45
COMPUTER BASICS IN THE WORK PLACE Trainer: Brent Simpers

Computer Basics in the Work Place

Embed Size (px)

Citation preview

Computer Basics in the Work Place

Computer Basics in the Work Place

Trainer: Brent Simpers

Welcome to computer basics in the work place. In this class you will learn the difference between the pc you have at home and the computer your use here . I am your trainer Brent Simpers. 1

Parts of a computer you should know and be able to name

Here are a list of Computer parts thank you really need to know the real names for the parts for your computer. The monitor is not a TV2

Here is a list of parts and there names as use by your help desk.3

It is important to know the correct names of the parts of your workstation so that you can report problems correctly

Login in to your computer and personal computer safety

Computer Safety is not the same as Workshop safety . Safety on the computer will keep your and your money safe, in the workshop you can lose a finger in the computer you can lose you and all your money.5

One of the biggest ways you can have your ID stolen is not lock your pc every time you leave your office.6

This Is why we lock our computers

This is the screen you see when you log into your computer

This is a standard lock screen on windows Enterprise computer.8

This is a sign in screen on a networked Windows 10 Workstation

This is the Login In screen It is seen when you login and relog in after you computer is unlocked9

Rules for a secure computer

Here are some rules for a safe computer and a safe internet experience. 10

Rules for a safe workstationKeeping a clean machine: Your company should have clear rules for what employees can install and keep on their work computers. Make sure they understand and abide by these rules. Unknown outside programs can open security vulnerabilities in your network.Following good password practices: A strong password is a sentence that is at least 12 characters long. Focus on positive sentences or phrases that you like to think about and are easy to remember (for example, I love country music.). On many sites, you can even use spaces! Additionally, having separate passwords for every account helps to thwart cybercriminals. At a minimum, they should separate work and personal accounts and make sure that critical accounts have the strongest passwords. Finally, writing down passwords and keeping them in a safe place away from the computer and enabling two-step authentication are other important ways to secure accounts.When in doubt, throw it out: Employees should know not to open suspicious links in email, tweets, posts, online ads, messages or attachments even if they know the source. Employees should also be instructed about your company's spam filters and how to use them to prevent unwanted, harmful email.Backing up their work: Whether you set your employees' computers to back up automatically or ask that they do it themselves, employees should be instructed on their role in protecting their work.Staying watchful and speaking up: Your employees should be encouraged to keep an eye out and say something if they notice strange happenings on their computer.

I have a hand out with all these rules so you can safe your pens. 11

Virus protection and other software that should not be touched without

Virus scanner are our friends. Never Turn them off with out IT approval. 12

What Does an anti Virus Program Do?Anti-virus software helps to protect your computer from viruses that can destroy your data, slow your computer's performance, or cause your computer to crash. Anti-virus software scans your computer for patterns that may indicate an infection. The patterns it looks for are based on the signatures, or definitions, of known viruses. Virus authors are continually releasing new and updated viruses, so it is important that you have the latest definitions installed on your computer.

What is a firewall?A firewall helps to prevent data from entering or leaving your computer without your permission. It helps make you invisible on the Internet and blocks communications from unauthorized sources.

It should never be turned off or messed with.

Surfing The Net On Company Time

We all get down time and we all get bored but surf the net is not a good thing because of the dark things people do on the net.15

Internet Rules in the work PlaceEngaging in unlawful or malicious activities;Deliberately propagating any virus, worm, Trojan horse, trap-door program code, or other code or file designed to disrupt, disable, impair, or otherwise harm either the Company's networks or systems or those of any other individual or entity;Using abusive, profane, threatening, racist, sexist, or otherwise objectionable language in either public or private messages;Sending, receiving, or accessing pornographic materials;Becoming involved in partisan politics;Causing congestion, disruption, disablement, alteration, or impairment of Company networks or systems;Maintaining, organizing, or participating in non-work-related Web logs ("blogs"), Web journals, "chat rooms", or private/personal/instant messaging;Failing to log off any secure, controlled-access computer or other form of electronic data system to which you are assigned, if you leave such computer or system unattended;Using recreational games; and/orDefeating or attempting to defeat security restrictions on company systems and applications

