SlideShare a Scribd company logo
1 of 14
Inspect and Test the
Configured Computer
Networks
Check Computer Networks to
Ensure Safe Operation
Reporter:Joshua T. Asis
Computer network security breaches are in
the news often, and they’re costing
organizations that fall prey millions of
dollars.
Computer network problems and issues are
always a trending news in any part of the
world.
Fortunately, there are some computer
network security best practices that
business owners can implement today to
secure their data and build more
impenetrable protection against hackers
and viruses.
10 Proven Ways to Secure
and Check a Computer
Network
1. Install And Monitor Firewall Performance
A firewall is designed to block unauthorized access to
computers and networks. In essence, a firewall is a set of rules
that controls network traffic — incoming and outgoing.
Computers and networks that pass these rules are granted
access, and those that don’t are walled out.
2. Update Passwords When Needed and/or Yearly
to using strong passwords that feature letters (uppercase and
lowercase), symbols and numbers for added security, require
employees to regularly change their passwords.
3. Lean on Advanced Endpoint Detection
In order to respond to the continually evolving online threats in the
world today, advanced endpoint detection and response is technology
that uses AI to watch for indications of compromise and react
accordingly.
4. Create A Virtual Private Network (VPN)
With millions of people working remotely in a cosmic work shift
accelerated by the pandemic, there’s been a massive increase in
reported cybercrimes. VPNs create a more secure connection
between remote computers and company servers.
5. Must Have Proper Training
Every preparation you have won’t be effective if the people using your
system aren’t following security best practices. Educating
people about how to avoid major security risks or getting victimized
by identity theft is possibly the greatest weapon you Ahave in boosting
your security.
6. Filter and Delete Spam Emails
Spam filters have advanced considerably and should be leveraged.
7. Shut Down Computers When Not in Use
When your computer sits idle overnight while connected to the internet or
your own network, it becomes more visible and available to hackers.
Limit their access and block them outright just by shutting your computer
down for the night.
8. Encrypt Your Files
Encryption can protect sensitive data on Windows or Mac operating
systems using software specifically designed to mask your IP address.
9. Secure Personal Devices
Consider implementing a policy for using personal devices to ensure
individuals are following security protocols.
10. Ask for Help
enlist the help of a technology management provider that stays
updated on the latest threats and whose job it is to make your systems
as secure as possible.
REMEMBER
You must be knowledgeable of the these
ways on what to KNOW, perform activities
required under WHAT and HOW to
PROCESS.
Quiz Time!
1. What are the 10 Proven ways to
secure/check a computer network? (10pts.)
2.What is the Importance Inspect and Test
the Configured Computer Networks.
(5pts.)
Answer Key:
10 Proven Ways to Secure/ Check a Computer Network
1. Install And Monitor Firewall Performance
2. Update Passwords When Needed and/or Yearl
3. Lean on Advanced Endpoint Detection
4. Create A Virtual Private Network (VPN)
5. Must Have Proper Training
6. Filter and Delete Spam Emails
7. Shut Down Computers When Not in Use
8. Encrypt Your Files
9. Secure Personal Devices
10. Ask for Help
2. Answer may vary.
THANK YOU

More Related Content

Similar to Check-Computer-Networks-to-Ensure-Safe-Operation-Johua-2nd.pptx

5 ways to strengthen cybersecurity in the workplace
5 ways to strengthen cybersecurity in the workplace5 ways to strengthen cybersecurity in the workplace
5 ways to strengthen cybersecurity in the workplaceSameerShaik43
 
Computrace Laptop Security Solutions
Computrace Laptop Security SolutionsComputrace Laptop Security Solutions
Computrace Laptop Security Solutionsabe8512000
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacyeiramespi07
 
Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4leahg118
 
Slicksheet best practicesforkeepingyourhomenetworksecure
Slicksheet best practicesforkeepingyourhomenetworksecureSlicksheet best practicesforkeepingyourhomenetworksecure
Slicksheet best practicesforkeepingyourhomenetworksecureMargus Meigo
 
Top 25 SOC Analyst interview questions that You Should Know.pptx
Top 25 SOC Analyst interview questions that You Should Know.pptxTop 25 SOC Analyst interview questions that You Should Know.pptx
Top 25 SOC Analyst interview questions that You Should Know.pptxInfosectrain3
 
First Union Bank Report
First Union Bank ReportFirst Union Bank Report
First Union Bank ReportYogesh Kumar
 
Avoid embarrassing press by designing secure IoT products with Misha Seltzer
Avoid embarrassing press by designing secure IoT products with Misha SeltzerAvoid embarrassing press by designing secure IoT products with Misha Seltzer
Avoid embarrassing press by designing secure IoT products with Misha SeltzerProduct of Things
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docxedgar6wallace88877
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docxfathwaitewalter
 
