SlideShare a Scribd company logo
Keep Your Computers Safe and Secure ©2008 Rob Clement All Rights Reserved www.boysbach.com
Introduction Beware you can lose your data sooner than you think. One lightning strike could be a catastrophe for you. A computer is “cheap” and easily replaced. The information may be irreplaceable.
What Is The Real Problem Challenge: Switch off your computer/s for a day. Keep the machine turned off  –  no cheating See what you need to have right now. How much is that information worth? Options: Use Internet at Cyber cafe or library. What if you had your PC stolen or it was destroyed?
Keep Your Computer Safe 1 Place your computer in a secure location. Check out your security video Avoid high-visibility locations
Keep Your Computer Safe 2 Is your power supply safe? Surge protection Battery backup Generator
Keep Your Computer Safe 3 Drinks and floods Get a new keyboard don't fix it! Portables and liquids do not mix! Keep your desktop off the floor!
Keep Your Computer Safe 4 Cleaning sprays can be deadly Fires and explosions happen: keep your computer data safe.
Traveling With Your Portable Backup data before traveling. One backup with you One backup leave behind Don't lose the portable Don't have the portable stolen.
Protect Your Passwords If you use a computer at the coffee shop or Cyber cafe Log off e-mail and your bank account when you finish Protect your bank and personal details Your use of a computer at a Cyber cafe or coffee shop it could be monitored.
Backup Options and Priorities 1 Backups are essential. Backup to magnetic tape is best. DVD or CD R/W discs otherwise Check the results of your backup from time to time.
Backup Options and Priorities 2 Backup: Documents (My Document pre-Vista)‏ E-mails Other software's data:   e.g. The accounts package.
Backup Options and Priorities 3 Check the warranty on a fireproof safe. Make a decision do not leave to chance.
Backup Options and Priorities 4 Keep optical discs away from heat or light. Replace optical discs if they show problems. Keep backup away from computer. Keep the original software discs safely. Backup any software you have downloaded. Always rotate a number of discs.
Magnets Why are magnets so dangerous to computers? To wipe your data from a floppy disc or hard drive use fixed magnet.
Computer Operating System Discs Collect the boot and recovery discs for your PC Put them in a CD holder If you use a portable take these discs with you.
Your PDA Is “Part” Of A Computer. Do not forget your PDA. It is always vulnerable. Copy all data onto your PC regularly. Back up your telephone numbers
Simple Settings on Your Computer 1 Apply updates to your system Turn on your firewall. Include Vista Windows Defender. Set your browser for max security. Consider an alternative browser
Simple Settings on Your Computer 2 Install software protection Anti-virus Internet Security Evaluate choices not just prices Do not open unknown e-mail attachments. Do not run programs, you do not know where they came from. Disconnect from Internet when not in use.
Simple Settings on Your Computer 3 Think about where to locate physical firewalls Turn off your computer when not in use
Spam Is Coming 1 What is Spam? Unwanted or junk e-mail. Beware of becoming a spammer. Check your spam folder often   or miss important mail. Do not release your e-mail address to the Internet.
Spam Is Coming 2 Use spam blocking software. Use multiple e-mail addresses Get an e-mail provider who will stop spam.
Adware, Spyware and Malware 1 Spyware is software that enables an individual or company to see what web sites you are accessing, search your hard disc for “useful information” and also what your account numbers and passwords are.
Adware, Spyware and Malware 2 Adware on the other hand will display adverts for various types of products and services available on the Internet. Adware is annoying; spyware can be catastrophic to your computer and to you.
Adware, Spyware and Malware 3 Malware is spyware in its worst forms, where in the end the malware will give all of your computer information to a third party, mess up your web browser settings and your Internet sites and prevent you from using your computer as it runs so slowly.
Phishing and Identity Theft 1 Phishing and identity theft is big business. Ever received an e-mail from a reputable business or bank? Are they real? No they are Phishing for bank or credit card info?
Phishing and Identity Theft 2 Identity theft someone steals your ID and passwords and then pretend to be you, stealing money and arranging bank loans. Ask for personal advice for software to combat this
A Computer Virus 1 A computer virus is a program (or script)‏ it causes worry to the user or harm to the computer or both Computer virus detection is big business. Beware of special days   like Friday 13 th , 9/11 etc
A Computer Virus 2 Always have anti-virus updates paid for. Always update your anti-virus A Trojan horse appears harmless or even helpful but it is harmful and may be deadly. Switch the Firewall on now.
A Computer Virus 3 Access the Internet without anti-virus etc is playing Russian Roulette Use the free service offered by Symantec or Kaspersky to  check your computer. Shop around and ask for advice.
Online Scams 1 Do not trust everyone on the Internet. You cannot see their faces You cannot see their body language.
Online Scams 2 If someone appears too good to be true they probably are. They may appear a novice. They may appear an expert. They may appear to be average.
Online Scams 3 Do not give out your personal details Not your home address Not your date of birth Not your bank details Not your credit card details
Online Scams 4 Check their ISP to see what country they are in. Check business address Check website pictures Check company registration Check list of directors Before accepting any business  proposal ALL THIS IS DUE DILIGENCE
Conclusion Protect your computer. Secure your computer. Protect from virus, spam, spyware, adware, and malware. Make back up so you never lose the data.
To Purchase a full copy of “ PC Safety and Security Manual” By Rob Clement Go to www.boysbach.com
Keep Your Computers Safe and Secure With thanks to www.powerbacks.com   for the backdrop

