SlideShare a Scribd company logo
2
Most read
4
Most read
5
Most read
Protecting Your Computer
Best Practices
 Keep Your Files Safe
 Always save files on network drives.
 Never save files on the desktop
 Never save files on the local drive (C:)
 Prepare Your Computer For Nightly Updates
 Completely shut off your computer.
 The update server will update your computer for updates.
 Reboot your computer at least once a week.
 Never give your passwords to anyone else.
 Keep your accounts safe by using passwords
that are impossible to guess.
 Use non-personal information. (Avoid dates, family
names, pet names.)
 Use words that do not appear in the dictionary. ("Cat"
or "dog" is bad, and "Catdog" is bad, as well.)
 Change your passwords frequently.
 Use different IDs/passwords for different systems. (Do
not use your bank PIN for your computer password.)
 Protect your identity
 Never respond to e-mail asking you to send
a password, social security number or other
sensitive info.
 Use secure web sites whenever sharing
private information.
 Learn about how web sites use "cookies" to
store information about you.
 Protect your files
 Lock your screen when you are away from your
desk
 Avoid storing personally identifiable information on
portable media (such as USB drives).
 Use secure file transfer to encrypt your files in transit.
 Establish secure connections with other machines to
encrypt your login credentials and exchange of
information.
 Protect your computer from viruses and
spyware.
 Keep anti-virus features turned on.
 Scan every file you receive for viruses,
including files on removable media.
 Do not open attachments unless the e-mail is
from someone you know.
 Keep automatic operating system updates
running.
 Protect your computer from viruses and
spyware.
 Keep anti-spyware software running.
 Set up E-mail filter quarantine.
 Don't enter sensitive or financial information into pop-
up windows.
 Do not respond to e-mail messages giving you the
opportunity to opt out. (This lets the spammer know
you are alive and well!)
 Download files only from trusted sites. Click on hyperlinks in e-
mail ONLY if you trust the site.
 Know that browser spoofing presents sites that appear to be
trusted sites but are not.

More Related Content

PPT
Cyber crime and cyber security
PPTX
User security awareness
PPTX
Phishing Attacks
PPTX
Phishing and hacking
PPTX
Cyber terrorism
PPTX
IT Security DOs and DONTs
PPTX
Il phishing
PPT
Ethical Hacking
Cyber crime and cyber security
User security awareness
Phishing Attacks
Phishing and hacking
Cyber terrorism
IT Security DOs and DONTs
Il phishing
Ethical Hacking

What's hot (20)

PPTX
Cyber crime and security
PDF
Information security awareness, middle management
PPTX
Different Types of Phishing Attacks
PPT
Cyber Security and Cyber Awareness
PPTX
Cyber crime
PPTX
Basic Security Training for End Users
PPT
IT security awareness
PDF
Computer Security | Types of Computer Security | Cybersecurity Course | Edureka
PPTX
Cybersecurity Awareness Training
PDF
Customer information security awareness training
PPTX
Cyber security
PPT
Phishing attacks ppt
PPT
Cyber Crime and Security
PPTX
Email phishing and countermeasures
PPTX
Cyber security
PPTX
Advantages and Disadvantages of internet
PPTX
Ethical hacking
PPTX
Cybercrime and Security
PDF
End-User Security Awareness
PPTX
Spoofing Techniques
Cyber crime and security
Information security awareness, middle management
Different Types of Phishing Attacks
Cyber Security and Cyber Awareness
Cyber crime
Basic Security Training for End Users
IT security awareness
Computer Security | Types of Computer Security | Cybersecurity Course | Edureka
Cybersecurity Awareness Training
Customer information security awareness training
Cyber security
Phishing attacks ppt
Cyber Crime and Security
Email phishing and countermeasures
Cyber security
Advantages and Disadvantages of internet
Ethical hacking
Cybercrime and Security
End-User Security Awareness
Spoofing Techniques
Ad

Viewers also liked (20)

PPT
Protecting Your Computer
PPT
Protecting Your Computer
PPTX
Introduction to Reading Comprehension
PPTX
02 computer parts and ports
PPTX
Lesson 3 Basic Parts Of The Computer
PPT
Introduction to computer hardware
PPTX
Simple present tense
PPSX
Internal pc components v2
PDF
Internal parts
PPT
Future tense.
PPTX
Building a computer in virtual desktop.
PPTX
Building a computer virtual desktop computer components
PPT
Future tense
PPT
computer Hardware components
PPTX
Computer Hardware-Part 1
PPT
Internal PC Components explained
PPT
Memory(RAM ROM FLASH MEMORY)
PPTX
Future tense
PPTX
Future tense
PPT
Computers7 Ch4 2
Protecting Your Computer
Protecting Your Computer
Introduction to Reading Comprehension
02 computer parts and ports
Lesson 3 Basic Parts Of The Computer
Introduction to computer hardware
Simple present tense
Internal pc components v2
Internal parts
Future tense.
Building a computer in virtual desktop.
Building a computer virtual desktop computer components
Future tense
computer Hardware components
Computer Hardware-Part 1
Internal PC Components explained
Memory(RAM ROM FLASH MEMORY)
Future tense
Future tense
Computers7 Ch4 2
Ad

