SlideShare una empresa de Scribd logo
1 de 10
Protecting Your Computer
Best Practices
 Keep Your Files Safe
 Always save files on network drives.
 Never save files on the desktop
 Never save files on the local drive (C:)
 Prepare Your Computer For Nightly Updates
 Completely shut off your computer.
 The update server will update your computer for updates.
 Reboot your computer at least once a week.
 Never give your passwords to anyone else.
 Keep your accounts safe by using passwords
that are impossible to guess.
 Use non-personal information. (Avoid dates, family
names, pet names.)
 Use words that do not appear in the dictionary. ("Cat"
or "dog" is bad, and "Catdog" is bad, as well.)
 Change your passwords frequently.
 Use different IDs/passwords for different systems. (Do
not use your bank PIN for your computer password.)
 Protect your identity
 Never respond to e-mail asking you to send
a password, social security number or other
sensitive info.
 Use secure web sites whenever sharing
private information.
 Learn about how web sites use "cookies" to
store information about you.
 Protect your files
 Lock your screen when you are away from your
desk
 Avoid storing personally identifiable information on
portable media (such as USB drives).
 Use secure file transfer to encrypt your files in transit.
 Establish secure connections with other machines to
encrypt your login credentials and exchange of
information.
 Protect your computer from viruses and
spyware.
 Keep anti-virus features turned on.
 Scan every file you receive for viruses,
including files on removable media.
 Do not open attachments unless the e-mail is
from someone you know.
 Keep automatic operating system updates
running.
 Protect your computer from viruses and
spyware.
 Keep anti-spyware software running.
 Set up E-mail filter quarantine.
 Don't enter sensitive or financial information into pop-
up windows.
 Do not respond to e-mail messages giving you the
opportunity to opt out. (This lets the spammer know
you are alive and well!)
 Download files only from trusted sites. Click on hyperlinks in e-
mail ONLY if you trust the site.
 Know that browser spoofing presents sites that appear to be
trusted sites but are not.

Más contenido relacionado

La actualidad más candente

Computer Malware
Computer MalwareComputer Malware
Computer Malwareaztechtchr
 
Jeremy Virus Effect
Jeremy   Virus EffectJeremy   Virus Effect
Jeremy Virus Effectguest7b2ba1
 
You Got To Protect Your Computer
You Got To Protect Your ComputerYou Got To Protect Your Computer
You Got To Protect Your ComputerBikashPayeng
 
Introduction to Malware
Introduction to MalwareIntroduction to Malware
Introduction to Malwareamiable_indian
 
Virus Spyware Quiz
Virus Spyware QuizVirus Spyware Quiz
Virus Spyware QuizPEC
 
S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I Kazman21
 
Computer Security
Computer SecurityComputer Security
Computer Securitysecrettub
 
Viruses and antiviruses
Viruses and antivirusesViruses and antiviruses
Viruses and antivirusesSarhad Baez
 
Internet PC Security by Khalil Jubran Mindspring Networks
Internet PC Security  by Khalil Jubran  Mindspring Networks  Internet PC Security  by Khalil Jubran  Mindspring Networks
Internet PC Security by Khalil Jubran Mindspring Networks Khalil Jubran
 
10 ways to_increase_your_computer_security
10 ways to_increase_your_computer_security10 ways to_increase_your_computer_security
10 ways to_increase_your_computer_securityHybrid IT Solutions
 
Safe computing (Tips & Tricks)
Safe computing (Tips & Tricks)Safe computing (Tips & Tricks)
Safe computing (Tips & Tricks)Satyendra Arora
 
Wong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-VirusWong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-Virussharing notes123
 
Computing and ethics
Computing and ethicsComputing and ethics
Computing and ethicsNikki Shree
 
Jeopardy
JeopardyJeopardy
Jeopardyzed_o07
 
WISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS
 
How to Delete plus network.com
How to Delete plus network.comHow to Delete plus network.com
How to Delete plus network.commariagoel7
 

La actualidad más candente (20)

Computer Malware
Computer MalwareComputer Malware
Computer Malware
 
Jeremy Virus Effect
Jeremy   Virus EffectJeremy   Virus Effect
Jeremy Virus Effect
 
You Got To Protect Your Computer
You Got To Protect Your ComputerYou Got To Protect Your Computer
You Got To Protect Your Computer
 
Introduction to Malware
Introduction to MalwareIntroduction to Malware
Introduction to Malware
 
