desktop security 8 9 07

Post on 15-May-2015

539 Views

Category:

Economy & Finance

1 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Desktop Security & Backup

Adam King

August 9th, 2007

a program of

NPower is…

A network of local nonprofit technology assistance providers that share a common mission, vision and service values.

» Mission: To ensure all nonprofits can use technology to better serve their communities.

» Vision: A thriving nonprofit sector in which all organizations

can use technology to help create healthy, vibrant communities.

LASince 2003

SeattleSince 1999

PortlandSince 2002

ColoradoSince 2003

ArizonaSince 2003

Charlotte RegionSince 2003

IndianaSince 2002

MichiganSince 2001

DCSince 2004

NYSince 2001

AtlantaSince 2001

PASince 2003

TexasSince 2007

The NPower network

NPower Michigan Services

• Technology Purchasing Guide: www.npowermichigan.org/resources/

• TechTrek: group technology assessment and planning

• Consulting

• Scheduled Support

Managed Services

• Help desk• Security (anti-spyware and anti-virus)• Windows patches and updates• System monitoring• Remote login assistance• Budgeting and planning

• $40 per desktop / $100 per server

Additional: IT project management (of either volunteers or IT professionals) at $75 per hour. On-site technician rates vary.

Desktop Security & Backup

• Viruses, Spyware, & Adware

• Firewalls

• Wireless Security

• Creating Strong Passwords

• Backup, Backup, Backup

Viruses

• A computer program that can copy itself and infect a computer without permission of the user

• Viruses, Worms, Trojan Horses = MALWARE

Viruses

• How viruses spread: Internet downloads Removable media Across the network Email attachments

Viruses

• Protecting your system Antivirus software

1. Standardization

2. Definitions

3. Subscriptions

Be smart about email attachments• Unknown senders

• Known senders

Firewall

Viruses

• Recovering from a virus attack Run a full system scan (in Safe Mode if

necessary) Run an “autofix” tool Replace infected files Reformat hard drive

Antivirus Software

Spyware/Adware

Software that covertly gathers user information through your Internet connection without your knowledge, usually for advertising purposes; typically bundled as a hidden component of freeware or shareware programs

• Unwanted pop-up ads and slowed computer performance

• Third party cookies added to your system

• Trick you into buying something

• Personal information can be stolen

• One of the fastest growing threats to computer users

Spyware/Adware

• Protecting yourself and your PC: Proactive software

• Windows Defender (www.microsoft.com)

• Internet security suites

Scanning software• Spybot, Adaware (www.download.com)

• Can also be run in Safe Mode

Avoid dubious Internet software downloads (especially toolbars)

Firewall

• Firewall is a barrier to prevent intruders from “hacking”, or breaking into, your computer

Firewall

• Filters incoming traffic

• Blocks remote access

• Secures the communication ports your computer uses unless you open them

Firewall

• Can be a hardware device or a software program

Firewall

• What kind of Firewall do you need? Hardware firewall absolutely required!

• Basic router with built-in firewall capabilities okay for simple connection to internet

• Advanced firewall device required for specific needs (i.e. VPN or hosting your own email)

Software firewall is supplemental• Exception: Laptop with wireless that often connects to

strange wifi networks

Wireless Security

• Make sure your wireless network isn’t wide open!

Change default password on the router or access point

Secure the connection– WEP – crackable!

– WPA – best option

Wireless Security

• Change default password

Wireless Security

• Secure the connection

Strong Passwords

• 6 to 8 characters long using lower/upper case letters, numbers, and symbols (Microsoft recommends 14…)

4 characters – 14 million possible passwords – 2 seconds

8 characters – 200 trillion possible passwords – 1 year

9 characters – 13 quadrillion possible passwords – 70 years

10 characters – 840 quadrillion possible passwords – 4000 years

• Avoid words in the dictionary (easier to guess)

• Use a sentence that means something to you Every Sunday I go to church at 9 E$igtc@9

• Change passwords regularly

Backup

• Scary Statistics: A computer hard drive fails every 15 seconds Over 2000 laptops are stolen or lost everyday 1 in 5 computers suffer hard drive failure during

their normal useful life Eventually, 100% of all hard drives will fail

Source: Realty Times

Backup

• My Documents• Shared files• Database files• Email files• Accounting data• Organizational

pictures

• Music• Personal files &

pictures

What to Backup? What to Not Backup?

Backup

• Central file storage location:

Server or networked PC

Backup

• Tape Backup

Pros

•Easy to archive (many years)

•Many tapes = many backups

•Easy to take offsite

Cons

•Slower

•Device + Many Tapes = Expensive

•Large capacity tapes also expensive

•Must replace tapes regularly for reliability

Backup

• External Hard Drive

Pros

•Inexpensive

•LARGE capacity

Cons

•Fewer “points of failure”

•Sometimes difficult to take offsite

4 external drives -- 1 week each -- rotate -- offsite

Backup

• For tape and hard drive backups – need some sort of automatic backup software

• Using the NTBackup program Start All Programs Accessories System

Tools Backup

Backup

• Internet

Pros

•Automatic and incremental

•Versioning

•Affordable option

•Offsite

Cons

•Relies on your Internet connection

•Initial backup is slow

•Recurring fee

Backup

• Other Internet backup providers: Connected.com Carbonite.com IBackup.com

Backup

• Disk Imaging Software that creates an exact image of your hard

drive Needs additional hard drive (built-in or external) $50-60

Desktop Security & Backup

• Protect yourself from: Viruses Spyware

• Firewalls

• Wireless Security

• Creating Strong Passwords

• Backup methods

Thank You!

Adam King

adam@npowermichigan.org

top related