SlideShare une entreprise Scribd logo
1  sur  13
Télécharger pour lire hors ligne
COMPUTER SECURITY 101
A Checklist for IT Admins to Share With Their Users
we know you understand the value of
proper computer security
Okay IT Admins,
but do your users?
Communicating the value
of proper computer security to
your end users can prove to be
a real challenge
To better protect your users we’ve compiled
a security 101 checklist in the
following key areas:
Password security
Email security
Web browser security
Smartphone security
Workstation security
Network security
Personal & “social” security
Share these critical tips
with all your users and get the
security conversation going!
□□ Never share your password with anyone, ever
□□ Use a passphrase (a short sentence that’s easy
to remember) instead of a password
□□ Combine your passphrase with two-factor
authentication
PASSWORD
SECURITY
□□ Never respond to an email from strangers
□□ Don’t open any attachments that you haven’t
scanned first
□□ Don’t open any links you haven’t checked (hint,
hover over the link to ensure it’s really going
where it’s supposed to go)
□□ Always back up your email
EMAIL
SECURITY
□□ Only install from safe sources (hint, the vendor’s
download site or your browser’s add-in store)
□□ Look for the lock and ensure you see the icon
before entering your personal information into
a website
□□ Save and sync selectively when asked “Would
you like to store this password?” The best
answer is NO.
□□ If you log in then you should also log out -
always
□□ Clear and back up everything
WEB BROWSER
SECURITY
□□ Always use a lock screen - every smartphone
and tablet have one. Use it.
□□ Nobody should ever borrow your smartphone
□□ Don’t respond to a text from a stranger
□□ Don’t answer calls from strange phone
numbers - it’s better to screen these calls. Let
voicemail handle it.
□□ Back up everything
SMARTPHONE
SECURITY
□□ Use an active security suite, aka an antivirus
program to protect your system from viruses
such as malware, spyware, and network attacks
□□ Update your software - keep your operating
system, security suite, and programs up-to-date
□□ Leave it? Lock it. Don’t leave your system
logged in and unattended
□□ Don’t share your system with anyone unless
specifically told by your IT team
□□ Back up your data
WORKSTATION
SECURITY
□□ Never connect to Wi-Fi that you don’t own
□□ Don’t connect to Wi-Fi without a password
□□ Always use a firewall
□□ Always use SSL in your web browser
NETWORK
SECURITY
□□ Don’t talk to strangers online
□□ Only give out data on the phone calls that you
started
□□ Watch your back - literally. Be aware of your
surroundings when in public and logged on to
your computer
□□ Everybody you just met is a stranger, no matter
what they claim to “know” - the best advice for
online and in person as well.
PERSONAL & “SOCIAL”
SECURITY
Share these crucial security
basics with your users.
These best practices will ensure that
your users are protected.
For more information download the eBook “The IT Admin’s
Checklist for Complete Office-Wide Computer Security”
A COMPLETE GUIDE

Contenu connexe

En vedette

Top 10 Evidence Based Teaching Strategies
Top 10 Evidence Based Teaching StrategiesTop 10 Evidence Based Teaching Strategies
Top 10 Evidence Based Teaching StrategiesShaun Killian
 
Computer Security and Risks
Computer Security and RisksComputer Security and Risks
Computer Security and RisksMiguel Rebollo
 
Google Apps Demographics Study [Infographic]
Google Apps Demographics Study [Infographic]Google Apps Demographics Study [Infographic]
Google Apps Demographics Study [Infographic]Datto
 
Video Tools for Teachers - Digital Video
Video Tools for Teachers - Digital VideoVideo Tools for Teachers - Digital Video
Video Tools for Teachers - Digital VideoNik Peachey
 
Cyber security
Cyber securityCyber security
Cyber securitySiblu28
 
Machine learning aplicado a los negocios
Machine learning aplicado a los negociosMachine learning aplicado a los negocios
Machine learning aplicado a los negociosLuis Cosio
 
23 network security threats pkg
23 network security threats pkg23 network security threats pkg
23 network security threats pkgUmang Gupta
 
G Suite Zero (Basic 101) - Webinar (for Malaysians)
G Suite Zero (Basic 101) - Webinar (for Malaysians)G Suite Zero (Basic 101) - Webinar (for Malaysians)
G Suite Zero (Basic 101) - Webinar (for Malaysians)M Nasir SO
 
Machine Learning - why the hype and how it does its magic
Machine Learning - why the hype and how it does its magicMachine Learning - why the hype and how it does its magic
Machine Learning - why the hype and how it does its magicAmirali Charania
 