Rules Cont.Use of Company computers, networks, and Internet access is a privilege granted by management and may be revoked at any time for inappropriate conduct carried out on such systems, including, but not limited to:Sending chain letters or participating in any way in the creation or transmission of unsolicited commercial e-mail ("spam") that is unrelated to legitimate Company purposes;Engaging in private or personal business activities, including excessive use of instant messaging and chat rooms (see below);Accessing networks, servers, drives, folders, or files to which the employee has not been granted access or authorization from someone with the right to make such a grant;Making unauthorized copies of Company files or other Company data;Destroying, deleting, erasing, or concealing Company files or other Company data, or otherwise making such files or data unavailable or inaccessible to the Company or to other authorized users of Company systems;Misrepresenting oneself or the Company;Violating the laws and regulations of the United States or any other nation or any state, city, province, or other local jurisdiction in any way;

Rules Cont.Important exception: consistent with federal law, you may use the Company's electronic systems in order to discuss with other employees the terms and conditions of your and your coworkers' employment. However, any such discussions should take place during non-duty times and should not interfere with your or your coworkers' assigned duties. You must comply with a coworker's stated request to be left out of such discussions. Using Company electronic systems to access, create, view, transmit, or receive racist, sexist, threatening, or otherwise objectionable or illegal material, defined as any visual, textual, or auditory entity, file, or data, is strictly prohibited. Such material violates the Company anti-harassment policies and subjects the responsible employee to disciplinary action. The Company's electronic mail system, Internet access, and computer systems must not be used to harm others or to violate the laws and regulations of the United States or any other nation or any state, city, province, or other local jurisdiction in any way. Use of company resources for illegal activity can lead to disciplinary action, up to and including dismissal and criminal prosecution. The Company will comply with reasonable requests from law enforcement and regulatory agencies for logs, diaries, archives, or files on individual Internet activities, e-mail use, and/or computer use. Unless specifically granted in this policy, any non-business use of the Company's electronic systems is expressly forbidden. If you violate these policies, you could be subject to disciplinary action, up to and including dismissal.

Wasted time is lost Time

If you have nothing to do ask a team mate if you can help them , idle hands are the devils workshop and the internet loves idle hands.19

Social media in the work place why some can and most cant

No Social media Its depressing, and depressed people are less productive.Its addicting.It can be used to spy on you.Its an excuse to procrastinate.It waste time you should be working.

Why cant we have Facebook or other social media on our office computers. While this is the same reason we do not allow gaming websites and other time wastes. These sites have virus are addictive and can spy on you and allow other to get in to our company network.21

But Susan Has it in SalesWhy do Some users have access to Social Media and others dont, Because it is become part of their job. Sites like Facebook, Twitter and other Social Media tend to help Departments like Sales or Media relations do their job and these department have their own Network so the bandwidth lose does not effect the company. The Facebook that will soon be in these department is called Facebook at Work and does not allow personal accounts or games.If you job or department requires Facebook or other social media you department head will let you know.

Some departments use it as a tool and they have a special Facebook called Facebook for the workplace. It has now games and only has company account access.22

The Cost in Social media thought out the companyProductivity-One reason why organizations on social networking in the workplace is the fact that employees spend a great deal of time updating their profiles and sites throughout the day. If every employee in a 50-strong workforce spent 30 minutes on a social networking site every day, that would work out to a loss of 6,500 hours of productivity in one year! Although this may be a generalization, organizations look very carefully at productivity issues, and 25 hours of non-productive work per day does not go over well with management. When you factor in the average wage per hour you get a better (and decisive) picture.Resources-Although updates from sites like Facebook or LinkedIn may not take up huge amounts of bandwidth, the availability of (bandwidth-hungry) video links posted on these sites creates problems for IT administrators. There is a cost to Internet browsing, especially when high levels of bandwidth are required.

Here are some reason some companies have banned Facebook.23

Why the Lack of Social MediaViruses and Malware-his threat is often overlooked by organizations. Hackers are attracted to social networking sites because they see the potential to commit fraud and launch spam and malware attacks. There are more than 50,000 applications available for Facebook (according to the company) and while FaceBook may make every effort to provide protection against malware, these third-party applications may not all be safe. Some have the potential to be used to infect computers with malicious code, which in turn can be used to collect data from that users site. Messaging on social networking sites is also a concern, and the Koobface worm is just one example of how messages are used to spread malicious code and worms.

