IT Workshop Presented by CoM IT Thursday, November 20th 3:30 – 5:00 PM MSB ROOM 4051 Speakers: Jesse Fatherree, Wade Hedgren, Kent Norton We will be covering.

Slides:



Advertisements
Similar presentations
Which server is right for you? Get in Contact with us
Advertisements

{ Making Microsoft Office work for you Organizing Your Life at work and home in the Cloud Presented by: Matthew Baker (321)
Office 365 Presented by User Services of Library & Information Services.
Fòmasyon Itilizatè Ayiti Office 365 Fòmasyon. Why the Change? Partners in Health's new hosted Microsoft Office 365 solution allows users to access their.
What is it? CLOUD COMPUTING.  Connects to the cloud via the Internet  Does computing tasks, or  Runs applications, or  Stores Data THE AVERAGE CLOUD.
Back Up and Recovery Sue Kayton February 2013.
Your storage on the ground; Your files in the cloud.
Elite Networking & Consulting Presents: Everything You Wanted To Know About Data Insurance* * But Were Afraid To Ask Elite Networking & Consulting, LLC,
 2:00 pm - 2:15 p.m. ◦ Intro, Welcome and Overview of Agenda  2:15 p.m. - 3:00 p.m. – Admin Training ◦ Introduction to Live at EDU and roadmap.
Security Awareness ITS SECURITY TRAINING. Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.
©Kwan Sai Kit, All Rights Reserved Windows Small Business Server 2003 Features.
Presented by Berwick Academy ICT Technical Services
Purpose Intended Audience and Presenter Contents Proposed Presentation Length Intended audience is all distributor partners and VARs Content may be customized.
University Health Care Computer Systems Fellows, Residents, & Interns.
Mehdi Ghayoumi Kent State University Computer Science Department Summer 2015 Exposition on Cyber Infrastructure and Big Data.
What is it? CLOUD COMPUTING.  Connects to the cloud via the Internet  Does computing tasks, or  Runs applications, or  Stores Data THE AVERAGE CLOUD.
Managing Applications, Services, Folders, and Libraries Lesson 4.
TRUENORTH TECHNOLOGY POLICIES OVERVIEW. This includes but is not limited to : – Games – Non-work related software – Streaming media applications – Mobile.
Data Security at Duke DECEMBER What happened: “At this time, we have no indication that research data or personal data managed by Harvard systems.
One Drive for Business: More Than a File Share Erica Toelle
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
Office 365 is cloud- based productivity, hosted by Microsoft. Business-class Gain large, 50GB mailboxes that can send messages up to 25MB in size,
Product Training 1 JetFlash Software Application.
Office 365 Overview Sara Grachek Craig Overboe Mary Shrode.
Common sense solutions to data privacy observed by each employee is the crucial first step toward data security Data Privacy/Data Security Contact IRT.
WHAT IS CLOUD COMPUTING? Pierce County Library System.
Dial-In Number: 1 (631) Webinar ID: FHC Tech Talk Automation and Efficiency Series Talk #1 Carbonite automated backup.
Information Technology Services (ITS)
KasPer Pro HRMS with Self Service Brings a Fully Featured Human Resources Management Solution to the Office 365/SharePoint Online Environment OFFICE 365.
Disaster Recovery & Secure Backups
DATA SECURITY FOR MEDICAL RESEARCH
File Management in the Cloud
WorkDiff Mobile, Scenario-Based Collaboration Solution WorkDiff Allows Users to Work Differently While Using Familiar Functions of Microsoft Office 365.
ESign365 Add-In Gives Enterprises and Their Users the Power to Seamlessly Edit and Send Documents for e-Signature Within Office 365 OFFICE 365 APP BUILDER.
Office 365 is cloud-based productivity, hosted by Microsoft.
StreetSmart Mobile Workforce App Incorporates Microsoft Office 365 Outlook Add-In for Improved Field Worker Scheduling and Streamlined Invoicing OFFICE.
BEST CLOUD COMPUTING PLATFORM Skype : mukesh.k.bansal.
