SlideShare una empresa de Scribd logo
1 de 8
Computer Awareness Training

        Tyler Jennings
           1/26/09
Training Covered
•   Password policies
•   Email best practices
•   Social Engineering Education
•   Backups and data storage
•   Anti-virus
General Password Knowledge
• Never Write Down or store near your
  computer
• Do not use simple dictionary passwords
• Never allow users to watch you enter your
  password.
• Passwords should contain 8
  characters, numbers, and symbols
• Change passwords every 4 months
Email Standards
• Never open email attachments from unknown
  sources
• Don’t open links in Emails from unknown
  sources
• If you receive emails from an unknown source
  delete them from your inbox and deleted
  folder
Social Engineering
• Never give your password to
  anyone, regardless of who they say they are.
• Don’t leave sensitive information intact, or
  stored on insecure devices
• Use discretion when checking emails, don’t
  open spam and most importantly don’t
  divulge any information
Backup any Information you intend
                keep
• When it comes to hard drives: its not will it fail
  its when it fails
• Backup work related information onto a
  separate storage device (thumb
  drive, network storage, external hard drive)
Anti-Virus

• Keep your Anti-virus up-to-date
• If your Anti-virus software isn’t centrally
  managed and controlled. Manually install a
  authorized anti-virus and keep its signatures
  updated.
General Guidelines

• Never divulge sensitive or confidential
  information to unknown sources.
• Follow the acceptable use policy of your
  organization
• Keep your passwords secure
• Backup Critical Data

Más contenido relacionado

La actualidad más candente

Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3
DallasHaselhorst
 
ICT Laptop and Desktop Policy Final
ICT  Laptop and Desktop Policy FinalICT  Laptop and Desktop Policy Final
ICT Laptop and Desktop Policy Final
Kel' Laquian
 

La actualidad más candente (20)

Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3
 
Basic Security Training for End Users
Basic Security Training for End UsersBasic Security Training for End Users
Basic Security Training for End Users
 
ICT Laptop and Desktop Policy Final
ICT  Laptop and Desktop Policy FinalICT  Laptop and Desktop Policy Final
ICT Laptop and Desktop Policy Final
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Security Awareness & Training
Security Awareness & TrainingSecurity Awareness & Training
Security Awareness & Training
 
End-User Security Awareness
End-User Security AwarenessEnd-User Security Awareness
End-User Security Awareness
 
Laptop maintenance
Laptop maintenanceLaptop maintenance
Laptop maintenance
 
Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crime
 
Physical security.ppt
Physical security.pptPhysical security.ppt
Physical security.ppt
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
 
Malware Classification and Analysis
Malware Classification and AnalysisMalware Classification and Analysis
Malware Classification and Analysis
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
 
Employee Awareness in Cyber Security - Kloudlearn
Employee Awareness in Cyber Security - KloudlearnEmployee Awareness in Cyber Security - Kloudlearn
Employee Awareness in Cyber Security - Kloudlearn
 
Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0
 
Webinar_Cybersecurity is a shared responsibility presentation
Webinar_Cybersecurity is a shared responsibility presentationWebinar_Cybersecurity is a shared responsibility presentation
Webinar_Cybersecurity is a shared responsibility presentation
 
Basic Troubleshooting
Basic TroubleshootingBasic Troubleshooting
Basic Troubleshooting
 

Destacado

COMPUTER AWARENESS PROGRAMME IN RURAL AREAS
COMPUTER AWARENESS PROGRAMME IN RURAL AREASCOMPUTER AWARENESS PROGRAMME IN RURAL AREAS
COMPUTER AWARENESS PROGRAMME IN RURAL AREAS
maheshaesi
 
Role of information & communication technology (ict) in rural development by ...
Role of information & communication technology (ict) in rural development by ...Role of information & communication technology (ict) in rural development by ...
Role of information & communication technology (ict) in rural development by ...
VVR IAS Exam Preparation
 
