Presentation is loading. Please wait.

Presentation is loading. Please wait.

Best Practices for Computer Security and Maintenance

Similar presentations


Presentation on theme: "Best Practices for Computer Security and Maintenance"— Presentation transcript:

1 Best Practices for Computer Security and Maintenance
Louis Lopez , MCSE, CNE, CNA, CCA, CCNA, A+, N+, S+, ICIS, ICSC , MCP, MCP+I, STAR ISP, STAR NCP, STAR NTP, CNS, ASE, CCSA, CCSE, DPME 713 – 783 – 6453

2 Defragment (defrag) / Optimize
Waste of time

3 NTFS is an automatic defrag
Only modified files are fragmented Windows 7+ autodisables the ability to Defrag an SSD drive SSD drives have no mechanical parts and are not subject to seek times Defragging is like putting two pieces of broken sand together on a beach

4 Leave the computer on or turn it off debate

5 Leave it on or turn it off debate
Leave it off: To save electricity To save the life of the computer To protect against hackers Leave it on: To run Windows updates To run other automated update processes To check for viruses at night

6 It doesn’t friggin’ matter BACK IT UP TO THE CLOUD!
DO NOT BACKUP TO A USB STICK OR EXTERNAL DRIVE ALONE!!

7 These are on the cloud and they ARE NOT A BACKUP
These replicate to the cloud and are considered a copy if your drive crashes If you delete a file or folder, or the data gets encrypted, then the data is replicated to all locations as GONE or encrypted in all locations!

8 Cloud backups can get different versions of the files from a particular time
Cloud replication is for convenience to access the same data in many locations on different computers Cloud backups can restore a lost file or folder Cloud replication cannot Both recover if a crash or a disaster occurs

9 External USB Hard drive?
Why not backup to: USB Flash Drive External USB Hard drive? Theft - Fire - Flood High Rate of Failure Lightning Strikes - Power Surges If you do - disconnect them often - and check them Can be a great choice if you need a faster recovery than the cloud has to offer but not by themselves

10 All backups are not the same Most backups are data only recovery
Teleflex Networks offers Bare Metal Restore options using StorageCraft They can also spin up a virtual server with all of your data on it ready to go

11 Datacenters offer tape backups or other backups performed for you
NeedComputerHelp offers Cloud Services to replace your Server. They back up the data and check it for you

12 Check your backups regularly Try to restore a file or folder
Check your s to see if the backups are working, not just to check if you received an from that company!!!

13 or turn it off debate Answer?
Leave the computer on or turn it off debate Answer? We recommend to leave it on for way too many reasons.

14 To dust or not to dust

15 To dust or not to dust

16 Can cause premature failure
To dust or not to dust Can cause premature failure Can cause fires It is nasty for me - computer guy The computer will overheat The computer will shutoff

17 Clean once every 5 minutes
To dust or not to dust Pet owners Clean once every 5 minutes

18 Dusty/buggy environments
To dust or not to dust Dusty/buggy environments Clean once a quarter

19 Clean once a year or more
To dust or not to dust All others Clean once a year or more

20 Computer Security Protecting your data

21 Computer Security What passwords can protect What passwords cannot protect What passwords to use Password uniqueness

22 Computer Security What passwords can protect

23 Computer Security Almost Nothing!

24 Protects against weak hackers
Computer Security Prevents people you know from getting information you don’t want them to have Protects against weak hackers

25 Computer Security What passwords cannot protect

26 Cannot protect against opening attachments
Computer Security Cannot protect against opening attachments Cannot protect against infiltrations of institutions

27 Computer Security What passwords to use

28 Use passwords at least 8 characters with complexity
Computer Security Use passwords at least 8 characters with complexity Apple88# is an example Use password padding …..

29 Computer Security Password uniqueness

30 Unique passwords can be easy
Computer Security If they can figure out a password to one place, they may have the password to every service you use Unique passwords can be easy

31 Computer Security Amegy Bank AME

32 Your secret password you use everywhere
Computer Security midtown Your secret password you use everywhere

33 Computer Security When written we will always substitute a small x in place of our secret password

34 Computer Security ABCD! A made up ending

35 Put them all together and your password you write down will be
Computer Security Put them all together and your password you write down will be AMExABCD!

36 Change the ending at any time Write them down with the x
Computer Security Change the ending at any time Write them down with the x Have an x, y, or z for variety Put them in a spreadsheet

37 Androids are easily infected iPhones are less likley to infect
Phone Security Androids are easily infected iPhones are less likley to infect Both require updates to have the best chance possible

38 Use antivirus and update it Use antimalware and update it
Computer Security Run Windows Updates Use antivirus and update it Use antimalware and update it Use complex unique passwords

39 Replacement times recommended
3 years for business computers 5 years for home computers 5 years for routers 2 years for UPS batteries Replace monitors, keyboards, mice and printers when they fail

40 Best Practices for Computer Security and Maintenance
Louis Lopez , MCSE, CNE, CNA, CCA, CCNA, A+, N+, S+, ICIS, ICSC , MCP, MCP+I, STAR ISP, STAR NCP, STAR NTP, CNS, ASE, CCSA, CCSE, DPME 713 – 783 – 6453


Download ppt "Best Practices for Computer Security and Maintenance"

Similar presentations


Ads by Google