20
10 Things to Teach End- Users Brought to you by Progressiv e Integratio ns, Inc.,

10 things to teach end users

Embed Size (px)

DESCRIPTION

 

Citation preview

Page 1: 10 things to teach end users

10 Things to Teach End-Users

Brought to you by

Progressive Integrations,

Inc.,

Page 2: 10 things to teach end users

History

• Who is Progressive Integrations, Inc.,?

• What is the reason for this seminar?• Where can I get more information?• When can I get help after this

seminar?• How are your going to help?

Page 3: 10 things to teach end users

Intro

• To be effective in our everyday computing and contribute value to business, users need at least a minimal grasp of information technology.

• Exactly what you need to know varies from environment to environment. What I am about to share with you is what is called computing best practices, including how to effectively report problems and how to safeguard your data.

Page 4: 10 things to teach end users

#1 Rebooting before calling for help

• Simple things like checking cable connections, cords, and power can quickly get you back up and running.

• Although telling users to reboot when they experience a problem may seem like a cop out or a delaying tactic, it is an uncomfortable fact that rebooting apparently fixes a multitude of both real and perceived pc/mac errors.

• Even if a reboot does not solve the problem, the mere fact that the problem recurs after a reboot can give a support tech significant diagnostic information.

• Rebooting is not a panacea for all computer aliments, and it is even not helpful in some cases.

Page 5: 10 things to teach end users

#2 Reporting a computer problem

• In addition to knowing the correct procedure for reporting computer problems – e.g. emailing the help desk– users need to know what will help expedite the resolution process.

• Users can easily be trained to effectively report problems if they are provided with a form that gathers appropriate information, such as any error messages, open applications, what they were doing when the problem occurred, and whether the problem can be reproduced.

Page 6: 10 things to teach end users

Example of Support Ticket

Page 7: 10 things to teach end users

#3 Keeping passwords safe

• There is little point in having a password if it is written down in an unsecured location or shared among users, family members and friends. I have seen passwords written on post-it notes attached to monitors, pinned to notice boards, under the keyboard, and even displayed as the text of the marquee screen saver.

Page 8: 10 things to teach end users

#4 Constructing Safe Passwords

• A strong password is a password that meets the following guidelines:

– Be seven or fourteen characters long, due to the way in which encryption works. For obvious reasons, fourteen characters are preferable.

– Contain both uppercase and lowercase letters. – Contain numbers. – Contain symbols, such as ` ! " ? $ ? % ^ & * ( ) _ - + = { [ } ] : ; @ ' ~ # | \

< , > . ? / – Contain a symbol in the second, third, fourth, fifth or sixth position (due to

the way in which encryption works). – Not resemble any of your previous passwords. – Not be your name, your friend's or family member's name, or your login. – Not be a dictionary word or common name.

• Good software for password generation, archiving, and automatic fill, are: roboform, lastpass, keepass

• See http://www.microsoft.com/protect/fraud/passwords/create.aspx for more online information.

Page 9: 10 things to teach end users

Password humor…

Page 10: 10 things to teach end users

#5 Practice safe computing while traveling

• Remote access tokens should not be carried in the same case as the computer.

• Access codes, names, and passwords should not be written down and included in the same case.

• Sensitive data should be encrypted and/or stored on removable data storage devices, carried separately from the computer.

• Never leave devices unattended, use open networks without security software and protection.

Page 11: 10 things to teach end users

#6 Preventing loss of data

• Users need to know that backups do not happen by magic, and if they delete a file before it has been backed up, it may not be recoverable.

• Users must know what is backed up and when and not simply assume that every file they create or modify, regardless of location will be backed up.

• What is the difference between a local backups, external backups, online backups, images, and time machines/capsules?

• Differential? Full? Incremental?

Page 12: 10 things to teach end users

#7 Usage policies

• Home users need usage policies too.• Difference between roles (admin,

standard, guest).• Regardless of strength or content of the

policy, generally speaking, such policies are put in place to protect the consumer, company and entities from lawsuits and most importantly to protect the integrity of the IT infrastructure. (i.e., EULA, web filters).

Page 13: 10 things to teach end users

#8 Exercise care in sending e-mails

• Think before pressing “reply to all”• Double check addresses before clicking

send.• What does CC and BCC mean? When do

you use them?• If you would not put a ‘stamp’ on it then

maybe you shouldn’t send it?• Typing in ALL CAPS is yelling to your

recipient and will probably be deleted.• http://www.netmanners.com/

Page 14: 10 things to teach end users

#9 Protecting against viruses, phising, malware, and other nasties

• Don’t open e-mails from unknown sources.

• Just because it looks real doesn’t mean it is.

• Invest in a good security suite.• Free is not always better.• Be careful where you enter your

personal information on websites.

Page 15: 10 things to teach end users

Phishing example

Page 16: 10 things to teach end users

More Phishing examples

Page 17: 10 things to teach end users

#10 Superstitions that will frustrate you and your tech

• Refusing to reboot – if it ain’t broke don’t fix it mentality.

• Excessive fear of upgrades – exercising caution with upgrades is a good idea, however, one bad experience should not be the gauge of all upgrades. Upgrades bring features, security, stability, and reliability.

• Kneejerk repetition of commands – if it did not respond the last 6 times it probably will not this time.

Page 18: 10 things to teach end users

#10 cont.

• Insisting on particular hardware or software when other equally good hardware or software is available. Uncle Ferd does not always know best

• “I broke it” – software does not break, hardware does. Most issues are software issues, and assuming ‘you broke it’ only feeds the fear to try again.

• Magical thinking – the temptation to forget that the computer is a tool to work with instead of the incomprehensible entity that must be negotiated with.

Page 19: 10 things to teach end users

#10 cont

• Attributing personality to the machine – it is not out to get you, it does not have a mind of its own, and just because it failed one time does not mean it is going to do it again.

• It’s the tech’s fault, he/she was the last one to touch it. Ever since _____ did, it has not worked right…

Page 20: 10 things to teach end users

Q&A

• Please fill out evaluation – your feedback will bring the next course and help serve you better.

• Thank you from Progressive Integrations, Inc., bringing tomorrows technology to the home today.