Download presentation
Presentation is loading. Please wait.
Published byHope Bennett Modified over 6 years ago
1
Best Practices for Computer Security and Maintenance
Louis Lopez , MCSE, CNE, CNA, CCA, CCNA, A+, N+, S+, ICIS, ICSC , MCP, MCP+I, STAR ISP, STAR NCP, STAR NTP, CNS, ASE, CCSA, CCSE, DPME 713 – 783 – 6453
2
Defragment (defrag) / Optimize
Waste of time
3
NTFS is an automatic defrag
Only modified files are fragmented Windows 7+ autodisables the ability to Defrag an SSD drive SSD drives have no mechanical parts and are not subject to seek times Defragging is like putting two pieces of broken sand together on a beach
4
Leave the computer on or turn it off debate
5
Leave it on or turn it off debate
Leave it off: To save electricity To save the life of the computer To protect against hackers Leave it on: To run Windows updates To run other automated update processes To check for viruses at night
6
It doesn’t friggin’ matter BACK IT UP TO THE CLOUD!
DO NOT BACKUP TO A USB STICK OR EXTERNAL DRIVE ALONE!!
7
These are on the cloud and they ARE NOT A BACKUP
These replicate to the cloud and are considered a copy if your drive crashes If you delete a file or folder, or the data gets encrypted, then the data is replicated to all locations as GONE or encrypted in all locations!
8
Cloud backups can get different versions of the files from a particular time
Cloud replication is for convenience to access the same data in many locations on different computers Cloud backups can restore a lost file or folder Cloud replication cannot Both recover if a crash or a disaster occurs
9
External USB Hard drive?
Why not backup to: USB Flash Drive External USB Hard drive? Theft - Fire - Flood High Rate of Failure Lightning Strikes - Power Surges If you do - disconnect them often - and check them Can be a great choice if you need a faster recovery than the cloud has to offer but not by themselves
10
All backups are not the same Most backups are data only recovery
Teleflex Networks offers Bare Metal Restore options using StorageCraft They can also spin up a virtual server with all of your data on it ready to go
11
Datacenters offer tape backups or other backups performed for you
NeedComputerHelp offers Cloud Services to replace your Server. They back up the data and check it for you
12
Check your backups regularly Try to restore a file or folder
Check your s to see if the backups are working, not just to check if you received an from that company!!!
13
or turn it off debate Answer?
Leave the computer on or turn it off debate Answer? We recommend to leave it on for way too many reasons.
14
To dust or not to dust
15
To dust or not to dust
16
Can cause premature failure
To dust or not to dust Can cause premature failure Can cause fires It is nasty for me - computer guy The computer will overheat The computer will shutoff
17
Clean once every 5 minutes
To dust or not to dust Pet owners Clean once every 5 minutes
18
Dusty/buggy environments
To dust or not to dust Dusty/buggy environments Clean once a quarter
19
Clean once a year or more
To dust or not to dust All others Clean once a year or more
20
Computer Security Protecting your data
21
Computer Security What passwords can protect What passwords cannot protect What passwords to use Password uniqueness
22
Computer Security What passwords can protect
23
Computer Security Almost Nothing!
24
Protects against weak hackers
Computer Security Prevents people you know from getting information you don’t want them to have Protects against weak hackers
25
Computer Security What passwords cannot protect
26
Cannot protect against opening attachments
Computer Security Cannot protect against opening attachments Cannot protect against infiltrations of institutions
27
Computer Security What passwords to use
28
Use passwords at least 8 characters with complexity
Computer Security Use passwords at least 8 characters with complexity Apple88# is an example Use password padding …..
29
Computer Security Password uniqueness
30
Unique passwords can be easy
Computer Security If they can figure out a password to one place, they may have the password to every service you use Unique passwords can be easy
31
Computer Security Amegy Bank AME
32
Your secret password you use everywhere
Computer Security midtown Your secret password you use everywhere
33
Computer Security When written we will always substitute a small x in place of our secret password
34
Computer Security ABCD! A made up ending
35
Put them all together and your password you write down will be
Computer Security Put them all together and your password you write down will be AMExABCD!
36
Change the ending at any time Write them down with the x
Computer Security Change the ending at any time Write them down with the x Have an x, y, or z for variety Put them in a spreadsheet
37
Androids are easily infected iPhones are less likley to infect
Phone Security Androids are easily infected iPhones are less likley to infect Both require updates to have the best chance possible
38
Use antivirus and update it Use antimalware and update it
Computer Security Run Windows Updates Use antivirus and update it Use antimalware and update it Use complex unique passwords
39
Replacement times recommended
3 years for business computers 5 years for home computers 5 years for routers 2 years for UPS batteries Replace monitors, keyboards, mice and printers when they fail
40
Best Practices for Computer Security and Maintenance
Louis Lopez , MCSE, CNE, CNA, CCA, CCNA, A+, N+, S+, ICIS, ICSC , MCP, MCP+I, STAR ISP, STAR NCP, STAR NTP, CNS, ASE, CCSA, CCSE, DPME 713 – 783 – 6453
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.