Virus Spyware Quiz
Virus Spyware QuizVirus Spyware Quiz
Virus Spyware Quiz
 
S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I K
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Viruses and antiviruses
Viruses and antivirusesViruses and antiviruses
Viruses and antiviruses
 
Internet PC Security by Khalil Jubran Mindspring Networks
Internet PC Security  by Khalil Jubran  Mindspring Networks  Internet PC Security  by Khalil Jubran  Mindspring Networks
Internet PC Security by Khalil Jubran Mindspring Networks
 
10 ways to_increase_your_computer_security
10 ways to_increase_your_computer_security10 ways to_increase_your_computer_security
10 ways to_increase_your_computer_security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Malware
MalwareMalware
Malware
 
Safe computing (Tips & Tricks)
Safe computing (Tips & Tricks)Safe computing (Tips & Tricks)
Safe computing (Tips & Tricks)
 
Wong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-VirusWong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-Virus
 
Computing and ethics
Computing and ethicsComputing and ethics
Computing and ethics
 
Safe Computing
Safe ComputingSafe Computing
Safe Computing
 
Computer security
Computer securityComputer security
Computer security
 
Jeopardy
JeopardyJeopardy
Jeopardy
 
WISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurity
 
How to Delete plus network.com
How to Delete plus network.comHow to Delete plus network.com
How to Delete plus network.com
 

Destacado

Protecting Your Computer
Protecting Your ComputerProtecting Your Computer
Protecting Your Computernorzaini
 
Introduction to Reading Comprehension
Introduction to Reading ComprehensionIntroduction to Reading Comprehension
Introduction to Reading Comprehensionmissfifit
 
02 computer parts and ports
02 computer parts  and ports02 computer parts  and ports
02 computer parts and portsMelchor Balolong
 
Lesson 3 Basic Parts Of The Computer
Lesson 3   Basic Parts Of The ComputerLesson 3   Basic Parts Of The Computer
Lesson 3 Basic Parts Of The Computerguevarra_2000
 
Introduction to computer hardware
Introduction to computer hardwareIntroduction to computer hardware
Introduction to computer hardwaremite6025.hku
 
Simple present tense
Simple present tenseSimple present tense
Simple present tenseiraidahj
 
Internal pc components v2
Internal pc components v2Internal pc components v2
Internal pc components v2tomrussso
 
Building a computer in virtual desktop.
Building a computer in virtual desktop.Building a computer in virtual desktop.
Building a computer in virtual desktop.OriginalGSM
 
Building a computer virtual desktop computer components
Building a computer virtual desktop computer componentsBuilding a computer virtual desktop computer components
Building a computer virtual desktop computer componentsOriginalGSM
 
computer Hardware components
computer  Hardware componentscomputer  Hardware components
computer Hardware componentsThea Vstr
 
Computer Hardware-Part 1
Computer Hardware-Part 1Computer Hardware-Part 1
Computer Hardware-Part 1Coky Fauzi Alfi
 
Internal PC Components explained
Internal PC Components explainedInternal PC Components explained
Internal PC Components explainedtomrussso
 
Memory(RAM ROM FLASH MEMORY)
Memory(RAM ROM FLASH MEMORY)Memory(RAM ROM FLASH MEMORY)
Memory(RAM ROM FLASH MEMORY)smkhan
 
Future tense
Future tenseFuture tense
Future tenseguerina3
 
Components of a PC
Components of a PCComponents of a PC
Components of a PCavilab
 

Destacado (20)

Protecting Your Computer
Protecting Your ComputerProtecting Your Computer
Protecting Your Computer
 
Introduction to Reading Comprehension
Introduction to Reading ComprehensionIntroduction to Reading Comprehension
Introduction to Reading Comprehension
 
02 computer parts and ports
02 computer parts  and ports02 computer parts  and ports
02 computer parts and ports
 
Lesson 3 Basic Parts Of The Computer
Lesson 3   Basic Parts Of The ComputerLesson 3   Basic Parts Of The Computer
Lesson 3 Basic Parts Of The Computer
 
Introduction to computer hardware
Introduction to computer hardwareIntroduction to computer hardware
Introduction to computer hardware
 
Simple present tense
Simple present tenseSimple present tense
Simple present tense
 
Internal pc components v2
Internal pc components v2Internal pc components v2
Internal pc components v2
 
Internal parts
Internal partsInternal parts
Internal parts
 
Future tense.
Future tense.Future tense.
Future tense.
 