More Related Content

PPTX
Computing and ethics
PPT
Understanding security and safe computing
PDF
WISE KIDS Leaflet: eSecurity
PDF
Computer safety
PPTX
HELE 4 Lesson 2: Safe and Responsible Use of ICT
PPTX
Computer SOS
Computing and ethics
Understanding security and safe computing
WISE KIDS Leaflet: eSecurity
Computer safety
HELE 4 Lesson 2: Safe and Responsible Use of ICT
Computer SOS

What's hot (19)

PPT
Ten Important Rules
PPT
Internet Safety
PPTX
Internet safety guide
PPTX
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
PDF
14 tips to increase cybersecurity awareness
PPT
Infosec 4 The Home
PPT
Jeopardy
PPTX
List of Malwares
PPTX
Online safety and security
PDF
Network security primer
PPTX
Email Security Tips
PDF
Security Awareness Training
PPTX
Cybersecurity Awareness
PPT
Computer based crime
ODP
Online Security and Safety
PDF
Cyber security and Privacy Awareness manual
PPT
Presented to Compass
PDF
Notes to The Ten Commandments of Online Security and Privacy
PPTX
Remote administration tools
Ten Important Rules
Internet Safety
Internet safety guide
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
14 tips to increase cybersecurity awareness
Infosec 4 The Home
Jeopardy
List of Malwares
Online safety and security
Network security primer
Email Security Tips
Security Awareness Training
Cybersecurity Awareness
Computer based crime
Online Security and Safety
Cyber security and Privacy Awareness manual
Presented to Compass
Notes to The Ten Commandments of Online Security and Privacy
Remote administration tools
Ad

Similar to Keep Your Computers Safe And Secure (20)

PPTX
Home and Business Computer Security 2014
PPTX
Edu352 week1discussion2technologysafetyoct2011crs
PDF
How to Protect Your PC from Malware, Ransomware, Virus
PPTX
Cyber Security
PDF
Guide to pc_security
PDF
Computer Security Guide to Pc Security
PDF
Employee Security Awareness Program
DOCX
Giarritano concept paper 4
DOCX
3 summer computer tips
PPTX
Cyber crime & security
PDF
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
PPT
Protect Yourself From Internet Pests
PPT
Safety Plano Library June 4 Main
PDF
10 steps to protecting your computer to the world of internet.
PPT
Protecting Your Computer
PPT
101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!
PPSX
Security Awareness Training
PPT
Computer Security
PPT
Keeping Your Computer Secure
ODP
The Net is Dangerous
Home and Business Computer Security 2014
Edu352 week1discussion2technologysafetyoct2011crs
How to Protect Your PC from Malware, Ransomware, Virus
Cyber Security
Guide to pc_security
Computer Security Guide to Pc Security
Employee Security Awareness Program
Giarritano concept paper 4
3 summer computer tips
Cyber crime & security
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
Protect Yourself From Internet Pests
Safety Plano Library June 4 Main
10 steps to protecting your computer to the world of internet.
Protecting Your Computer
101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!
Security Awareness Training
Computer Security
Keeping Your Computer Secure
The Net is Dangerous
Ad