Accounting_Accuracy_Methodology-5
Accounting_Accuracy_Methodology-5Accounting_Accuracy_Methodology-5
Accounting_Accuracy_Methodology-5
Ricardo G Lopes
 
Structure of english
Structure of englishStructure of english
Structure of english
brix_21
 

Destacado (20)

COMPUTER AWARENESS PROGRAMME IN RURAL AREAS
COMPUTER AWARENESS PROGRAMME IN RURAL AREASCOMPUTER AWARENESS PROGRAMME IN RURAL AREAS
COMPUTER AWARENESS PROGRAMME IN RURAL AREAS
 
Computer Basics 101 Slide Show Presentation
Computer Basics 101 Slide Show PresentationComputer Basics 101 Slide Show Presentation
Computer Basics 101 Slide Show Presentation
 
basics of computer system ppt
basics of computer system pptbasics of computer system ppt
basics of computer system ppt
 
Role of information & communication technology (ict) in rural development by ...
Role of information & communication technology (ict) in rural development by ...Role of information & communication technology (ict) in rural development by ...
Role of information & communication technology (ict) in rural development by ...
 
Ppt on internet
Ppt on internetPpt on internet
Ppt on internet
 
MS Power Point 2007 Presentation
MS Power Point 2007 PresentationMS Power Point 2007 Presentation
MS Power Point 2007 Presentation
 
Databse management system
Databse management systemDatabse management system
Databse management system
 
Accounting_Accuracy_Methodology-5
Accounting_Accuracy_Methodology-5Accounting_Accuracy_Methodology-5
Accounting_Accuracy_Methodology-5
 
Bank Exam Computer Awareness
Bank Exam Computer AwarenessBank Exam Computer Awareness
Bank Exam Computer Awareness
 
Prep velvet – Speed Maths
Prep velvet – Speed MathsPrep velvet – Speed Maths
Prep velvet – Speed Maths
 
D1 seating arrangement pdf
D1 seating arrangement pdfD1 seating arrangement pdf
D1 seating arrangement pdf
 
Introduction to Data Communication by Vishal Garg
Introduction to Data Communication by Vishal GargIntroduction to Data Communication by Vishal Garg
Introduction to Data Communication by Vishal Garg
 
Разговорный курс STEP-UP. Class 1.
Разговорный курс STEP-UP. Class 1.Разговорный курс STEP-UP. Class 1.
Разговорный курс STEP-UP. Class 1.
 
Class 1
Class 1Class 1
Class 1
 
Structure of english
Structure of englishStructure of english
Structure of english
 
Android Technology
Android TechnologyAndroid Technology
Android Technology
 
Computer fundamental introduction_and_types
Computer fundamental introduction_and_typesComputer fundamental introduction_and_types
Computer fundamental introduction_and_types
 
Revision class 3
Revision class 3Revision class 3
Revision class 3
 
Step up grammar class 2 (pre-intermediate)
Step up grammar class 2 (pre-intermediate)Step up grammar class 2 (pre-intermediate)
Step up grammar class 2 (pre-intermediate)
 
Grammar class 7. Relative Clauses
Grammar class 7. Relative ClausesGrammar class 7. Relative Clauses
Grammar class 7. Relative Clauses
 

Similar a Computer Awareness Training

Security Awareness 9 10 09 V4 Best Prac
Security Awareness 9 10 09 V4 Best PracSecurity Awareness 9 10 09 V4 Best Prac
Security Awareness 9 10 09 V4 Best Prac
Megan Bell
 
Fc5 f143a 14c2-3f0d-1cda962638668b94
Fc5 f143a 14c2-3f0d-1cda962638668b94Fc5 f143a 14c2-3f0d-1cda962638668b94
Fc5 f143a 14c2-3f0d-1cda962638668b94
bookgirljoy
 

Similar a Computer Awareness Training (20)

IT Security Basics For Managers
IT Security Basics For ManagersIT Security Basics For Managers
IT Security Basics For Managers
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 
ISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptxISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptx
 