Free Guide-to-cybersecurity-fundamentals.pdf
Free Guide-to-cybersecurity-fundamentals.pdfFree Guide-to-cybersecurity-fundamentals.pdf
Free Guide-to-cybersecurity-fundamentals.pdfVarinder K
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppWeSecureApp
 
GBS - 8 ways to knockout network headaches
GBS - 8 ways to knockout network headachesGBS - 8 ways to knockout network headaches
GBS - 8 ways to knockout network headachesKristin Helgeson
 
ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10Irsandi Hasan
 
3 Tips to Stay Safe Online in 2017
3 Tips to Stay Safe Online in 20173 Tips to Stay Safe Online in 2017
3 Tips to Stay Safe Online in 2017Bret Piatt
 

Similar to Check-Computer-Networks-to-Ensure-Safe-Operation-Johua-2nd.pptx (20)

5 ways to strengthen cybersecurity in the workplace
5 ways to strengthen cybersecurity in the workplace5 ways to strengthen cybersecurity in the workplace
5 ways to strengthen cybersecurity in the workplace
 
Computrace Laptop Security Solutions
Computrace Laptop Security SolutionsComputrace Laptop Security Solutions
Computrace Laptop Security Solutions
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacy
 
Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4
 
NewIinternet security
NewIinternet securityNewIinternet security
NewIinternet security
 
New internet security
New internet securityNew internet security
New internet security
 
Chapter 5.pptx
Chapter 5.pptxChapter 5.pptx
Chapter 5.pptx
 
Slicksheet best practicesforkeepingyourhomenetworksecure
Slicksheet best practicesforkeepingyourhomenetworksecureSlicksheet best practicesforkeepingyourhomenetworksecure
Slicksheet best practicesforkeepingyourhomenetworksecure
 
Information Security Seminar
Information Security SeminarInformation Security Seminar
Information Security Seminar
 
Top 25 SOC Analyst interview questions that You Should Know.pptx
Top 25 SOC Analyst interview questions that You Should Know.pptxTop 25 SOC Analyst interview questions that You Should Know.pptx
Top 25 SOC Analyst interview questions that You Should Know.pptx
 
Securing Devices at Home
Securing Devices at HomeSecuring Devices at Home
Securing Devices at Home
 
First Union Bank Report
First Union Bank ReportFirst Union Bank Report
First Union Bank Report
 
Avoid embarrassing press by designing secure IoT products with Misha Seltzer
Avoid embarrassing press by designing secure IoT products with Misha SeltzerAvoid embarrassing press by designing secure IoT products with Misha Seltzer
Avoid embarrassing press by designing secure IoT products with Misha Seltzer
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
 
Free Guide-to-cybersecurity-fundamentals.pdf
Free Guide-to-cybersecurity-fundamentals.pdfFree Guide-to-cybersecurity-fundamentals.pdf
Free Guide-to-cybersecurity-fundamentals.pdf
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureApp
 
GBS - 8 ways to knockout network headaches
GBS - 8 ways to knockout network headachesGBS - 8 ways to knockout network headaches
GBS - 8 ways to knockout network headaches
 
ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10
 
3 Tips to Stay Safe Online in 2017
3 Tips to Stay Safe Online in 20173 Tips to Stay Safe Online in 2017
3 Tips to Stay Safe Online in 2017
 

More from kris harden

How-to-Organize-a-Sports-Club powerpoint
How-to-Organize-a-Sports-Club powerpointHow-to-Organize-a-Sports-Club powerpoint
How-to-Organize-a-Sports-Club powerpointkris harden
 
Vanessa-1st report submitted for the second quarter
Vanessa-1st report submitted for the second quarterVanessa-1st report submitted for the second quarter
Vanessa-1st report submitted for the second quarterkris harden
 
ppt curriculum day quiz bee that need be submitted
ppt curriculum day quiz bee that need be submittedppt curriculum day quiz bee that need be submitted
ppt curriculum day quiz bee that need be submittedkris harden
 
wepik-ensuring-workplace-safety-a-comprehensive-overview-of-occupational-safe...
wepik-ensuring-workplace-safety-a-comprehensive-overview-of-occupational-safe...wepik-ensuring-workplace-safety-a-comprehensive-overview-of-occupational-safe...
wepik-ensuring-workplace-safety-a-comprehensive-overview-of-occupational-safe...kris harden
 
MARK PRESENTATION.pptx
MARK PRESENTATION.pptxMARK PRESENTATION.pptx
MARK PRESENTATION.pptxkris harden
 
3. linux installation
3.  linux installation3.  linux installation
3. linux installationkris harden
 
1. prepare usb installer
1.  prepare usb installer1.  prepare usb installer
1. prepare usb installerkris harden
 