Computer , Internet and physical security.
Computer , Internet and physical security.Computer , Internet and physical security.
Computer , Internet and physical security.Ankur Kumar
 
SEM Performance with Machine Learning
SEM Performance with Machine LearningSEM Performance with Machine Learning
SEM Performance with Machine LearningAcquisio
 

En vedette (14)

Top 10 Evidence Based Teaching Strategies
Top 10 Evidence Based Teaching StrategiesTop 10 Evidence Based Teaching Strategies
Top 10 Evidence Based Teaching Strategies
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
Computer Security and Risks
Computer Security and RisksComputer Security and Risks
Computer Security and Risks
 
Google Apps Demographics Study [Infographic]
Google Apps Demographics Study [Infographic]Google Apps Demographics Study [Infographic]
Google Apps Demographics Study [Infographic]
 
Teaching strategies
Teaching strategiesTeaching strategies
Teaching strategies
 
Effective teaching strategies
Effective teaching strategiesEffective teaching strategies
Effective teaching strategies
 
Video Tools for Teachers - Digital Video
Video Tools for Teachers - Digital VideoVideo Tools for Teachers - Digital Video
Video Tools for Teachers - Digital Video
 
Cyber security
Cyber securityCyber security
Cyber security
 
Machine learning aplicado a los negocios
Machine learning aplicado a los negociosMachine learning aplicado a los negocios
Machine learning aplicado a los negocios
 
23 network security threats pkg
23 network security threats pkg23 network security threats pkg
23 network security threats pkg
 
G Suite Zero (Basic 101) - Webinar (for Malaysians)
G Suite Zero (Basic 101) - Webinar (for Malaysians)G Suite Zero (Basic 101) - Webinar (for Malaysians)
G Suite Zero (Basic 101) - Webinar (for Malaysians)
 
Machine Learning - why the hype and how it does its magic
Machine Learning - why the hype and how it does its magicMachine Learning - why the hype and how it does its magic
Machine Learning - why the hype and how it does its magic
 
Computer , Internet and physical security.
Computer , Internet and physical security.Computer , Internet and physical security.
Computer , Internet and physical security.
 
SEM Performance with Machine Learning
SEM Performance with Machine LearningSEM Performance with Machine Learning
SEM Performance with Machine Learning
 

Plus de Datto

What is Network Continuity? Why Does it Matter for Small Businesses?
What is Network Continuity? Why Does it Matter for Small Businesses?What is Network Continuity? Why Does it Matter for Small Businesses?
What is Network Continuity? Why Does it Matter for Small Businesses?Datto
 
The Wizards Behind Google Apps: 11 Google Apps Setup Tips for Admins by Admins
The Wizards Behind Google Apps: 11 Google Apps Setup Tips for Admins by Admins The Wizards Behind Google Apps: 11 Google Apps Setup Tips for Admins by Admins
The Wizards Behind Google Apps: 11 Google Apps Setup Tips for Admins by Admins Datto
 
15 Effective Tips for Schools Using Google Apps for Education
15 Effective Tips for Schools Using Google Apps for Education15 Effective Tips for Schools Using Google Apps for Education
15 Effective Tips for Schools Using Google Apps for EducationDatto
 
Midmarket CIO Forum Spring 2014
Midmarket CIO Forum Spring 2014Midmarket CIO Forum Spring 2014
Midmarket CIO Forum Spring 2014Datto
 
Protecting Data in the Cloud: The Truth about SaaS Backup
Protecting Data in the Cloud: The Truth about SaaS BackupProtecting Data in the Cloud: The Truth about SaaS Backup
Protecting Data in the Cloud: The Truth about SaaS BackupDatto
 
Midmarket CIO Forum 2013 Presentation
Midmarket CIO Forum 2013 PresentationMidmarket CIO Forum 2013 Presentation
Midmarket CIO Forum 2013 PresentationDatto
 
Salesforce Data Loss in the Wild Wild West
Salesforce Data Loss in the Wild Wild WestSalesforce Data Loss in the Wild Wild West
Salesforce Data Loss in the Wild Wild WestDatto
 
Growing Up Google - Google Apps for EDU Adoption [Infographic]
Growing Up Google - Google Apps for EDU Adoption [Infographic]Growing Up Google - Google Apps for EDU Adoption [Infographic]
Growing Up Google - Google Apps for EDU Adoption [Infographic]Datto
 
CIO Cloud Summit nyc_backupify
CIO Cloud Summit nyc_backupifyCIO Cloud Summit nyc_backupify
CIO Cloud Summit nyc_backupifyDatto
 
Google Apps Data Loss [Infographic]
Google Apps Data Loss [Infographic]Google Apps Data Loss [Infographic]
Google Apps Data Loss [Infographic]Datto
 
