SlideShare una empresa de Scribd logo
1 de 13
Descargar para leer sin conexión
COMPUTER SECURITY 101
A Checklist for IT Admins to Share With Their Users
we know you understand the value of
proper computer security
Okay IT Admins,
but do your users?
Communicating the value
of proper computer security to
your end users can prove to be
a real challenge
To better protect your users we’ve compiled
a security 101 checklist in the
following key areas:
Password security
Email security
Web browser security
Smartphone security
Workstation security
Network security
Personal & “social” security
Share these critical tips
with all your users and get the
security conversation going!
□□ Never share your password with anyone, ever
□□ Use a passphrase (a short sentence that’s easy
to remember) instead of a password
□□ Combine your passphrase with two-factor
authentication
PASSWORD
SECURITY
□□ Never respond to an email from strangers
□□ Don’t open any attachments that you haven’t
scanned first
□□ Don’t open any links you haven’t checked (hint,
hover over the link to ensure it’s really going
where it’s supposed to go)
□□ Always back up your email
EMAIL
SECURITY
□□ Only install from safe sources (hint, the vendor’s
download site or your browser’s add-in store)
□□ Look for the lock and ensure you see the icon
before entering your personal information into
a website
□□ Save and sync selectively when asked “Would
you like to store this password?” The best
answer is NO.
□□ If you log in then you should also log out -
always
□□ Clear and back up everything
WEB BROWSER
SECURITY
□□ Always use a lock screen - every smartphone
and tablet have one. Use it.
□□ Nobody should ever borrow your smartphone
□□ Don’t respond to a text from a stranger
□□ Don’t answer calls from strange phone
numbers - it’s better to screen these calls. Let
voicemail handle it.
□□ Back up everything
SMARTPHONE
SECURITY
□□ Use an active security suite, aka an antivirus
program to protect your system from viruses
such as malware, spyware, and network attacks
□□ Update your software - keep your operating
system, security suite, and programs up-to-date
□□ Leave it? Lock it. Don’t leave your system
logged in and unattended
□□ Don’t share your system with anyone unless
specifically told by your IT team
□□ Back up your data
WORKSTATION
SECURITY
□□ Never connect to Wi-Fi that you don’t own
□□ Don’t connect to Wi-Fi without a password
□□ Always use a firewall
□□ Always use SSL in your web browser
NETWORK
SECURITY
□□ Don’t talk to strangers online
□□ Only give out data on the phone calls that you
started
□□ Watch your back - literally. Be aware of your
surroundings when in public and logged on to
your computer
□□ Everybody you just met is a stranger, no matter
what they claim to “know” - the best advice for
online and in person as well.
PERSONAL & “SOCIAL”
SECURITY
Share these crucial security
basics with your users.
These best practices will ensure that
your users are protected.
For more information download the eBook “The IT Admin’s
Checklist for Complete Office-Wide Computer Security”
A COMPLETE GUIDE

Más contenido relacionado

Destacado

Top 10 Evidence Based Teaching Strategies
Top 10 Evidence Based Teaching StrategiesTop 10 Evidence Based Teaching Strategies
Top 10 Evidence Based Teaching StrategiesShaun Killian
 
Computer Security and Risks
Computer Security and RisksComputer Security and Risks
Computer Security and RisksMiguel Rebollo
 
Google Apps Demographics Study [Infographic]
Google Apps Demographics Study [Infographic]Google Apps Demographics Study [Infographic]
Google Apps Demographics Study [Infographic]Datto
 
Video Tools for Teachers - Digital Video
Video Tools for Teachers - Digital VideoVideo Tools for Teachers - Digital Video
Video Tools for Teachers - Digital VideoNik Peachey
 
Cyber security
Cyber securityCyber security
Cyber securitySiblu28
 
Machine learning aplicado a los negocios
Machine learning aplicado a los negociosMachine learning aplicado a los negocios
Machine learning aplicado a los negociosLuis Cosio
 
23 network security threats pkg
23 network security threats pkg23 network security threats pkg
23 network security threats pkgUmang Gupta
 
G Suite Zero (Basic 101) - Webinar (for Malaysians)
G Suite Zero (Basic 101) - Webinar (for Malaysians)G Suite Zero (Basic 101) - Webinar (for Malaysians)
G Suite Zero (Basic 101) - Webinar (for Malaysians)M Nasir SO
 
Machine Learning - why the hype and how it does its magic
Machine Learning - why the hype and how it does its magicMachine Learning - why the hype and how it does its magic
Machine Learning - why the hype and how it does its magicAmirali Charania
 