Reputation and Legal Liability-At then time of authorship, there have been no major corporate lawsuits involving evidence from social networking sites. However, organizations need to watch for employees who may be commenting publicly about their employer. For example, one young employee wrote on her profile that her job was boring and soon received her marching orders from her boss. What if a disgruntled employee decided to complain about a product or the companys inefficiencies in his or her profile? There are also serious legal consequences if employees use these sites and click on links to view objectionable, illicit or offensive content. An employer could be held liable for failing to protect employees from viewing such material. The legal costs, fines and damage to the organizations reputation could be substantial.

Just because a website or social media is not on the block list yet does not mean it is safe.24

Lack Con.Social Engineering-Social engineering is becoming a fine art and more and more people are falling victim to online scams that seem genuine. This can result in data or identity theft. Users may be convinced to give personal details such as Social Security numbers, employment details and so on. By collecting such information, data theft becomes a serious risk. On the other hand, people have a habit of posting details in their social networking profiles. While they would never disclose certain information when meeting someone for the first time, they see nothing wrong with posting it online for all to see on their profile, personal blog or other social networking site account. This data can often be mined by cybercriminals.

Employers must be on the lookout for information that their employees may post, as this may have an impact on the company. People often post messages without thinking through what theyve have written. A seemingly innocuous message such as Im working this weekend because weve found a problem in our front-end product may be a spur-of-the-moment comment but could raise concern among customers who may use that system, especially if the company handles confidential or financial detail.

Some Socail media site are used to train your mind to think in a certain way and get you to do things you would not do.25

Network saves My work where?How a Company Network Saves you work.

Where you work is SavedYour Work is saved in Three locations every time you tell you computer to save.Location One is on your computer in the docs folder .Location Two is on the Company Servers in a user backup file.Location Three is On a secure cloud drive All Three location Require a password and user name to access the file, No USB Drives are needed to Save work and in Fact are Ban For Everyone but The IT Department.

Being a big network has its up side too. You work is saved 3 time at least these locations this is for several reasons such as computer crash, network down in our department, or fire or other disaster that destroys the building. Your work product is safe. 27

Security and the little spyWhy USB drive are a security hazard!

USB Drives

They Can Carry VirusesThey Can Steal Company DataThey Can Carry Malware

Usb drive thumb drive or jump drive what ever you call them they are dangerous. They can be used to steal and spy can have virus or malware so here at this company we say no. 29

Usb Drives As a security ConcernUSB peripherals, such as thumb drives, can be reprogrammed to steal the contents of anything written to the drive and to spread the firmware-modifying code to any PCs it touches. The net result could be a self-replicating virus that spreads through sparing thumb drives, much like the rudimentary viruses that spread by floppy disk decades ago.Instead, like many cyber security threats, the only real mitigation right now is how you behave. For instance, it's better not to insert one your USB devices into a computer you don't trust (avoid public computer kiosks, for example), and don't plug a USB device into your own computer unless you are confident you trust it and know everywhere it has been.

The ThreatAttackers may also use their USB drives to steal information directly from a computer. If an attacker can physically access a computer, he or she can download sensitive information directly onto a USB drive. Even computers that have been turned off may be vulnerable, because a computer's memory is still active for several minutes without power. If an attacker can plug a USB drive into the computer during that time, he or she can quickly reboot the system from the USB drive and copy the computer's memory, including passwords, encryption keys, and other sensitive data, onto the drive. Victims may not even realize that their computers were attacked.The most obvious security risk for USB drives, though, is that they are easily lost or stolen (see Protecting Portable Devices: Physical Security for more information). If the data was not backed up, the loss of a USB drive can mean hours of lost work and the potential that the information cannot be replicated. And if the information on the drive is not encrypted, anyone who has the USB drive can access all of the data on it.

Lock down Close and protect yourself and your job!

What is The Lock Down SoftwareSystem lockdown is a protection setting that you can use to control the applications that can run on the client computer. You can create a file fingerprint list that contains the checksums and the locations of all the applications that are authorized for use at your company. The client software includes a Checksum.exe tool that you can use to create a file fingerprint list. The advantage of system lockdown is that it can be enforced whether or not the user is connected to the network. You can use system lockdown to block almost any Trojan horse, spyware, or malware that tries to run or load itself into an existing application. For example, you can prevent these files from loading into Internet Explorer. System lockdown ensures that your system stays in a known and trusted state.

This company uses Lock Down software to stop security breeches, If the software finds a security breech it shuts down that computer and that department to safe guard company assets. 33

Help Desk Heroes; How to call for help when you need it.