Data Liberation Awards [Infographic]
Data Liberation Awards [Infographic]Data Liberation Awards [Infographic]
Data Liberation Awards [Infographic]Datto
 
The Value of Gmail Accounts [Infographic]
The Value of Gmail Accounts [Infographic]The Value of Gmail Accounts [Infographic]
The Value of Gmail Accounts [Infographic]Datto
 
13 Steps to Safely Deprovision and Delete a Google Apps User
13 Steps to Safely Deprovision and Delete a Google Apps User13 Steps to Safely Deprovision and Delete a Google Apps User
13 Steps to Safely Deprovision and Delete a Google Apps UserDatto
 
10 Steps to Optimize Mozilla Firefox for Google Apps Security
10 Steps to Optimize Mozilla Firefox for Google Apps Security10 Steps to Optimize Mozilla Firefox for Google Apps Security
10 Steps to Optimize Mozilla Firefox for Google Apps SecurityDatto
 
5 Steps to Secure Google Drive
5 Steps to Secure Google Drive5 Steps to Secure Google Drive
5 Steps to Secure Google DriveDatto
 
Do You Have Protection?
Do You Have Protection?Do You Have Protection?
Do You Have Protection?Datto
 
My Apps Are Fat - Not with Backupify!
My Apps Are Fat - Not with Backupify!My Apps Are Fat - Not with Backupify!
My Apps Are Fat - Not with Backupify!Datto
 
10 Scenarios of Google Apps Data Loss
10 Scenarios of Google Apps Data Loss10 Scenarios of Google Apps Data Loss
10 Scenarios of Google Apps Data LossDatto
 
11 Reasons to Backup Your Facebook Page
11 Reasons to Backup Your Facebook Page11 Reasons to Backup Your Facebook Page
11 Reasons to Backup Your Facebook PageDatto
 
Which 'aaS' is Right for You?
Which 'aaS' is Right for You?Which 'aaS' is Right for You?
Which 'aaS' is Right for You?Datto
 

Plus de Datto (20)

What is Network Continuity? Why Does it Matter for Small Businesses?
What is Network Continuity? Why Does it Matter for Small Businesses?What is Network Continuity? Why Does it Matter for Small Businesses?
What is Network Continuity? Why Does it Matter for Small Businesses?
 
The Wizards Behind Google Apps: 11 Google Apps Setup Tips for Admins by Admins
The Wizards Behind Google Apps: 11 Google Apps Setup Tips for Admins by Admins The Wizards Behind Google Apps: 11 Google Apps Setup Tips for Admins by Admins
The Wizards Behind Google Apps: 11 Google Apps Setup Tips for Admins by Admins
 
15 Effective Tips for Schools Using Google Apps for Education
15 Effective Tips for Schools Using Google Apps for Education15 Effective Tips for Schools Using Google Apps for Education
15 Effective Tips for Schools Using Google Apps for Education
 
Midmarket CIO Forum Spring 2014
Midmarket CIO Forum Spring 2014Midmarket CIO Forum Spring 2014
Midmarket CIO Forum Spring 2014
 
Protecting Data in the Cloud: The Truth about SaaS Backup
Protecting Data in the Cloud: The Truth about SaaS BackupProtecting Data in the Cloud: The Truth about SaaS Backup
Protecting Data in the Cloud: The Truth about SaaS Backup
 
Midmarket CIO Forum 2013 Presentation
Midmarket CIO Forum 2013 PresentationMidmarket CIO Forum 2013 Presentation
Midmarket CIO Forum 2013 Presentation
 
Salesforce Data Loss in the Wild Wild West
Salesforce Data Loss in the Wild Wild WestSalesforce Data Loss in the Wild Wild West
Salesforce Data Loss in the Wild Wild West
 
Growing Up Google - Google Apps for EDU Adoption [Infographic]
Growing Up Google - Google Apps for EDU Adoption [Infographic]Growing Up Google - Google Apps for EDU Adoption [Infographic]
Growing Up Google - Google Apps for EDU Adoption [Infographic]
 
CIO Cloud Summit nyc_backupify
CIO Cloud Summit nyc_backupifyCIO Cloud Summit nyc_backupify
CIO Cloud Summit nyc_backupify
 
Google Apps Data Loss [Infographic]
Google Apps Data Loss [Infographic]Google Apps Data Loss [Infographic]
Google Apps Data Loss [Infographic]
 
Data Liberation Awards [Infographic]
Data Liberation Awards [Infographic]Data Liberation Awards [Infographic]
Data Liberation Awards [Infographic]
 