Computer , Internet and physical security.
Computer , Internet and physical security.Computer , Internet and physical security.
Computer , Internet and physical security.Ankur Kumar
 
SEM Performance with Machine Learning
SEM Performance with Machine LearningSEM Performance with Machine Learning
SEM Performance with Machine LearningAcquisio
 

Destacado (14)

Top 10 Evidence Based Teaching Strategies
Top 10 Evidence Based Teaching StrategiesTop 10 Evidence Based Teaching Strategies
Top 10 Evidence Based Teaching Strategies
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
Computer Security and Risks
Computer Security and RisksComputer Security and Risks
Computer Security and Risks
 
Google Apps Demographics Study [Infographic]
Google Apps Demographics Study [Infographic]Google Apps Demographics Study [Infographic]
Google Apps Demographics Study [Infographic]
 
Teaching strategies
Teaching strategiesTeaching strategies
Teaching strategies
 
Effective teaching strategies
Effective teaching strategiesEffective teaching strategies
Effective teaching strategies
 
Video Tools for Teachers - Digital Video
Video Tools for Teachers - Digital VideoVideo Tools for Teachers - Digital Video
Video Tools for Teachers - Digital Video
 
Cyber security
Cyber securityCyber security
Cyber security
 
Machine learning aplicado a los negocios
Machine learning aplicado a los negociosMachine learning aplicado a los negocios
Machine learning aplicado a los negocios
 
23 network security threats pkg
23 network security threats pkg23 network security threats pkg
23 network security threats pkg
 
G Suite Zero (Basic 101) - Webinar (for Malaysians)
G Suite Zero (Basic 101) - Webinar (for Malaysians)G Suite Zero (Basic 101) - Webinar (for Malaysians)
G Suite Zero (Basic 101) - Webinar (for Malaysians)
 
Machine Learning - why the hype and how it does its magic
Machine Learning - why the hype and how it does its magicMachine Learning - why the hype and how it does its magic
Machine Learning - why the hype and how it does its magic
 
Computer , Internet and physical security.
Computer , Internet and physical security.Computer , Internet and physical security.
Computer , Internet and physical security.
 
SEM Performance with Machine Learning
SEM Performance with Machine LearningSEM Performance with Machine Learning
SEM Performance with Machine Learning
 

Más de Datto

What is Network Continuity? Why Does it Matter for Small Businesses?
What is Network Continuity? Why Does it Matter for Small Businesses?What is Network Continuity? Why Does it Matter for Small Businesses?
What is Network Continuity? Why Does it Matter for Small Businesses?Datto
 
The Wizards Behind Google Apps: 11 Google Apps Setup Tips for Admins by Admins
The Wizards Behind Google Apps: 11 Google Apps Setup Tips for Admins by Admins The Wizards Behind Google Apps: 11 Google Apps Setup Tips for Admins by Admins
The Wizards Behind Google Apps: 11 Google Apps Setup Tips for Admins by Admins Datto
 
15 Effective Tips for Schools Using Google Apps for Education
15 Effective Tips for Schools Using Google Apps for Education15 Effective Tips for Schools Using Google Apps for Education
15 Effective Tips for Schools Using Google Apps for EducationDatto
 
Midmarket CIO Forum Spring 2014
Midmarket CIO Forum Spring 2014Midmarket CIO Forum Spring 2014
Midmarket CIO Forum Spring 2014Datto
 
Protecting Data in the Cloud: The Truth about SaaS Backup
Protecting Data in the Cloud: The Truth about SaaS BackupProtecting Data in the Cloud: The Truth about SaaS Backup
Protecting Data in the Cloud: The Truth about SaaS BackupDatto
 
Midmarket CIO Forum 2013 Presentation
Midmarket CIO Forum 2013 PresentationMidmarket CIO Forum 2013 Presentation
Midmarket CIO Forum 2013 PresentationDatto
 
Salesforce Data Loss in the Wild Wild West
Salesforce Data Loss in the Wild Wild WestSalesforce Data Loss in the Wild Wild West
Salesforce Data Loss in the Wild Wild WestDatto
 
Growing Up Google - Google Apps for EDU Adoption [Infographic]
Growing Up Google - Google Apps for EDU Adoption [Infographic]Growing Up Google - Google Apps for EDU Adoption [Infographic]
Growing Up Google - Google Apps for EDU Adoption [Infographic]Datto
 
CIO Cloud Summit nyc_backupify
CIO Cloud Summit nyc_backupifyCIO Cloud Summit nyc_backupify
CIO Cloud Summit nyc_backupifyDatto
 
Google Apps Data Loss [Infographic]
Google Apps Data Loss [Infographic]Google Apps Data Loss [Infographic]
Google Apps Data Loss [Infographic]Datto
 