More from kris harden (8)

How-to-Organize-a-Sports-Club powerpoint
How-to-Organize-a-Sports-Club powerpointHow-to-Organize-a-Sports-Club powerpoint
How-to-Organize-a-Sports-Club powerpoint
 
Vanessa-1st report submitted for the second quarter
Vanessa-1st report submitted for the second quarterVanessa-1st report submitted for the second quarter
Vanessa-1st report submitted for the second quarter
 
ppt curriculum day quiz bee that need be submitted
ppt curriculum day quiz bee that need be submittedppt curriculum day quiz bee that need be submitted
ppt curriculum day quiz bee that need be submitted
 
wepik-ensuring-workplace-safety-a-comprehensive-overview-of-occupational-safe...
wepik-ensuring-workplace-safety-a-comprehensive-overview-of-occupational-safe...wepik-ensuring-workplace-safety-a-comprehensive-overview-of-occupational-safe...
wepik-ensuring-workplace-safety-a-comprehensive-overview-of-occupational-safe...
 
MARK PRESENTATION.pptx
MARK PRESENTATION.pptxMARK PRESENTATION.pptx
MARK PRESENTATION.pptx
 
3. linux installation
3.  linux installation3.  linux installation
3. linux installation
 
2. install os
2. install os2. install os
2. install os
 
1. prepare usb installer
1.  prepare usb installer1.  prepare usb installer
1. prepare usb installer
 

Recently uploaded

Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 

Recently uploaded (20)

TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 

Check-Computer-Networks-to-Ensure-Safe-Operation-Johua-2nd.pptx

  • 1. Inspect and Test the Configured Computer Networks Check Computer Networks to Ensure Safe Operation Reporter:Joshua T. Asis
  • 2. Computer network security breaches are in the news often, and they’re costing organizations that fall prey millions of dollars. Computer network problems and issues are always a trending news in any part of the world.
  • 3. Fortunately, there are some computer network security best practices that business owners can implement today to secure their data and build more impenetrable protection against hackers and viruses.
  • 4. 10 Proven Ways to Secure and Check a Computer Network
  • 5. 1. Install And Monitor Firewall Performance A firewall is designed to block unauthorized access to computers and networks. In essence, a firewall is a set of rules that controls network traffic — incoming and outgoing. Computers and networks that pass these rules are granted access, and those that don’t are walled out. 2. Update Passwords When Needed and/or Yearly to using strong passwords that feature letters (uppercase and lowercase), symbols and numbers for added security, require employees to regularly change their passwords.
  • 6. 3. Lean on Advanced Endpoint Detection In order to respond to the continually evolving online threats in the world today, advanced endpoint detection and response is technology that uses AI to watch for indications of compromise and react accordingly. 4. Create A Virtual Private Network (VPN) With millions of people working remotely in a cosmic work shift accelerated by the pandemic, there’s been a massive increase in reported cybercrimes. VPNs create a more secure connection between remote computers and company servers.
  • 7. 5. Must Have Proper Training Every preparation you have won’t be effective if the people using your system aren’t following security best practices. Educating people about how to avoid major security risks or getting victimized by identity theft is possibly the greatest weapon you Ahave in boosting your security. 6. Filter and Delete Spam Emails Spam filters have advanced considerably and should be leveraged.
  • 8. 7. Shut Down Computers When Not in Use When your computer sits idle overnight while connected to the internet or your own network, it becomes more visible and available to hackers. Limit their access and block them outright just by shutting your computer down for the night. 8. Encrypt Your Files Encryption can protect sensitive data on Windows or Mac operating systems using software specifically designed to mask your IP address.
  • 9. 9. Secure Personal Devices Consider implementing a policy for using personal devices to ensure individuals are following security protocols. 10. Ask for Help enlist the help of a technology management provider that stays updated on the latest threats and whose job it is to make your systems as secure as possible.
  • 10. REMEMBER You must be knowledgeable of the these ways on what to KNOW, perform activities required under WHAT and HOW to PROCESS.
  • 11. Quiz Time! 1. What are the 10 Proven ways to secure/check a computer network? (10pts.) 2.What is the Importance Inspect and Test the Configured Computer Networks. (5pts.)
  • 12.
  • 13. Answer Key: 10 Proven Ways to Secure/ Check a Computer Network 1. Install And Monitor Firewall Performance 2. Update Passwords When Needed and/or Yearl 3. Lean on Advanced Endpoint Detection 4. Create A Virtual Private Network (VPN) 5. Must Have Proper Training 6. Filter and Delete Spam Emails 7. Shut Down Computers When Not in Use 8. Encrypt Your Files 9. Secure Personal Devices 10. Ask for Help 2. Answer may vary.