
Cyber-savvy Cyber-safety Cyber-savvy Cyber-safety
Cyber-savvy Cyber-safety
Tawose Olamide Timothy
 
cybersafety_basics.pptx
cybersafety_basics.pptxcybersafety_basics.pptx
cybersafety_basics.pptx
PraveenKumar313855
 
Keeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safeKeeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safe
Computer Explorers
 
Internet
InternetInternet
Internet
youssefchefcher
 
An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)
Cyber Security Infotech
 
CYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEWCYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEW
Billy Warero
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
pinkutinku26
 
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
Smt. Indira Gandhi College of Engineering, Navi Mumbai, Mumbai
 
Tip sheet
 Tip sheet Tip sheet
IS100 Week 11
IS100 Week 11IS100 Week 11
IS100 Week 11
METU-Informatics
 
Cyber security
Cyber securityCyber security
Cyber security
Arjun Chetry
 
Cyber security and safety
Cyber security and safetyCyber security and safety
Cyber security and safety
Dooremoore
 
Computer Security
Computer SecurityComputer Security
Computer Security
Cristian Mihai
 
Defensive measure of virus
Defensive  measure of virusDefensive  measure of virus
Defensive measure of virus
Abrish06
 

Similar to 6 protecting your computer (20)

CYBER SECURITY AWARENESS.pptx
CYBER SECURITY AWARENESS.pptxCYBER SECURITY AWARENESS.pptx
CYBER SECURITY AWARENESS.pptx
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014
 
Dark Alleys Part1
Dark Alleys Part1Dark Alleys Part1
Dark Alleys Part1
 
Dark Alleys Part1740
Dark Alleys Part1740Dark Alleys Part1740
Dark Alleys Part1740
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System Threats
 
Cyber-savvy Cyber-safety
Cyber-savvy Cyber-safety Cyber-savvy Cyber-safety
Cyber-savvy Cyber-safety
 
cybersafety_basics.pptx
cybersafety_basics.pptxcybersafety_basics.pptx
cybersafety_basics.pptx
 
Keeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safeKeeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safe
 
Internet
InternetInternet
Internet
 
An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)
 
CYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEWCYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEW
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
 
Tip sheet
 Tip sheet Tip sheet
Tip sheet
 
Protect
ProtectProtect
Protect
 
IS100 Week 11
IS100 Week 11IS100 Week 11
IS100 Week 11
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security and safety
Cyber security and safetyCyber security and safety
Cyber security and safety
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Defensive measure of virus
Defensive  measure of virusDefensive  measure of virus
Defensive measure of virus
 

More from mohamad Hamizi

8 login passwords
8   login passwords 8   login passwords
8 login passwords
mohamad Hamizi
 
7 social engineering and insider threats
7   social engineering and insider threats 7   social engineering and insider threats
7 social engineering and insider threats
mohamad Hamizi
 
5 instant messaging and email
5   instant messaging and email 5   instant messaging and email
5 instant messaging and email
mohamad Hamizi
 
4 mobile and remote best practices
4   mobile and remote best practices 4   mobile and remote best practices
4 mobile and remote best practices
mohamad Hamizi
 
3 ensuring physical and data security
3   ensuring physical and data security 3   ensuring physical and data security
3 ensuring physical and data security
mohamad Hamizi
 
2 cybersecurity best practices
2   cybersecurity best practices 2   cybersecurity best practices
2 cybersecurity best practices
mohamad Hamizi
 
1 understanding cyber threats
1   understanding cyber threats 1   understanding cyber threats
1 understanding cyber threats
mohamad Hamizi
 

More from mohamad Hamizi (7)

8 login passwords
8   login passwords 8   login passwords
8 login passwords
 
7 social engineering and insider threats
7   social engineering and insider threats 7   social engineering and insider threats
7 social engineering and insider threats
 
5 instant messaging and email
5   instant messaging and email 5   instant messaging and email
5 instant messaging and email
 
4 mobile and remote best practices
4   mobile and remote best practices 4   mobile and remote best practices
4 mobile and remote best practices
 
3 ensuring physical and data security
3   ensuring physical and data security 3   ensuring physical and data security
3 ensuring physical and data security
 
2 cybersecurity best practices
2   cybersecurity best practices 2   cybersecurity best practices
2 cybersecurity best practices
 
1 understanding cyber threats
1   understanding cyber threats 1   understanding cyber threats
1 understanding cyber threats
 

Recently uploaded

The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
AzmatAli747758
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
Celine George
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
PedroFerreira53928
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
Col Mukteshwar Prasad
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
bennyroshan06
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
GeoBlogs
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 

Recently uploaded (20)

The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 

6 protecting your computer

  • 2. Best Practices  Keep Your Files Safe  Always save files on network drives.  Never save files on the desktop  Never save files on the local drive (C:)
  • 3.  Prepare Your Computer For Nightly Updates  Completely shut off your computer.  The update server will update your computer for updates.
  • 4.  Reboot your computer at least once a week.  Never give your passwords to anyone else.
  • 5.  Keep your accounts safe by using passwords that are impossible to guess.  Use non-personal information. (Avoid dates, family names, pet names.)  Use words that do not appear in the dictionary. ("Cat" or "dog" is bad, and "Catdog" is bad, as well.)  Change your passwords frequently.  Use different IDs/passwords for different systems. (Do not use your bank PIN for your computer password.)
  • 6.  Protect your identity  Never respond to e-mail asking you to send a password, social security number or other sensitive info.  Use secure web sites whenever sharing private information.  Learn about how web sites use "cookies" to store information about you.
  • 7.  Protect your files  Lock your screen when you are away from your desk  Avoid storing personally identifiable information on portable media (such as USB drives).  Use secure file transfer to encrypt your files in transit.  Establish secure connections with other machines to encrypt your login credentials and exchange of information.
  • 8.  Protect your computer from viruses and spyware.  Keep anti-virus features turned on.  Scan every file you receive for viruses, including files on removable media.  Do not open attachments unless the e-mail is from someone you know.  Keep automatic operating system updates running.
  • 9.  Protect your computer from viruses and spyware.  Keep anti-spyware software running.  Set up E-mail filter quarantine.  Don't enter sensitive or financial information into pop- up windows.  Do not respond to e-mail messages giving you the opportunity to opt out. (This lets the spammer know you are alive and well!)
  • 10.  Download files only from trusted sites. Click on hyperlinks in e- mail ONLY if you trust the site.  Know that browser spoofing presents sites that appear to be trusted sites but are not.