Data Liberation Awards [Infographic]
Data Liberation Awards [Infographic]Data Liberation Awards [Infographic]
Data Liberation Awards [Infographic]Datto
 
The Value of Gmail Accounts [Infographic]
The Value of Gmail Accounts [Infographic]The Value of Gmail Accounts [Infographic]
The Value of Gmail Accounts [Infographic]Datto
 
13 Steps to Safely Deprovision and Delete a Google Apps User
13 Steps to Safely Deprovision and Delete a Google Apps User13 Steps to Safely Deprovision and Delete a Google Apps User
13 Steps to Safely Deprovision and Delete a Google Apps UserDatto
 
10 Steps to Optimize Mozilla Firefox for Google Apps Security
10 Steps to Optimize Mozilla Firefox for Google Apps Security10 Steps to Optimize Mozilla Firefox for Google Apps Security
10 Steps to Optimize Mozilla Firefox for Google Apps SecurityDatto
 
5 Steps to Secure Google Drive
5 Steps to Secure Google Drive5 Steps to Secure Google Drive
5 Steps to Secure Google DriveDatto
 
Do You Have Protection?
Do You Have Protection?Do You Have Protection?
Do You Have Protection?Datto
 
My Apps Are Fat - Not with Backupify!
My Apps Are Fat - Not with Backupify!My Apps Are Fat - Not with Backupify!
My Apps Are Fat - Not with Backupify!Datto
 
10 Scenarios of Google Apps Data Loss
10 Scenarios of Google Apps Data Loss10 Scenarios of Google Apps Data Loss
10 Scenarios of Google Apps Data LossDatto
 
11 Reasons to Backup Your Facebook Page
11 Reasons to Backup Your Facebook Page11 Reasons to Backup Your Facebook Page
11 Reasons to Backup Your Facebook PageDatto
 
Which 'aaS' is Right for You?
Which 'aaS' is Right for You?Which 'aaS' is Right for You?
Which 'aaS' is Right for You?Datto
 

Más de Datto (20)

What is Network Continuity? Why Does it Matter for Small Businesses?
What is Network Continuity? Why Does it Matter for Small Businesses?What is Network Continuity? Why Does it Matter for Small Businesses?
What is Network Continuity? Why Does it Matter for Small Businesses?
 
The Wizards Behind Google Apps: 11 Google Apps Setup Tips for Admins by Admins
The Wizards Behind Google Apps: 11 Google Apps Setup Tips for Admins by Admins The Wizards Behind Google Apps: 11 Google Apps Setup Tips for Admins by Admins
The Wizards Behind Google Apps: 11 Google Apps Setup Tips for Admins by Admins
 
15 Effective Tips for Schools Using Google Apps for Education
15 Effective Tips for Schools Using Google Apps for Education15 Effective Tips for Schools Using Google Apps for Education
15 Effective Tips for Schools Using Google Apps for Education
 
Midmarket CIO Forum Spring 2014
Midmarket CIO Forum Spring 2014Midmarket CIO Forum Spring 2014
Midmarket CIO Forum Spring 2014
 
Protecting Data in the Cloud: The Truth about SaaS Backup
Protecting Data in the Cloud: The Truth about SaaS BackupProtecting Data in the Cloud: The Truth about SaaS Backup
Protecting Data in the Cloud: The Truth about SaaS Backup
 
Midmarket CIO Forum 2013 Presentation
Midmarket CIO Forum 2013 PresentationMidmarket CIO Forum 2013 Presentation
Midmarket CIO Forum 2013 Presentation
 
Salesforce Data Loss in the Wild Wild West
Salesforce Data Loss in the Wild Wild WestSalesforce Data Loss in the Wild Wild West
Salesforce Data Loss in the Wild Wild West
 
Growing Up Google - Google Apps for EDU Adoption [Infographic]
Growing Up Google - Google Apps for EDU Adoption [Infographic]Growing Up Google - Google Apps for EDU Adoption [Infographic]
Growing Up Google - Google Apps for EDU Adoption [Infographic]
 
CIO Cloud Summit nyc_backupify
CIO Cloud Summit nyc_backupifyCIO Cloud Summit nyc_backupify
CIO Cloud Summit nyc_backupify
 
Google Apps Data Loss [Infographic]
Google Apps Data Loss [Infographic]Google Apps Data Loss [Infographic]
Google Apps Data Loss [Infographic]
 
Data Liberation Awards [Infographic]
Data Liberation Awards [Infographic]Data Liberation Awards [Infographic]
Data Liberation Awards [Infographic]
 