Recently uploaded (20)

PDF
Katrina Stoneking: Shaking Up the Alcohol Beverage Industry
PPT
340036916-American-Literature-Literary-Period-Overview.ppt
PPTX
HR Introduction Slide (1).pptx on hr intro
PPTX
Lecture (1)-Introduction.pptx business communication
DOCX
unit 2 cost accounting- Tender and Quotation & Reconciliation Statement
PDF
Solara Labs: Empowering Health through Innovative Nutraceutical Solutions
PDF
MSPs in 10 Words - Created by US MSP Network
PDF
Laughter Yoga Basic Learning Workshop Manual
PDF
BsN 7th Sem Course GridNNNNNNNN CCN.pdf
PDF
20250805_A. Stotz All Weather Strategy - Performance review July 2025.pdf
PPTX
ICG2025_ICG 6th steering committee 30-8-24.pptx
PPT
Data mining for business intelligence ch04 sharda
PPTX
Amazon (Business Studies) management studies
PPTX
5 Stages of group development guide.pptx
PDF
Power and position in leadershipDOC-20250808-WA0011..pdf
PDF
How to Get Business Funding for Small Business Fast
PPTX
job Avenue by vinith.pptxvnbvnvnvbnvbnbmnbmbh
PDF
DOC-20250806-WA0002._20250806_112011_0000.pdf
PDF
WRN_Investor_Presentation_August 2025.pdf
DOCX
Business Management - unit 1 and 2
Katrina Stoneking: Shaking Up the Alcohol Beverage Industry
340036916-American-Literature-Literary-Period-Overview.ppt
HR Introduction Slide (1).pptx on hr intro
Lecture (1)-Introduction.pptx business communication
unit 2 cost accounting- Tender and Quotation & Reconciliation Statement
Solara Labs: Empowering Health through Innovative Nutraceutical Solutions
MSPs in 10 Words - Created by US MSP Network
Laughter Yoga Basic Learning Workshop Manual
BsN 7th Sem Course GridNNNNNNNN CCN.pdf
20250805_A. Stotz All Weather Strategy - Performance review July 2025.pdf
ICG2025_ICG 6th steering committee 30-8-24.pptx
Data mining for business intelligence ch04 sharda
Amazon (Business Studies) management studies
5 Stages of group development guide.pptx
Power and position in leadershipDOC-20250808-WA0011..pdf
How to Get Business Funding for Small Business Fast
job Avenue by vinith.pptxvnbvnvnvbnvbnbmnbmbh
DOC-20250806-WA0002._20250806_112011_0000.pdf
WRN_Investor_Presentation_August 2025.pdf
Business Management - unit 1 and 2

