desktop security 8 9 07

32
Desktop Security & Backup Adam King August 9th, 2007 a program of

Upload: michigan-nonprofit-association

Post on 15-May-2015

538 views

Category:

Economy & Finance


1 download

TRANSCRIPT

Page 1: Desktop Security 8 9 07

Desktop Security & Backup

Adam King

August 9th, 2007

a program of

Page 2: Desktop Security 8 9 07

NPower is…

A network of local nonprofit technology assistance providers that share a common mission, vision and service values.

» Mission: To ensure all nonprofits can use technology to better serve their communities.

» Vision: A thriving nonprofit sector in which all organizations

can use technology to help create healthy, vibrant communities.

Page 3: Desktop Security 8 9 07

LASince 2003

SeattleSince 1999

PortlandSince 2002

ColoradoSince 2003

ArizonaSince 2003

Charlotte RegionSince 2003

IndianaSince 2002

MichiganSince 2001

DCSince 2004

NYSince 2001

AtlantaSince 2001

PASince 2003

TexasSince 2007

The NPower network

Page 4: Desktop Security 8 9 07

NPower Michigan Services

• Technology Purchasing Guide: www.npowermichigan.org/resources/

• TechTrek: group technology assessment and planning

• Consulting

• Scheduled Support

Page 5: Desktop Security 8 9 07

Managed Services

• Help desk• Security (anti-spyware and anti-virus)• Windows patches and updates• System monitoring• Remote login assistance• Budgeting and planning

• $40 per desktop / $100 per server

Additional: IT project management (of either volunteers or IT professionals) at $75 per hour. On-site technician rates vary.

Page 6: Desktop Security 8 9 07

Desktop Security & Backup

• Viruses, Spyware, & Adware

• Firewalls

• Wireless Security

• Creating Strong Passwords

• Backup, Backup, Backup

Page 7: Desktop Security 8 9 07

Viruses

• A computer program that can copy itself and infect a computer without permission of the user

• Viruses, Worms, Trojan Horses = MALWARE

Page 8: Desktop Security 8 9 07

Viruses

• How viruses spread: Internet downloads Removable media Across the network Email attachments

Page 9: Desktop Security 8 9 07

Viruses

• Protecting your system Antivirus software

1. Standardization

2. Definitions

3. Subscriptions

Be smart about email attachments• Unknown senders

• Known senders

Firewall

Page 10: Desktop Security 8 9 07

Viruses

• Recovering from a virus attack Run a full system scan (in Safe Mode if

necessary) Run an “autofix” tool Replace infected files Reformat hard drive

Page 11: Desktop Security 8 9 07

Antivirus Software

Page 12: Desktop Security 8 9 07

Spyware/Adware

Software that covertly gathers user information through your Internet connection without your knowledge, usually for advertising purposes; typically bundled as a hidden component of freeware or shareware programs

• Unwanted pop-up ads and slowed computer performance

• Third party cookies added to your system

• Trick you into buying something

• Personal information can be stolen

• One of the fastest growing threats to computer users

Page 13: Desktop Security 8 9 07

Spyware/Adware

• Protecting yourself and your PC: Proactive software

• Windows Defender (www.microsoft.com)

• Internet security suites

Scanning software• Spybot, Adaware (www.download.com)

• Can also be run in Safe Mode

Avoid dubious Internet software downloads (especially toolbars)

Page 14: Desktop Security 8 9 07

Firewall

• Firewall is a barrier to prevent intruders from “hacking”, or breaking into, your computer

Page 15: Desktop Security 8 9 07

Firewall

• Filters incoming traffic

• Blocks remote access

• Secures the communication ports your computer uses unless you open them

Page 16: Desktop Security 8 9 07

Firewall

• Can be a hardware device or a software program

Page 17: Desktop Security 8 9 07

Firewall

• What kind of Firewall do you need? Hardware firewall absolutely required!

• Basic router with built-in firewall capabilities okay for simple connection to internet

• Advanced firewall device required for specific needs (i.e. VPN or hosting your own email)

Software firewall is supplemental• Exception: Laptop with wireless that often connects to

strange wifi networks

Page 18: Desktop Security 8 9 07

Wireless Security

• Make sure your wireless network isn’t wide open!

Change default password on the router or access point

Secure the connection– WEP – crackable!

– WPA – best option

Page 19: Desktop Security 8 9 07

Wireless Security

• Change default password

Page 20: Desktop Security 8 9 07

Wireless Security

• Secure the connection

Page 21: Desktop Security 8 9 07

Strong Passwords

• 6 to 8 characters long using lower/upper case letters, numbers, and symbols (Microsoft recommends 14…)

4 characters – 14 million possible passwords – 2 seconds

8 characters – 200 trillion possible passwords – 1 year

9 characters – 13 quadrillion possible passwords – 70 years

10 characters – 840 quadrillion possible passwords – 4000 years

• Avoid words in the dictionary (easier to guess)

• Use a sentence that means something to you Every Sunday I go to church at 9 E$igtc@9

• Change passwords regularly

Page 22: Desktop Security 8 9 07

Backup

• Scary Statistics: A computer hard drive fails every 15 seconds Over 2000 laptops are stolen or lost everyday 1 in 5 computers suffer hard drive failure during

their normal useful life Eventually, 100% of all hard drives will fail

Source: Realty Times

Page 23: Desktop Security 8 9 07

Backup

• My Documents• Shared files• Database files• Email files• Accounting data• Organizational

pictures

• Music• Personal files &

pictures

What to Backup? What to Not Backup?

Page 24: Desktop Security 8 9 07

Backup

• Central file storage location:

Server or networked PC

Page 25: Desktop Security 8 9 07

Backup

• Tape Backup

Pros

•Easy to archive (many years)

•Many tapes = many backups

•Easy to take offsite

Cons

•Slower

•Device + Many Tapes = Expensive

•Large capacity tapes also expensive

•Must replace tapes regularly for reliability

Page 26: Desktop Security 8 9 07

Backup

• External Hard Drive

Pros

•Inexpensive

•LARGE capacity

Cons

•Fewer “points of failure”

•Sometimes difficult to take offsite

4 external drives -- 1 week each -- rotate -- offsite

Page 27: Desktop Security 8 9 07

Backup

• For tape and hard drive backups – need some sort of automatic backup software

• Using the NTBackup program Start All Programs Accessories System

Tools Backup

Page 28: Desktop Security 8 9 07

Backup

• Internet

Pros

•Automatic and incremental

•Versioning

•Affordable option

•Offsite

Cons

•Relies on your Internet connection

•Initial backup is slow

•Recurring fee

Page 29: Desktop Security 8 9 07

Backup

• Other Internet backup providers: Connected.com Carbonite.com IBackup.com

Page 30: Desktop Security 8 9 07

Backup

• Disk Imaging Software that creates an exact image of your hard

drive Needs additional hard drive (built-in or external) $50-60

Page 31: Desktop Security 8 9 07

Desktop Security & Backup

• Protect yourself from: Viruses Spyware

• Firewalls

• Wireless Security

• Creating Strong Passwords

• Backup methods

Page 32: Desktop Security 8 9 07

Thank You!

Adam King

[email protected]