Best practices of computer security

44 %
56 %
Information about Best practices of computer security

Published on July 21, 2009

Author: qabiria



Sample of a webinar about computer threats and defense.

Best practices of computer security a webinar by Qabiria Studio S.L.N.E.

Contents  Why security is so important?  What are the real threats?  What can you do as a defense? Active and passive security Data backup

How safe are you?  Users’ awareness  Law vacuum  Identify vulnerabilities  Organize defense  Maintain a responsible behaviour

What is at risk?  Our time  Our money  Our data  Our privacy  Our identity

Vulnerabilities  Where do attacks come from?  How do crime works online?  Vandalism  Microsoft’s responsibilities

Women and children first…  Alternatives to Windows  Risks of piracy  Advantages of open-source solutions  Free support  Readiness  Peer review guaranteed  User- instead of profit-oriented solutions

Better safe than sorry  Strenghten the weakest link  Don’t be an easy mark  Never lower your guard  Verify the authenticity of instructions before following them

Authentification  The safe password doesn’t exist  10 characters = ~600.000.000.000 attempts  Time + brute force = any password  Chocolate bar = 70%+ of passwords (source: BBC)  The risk of keylogger  Password recovery

External factors  Power surges  Lightnings  Negligence  Theft/fire  Interferences

Thank you For further information: All our training courses:

Add a comment

Related presentations

Related pages

Indiana University: Best Practices for Computer Security

These instructions describe best practices for securing your computer, accounts, and the data stored on them. Information Security Best Practices contains ...
Read more

10 security best practice guidelines for consumers | ZDNet

10 security best practice guidelines for consumers. ... Don't click on popup windows that tell you that your computer is infected with a virus: ...
Read more

Enterprise Security Best Practices -

Enterprise Security Best Practices ... Any computer within your network that is connected to ... To strengthen your security infrastructure and ...
Read more

"Top 10 List" of Good Computing Practices - UC Santa Cruz

General good computing practices and tips that apply to most people who use a computer. ... Reporting computer security incidents...
Read more

10 Best Practices for Cyber Security in 2016 | ObserveIT

Take a look at the list and see if any of these best practices for cyber security have gotten lost as ... your users on cyber security best practices.
Read more

10 Important Computer Security Practices You Should Follow

There’s no way to make a complete list of all the best computer security practices, so we’re sure we’ve missed some important ones.
Read more

Best Practices for Enterprise Security -

Data and transaction security is of paramount importance in this age of rapidly expanding commercial and government computer networks and the emerging ...
Read more

Security Best Practices: Stopping malware and other ...

Security Best Practices; ... Best Practices: ... Review mail security and gateway blocking effectiveness.
Read more

Network Security Policy: Best Practices White Paper - Cisco

Network Security Policy: Best Practices White Paper. Download. Print. Available Languages. ... guidelines for improving their security practices, ...
Read more

10 security best practice guidelines for businesses | ZDNet

Here are 10 best practices that provide ... 10 security best practice guidelines for ... Symantec produces some of the security industry's best ...
Read more