Improve security by optimizing your reboot strategy

Many  computer changes we make for security reasons are not effective until the  computer is rebooted (restarted). However, reboots require all the software on  the computer to be shut down. This leads to some key challenges:

  • There is a danger that as the software is shut down, any unsaved data or document changes might not be saved
  • In almost all cases the user will have to start their applications again as needed, reopen the documents, and reposition the application windows
  • If the user was in the midst of a task, that task will be delayed while the computer reboots
    1. The task might be particularly time critical
    2. The interruption might be embarrassing to the user
  • The user might have had a bad experience with a previous reboot and thus fear this reboot could be problematic

For these reasons, computer administrators and end-users often hesitate to force reboots. Computers are commonly left vulnerable for weeks as reboots are delayed and thus the security improvements are not effective. In this paper we will:

  • Review core concepts related to reboot strategies
  • Detail reboot options
  • Outline the process to review your strategy and optimize it

Fill in the form to download the whitepaper

Share this post

Share this post on your favorite social media platform.

Find this resource useful?

If so please click here

Related Content

On-demand Webinar

BIOS to UEFI 2020: The up-to-date guide to a fully secure Windows 10

To arrive at a fully secure Windows 10, with all its fantastic new security features in place, you must configure all your Windows computers for UEFI and SecureBoot. This on-demand webinar features live demos on how to complete the BIOS-to-UEFI…

On-demand Webinar

The Big Patching Debate

In the wake of high-profile patch failures such as the Equifax breach, and widespread reports of the growing tension between IT Security and IT Operations, what's getting in the way of quicker, better patching processes?


Getting your house in order

Why businesses are leaving doors open to security breaches and what must be done to close them. Exclusive survey and microsite with 10 Point Action Plan from Obama advisor Michael Daniel

On-demand Webinar

Apps, End-user Experience & Your Mobile Workforce

Today’s tech-savvy workforce expects the latest tools without disruption – whether they’re working at the office or remotely. Empowering these end users whilst simplifying application management is a fine balancing act. In this webinar, we’ll show you how it…

About 1E

Modern users expect a mobile-like experience, with self-service and instant results. 1E enables IT to deliver comprehensive self-service and respond in real-time by augmenting Microsoft and ServiceNow solutions. Over 1000 organizations trust 1E to meet their user, business, and security needs. Your employees are important; they deserve 1E managed endpoints.