Building a computer in virtual desktop.
Building a computer in virtual desktop.Building a computer in virtual desktop.
Building a computer in virtual desktop.
 
Building a computer virtual desktop computer components
Building a computer virtual desktop computer componentsBuilding a computer virtual desktop computer components
Building a computer virtual desktop computer components
 
Future tense
Future tenseFuture tense
Future tense
 
computer Hardware components
computer  Hardware componentscomputer  Hardware components
computer Hardware components
 
Computer Hardware-Part 1
Computer Hardware-Part 1Computer Hardware-Part 1
Computer Hardware-Part 1
 
Internal PC Components explained
Internal PC Components explainedInternal PC Components explained
Internal PC Components explained
 
Memory(RAM ROM FLASH MEMORY)
Memory(RAM ROM FLASH MEMORY)Memory(RAM ROM FLASH MEMORY)
Memory(RAM ROM FLASH MEMORY)
 
Future tense
Future tenseFuture tense
Future tense
 
Future tense
Future tenseFuture tense
Future tense
 
Computers7 Ch4 2
Computers7 Ch4 2Computers7 Ch4 2
Computers7 Ch4 2
 
Components of a PC
Components of a PCComponents of a PC
Components of a PC
 

Similar a 6 protecting your computer

CYBER SECURITY AWARENESS.pptx
CYBER SECURITY AWARENESS.pptxCYBER SECURITY AWARENESS.pptx
CYBER SECURITY AWARENESS.pptxTapan Khilar
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014B2BPlanner Ltd.
 
Dark Alleys Part1740
Dark Alleys Part1740Dark Alleys Part1740
Dark Alleys Part1740guest2bd2b2
 
Dark Alleys Part1
Dark Alleys Part1Dark Alleys Part1
Dark Alleys Part1Anne Adrian
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System ThreatsDrishti Bhalla
 
Keeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safeKeeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safeComputer Explorers
 
An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)Cyber Security Infotech
 
CYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEWCYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEWBilly Warero
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & securitypinkutinku26
 
Cyber security and safety
Cyber security and safetyCyber security and safety
Cyber security and safetyDooremoore
 
Defensive measure of virus
Defensive  measure of virusDefensive  measure of virus
Defensive measure of virusAbrish06
 

Similar a 6 protecting your computer (20)

CYBER SECURITY AWARENESS.pptx
CYBER SECURITY AWARENESS.pptxCYBER SECURITY AWARENESS.pptx
CYBER SECURITY AWARENESS.pptx
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014
 
Dark Alleys Part1740
Dark Alleys Part1740Dark Alleys Part1740
Dark Alleys Part1740
 
Dark Alleys Part1
Dark Alleys Part1Dark Alleys Part1
Dark Alleys Part1
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System Threats
 
Cyber-savvy Cyber-safety
Cyber-savvy Cyber-safety Cyber-savvy Cyber-safety
Cyber-savvy Cyber-safety
 
cybersafety_basics.pptx
cybersafety_basics.pptxcybersafety_basics.pptx
cybersafety_basics.pptx
 
Keeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safeKeeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safe
 
Internet
InternetInternet
Internet
 
An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)
 
CYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEWCYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEW
 
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Tip sheet
 Tip sheet Tip sheet
Tip sheet
 
Protect
ProtectProtect
Protect
 
IS100 Week 11
IS100 Week 11IS100 Week 11
IS100 Week 11
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security and safety
Cyber security and safetyCyber security and safety
Cyber security and safety
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Defensive measure of virus
Defensive  measure of virusDefensive  measure of virus
Defensive measure of virus
 

Más de mohamad Hamizi

7 social engineering and insider threats
7   social engineering and insider threats 7   social engineering and insider threats
7 social engineering and insider threats mohamad Hamizi
 
5 instant messaging and email
5   instant messaging and email 5   instant messaging and email
5 instant messaging and email mohamad Hamizi
 
4 mobile and remote best practices
4   mobile and remote best practices 4   mobile and remote best practices
4 mobile and remote best practices mohamad Hamizi
 
3 ensuring physical and data security
3   ensuring physical and data security 3   ensuring physical and data security
3 ensuring physical and data security mohamad Hamizi
 