When To CallI got an error message.

OK, did you write the error message down or perhaps take a screenshot? No? Well, the help desk is going to need a little more to go on. If you write it down or make a screen cap, you can include the error message information in your question for the help desk, making it far easier to diagnose and fix your problem.

Tell the help desk what the message that poped up says can save time and alert them to any security thetas. 35

When To CallI dont have to read the dialog box that popped up unexpectedly. Thats ITs job.If you unexpectedly have a dialog box pop up, heres an idea: read it. You may, in fact, know whether to click on OK or Cancel. If you dont, then you can relay the contents of the dialog box to the help desk, and they will help you decide.

36

When To CallI need the IT department to speed up the internet.

Before getting in touch with the help desk, its a good idea to ask yourself if what youre asking is actually possible. Do you want IT to remove the pictures of your daughter that her boyfriend posted on Facebook? Do you want them to install OS X on your new Windows PC? A web help desk worker can do lots of things, but some things are impossible without supernatural powers.

There are request that the IT department can do and some that are just impossible. We can fix almost anything.37

but we are not Genies38

When To CallIll just submit this request before leaving on vacation so it will be fixed when I get back.

This wouldnt be a terrible idea, except these requests invariably define the problem as My computer doesnt work, or consist of a mysterious one-word description like, Printer. Whats more, if the help desk makes an attempt to fix your issue, theyre going to want to find out if it worked, and thats not possible if youre in Key West slurping margaritas.

Most things we need you there to fix and make sure it is what you wanted asking us to do something before you leave not good.39

When To Call4. Nothing shows up on my screen.Have you tried the obvious things, like turning it on? Is your monitor, in fact, connected to your computer? What about the keyboard? If youre typing like a banshee and nothing is showing up, perhaps the keyboard isnt connected. Believe it or not, checking to see that everything is properly plugged in and turned on fixes a lot of IT problems.

Ask your self this question are there lights on the case and on the monitor if not one may be turned off.40

When To CallIts Friday at 4:30. If I submit a ticket now, theyll have all weekend to fix it, especially if I mark it URGENT.

Not only do IT workers often need to discuss the problem with you, they dont always work on weekends. And they wont be kindly disposed if your URGENT problem is something like, Can you get around the company controls so I can log onto Facebook?

Call the Help Desk on Friday at 4:30 pm is not funny or a good joke. They have max hours they can work before it causes problems with payroll and if you have using this to leave early we need you their to talk us though the problem.41

When To CallAll my IT requests are urgent.

How very helpful to mark all your IT help desk requests with terms like ASAP, urgent, and very important. It helps the workers put them ahead of all those requests labeled Just fix this if you feel like it, and This isnt really important. If every single one of your IT requests is urgent, then youre the kid who cried wolf and the day you see flames shooting from your keyboard, nobody will take you seriously.

Urgent is I am about to lose 6 weeks work not I cant log in to my gaming site to play Donkey Kong.42

Chrome wouldnt open, so the internet must be down.

A surprising number of reasonably intelligent people give up at the first sign of a problem. But if you close Chrome and open it back up again, it might work. And if Chrome doesnt work, theres almost certainly a copy of IE on your computer that you can use till the help desk can get to your call

Sometimes programs like chrome get stuck in a loop so it best to make sure all copies of chrome are not running in the background and I will show you how on the computer after this lecture.43

When To Call The Please do not do If I submit a ticket, email the help desk, and call them, theyll prioritize my problem.

In fact, if you regularly carpet bomb the IT department, supplementing your help desk ticket with emails and phone calls, they wont prioritize your problem. Theyll just avoid you. Use the ticket submission procedure; or better yet, check the self-service portal first. The answer you need might be in front of your face.

Todays web help desk software cant help you with people who are inconsiderate or proudly clueless, but it can help you use your time as efficiently as possible. When your help desk software is cloud-hosted, youre always running the latest version and are constantly building your knowledge base and improving the end user experience. Believe it or not, most of them really do appreciate it.

Submitting all more than one call or request to work on the same problem does not get it fixed, in many cases it mess the ticket order of your call up and put you at the end of the que. 44

Thanks for Your Time Any Questions?

Thanks for spending the morning with me and not let switch over to you computers for some hands on learning.45

SERENITYAUDIONAUTIX.COMSLOWAcoustic110213.555eng - CALMING,RELAXING