1 / 20

Common PC Security Issues in Small

Topics Covered. Common Security risks for businessWhat to do with new ComputersCreating an electronic perimeterHow to clean Infected PC'sKeeping your systems Up to dateSecuring Current ComputersWireless Security BasicsNumbers you might want to know about. Security Risks of Home/Small Offi

lilka
Download Presentation

Common PC Security Issues in Small

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


    1. Common PC Security Issues in Small/Home Offices Presented by Georgia Cumberland Academy Computer Help Desk Available online at http://www.gcasda.org/tech/index.asp?id=118 Ryan Helm & Bryan Bankhead This slide show will show you a few things you can do to better prepare your PC from a possible attack by viruses or spywareThis slide show will show you a few things you can do to better prepare your PC from a possible attack by viruses or spyware

    2. Topics Covered Common Security risks for business What to do with new Computers Creating an electronic perimeter How to clean Infected PCs Keeping your systems Up to date Securing Current Computers Wireless Security Basics Numbers you might want to know about Here are some of the topics that we will be going overHere are some of the topics that we will be going over

    3. Security Risks of Home/Small Office Networks New Systems Are Not Secure Sharing Systems Moderate Your Internet Usage Habits /Download Clipart/Music at your own risk Wireless networking Be careful with what you are doing because certain things will make your PC more likely to get infectedBe careful with what you are doing because certain things will make your PC more likely to get infected

    4. What should be done with all new Computers? Build a starter CD with AV Remove the promotional apps Install antivirus software Turn on a software firewall Install printers and other peripherals Establish a password for the administrator account Create a new user account with password Turn off unnecessary Windows services Establish a system restore point Install and configure a router

    5. Creating an Electronic Security Perimeter Security Barrier Options for Home Networking Wireless Networks (WLAN) Software Firewalls (Windows Firewall) Hardware Firewalls (Smooth Wall) NAT Router (Most Routers use NAT) Network Address Translator NAT translates between the internet and your computerNetwork Address Translator NAT translates between the internet and your computer

    6. How to clean an infected machine Specialized Boot disk (BartPe) Microsoft (AntiSpyware) Other AntiSpyware (Spy Sweeper) Antivirus repair boot disk Trend Micro House Call/ Other one time cleaning Last resort Reformat the computer MS Antispyware is has to be downloaded Mention the fact that we use reformating as our first resort at GCAMS Antispyware is has to be downloaded Mention the fact that we use reformating as our first resort at GCA

    7. Keep Your Systems Up-to-Date Updating Windows Systems Use Current Antivirus Update all the timesUpdate all the times

    8. Secure Currently Deployed PCs 1. Patch automatically: Ensure Windows is set to update itself. In XP, click Start, Control Panel, Security Settings (if you're in Category view), Automatic Updates. In 2000, choose Start, Settings, Control Panel, Automatic Updates. Also tell them that this is a step by step Also tell them that this is a step by step

    9. Secure Currently Deployed PCs Cont. 2. Don't wait for Windows: If your PC has been off for more than a few days, don't wait for Windows' automatic update to kick in. Make the Windows Update site your first Internet stop. Updating is criticalUpdating is critical

    10. Secure Currently Deployed PCs Cont. 3. Use XP's security monitor: Windows XP Service Pack 2's Windows Security Center, which alerts you when your PC's firewall and antivirus protection are disabled or out of date. It doesn't alert you to suspicious outbound traffic. We recommend that you disable the XP firewall and instead use Zone Labs' (ZoneAlarm) or another third-party firewall program that protects both ways. Zone alarm checks ingoing and outgoing data like bank account numbers and credit card numbers it is good for showing that you have been compromized Zone alarm checks ingoing and outgoing data like bank account numbers and credit card numbers it is good for showing that you have been compromized

    11. Secure Currently Deployed PCs Cont. 4. Make your file extensions visible: To make these troublemakers easier to spot, open Windows Explorer or any folder window and click Tools, Folder Options, View. Ensure that the option 'Hide file extensions for known file types' is unchecked. Showing extensions can help you find viruses easier. Anything with a questionable extension should be looked at carefully. Windows looks at the last three characters of the file names.Showing extensions can help you find viruses easier. Anything with a questionable extension should be looked at carefully. Windows looks at the last three characters of the file names.

    12. Secure Currently Deployed PCs Cont. 5. Keep Internet Explorer safe: To make IE safer, click Tools, Internet Options, Security, Custom Level, select High from the drop-down menu at the bottom of the Security Settings dialog box, and click Reset, Yes, OK. Add the sites that you access often to IE's Trusted Sites list: Choose Tools, Internet Options, Security, click the Trusted Sites icon, and then click the Sites button. This tells you with pop ups to make the pop ups are annoying you can add it to trusted sites listThis tells you with pop ups to make the pop ups are annoying you can add it to trusted sites list

    13. Secure Currently Deployed PCs Cont. 6. Make Firefox more secure: The only way to block JavaScripts on a site-by-site basis in the Mozilla Foundation's free Firefox browser is to download and install the NoScript add-in that was created by Giorgio Maone. www.noscript.net. Noscript is available on the net. Fire Fox is way more secure than IE with this add on Fire Fox is rock solid.Noscript is available on the net. Fire Fox is way more secure than IE with this add on Fire Fox is rock solid.

    14. Secure Currently Deployed PCs Cont. 7. Handle e-mail links with care: To reduce your risk of an e-mail-borne infection, don't click links in suspicious messages (the text in the message may mask the actual Web address). Instead, enter the URL in your browser's address bar manually, or go to the site's home page and then navigate to the page in question.

    15. Secure Currently Deployed PCs Cont. 8. Scan attachments for viruses: Rather than double-clicking the attachment to open it instantly, save the file to a drive on your PC, open Windows Explorer, right-click the file, and choose the option to scan it for viruses. (Better yet, set your antivirus software to scan incoming and outgoing e-mail automatically.)

    16. Secure Currently Deployed PCs Cont. 9. Close the preview pane: In Microsoft Outlook 2003, click View, Reading pane, Off. In Outlook Express 6, click View, Layout and verify that 'Show Preview Pane' is unchecked. In Mozilla Thunderbird, click View, Layout and confirm that 'Message pane' is unchecked.

    17. Secure Currently Deployed PCs Cont. 10. Read your mail in plain text: In Outlook 2003, click Tools, Options, Preferences, E-mail Options and check Read all standard mail in plain text. In Outlook Express 6, choose Tools, Options, Read and click Read all messages in plain text. In Mozilla Thunderbird, select View, Message Body As, Plain Text.

    18. Ten Tips for protecting your wireless: No Default Settings Cell Sizing SSID Naming Cloaking MAC Filters Encryption Static IP Common Security Practices Document Your Settings Turn it off There are three things that you need to get on a wireless network. You need an IP address, Encryption, and SSID or the name of your wireless device.There are three things that you need to get on a wireless network. You need an IP address, Encryption, and SSID or the name of your wireless device.

    19. Some Interesting Numbers 31% of businesses rate spyware as a major threat for the next year. [Deloitte Global Security Survey, 2005] 27% of small or medium-size businesses do not use an anti-spyware product. [Forrester Research, 2005] 33% of scanned enterprise PCs were infected with adware. [Webroot State of Spyware, 2Q 2005] 80% of scanned consumer PCs were infected with spyware. [Webroot State of Spyware, 2Q 2005] 65% of businesses plan to invest in new or additional anti-spyware tools. [Forrester Research, 2005] 80% of surveyed firms use anti-spyware tools. [Forrester Research, 2005]

More Related