HP ENVY 15-as100 Winows 7 - Page 48

Installing HP and third-party software updates, Using HP Touchpoint Manager (select models only)

Page 48 highlights

Installing HP and third-party software updates HP recommends that you regularly update the software and drivers that were originally installed on your computer. To download the latest versions, go to http://www.hp.com/support. At this location, you can also register to receive automatic update notifications when they become available. If you have installed third-party software after you purchased your computer, regularly update the software. Software companies provide software updates to their products to correct security problems and improve functionality of the software. Using HP Touchpoint Manager (select models only) HP Touchpoint Manager is a cloud-based IT solution that enables businesses to effectively manage and secure their company assets. HP Touchpoint Manager helps protect devices against malware and other attacks, monitors device health, and enables you to reduce time spent solving end-user device and security issues. You can quickly download and install the software, which is highly cost effective relative to traditional in-house solutions. Securing your wireless network When you set up a WLAN or access an existing WLAN, always enable security features to protect your network from unauthorized access. WLANs in public areas (hotspots) like coffee shops and airports may not provide any security. Backing up your software applications and information Regularly back up your software applications and information to protect them from being permanently lost or damaged through a virus attack or a software or hardware failure. For more information, see Backing up, restoring, and recovering on page 44. Using an optional security cable A security cable, which is purchased separately, is designed to act as a deterrent, but it may not prevent the computer from being mishandled or stolen. Security cables are only one of several methods that should be employed as part of a complete security solution to help maximize theft protection. The security cable slot on your computer may look slightly different from the illustration in this section. For the location of the security cable slot on your computer, see Getting to know your computer on page 3. 1. Loop the security cable around a secured object. 2. Insert the key (1) into the security cable lock (2). 38 Chapter 8 Securing your computer and information

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66

Installing HP and third-party software updates
HP recommends that you regularly update the software and drivers that were originally installed on your
computer. To download the latest versions, go to
support
. At this location, you can also
register to receive automatic update notifications when they become available.
If you have installed third-party software after you purchased your computer, regularly update the software.
Software companies provide software updates to their products to correct security problems and improve
functionality of the software.
Using HP Touchpoint Manager (select models only)
HP Touchpoint Manager is a cloud-based IT solution that enables businesses to effectively manage and
secure their company assets. HP Touchpoint Manager helps protect devices against malware and other
attacks, monitors device health, and enables you to reduce time spent solving end-user device and security
issues. You can quickly download and install the software, which is highly cost effective relative to traditional
in-house solutions.
Securing your wireless network
When you set up a WLAN or access an existing WLAN, always enable security features to protect your
network from unauthorized access. WLANs in public areas (hotspots) like coffee shops and airports may not
provide any security.
Backing up your software applications and information
Regularly back up your software applications and information to protect them from being permanently lost
or damaged through a virus attack or a software or hardware failure. For more information, see
Backing up,
restoring, and recovering
on page
44
.
Using an optional security cable
A security cable, which is purchased separately, is designed to act as a deterrent, but it may not prevent the
computer from being mishandled or stolen. Security cables are only one of several methods that should be
employed as part of a complete security solution to help maximize theft protection.
The security cable slot on your computer may look slightly different from the illustration in this section. For
the location of the security cable slot on your computer, see
Getting to know your computer
on page
3
.
1.
Loop the security cable around a secured object.
2.
Insert the key
(1)
into the security cable lock
(2)
.
38
Chapter 8
Securing your computer and information