10 Things You Can do to Secure Your PC Presented by Peter Nowak OIS Client Services Manager.

Slides:



Advertisements
Similar presentations
Keep Your PC Safe (Windows 7, Vista or XP) Nora Lucke 02/05/2012 Documents - security.
Advertisements

June 2008 Surf Safely with a Clean Computer Roger Thornburn.
WEB AND WIRELESS AUTOMATION connecting people and processes InduSoft Web Solution Welcome.
1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.
Physics Network Integration Chris Hunter. Physics network team Chris Hunter : Network Manager David Newton : Network Support Technician Room DWB 663 Phone.
Windows XP Tutorial Securing Windows. Introduction This presentation will guide you through basic security principles for Windows XP.
Lecture Materials for the John Wiley & Sons book: Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions October 12, 2014 DRAFT1.
PC Security 101 Keeping your data and your computer safe.
1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.
Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Configuring your Home Network Configuring your Home Network Jay Ferron ADMT, CISM, CISSP, MCDBA, MCSE, MCT, NSA-IAM.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 13: Planning Server and Network Security.
Configuring Windows Vista Security Chapter 3. IE7 Pop-up Blocker Pop-up Blocker prevents annoying and sometimes unsafe pop-ups from web sites Can block.
Data Security Issues in IR Eileen Driscoll Institutional Planning and Research Cornell University
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Wireless Security Focus on Encryption Steps to secure a Wi-Fi Network.
Introducing Quick Heal Endpoint Security 5.3. “Quick Heal Endpoint Security 5.3 is designed to provide simple, intuitive centralized management and control.
Bullet-Proofing Your Wireless Router By Steve Janss.
Securing a Wireless Network
Working From Your Home Computer Safely: The Ten Commandments Stephen Jones, GSEC, A+ With special thanks to Balakrishnan Ramachandran.
Securing Your Home Computer Presenter: Donnie Green Date: February 11, 2009 National Aeronautics and Space Administration
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
eScan Total Security Suite with Cloud Security
Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
© 2006 Consumer Jungle Minimizing Online Risks. © 2006 Consumer Jungle 15 Steps to Minimizing Online Risks 1.Update your operating system 2.Use a firewall.
Security 101 Harper P. Johnson Information Technology Services Director of Information Security.
Networking Security Chapter 8 powered by dj. Chapter Objectives  Explain various security threats  Monitor security in Windows Vista  Explain basic.
Configuring Windows XP-Based Laptops for Guest Access to Bloomsburg University’s Wireless Network Intended for University staff, and guests planning to.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
IT security By Tilly Gerlack.
IT Security Essentials Lesley A. Bidwell, IT Security Administrator.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
Virtual techdays INDIA │ 9-11 February 2011 Security Discussion: Ask the Experts M.S.Anand │ MTC Technology Specialist │ Microsoft Corporation Anirudh.
 Physical protection and Simple measures  Passwords  Firewalls  Anti-Virus, Spyware and Malware  Web browsers   Patches  Wireless  Encryption.
Connecting Computers and Keeping them safe from Hackers and Viruses Bradie Britzmann and Courtney Hughes Britzmann & Hughes.
IIS Security Sridurga Mavram. Contents -Introduction -Security Consideration -Creating a web page -Drawbacks -Security Tools -Conclusion -References.
Secure Wireless Home Networks Area 2 SIR Presentation Nov. 18, 2004 Dean Steichen Br. 8.
C HAPTER 2 Introduction to Windows XP Professional.
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
Internet Security and Your Computer Welcome to Boot Camp.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
NetTech Solutions Protecting the Computer Lesson 10.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Windows Administration How to protect your computer.
Internet Explorer 7 Updated Advice for the NHS 04 February 2008 Version 1.3.
Return to the PC Security web page Lesson 4: Increasing Web Browser Security.
Vulnerabilities in Operating Systems Michael Gaydeski COSC December 2008.
Copyright © 2008 AusCERT 1 Practical Computer Security See the notes section throughout the slide presentation for additional information.
Cyber Security: Today’s Threats and Mitigations Jonathan Homer, Cyber Security Analyst Idaho National Laboratory.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Overview Microsoft Windows XP Pro (SP2) Microsoft Windows Server 2003 User accounts and groups File sharing and file permissions Password/Lockout Policy.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
NETWORK SECURITY LAB 1170 REHAB ALFALLAJ CT1406. Introduction There are a number of technologies that exist for the sole purpose of ensuring that the.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Labs. Session 1 Lab: Installing and Configuring Windows 7 Exercise 1: Migrating Settings by Using Windows Easy Transfer Exercise 2: Configuring a Reference.
Windows Tutorial 5 Protecting Your Computer
What is Information Security?
What they are and how to protect against them
TECHNOLOGY GUIDE THREE
Home Computer Security
Information Security Session November 11, 2004
Information Security Session October 24, 2005
Chapter 3: Protecting Your Data and Privacy
Implementing Client Security on Windows 2000 and Windows XP Level 150
Cybersecurity and Cyberhygiene
Using Software Restriction Policies
Presentation transcript:

10 Things You Can do to Secure Your PC Presented by Peter Nowak OIS Client Services Manager

What Can I do 1.Turn off File Sharing 2.Install Firewall 3.Scan for Spy ware 4.Anti-Virus 5.Update Your OS 6.Upgrade IE 6 to IE 7 7.Secure your Wireless Network 8.Encrypt your Data 9.Safe Passwords 10.Manage your accounts

Turn off File/Print Sharing Many attacks will allow a malicious hacker to have complete read/write access to the contents of your hard-drive. Be careful when using WiFi Hotspots. NOTE: File sharing is enabled by default when Windows XP Home is installed onto your computer.

Install a Firewall A firewall can block malware that could otherwise scan your computer for vulnerabilities and then try to break in at a weak point. Use a wired or wireless router with firewall features to provide additional protection.

Scan for Spyware Dell claims that 12% of their calls now involve questions about spy ware. Best defense is to use multiple anti-spy ware tools. Select an anti-spy ware tool that provides: Automatic updates Real-time scans

Scan for Viruses Scan your machine regularly Use AV program with: Real-time scanning Automatic Updates Scanning Many AV programs require an annual subscription.

Keep Your Operating System Up to date Turn on auto-updates in Windows Configure Auto-updates to patch the OS daily. Ensure that the machine is on at the scheduled update time.

Update to Internet Explorer 7 Features include: Phishing filter Cross Domain barriers Color coded address bar Extended Validation SSL Certificates

Secure Your Wireless Network Ensure your home network has the appropriate Encryption enabled. Some wireless routers allow you to restrict access to your wireless network by listing all your wireless devices MAC addresses. This will keep unwanted neighbors off your network.

Encrypt Your Data Protects the data if your laptop is stolen. You can encrypt select files or the entire hard drive. Requires a separate password to un-encrypt the data before it can be accessed.

Strong Passwords Do not use personal information Use mixed case passwords with numbers and special characters. Change passwords often Use pass phrases rather than passwords Select a phrase that is easy to remember =

Managing Accounts Logon as Administrator only when necessary. Disable the Guest Account Rename the Administrator Account

Lock Your Computer Set a password on your screen saver Use the  + L function to lock the keyboard Bonus Tip

Resources ity/a/aa112103b.htmhttp://netsecurity.about.com/cs/generalsecur ity/a/aa112103b.htm yware-Evolving.htmlhttp:// yware-Evolving.html wnload.aspx?docid=314832http://downloads.techrepublic.com.com/do wnload.aspx?docid= ts/winfamily/ie/default.mspxhttp:// ts/winfamily/ie/default.mspx