View
534
Download
1
Tags:
Embed Size (px)
Citation preview
Desktop Security & Backup
Adam King
August 9th, 2007
a program of
NPower is…
A network of local nonprofit technology assistance providers that share a common mission, vision and service values.
» Mission: To ensure all nonprofits can use technology to better serve their communities.
» Vision: A thriving nonprofit sector in which all organizations
can use technology to help create healthy, vibrant communities.
LASince 2003
SeattleSince 1999
PortlandSince 2002
ColoradoSince 2003
ArizonaSince 2003
Charlotte RegionSince 2003
IndianaSince 2002
MichiganSince 2001
DCSince 2004
NYSince 2001
AtlantaSince 2001
PASince 2003
TexasSince 2007
The NPower network
NPower Michigan Services
• Technology Purchasing Guide: www.npowermichigan.org/resources/
• TechTrek: group technology assessment and planning
• Consulting
• Scheduled Support
Managed Services
• Help desk• Security (anti-spyware and anti-virus)• Windows patches and updates• System monitoring• Remote login assistance• Budgeting and planning
• $40 per desktop / $100 per server
Additional: IT project management (of either volunteers or IT professionals) at $75 per hour. On-site technician rates vary.
Desktop Security & Backup
• Viruses, Spyware, & Adware
• Firewalls
• Wireless Security
• Creating Strong Passwords
• Backup, Backup, Backup
Viruses
• A computer program that can copy itself and infect a computer without permission of the user
• Viruses, Worms, Trojan Horses = MALWARE
Viruses
• How viruses spread: Internet downloads Removable media Across the network Email attachments
Viruses
• Protecting your system Antivirus software
1. Standardization
2. Definitions
3. Subscriptions
Be smart about email attachments• Unknown senders
• Known senders
Firewall
Viruses
• Recovering from a virus attack Run a full system scan (in Safe Mode if
necessary) Run an “autofix” tool Replace infected files Reformat hard drive
Antivirus Software
Spyware/Adware
Software that covertly gathers user information through your Internet connection without your knowledge, usually for advertising purposes; typically bundled as a hidden component of freeware or shareware programs
• Unwanted pop-up ads and slowed computer performance
• Third party cookies added to your system
• Trick you into buying something
• Personal information can be stolen
• One of the fastest growing threats to computer users
Spyware/Adware
• Protecting yourself and your PC: Proactive software
• Windows Defender (www.microsoft.com)
• Internet security suites
Scanning software• Spybot, Adaware (www.download.com)
• Can also be run in Safe Mode
Avoid dubious Internet software downloads (especially toolbars)
Firewall
• Firewall is a barrier to prevent intruders from “hacking”, or breaking into, your computer
Firewall
• Filters incoming traffic
• Blocks remote access
• Secures the communication ports your computer uses unless you open them
Firewall
• Can be a hardware device or a software program
Firewall
• What kind of Firewall do you need? Hardware firewall absolutely required!
• Basic router with built-in firewall capabilities okay for simple connection to internet
• Advanced firewall device required for specific needs (i.e. VPN or hosting your own email)
Software firewall is supplemental• Exception: Laptop with wireless that often connects to
strange wifi networks
Wireless Security
• Make sure your wireless network isn’t wide open!
Change default password on the router or access point
Secure the connection– WEP – crackable!
– WPA – best option
Wireless Security
• Change default password
Wireless Security
• Secure the connection
Strong Passwords
• 6 to 8 characters long using lower/upper case letters, numbers, and symbols (Microsoft recommends 14…)
4 characters – 14 million possible passwords – 2 seconds
8 characters – 200 trillion possible passwords – 1 year
9 characters – 13 quadrillion possible passwords – 70 years
10 characters – 840 quadrillion possible passwords – 4000 years
• Avoid words in the dictionary (easier to guess)
• Use a sentence that means something to you Every Sunday I go to church at 9 E$igtc@9
• Change passwords regularly
Backup
• Scary Statistics: A computer hard drive fails every 15 seconds Over 2000 laptops are stolen or lost everyday 1 in 5 computers suffer hard drive failure during
their normal useful life Eventually, 100% of all hard drives will fail
Source: Realty Times
Backup
• My Documents• Shared files• Database files• Email files• Accounting data• Organizational
pictures
• Music• Personal files &
pictures
What to Backup? What to Not Backup?
Backup
• Central file storage location:
Server or networked PC
Backup
• Tape Backup
Pros
•Easy to archive (many years)
•Many tapes = many backups
•Easy to take offsite
Cons
•Slower
•Device + Many Tapes = Expensive
•Large capacity tapes also expensive
•Must replace tapes regularly for reliability
Backup
• External Hard Drive
Pros
•Inexpensive
•LARGE capacity
Cons
•Fewer “points of failure”
•Sometimes difficult to take offsite
4 external drives -- 1 week each -- rotate -- offsite
Backup
• For tape and hard drive backups – need some sort of automatic backup software
• Using the NTBackup program Start All Programs Accessories System
Tools Backup
Backup
• Internet
Pros
•Automatic and incremental
•Versioning
•Affordable option
•Offsite
Cons
•Relies on your Internet connection
•Initial backup is slow
•Recurring fee
Backup
• Other Internet backup providers: Connected.com Carbonite.com IBackup.com
Backup
• Disk Imaging Software that creates an exact image of your hard
drive Needs additional hard drive (built-in or external) $50-60
Desktop Security & Backup
• Protect yourself from: Viruses Spyware
• Firewalls
• Wireless Security
• Creating Strong Passwords
• Backup methods