200 likes | 362 Views
Topics Covered. Common Security risks for businessWhat to do with new ComputersCreating an electronic perimeterHow to clean Infected PC'sKeeping your systems Up to dateSecuring Current ComputersWireless Security BasicsNumbers you might want to know about. Security Risks of Home/Small Offi
E N D
1. Common PC Security Issues in Small/Home Offices Presented by Georgia Cumberland Academy Computer Help Desk
Available online at http://www.gcasda.org/tech/index.asp?id=118
Ryan Helm &
Bryan Bankhead This slide show will show you a few things you can do to better prepare your PC from a possible attack by viruses or spywareThis slide show will show you a few things you can do to better prepare your PC from a possible attack by viruses or spyware
2. Topics Covered Common Security risks for business
What to do with new Computers
Creating an electronic perimeter
How to clean Infected PCs
Keeping your systems Up to date
Securing Current Computers
Wireless Security Basics
Numbers you might want to know about
Here are some of the topics that we will be going overHere are some of the topics that we will be going over
3. Security Risks of Home/Small Office Networks New Systems Are Not Secure
Sharing Systems
Moderate Your Internet Usage Habits /Download Clipart/Music at your own risk
Wireless networking Be careful with what you are doing because certain things will make your PC more likely to get infectedBe careful with what you are doing because certain things will make your PC more likely to get infected
4. What should be done with all new Computers? Build a starter CD with AV
Remove the promotional apps
Install antivirus software
Turn on a software firewall
Install printers and other peripherals
Establish a password for the administrator account
Create a new user account with password
Turn off unnecessary Windows services
Establish a system restore point
Install and configure a router
5. Creating an Electronic Security Perimeter Security Barrier Options for Home Networking
Wireless Networks (WLAN)
Software Firewalls (Windows Firewall)
Hardware Firewalls (Smooth Wall)
NAT Router (Most Routers use NAT) Network Address Translator NAT translates between the internet and your computerNetwork Address Translator NAT translates between the internet and your computer
6. How to clean an infected machine Specialized Boot disk (BartPe)
Microsoft (AntiSpyware)
Other AntiSpyware (Spy Sweeper)
Antivirus repair boot disk
Trend Micro House Call/ Other one time cleaning
Last resort Reformat the computer MS Antispyware is has to be downloaded Mention the fact that we use reformating as our first resort at GCAMS Antispyware is has to be downloaded Mention the fact that we use reformating as our first resort at GCA
7. Keep Your Systems Up-to-Date Updating Windows Systems
Use Current Antivirus Update all the timesUpdate all the times
8. Secure Currently Deployed PCs 1. Patch automatically: Ensure Windows is set to update itself. In XP, click Start, Control Panel, Security Settings (if you're in Category view), Automatic Updates. In 2000, choose Start, Settings, Control Panel, Automatic Updates. Also tell them that this is a step by step Also tell them that this is a step by step
9. Secure Currently Deployed PCs Cont. 2. Don't wait for Windows: If your PC has been off for more than a few days, don't wait for Windows' automatic update to kick in. Make the Windows Update site your first Internet stop. Updating is criticalUpdating is critical
10. Secure Currently Deployed PCs Cont. 3. Use XP's security monitor: Windows XP Service Pack 2's Windows Security Center, which alerts you when your PC's firewall and antivirus protection are disabled or out of date. It doesn't alert you to suspicious outbound traffic. We recommend that you disable the XP firewall and instead use Zone Labs' (ZoneAlarm) or another third-party firewall program that protects both ways. Zone alarm checks ingoing and outgoing data like bank account numbers and credit card numbers it is good for showing that you have been compromized Zone alarm checks ingoing and outgoing data like bank account numbers and credit card numbers it is good for showing that you have been compromized
11. Secure Currently Deployed PCs Cont. 4. Make your file extensions visible: To make these troublemakers easier to spot, open Windows Explorer or any folder window and click Tools, Folder Options, View. Ensure that the option 'Hide file extensions for known file types' is unchecked. Showing extensions can help you find viruses easier. Anything with a questionable extension should be looked at carefully. Windows looks at the last three characters of the file names.Showing extensions can help you find viruses easier. Anything with a questionable extension should be looked at carefully. Windows looks at the last three characters of the file names.
12. Secure Currently Deployed PCs Cont. 5. Keep Internet Explorer safe: To make IE safer, click Tools, Internet Options, Security, Custom Level, select High from the drop-down menu at the bottom of the Security Settings dialog box, and click Reset, Yes, OK. Add the sites that you access often to IE's Trusted Sites list: Choose Tools, Internet Options, Security, click the Trusted Sites icon, and then click the Sites button. This tells you with pop ups to make the pop ups are annoying you can add it to trusted sites listThis tells you with pop ups to make the pop ups are annoying you can add it to trusted sites list
13. Secure Currently Deployed PCs Cont. 6. Make Firefox more secure: The only way to block JavaScripts on a site-by-site basis in the Mozilla Foundation's free Firefox browser is to download and install the NoScript add-in that was created by Giorgio Maone. www.noscript.net. Noscript is available on the net. Fire Fox is way more secure than IE with this add on Fire Fox is rock solid.Noscript is available on the net. Fire Fox is way more secure than IE with this add on Fire Fox is rock solid.
14. Secure Currently Deployed PCs Cont. 7. Handle e-mail links with care: To reduce your risk of an e-mail-borne infection, don't click links in suspicious messages (the text in the message may mask the actual Web address). Instead, enter the URL in your browser's address bar manually, or go to the site's home page and then navigate to the page in question.
15. Secure Currently Deployed PCs Cont. 8. Scan attachments for viruses: Rather than double-clicking the attachment to open it instantly, save the file to a drive on your PC, open Windows Explorer, right-click the file, and choose the option to scan it for viruses. (Better yet, set your antivirus software to scan incoming and outgoing e-mail automatically.)
16. Secure Currently Deployed PCs Cont. 9. Close the preview pane: In Microsoft Outlook 2003, click View, Reading pane, Off. In Outlook Express 6, click View, Layout and verify that 'Show Preview Pane' is unchecked. In Mozilla Thunderbird, click View, Layout and confirm that 'Message pane' is unchecked.
17. Secure Currently Deployed PCs Cont. 10. Read your mail in plain text: In Outlook 2003, click Tools, Options, Preferences, E-mail Options and check Read all standard mail in plain text. In Outlook Express 6, choose Tools, Options, Read and click Read all messages in plain text. In Mozilla Thunderbird, select View, Message Body As, Plain Text.
18. Ten Tips for protecting your wireless: No Default Settings
Cell Sizing
SSID Naming
Cloaking
MAC Filters
Encryption
Static IP
Common Security Practices
Document Your Settings
Turn it off
There are three things that you need to get on a wireless network. You need an IP address, Encryption, and SSID or the name of your wireless device.There are three things that you need to get on a wireless network. You need an IP address, Encryption, and SSID or the name of your wireless device.
19. Some Interesting Numbers 31% of businesses rate spyware as a major threat for the next year. [Deloitte Global Security Survey, 2005]
27% of small or medium-size businesses do not use an anti-spyware product. [Forrester Research, 2005]
33% of scanned enterprise PCs were infected with adware. [Webroot State of Spyware, 2Q 2005]
80% of scanned consumer PCs were infected with spyware. [Webroot State of Spyware, 2Q 2005]
65% of businesses plan to invest in new or additional anti-spyware tools. [Forrester Research, 2005]
80% of surveyed firms use anti-spyware tools. [Forrester Research, 2005]