Safe Computing
Safe ComputingSafe Computing
Safe Computing
 
Do's and Dont's
 Do's and Dont's Do's and Dont's
Do's and Dont's
 
Edu352 week1discussion2technologysafetyoct2011crs
Edu352 week1discussion2technologysafetyoct2011crsEdu352 week1discussion2technologysafetyoct2011crs
Edu352 week1discussion2technologysafetyoct2011crs
 
Security Awareness 9 10 09 V4 Best Prac
Security Awareness 9 10 09 V4 Best PracSecurity Awareness 9 10 09 V4 Best Prac
Security Awareness 9 10 09 V4 Best Prac
 
Cyber Hygiene in Dailylife
Cyber Hygiene in DailylifeCyber Hygiene in Dailylife
Cyber Hygiene in Dailylife
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
T3 conference talk nov 2014
T3 conference talk nov 2014T3 conference talk nov 2014
T3 conference talk nov 2014
 
ACESnWS cyber security tips
ACESnWS cyber security tipsACESnWS cyber security tips
ACESnWS cyber security tips
 
ICT and end user security awareness slides
ICT and end user security awareness slidesICT and end user security awareness slides
ICT and end user security awareness slides
 
Awesome Tips for Data Security
Awesome Tips for Data SecurityAwesome Tips for Data Security
Awesome Tips for Data Security
 
Fc5 f143a 14c2-3f0d-1cda962638668b94
Fc5 f143a 14c2-3f0d-1cda962638668b94Fc5 f143a 14c2-3f0d-1cda962638668b94
Fc5 f143a 14c2-3f0d-1cda962638668b94
 
Cyber pledge infoMagnum
Cyber pledge infoMagnumCyber pledge infoMagnum
Cyber pledge infoMagnum
 
Personal security
Personal securityPersonal security
Personal security
 
Internet
InternetInternet
Internet
 
eSecurity! Keeping your Business and Customers Safe
eSecurity! Keeping your Business and Customers SafeeSecurity! Keeping your Business and Customers Safe
eSecurity! Keeping your Business and Customers Safe
 
10 things to teach end users
10 things to teach end users10 things to teach end users
10 things to teach end users
 
7 Email Security Best Practices You Need to Follow in 2023.pptx
7 Email Security Best Practices You Need to Follow in 2023.pptx7 Email Security Best Practices You Need to Follow in 2023.pptx
7 Email Security Best Practices You Need to Follow in 2023.pptx
 

Último

Último (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

Computer Awareness Training

  • 1. Computer Awareness Training Tyler Jennings 1/26/09
  • 2. Training Covered • Password policies • Email best practices • Social Engineering Education • Backups and data storage • Anti-virus
  • 3. General Password Knowledge • Never Write Down or store near your computer • Do not use simple dictionary passwords • Never allow users to watch you enter your password. • Passwords should contain 8 characters, numbers, and symbols • Change passwords every 4 months
  • 4. Email Standards • Never open email attachments from unknown sources • Don’t open links in Emails from unknown sources • If you receive emails from an unknown source delete them from your inbox and deleted folder
  • 5. Social Engineering • Never give your password to anyone, regardless of who they say they are. • Don’t leave sensitive information intact, or stored on insecure devices • Use discretion when checking emails, don’t open spam and most importantly don’t divulge any information
  • 6. Backup any Information you intend keep • When it comes to hard drives: its not will it fail its when it fails • Backup work related information onto a separate storage device (thumb drive, network storage, external hard drive)
  • 7. Anti-Virus • Keep your Anti-virus up-to-date • If your Anti-virus software isn’t centrally managed and controlled. Manually install a authorized anti-virus and keep its signatures updated.
  • 8. General Guidelines • Never divulge sensitive or confidential information to unknown sources. • Follow the acceptable use policy of your organization • Keep your passwords secure • Backup Critical Data