Keep Your Computers Safe And Secure

  • 1. Keep Your Computers Safe and Secure ©2008 Rob Clement All Rights Reserved www.boysbach.com
  • 2. Introduction Beware you can lose your data sooner than you think. One lightning strike could be a catastrophe for you. A computer is “cheap” and easily replaced. The information may be irreplaceable.
  • 3. What Is The Real Problem Challenge: Switch off your computer/s for a day. Keep the machine turned off – no cheating See what you need to have right now. How much is that information worth? Options: Use Internet at Cyber cafe or library. What if you had your PC stolen or it was destroyed?
  • 4. Keep Your Computer Safe 1 Place your computer in a secure location. Check out your security video Avoid high-visibility locations
  • 5. Keep Your Computer Safe 2 Is your power supply safe? Surge protection Battery backup Generator
  • 6. Keep Your Computer Safe 3 Drinks and floods Get a new keyboard don't fix it! Portables and liquids do not mix! Keep your desktop off the floor!
  • 7. Keep Your Computer Safe 4 Cleaning sprays can be deadly Fires and explosions happen: keep your computer data safe.
  • 8. Traveling With Your Portable Backup data before traveling. One backup with you One backup leave behind Don't lose the portable Don't have the portable stolen.
  • 9. Protect Your Passwords If you use a computer at the coffee shop or Cyber cafe Log off e-mail and your bank account when you finish Protect your bank and personal details Your use of a computer at a Cyber cafe or coffee shop it could be monitored.
  • 10. Backup Options and Priorities 1 Backups are essential. Backup to magnetic tape is best. DVD or CD R/W discs otherwise Check the results of your backup from time to time.
  • 11. Backup Options and Priorities 2 Backup: Documents (My Document pre-Vista)‏ E-mails Other software's data: e.g. The accounts package.
  • 12. Backup Options and Priorities 3 Check the warranty on a fireproof safe. Make a decision do not leave to chance.
  • 13. Backup Options and Priorities 4 Keep optical discs away from heat or light. Replace optical discs if they show problems. Keep backup away from computer. Keep the original software discs safely. Backup any software you have downloaded. Always rotate a number of discs.
  • 14. Magnets Why are magnets so dangerous to computers? To wipe your data from a floppy disc or hard drive use fixed magnet.
  • 15. Computer Operating System Discs Collect the boot and recovery discs for your PC Put them in a CD holder If you use a portable take these discs with you.
  • 16. Your PDA Is “Part” Of A Computer. Do not forget your PDA. It is always vulnerable. Copy all data onto your PC regularly. Back up your telephone numbers
  • 17. Simple Settings on Your Computer 1 Apply updates to your system Turn on your firewall. Include Vista Windows Defender. Set your browser for max security. Consider an alternative browser
  • 18. Simple Settings on Your Computer 2 Install software protection Anti-virus Internet Security Evaluate choices not just prices Do not open unknown e-mail attachments. Do not run programs, you do not know where they came from. Disconnect from Internet when not in use.
  • 19. Simple Settings on Your Computer 3 Think about where to locate physical firewalls Turn off your computer when not in use
  • 20. Spam Is Coming 1 What is Spam? Unwanted or junk e-mail. Beware of becoming a spammer. Check your spam folder often or miss important mail. Do not release your e-mail address to the Internet.
  • 21. Spam Is Coming 2 Use spam blocking software. Use multiple e-mail addresses Get an e-mail provider who will stop spam.
  • 22. Adware, Spyware and Malware 1 Spyware is software that enables an individual or company to see what web sites you are accessing, search your hard disc for “useful information” and also what your account numbers and passwords are.
  • 23. Adware, Spyware and Malware 2 Adware on the other hand will display adverts for various types of products and services available on the Internet. Adware is annoying; spyware can be catastrophic to your computer and to you.
  • 24. Adware, Spyware and Malware 3 Malware is spyware in its worst forms, where in the end the malware will give all of your computer information to a third party, mess up your web browser settings and your Internet sites and prevent you from using your computer as it runs so slowly.
  • 25. Phishing and Identity Theft 1 Phishing and identity theft is big business. Ever received an e-mail from a reputable business or bank? Are they real? No they are Phishing for bank or credit card info?
  • 26. Phishing and Identity Theft 2 Identity theft someone steals your ID and passwords and then pretend to be you, stealing money and arranging bank loans. Ask for personal advice for software to combat this
  • 27. A Computer Virus 1 A computer virus is a program (or script)‏ it causes worry to the user or harm to the computer or both Computer virus detection is big business. Beware of special days like Friday 13 th , 9/11 etc
  • 28. A Computer Virus 2 Always have anti-virus updates paid for. Always update your anti-virus A Trojan horse appears harmless or even helpful but it is harmful and may be deadly. Switch the Firewall on now.
  • 29. A Computer Virus 3 Access the Internet without anti-virus etc is playing Russian Roulette Use the free service offered by Symantec or Kaspersky to check your computer. Shop around and ask for advice.
  • 30. Online Scams 1 Do not trust everyone on the Internet. You cannot see their faces You cannot see their body language.
  • 31. Online Scams 2 If someone appears too good to be true they probably are. They may appear a novice. They may appear an expert. They may appear to be average.
  • 32. Online Scams 3 Do not give out your personal details Not your home address Not your date of birth Not your bank details Not your credit card details
  • 33. Online Scams 4 Check their ISP to see what country they are in. Check business address Check website pictures Check company registration Check list of directors Before accepting any business proposal ALL THIS IS DUE DILIGENCE
  • 34. Conclusion Protect your computer. Secure your computer. Protect from virus, spam, spyware, adware, and malware. Make back up so you never lose the data.
  • 35. To Purchase a full copy of “ PC Safety and Security Manual” By Rob Clement Go to www.boysbach.com
  • 36. Keep Your Computers Safe and Secure With thanks to www.powerbacks.com for the backdrop