Cloud Computing I hear this question often. It is not easy to explain, because it means different things depending on who you talk to. Today’s Webinar.
46elks Add-In for Microsoft Office 365 Excel Makes it Easy to Add SMS and Voice to Any Website or App – Just Install, Select Numbers, and Hit Send OFFICE.
SmartHOTEL Planner Add-In for Outlook: Office 365 Integration Enhances Room Planning, Booking, and Guest Management for Small Hotels and B&Bs OFFICE 365.
Webparts360: A Low-Code App Development Tool That Enables Non-Programmers to Build Business Solutions for Microsoft Office 365 Quickly, Easily OFFICE 365.
Letsignit, an Automated Signature Solution for Microsoft Office 365 and Microsoft Exchange, Provides Efficiency in Branding and Customization OFFICE.
in All Office 365 Apps for Enterprise Companies
Soft1 Open Enterprise Edition Allows Customers to Easily Synchronize Files Using Microsoft Office 365 and Seamlessly Store Any Information in SharePoint.
Make Your Management and Board Meetings More Effective and Paperless with Microsoft Office 365, SharePoint, and the Pervasent Board Papers App Partner.
A Modern Intranet Integration that Extends the Value of Your Microsoft Office 365 Deployment, Boosts Productivity, and Enhances Collaboration OFFICE 365.
Smart Org Charts in Microsoft Office 365: Securely Create, Collaborate, Edit, and Share Org Charts in PowerPoint and Online with OrgWeaver Software OFFICE.
Instructor Name Instructor Title Library Name
Collaborative Computing Solutions
Decisions Delivers an Easy Way to Plan, Organize and Run Efficient Board and Leadership Meetings Along with the Security of Microsoft Office 365 OFFICE.
Cloud Storage Services
Skyhigh Enables Enterprises to Use Productivity Tools of Microsoft Office 365 While Meeting Their Security, Compliance & Governance Requirements Partner.
MetaShare, Powered by Azure, Gives SharePoint a User-Friendly, Intuitive User Interface and Added App Features with No Added Administrative Tasks OFFICE.
+Vonus: An Intuitive, Cloud-Based Point-of-Sale Solution That’s Powered by Microsoft Office 365 with Tools to Increase Sales Using Social Media OFFICE.
With IvSign, Office 365 Users Can Digitally Sign Word Documents in the Cloud from Any Device Without Having to Install Any Digital Certificates OFFICE.
COM Orientation The template can be used to create presentations for community, civic, advocacy and government relations groups. It is also appropriate.
Which is right for your business, Office 365 or Microsoft 365?
File Manager for Microsoft Office 365, SharePoint, and OneDrive: Extensible Via Custom Connectors in Enterprise Deployments, Ideal for End Users OFFICE.
InLoox PM Web App product presentation
Which is right for your business, Office 365 or Microsoft 365?
Built on the Powerful Microsoft Office 365 Platform, My Intranet Boosts Efficiency with Support of Daily Tasks, Internal Communications and Collaboration.
Back Up and Recovery Sue Kayton October 2015.
The Jamespot for Office 365 Application Attaches Business Processes to Docs and Syncs Them to OneDrive to Simplify Collaboration and Sharing OFFICE 365.
Encryption in Office 365 Shobhit Sahay Technical Product Manager
AddIn Intranet for Office 365 Lets Teams Contribute and Communicate from Any Device. AddIn Analytics on Microsoft Azure Measures Employee Adoption Partner.
Letsignit, an Automated Signature Solution for Microsoft Office 365 and Microsoft Exchange, Provides Efficiency in Branding and Customization OFFICE.
Securing Windows 7 Lesson 10.
IT Office hours – 1 Data Sharing 101
Who We Are Pitt Information Technology provides resources at the University for students, faculty, and staff Technology Support Computer Accounts .
School of Medicine Orientation Information Security Training
Presentation transcript:

IT Workshop Presented by CoM IT Thursday, November 20th 3:30 – 5:00 PM MSB ROOM 4051 Speakers: Jesse Fatherree, Wade Hedgren, Kent Norton We will be covering these items: Forwarding Device Encryption CoM IT Website Cloud File Sharing/Storage

Auto Forwarding Auto Forwarding of UC to personal services (e.g., Gmail, AOL, Yahoo, etc.) is strictly prohibited. Under no circumstances should s containing ePHI be forwarded to a non affiliated service provider. Forwarding s between affiliated entities (i.e., UC, UC Health, Children’s Hospital and the VA) is permitted and is compliant with information security guidelines for safe data practices, as s between these affiliated entities utilize automated encryption methods. The auto-forward option at the server level will be subject to an oversight process allowing only auto-forwarding to an affiliated entity account (i.e., UC, UC Health, Children’s Hospital and the VA). To request server level auto-forwarding a request can be made by calling the Service Desk at 556-HELP (4357) or by ing If approved by the CoM, the CoM IT will work with the university to establish the server level auto-forwarding.

Accounts and Dually Compensated Employees accounts are automatically generated by the HR systems. If you are employed by multiple employers you may already have multiple accounts to try to manage. This is typically the case with physicians hired both by UC and UCP/UC Health. To help simplify the management of multiple mailboxes for employees, UC Health will allow for all incoming messages to be delivered to the UC mail system. A UCHealth.com alias can be created to direct incoming UCHealth.com s over to UC accounts.

USB Devices in the CoM 108 USB External Drives attached to computers in the CoM 123 USB Flash drives plugged into computers in the CoM 1 IOMEGA ZIP 250 USB Device

USB Device Encryption Excerpts from UC HIPAA Information Security Policy Removable or Portable Media Devices All faculty, staff, trainees, students and others in a University of Cincinnati designated health care component may never store ePHI on thumb drives or other removable media devices unless they meet University of Cincinnati encryption standards. Smartphones and Other Mobile Data Devices Encryption: The data on the mobile data device must be encrypted. Backups of data from one device to another device that is not encrypted (e.g., if a backup of a tablet is made using an unencrypted computer) the backup data must be encrypted.

USB Device Encryption Options McAfee File and Removable Media Protection Preferred method Works on both PC and a Mac Centrally managed through ePO Can be used on non-managed machines Built-in Password Recovery Has a 3TB limit Drive must be empty to encrypt.

USB Device Encryption Options Microsoft BitLocker Built into Windows 7 & 8 Enterprise Works with any size disk Access to data is read-only on non-enterprise machines Recovery keys are not centrally managed Cannot be read from a Mac

USB Device Encryption Options IRONKEY Encrypted Flash Drives Encryption is built into the device Can be centrally managed Can be used on any machine More expensive (16GB = $198 + $25 management fee)

CoM IT Website This website is intended to improve communication and collaboration between the IT service professionals and the faculty, staff and students within the CoM. Access the site here Site initially includes the following with much more on the way: Online Service Request Forms – New Hires, RDP, Lost Device, Purchasing Announcements - IT related changes/issues affecting the CoM Links – Commonly used links for CoM related IT services Frequently Asked Questions (FAQs) – View responses to commonly asked questions Access CoM IT’s document library for policies, training materials, service agreements & non electronic IT forms. - ONLINE DEMONSTRATION -

Data Storage Solutions UC Enterprise Storage –In process of migrating to new storage solution, Isilon. –Faster, more reliable, more space –Available from UC and UC Health network or via VPN from off-site SharePoint – OneDrive –All users currently have this available –Can store and share up to 5 GB of data in personal space –Has ability to share, view and edit documents within web browser –Open to the Internet but users must be UC employees, students or affiliates. Box.com –Currently in pilot stage - January to entire university –25 GB of space per user (expandable by request) –Box Edit app allows users to open and edit files directly from website –Files or folders can be shared with any registered user

More Upcoming Projects… Security Management –Enables data owners to audit and update file security on Isilon via web interface Configuration Manger / Software Center –Automates installation and updates for software

Thank you Questions?