The Value of Gmail Accounts [Infographic]
The Value of Gmail Accounts [Infographic]The Value of Gmail Accounts [Infographic]
The Value of Gmail Accounts [Infographic]
 
13 Steps to Safely Deprovision and Delete a Google Apps User
13 Steps to Safely Deprovision and Delete a Google Apps User13 Steps to Safely Deprovision and Delete a Google Apps User
13 Steps to Safely Deprovision and Delete a Google Apps User
 
10 Steps to Optimize Mozilla Firefox for Google Apps Security
10 Steps to Optimize Mozilla Firefox for Google Apps Security10 Steps to Optimize Mozilla Firefox for Google Apps Security
10 Steps to Optimize Mozilla Firefox for Google Apps Security
 
5 Steps to Secure Google Drive
5 Steps to Secure Google Drive5 Steps to Secure Google Drive
5 Steps to Secure Google Drive
 
Do You Have Protection?
Do You Have Protection?Do You Have Protection?
Do You Have Protection?
 
My Apps Are Fat - Not with Backupify!
My Apps Are Fat - Not with Backupify!My Apps Are Fat - Not with Backupify!
My Apps Are Fat - Not with Backupify!
 
10 Scenarios of Google Apps Data Loss
10 Scenarios of Google Apps Data Loss10 Scenarios of Google Apps Data Loss
10 Scenarios of Google Apps Data Loss
 
11 Reasons to Backup Your Facebook Page
11 Reasons to Backup Your Facebook Page11 Reasons to Backup Your Facebook Page
11 Reasons to Backup Your Facebook Page
 
Which 'aaS' is Right for You?
Which 'aaS' is Right for You?Which 'aaS' is Right for You?
Which 'aaS' is Right for You?
 

Dernier

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 

Dernier (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

Computer Security 101: A Checklist for IT Admins to Share with Their Users

  • 1. COMPUTER SECURITY 101 A Checklist for IT Admins to Share With Their Users
  • 2. we know you understand the value of proper computer security Okay IT Admins, but do your users?
  • 3. Communicating the value of proper computer security to your end users can prove to be a real challenge
  • 4. To better protect your users we’ve compiled a security 101 checklist in the following key areas: Password security Email security Web browser security Smartphone security Workstation security Network security Personal & “social” security
  • 5. Share these critical tips with all your users and get the security conversation going!
  • 6. □□ Never share your password with anyone, ever □□ Use a passphrase (a short sentence that’s easy to remember) instead of a password □□ Combine your passphrase with two-factor authentication PASSWORD SECURITY
  • 7. □□ Never respond to an email from strangers □□ Don’t open any attachments that you haven’t scanned first □□ Don’t open any links you haven’t checked (hint, hover over the link to ensure it’s really going where it’s supposed to go) □□ Always back up your email EMAIL SECURITY
  • 8. □□ Only install from safe sources (hint, the vendor’s download site or your browser’s add-in store) □□ Look for the lock and ensure you see the icon before entering your personal information into a website □□ Save and sync selectively when asked “Would you like to store this password?” The best answer is NO. □□ If you log in then you should also log out - always □□ Clear and back up everything WEB BROWSER SECURITY
  • 9. □□ Always use a lock screen - every smartphone and tablet have one. Use it. □□ Nobody should ever borrow your smartphone □□ Don’t respond to a text from a stranger □□ Don’t answer calls from strange phone numbers - it’s better to screen these calls. Let voicemail handle it. □□ Back up everything SMARTPHONE SECURITY
  • 10. □□ Use an active security suite, aka an antivirus program to protect your system from viruses such as malware, spyware, and network attacks □□ Update your software - keep your operating system, security suite, and programs up-to-date □□ Leave it? Lock it. Don’t leave your system logged in and unattended □□ Don’t share your system with anyone unless specifically told by your IT team □□ Back up your data WORKSTATION SECURITY
  • 11. □□ Never connect to Wi-Fi that you don’t own □□ Don’t connect to Wi-Fi without a password □□ Always use a firewall □□ Always use SSL in your web browser NETWORK SECURITY
  • 12. □□ Don’t talk to strangers online □□ Only give out data on the phone calls that you started □□ Watch your back - literally. Be aware of your surroundings when in public and logged on to your computer □□ Everybody you just met is a stranger, no matter what they claim to “know” - the best advice for online and in person as well. PERSONAL & “SOCIAL” SECURITY
  • 13. Share these crucial security basics with your users. These best practices will ensure that your users are protected. For more information download the eBook “The IT Admin’s Checklist for Complete Office-Wide Computer Security” A COMPLETE GUIDE