Similar to 6 protecting your computer (20)

PPT
Computer Security
PPTX
Cyber Security
PPTX
Cyber-savvy Cyber-safety
PPTX
CYBER SECURITY AWARENESS.pptx
PPT
Cyber security and safety
PPTX
Computer SOS
PPT
Adult Internet Safety
PPTX
Internet Security
PPTX
Computer Awareness Training
PPT
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
PPT
Online Fraud and Identity Theft: Transact Safely - Symantec Corp.
DOCX
A day that will be remembered
PPTX
IT Security DOs and DON'Ts
DOCX
End user security awareness
PDF
10 most important cyber security tips for your users
ODP
The Net is Dangerous
PPTX
AHADCYBER SAFETY AHADCYBER SAFETYAHADCYBER SAFETYAHADCYBER SAFETYAHADCYBER SA...
PDF
Awesome Tips for Data Security
Computer Security
Cyber Security
Cyber-savvy Cyber-safety
CYBER SECURITY AWARENESS.pptx
Cyber security and safety
Computer SOS
Adult Internet Safety
Internet Security
Computer Awareness Training
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
Online Fraud and Identity Theft: Transact Safely - Symantec Corp.
A day that will be remembered
IT Security DOs and DON'Ts
End user security awareness
10 most important cyber security tips for your users
The Net is Dangerous
AHADCYBER SAFETY AHADCYBER SAFETYAHADCYBER SAFETYAHADCYBER SAFETYAHADCYBER SA...
Awesome Tips for Data Security

More from mohamad Hamizi (7)

PPTX
8 login passwords
PPTX
7 social engineering and insider threats
PPTX
5 instant messaging and email
PPTX
4 mobile and remote best practices
PPTX
3 ensuring physical and data security
PPTX
2 cybersecurity best practices
PPTX
1 understanding cyber threats
8 login passwords
7 social engineering and insider threats
5 instant messaging and email
4 mobile and remote best practices
3 ensuring physical and data security
2 cybersecurity best practices
1 understanding cyber threats

Recently uploaded (20)

PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
Anesthesia in Laparoscopic Surgery in India
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
Basic Mud Logging Guide for educational purpose
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
Insiders guide to clinical Medicine.pdf
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
Computing-Curriculum for Schools in Ghana
PPTX
GDM (1) (1).pptx small presentation for students
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
TR - Agricultural Crops Production NC III.pdf
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
RMMM.pdf make it easy to upload and study
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
Sports Quiz easy sports quiz sports quiz
PPTX
Institutional Correction lecture only . . .
Renaissance Architecture: A Journey from Faith to Humanism
Final Presentation General Medicine 03-08-2024.pptx
Anesthesia in Laparoscopic Surgery in India
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Basic Mud Logging Guide for educational purpose
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Insiders guide to clinical Medicine.pdf
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Computing-Curriculum for Schools in Ghana
GDM (1) (1).pptx small presentation for students
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
TR - Agricultural Crops Production NC III.pdf
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
2.FourierTransform-ShortQuestionswithAnswers.pdf
RMMM.pdf make it easy to upload and study
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Sports Quiz easy sports quiz sports quiz
Institutional Correction lecture only . . .

6 protecting your computer

  • 2. Best Practices  Keep Your Files Safe  Always save files on network drives.  Never save files on the desktop  Never save files on the local drive (C:)
  • 3.  Prepare Your Computer For Nightly Updates  Completely shut off your computer.  The update server will update your computer for updates.
  • 4.  Reboot your computer at least once a week.  Never give your passwords to anyone else.
  • 5.  Keep your accounts safe by using passwords that are impossible to guess.  Use non-personal information. (Avoid dates, family names, pet names.)  Use words that do not appear in the dictionary. ("Cat" or "dog" is bad, and "Catdog" is bad, as well.)  Change your passwords frequently.  Use different IDs/passwords for different systems. (Do not use your bank PIN for your computer password.)
  • 6.  Protect your identity  Never respond to e-mail asking you to send a password, social security number or other sensitive info.  Use secure web sites whenever sharing private information.  Learn about how web sites use "cookies" to store information about you.
  • 7.  Protect your files  Lock your screen when you are away from your desk  Avoid storing personally identifiable information on portable media (such as USB drives).  Use secure file transfer to encrypt your files in transit.  Establish secure connections with other machines to encrypt your login credentials and exchange of information.
  • 8.  Protect your computer from viruses and spyware.  Keep anti-virus features turned on.  Scan every file you receive for viruses, including files on removable media.  Do not open attachments unless the e-mail is from someone you know.  Keep automatic operating system updates running.
  • 9.  Protect your computer from viruses and spyware.  Keep anti-spyware software running.  Set up E-mail filter quarantine.  Don't enter sensitive or financial information into pop- up windows.  Do not respond to e-mail messages giving you the opportunity to opt out. (This lets the spammer know you are alive and well!)
  • 10.  Download files only from trusted sites. Click on hyperlinks in e- mail ONLY if you trust the site.  Know that browser spoofing presents sites that appear to be trusted sites but are not.