How to?

How to ?

50 Ways to Participate in Computer Security Day

    1. Display computer security posters
    2. Present computer security briefings
    3. Change your password Modifier votre mot de passe
    4. Check for computer viruses Controler la presence du virus
    5. Show computer security videos, films or slides
    6. Protect against static electricity
    7. Modify the logon message on your computer system to notify users that Computer Security Day is November 30
    8. Vacuum your computer and the immediate area
    9. Clean the heads on your disk drives or other magnetic media drives
    10. Back-up your data (after being certain that it is virus-free)
    11. Delete unneeded files
    12. Initiate a computer security poster design contest for next year
    13. Demonstrate computer security software
    14. Publicize existing computer security policy
    15. Issue new and improved computer security policy
    16. Declare an amnesty day for computer security violators who wish to reform
    17. Announce COMPUTER SECURITY DAY in your internal newsletter
    18. Examine the audit files on your computers
    19. Verify that the "Welcome" message that is normally used on your computer is appropriate for your organization
    20. Write-protect all diskettes that are not to be written to
    21. Take the write-protect rings out of the tapes in your library
    22. Verify your inventory of computer applications
    23. Verify your inventory of computer utilities and packaged software
    24. Verify your inventory of computer hardware
    25. Verifier votre inventaire de reseau (LAN, WAN, etc)
    26. Install and inspect power surge protection as appropriate
    27. Install fire/smoke detection and suppression equipment in computer areas
    28. Eliminate dust from computer areas, including chalk dust
    29. Provide dust and water covers for personal and larger computers
    30. Post "No Drinking" and "No Smoking" signs in computer areas
    31. Develop a recovery plan for all computer systems that require one
    32. Verify that passwords are not "Posted" and all other keys are secured

...(Next)