The Value of Gmail Accounts [Infographic]
The Value of Gmail Accounts [Infographic]The Value of Gmail Accounts [Infographic]
The Value of Gmail Accounts [Infographic]
 
13 Steps to Safely Deprovision and Delete a Google Apps User
13 Steps to Safely Deprovision and Delete a Google Apps User13 Steps to Safely Deprovision and Delete a Google Apps User
13 Steps to Safely Deprovision and Delete a Google Apps User
 
10 Steps to Optimize Mozilla Firefox for Google Apps Security
10 Steps to Optimize Mozilla Firefox for Google Apps Security10 Steps to Optimize Mozilla Firefox for Google Apps Security
10 Steps to Optimize Mozilla Firefox for Google Apps Security
 
5 Steps to Secure Google Drive
5 Steps to Secure Google Drive5 Steps to Secure Google Drive
5 Steps to Secure Google Drive
 
Do You Have Protection?
Do You Have Protection?Do You Have Protection?
Do You Have Protection?
 
My Apps Are Fat - Not with Backupify!
My Apps Are Fat - Not with Backupify!My Apps Are Fat - Not with Backupify!
My Apps Are Fat - Not with Backupify!
 
10 Scenarios of Google Apps Data Loss
10 Scenarios of Google Apps Data Loss10 Scenarios of Google Apps Data Loss
10 Scenarios of Google Apps Data Loss
 
11 Reasons to Backup Your Facebook Page
11 Reasons to Backup Your Facebook Page11 Reasons to Backup Your Facebook Page
11 Reasons to Backup Your Facebook Page
 
Which 'aaS' is Right for You?
Which 'aaS' is Right for You?Which 'aaS' is Right for You?
Which 'aaS' is Right for You?
 

Último

Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 

Último (20)

Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 

Computer Security 101: A Checklist for IT Admins to Share with Their Users

  • 1. COMPUTER SECURITY 101 A Checklist for IT Admins to Share With Their Users
  • 2. we know you understand the value of proper computer security Okay IT Admins, but do your users?
  • 3. Communicating the value of proper computer security to your end users can prove to be a real challenge
  • 4. To better protect your users we’ve compiled a security 101 checklist in the following key areas: Password security Email security Web browser security Smartphone security Workstation security Network security Personal & “social” security
  • 5. Share these critical tips with all your users and get the security conversation going!
  • 6. □□ Never share your password with anyone, ever □□ Use a passphrase (a short sentence that’s easy to remember) instead of a password □□ Combine your passphrase with two-factor authentication PASSWORD SECURITY
  • 7. □□ Never respond to an email from strangers □□ Don’t open any attachments that you haven’t scanned first □□ Don’t open any links you haven’t checked (hint, hover over the link to ensure it’s really going where it’s supposed to go) □□ Always back up your email EMAIL SECURITY
  • 8. □□ Only install from safe sources (hint, the vendor’s download site or your browser’s add-in store) □□ Look for the lock and ensure you see the icon before entering your personal information into a website □□ Save and sync selectively when asked “Would you like to store this password?” The best answer is NO. □□ If you log in then you should also log out - always □□ Clear and back up everything WEB BROWSER SECURITY
  • 9. □□ Always use a lock screen - every smartphone and tablet have one. Use it. □□ Nobody should ever borrow your smartphone □□ Don’t respond to a text from a stranger □□ Don’t answer calls from strange phone numbers - it’s better to screen these calls. Let voicemail handle it. □□ Back up everything SMARTPHONE SECURITY
  • 10. □□ Use an active security suite, aka an antivirus program to protect your system from viruses such as malware, spyware, and network attacks □□ Update your software - keep your operating system, security suite, and programs up-to-date □□ Leave it? Lock it. Don’t leave your system logged in and unattended □□ Don’t share your system with anyone unless specifically told by your IT team □□ Back up your data WORKSTATION SECURITY
  • 11. □□ Never connect to Wi-Fi that you don’t own □□ Don’t connect to Wi-Fi without a password □□ Always use a firewall □□ Always use SSL in your web browser NETWORK SECURITY
  • 12. □□ Don’t talk to strangers online □□ Only give out data on the phone calls that you started □□ Watch your back - literally. Be aware of your surroundings when in public and logged on to your computer □□ Everybody you just met is a stranger, no matter what they claim to “know” - the best advice for online and in person as well. PERSONAL & “SOCIAL” SECURITY
  • 13. Share these crucial security basics with your users. These best practices will ensure that your users are protected. For more information download the eBook “The IT Admin’s Checklist for Complete Office-Wide Computer Security” A COMPLETE GUIDE