2 cybersecurity best practices
2   cybersecurity best practices 2   cybersecurity best practices
2 cybersecurity best practices mohamad Hamizi
 
1 understanding cyber threats
1   understanding cyber threats 1   understanding cyber threats
1 understanding cyber threats mohamad Hamizi
 

Más de mohamad Hamizi (7)

8 login passwords
8   login passwords 8   login passwords
8 login passwords
 
7 social engineering and insider threats
7   social engineering and insider threats 7   social engineering and insider threats
7 social engineering and insider threats
 
5 instant messaging and email
5   instant messaging and email 5   instant messaging and email
5 instant messaging and email
 
4 mobile and remote best practices
4   mobile and remote best practices 4   mobile and remote best practices
4 mobile and remote best practices
 
3 ensuring physical and data security
3   ensuring physical and data security 3   ensuring physical and data security
3 ensuring physical and data security
 
2 cybersecurity best practices
2   cybersecurity best practices 2   cybersecurity best practices
2 cybersecurity best practices
 
1 understanding cyber threats
1   understanding cyber threats 1   understanding cyber threats
1 understanding cyber threats
 

Último

week 1 cookery 8 fourth - quarter .pptx
week 1 cookery 8  fourth  -  quarter .pptxweek 1 cookery 8  fourth  -  quarter .pptx
week 1 cookery 8 fourth - quarter .pptxJonalynLegaspi2
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQuiz Club NITW
 
How to Manage Engineering to Order in Odoo 17
How to Manage Engineering to Order in Odoo 17How to Manage Engineering to Order in Odoo 17
How to Manage Engineering to Order in Odoo 17Celine George
 
Using Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea DevelopmentUsing Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea Developmentchesterberbo7
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1GloryAnnCastre1
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Projectjordimapav
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmStan Meyer
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxSayali Powar
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQuiz Club NITW
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdfMr Bounab Samir
 

Último (20)

week 1 cookery 8 fourth - quarter .pptx
week 1 cookery 8  fourth  -  quarter .pptxweek 1 cookery 8  fourth  -  quarter .pptx
week 1 cookery 8 fourth - quarter .pptx
 
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptxINCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
 
Paradigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTAParadigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTA
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
 
Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"
 
How to Manage Engineering to Order in Odoo 17
How to Manage Engineering to Order in Odoo 17How to Manage Engineering to Order in Odoo 17
How to Manage Engineering to Order in Odoo 17
 
Using Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea DevelopmentUsing Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea Development
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
prashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Professionprashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Profession
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Project
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and Film
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdf
 

6 protecting your computer

  • 2. Best Practices  Keep Your Files Safe  Always save files on network drives.  Never save files on the desktop  Never save files on the local drive (C:)
  • 3.  Prepare Your Computer For Nightly Updates  Completely shut off your computer.  The update server will update your computer for updates.
  • 4.  Reboot your computer at least once a week.  Never give your passwords to anyone else.
  • 5.  Keep your accounts safe by using passwords that are impossible to guess.  Use non-personal information. (Avoid dates, family names, pet names.)  Use words that do not appear in the dictionary. ("Cat" or "dog" is bad, and "Catdog" is bad, as well.)  Change your passwords frequently.  Use different IDs/passwords for different systems. (Do not use your bank PIN for your computer password.)
  • 6.  Protect your identity  Never respond to e-mail asking you to send a password, social security number or other sensitive info.  Use secure web sites whenever sharing private information.  Learn about how web sites use "cookies" to store information about you.
  • 7.  Protect your files  Lock your screen when you are away from your desk  Avoid storing personally identifiable information on portable media (such as USB drives).  Use secure file transfer to encrypt your files in transit.  Establish secure connections with other machines to encrypt your login credentials and exchange of information.
  • 8.  Protect your computer from viruses and spyware.  Keep anti-virus features turned on.  Scan every file you receive for viruses, including files on removable media.  Do not open attachments unless the e-mail is from someone you know.  Keep automatic operating system updates running.
  • 9.  Protect your computer from viruses and spyware.  Keep anti-spyware software running.  Set up E-mail filter quarantine.  Don't enter sensitive or financial information into pop- up windows.  Do not respond to e-mail messages giving you the opportunity to opt out. (This lets the spammer know you are alive and well!)
  • 10.  Download files only from trusted sites. Click on hyperlinks in e- mail ONLY if you trust the site.  Know that browser spoofing presents sites that appear to be trusted sites but are not.