Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword
Like this
1Activity
0 of .
Results for:
No results containing your search query
P. 1
Personal Computer Security

Personal Computer Security

Ratings: (0)|Views: 18 |Likes:
Published by Jim Coe
There are many more computer threats than just computer hackers and malware. How are you keeping your business computing dependable?
There are many more computer threats than just computer hackers and malware. How are you keeping your business computing dependable?

More info:

Published by: Jim Coe on Feb 28, 2012
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as DOC, PDF, TXT or read online from Scribd
See more
See less

05/13/2014

pdf

text

original

 
P
ERSONAL
C
OMPUTER
S
ECURITY 
For Windows Afflictions, apply my free ‘
’ (blog)
 
My ‘
’ Web Services
 
P
ERSONAL
C
OMPUTER
S
ECURITY 
What really comprises PC Security? To me it’s more than just protection fromcrackers and malware. We now depend on our computers so much thatanything threatening their dependability is a “security risk”. Here is a longand scary list of such threats.
FIRST, THE USUAL SUSPECTS:
Hackers (properly called “crackers”)
Malware
Privacy invaders
BUT ALSO:
Poorly written software
Disasters: conflicts, fires or floods
Our own computing errors
Missed updates, leading to unpatched vulnerabilities
Bad updates
Failed hardware
Power failures
Local network and Internet failures
Poor cooling, leading to slow processors or failures
Well-meaning but ham-fisted neighbors, friends, relatives
Obsolescence
Stolen online content or other online storage or server problems
WITH SO MANY CONCERNS, YOU NEED MORE THAN JUST THE USUAL SECURITY SOFTWARE. YOU ALSO NEED:
Regular periodic maintenance
Regular image backups (not just file-by-file or Internet backups)
An UPS (Uninterruptible Power Supply, a battery backup for home power)
A rugged computer design with careful hardware and software selection
Proper computer and network installation and cooling
 Timely hardware and software upgrades
Strong security policies
Good, testedemergency planningand implementation:
o
Computer Data Recovery Plan
o
Disaster Recovery Business Plan component
o
Adequate insurance coverage2

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->