1 Technology Orientation. 2 Acceptable Use Policy.

Slides:



Advertisements
Similar presentations
Setting up a Gmail Account & Safety
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Helping our customers keep their computers safe.  Using your pet’s, business, family, friend’s names  Using number or letter sequences (0123, abcd)
Part 2 of Evil Lurking in Websites Data Security at the University of Wisconsin Oshkosh.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
1 I ntegrated S ite S ecurity for G rids © Members of the ISSeG Collaboration, 2008 See: ISS e G Computer Security: Advice for computer.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
Outlook Web Access (OWA) is a web mail service of Microsoft Exchange; allow users to connect remotely via a Web browser OWA is used to access ,
Evidence By Jordan Shurety. This I where you write who you are going to send the to. Cc in an means carbon copy or courtesy copy. You.
user guide Having a strong password allows other users to struggle to guess. To make a strong password you should use up to 12 letters and 1 or 2.
Company LOGO Exploring Using TWIG (Webmail) at ACC.
How To Prepare For Your First Online Class By Jeannie Tipton Let’s Begin!
Internet safety By Lydia Snowden.
eScan Total Security Suite with Cloud Security
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.

Your Trusted Partner In All Things IT. 20 Years of IT Experience University Automotive Food Service Banking Insurance Legal Medical Dental Software Development.
Information guide.
PAGE 1 Company Proprietary and Confidential Internet Safety and Security Presented January 13, 2014.
Security Awareness ITS SECURITY TRAINING. Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.
ESCCO Data Security Training David Dixon September 2014.
By Chris Versaci CLOUD SECURITY. WHAT IS CLOUD COMPUTING? Cloud computing is a concept that involves a large number of computers connected through a real-time.
etiquette Etiquette s always go to any of the following: Staff
1.1 System Performance Security Module 1 Version 5.
Electronic Communication Is the process of sending and receiving messages. Text Message File Transfer Sending messages from one computer.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
Welcome to MSTC Instructor: Brent Presley. OVERVIEW MSTC Network Login MyMSTC MSTC Computer Needs Software Needs Network Storage Course Website.
Windows Tutorial 4 Working with the Internet and
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Staying safe online Suitable for: Beginner.
University Health Care Computer Systems Fellows, Residents, & Interns.
Technology Overview Kim Davis Coordinator of Technology Support Services.
Santa’s s By Chloe Warman.
Dylan Bayliff. Contents: 1- Sending s & Using etiquette 2- Staying safe and Accessing 3- Open s 4- Replying to s 5- Setting up contacts.
Etiquette – a list of rules that we observe Phishing - sending an to a user falsely claiming to be a legitimate company to scam the user into providing.
Santa’s s By Brandon. Sending an attachment to Santa I attached the by pressing the attachment button above the recipient box I used.
COMPUTER SECURITY BEST PRACTICES. SECURE YOUR STUFF!  Physically secure your workstation by locking your screen when away  Secure any small, easy to.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
What are the rules? Information technology is available to every student, faculty and staff member in support of the essential mission of the University.
Microsoft Office XP Illustrated Introductory, Enhanced Started with Outlook 2002 Getting.
By Sasha Radjuk. - Etiquette and User Guide Give some basic notes on how to log in. To login go on Google and type in outlook web app and the type.
Company Guidelines and Basic Rules for …. No text words or slang, all s sent have to be polite and formal Use suitable, relevant subject lines.
INTERNET SAFETY FOR KIDS
The Internet 8th Edition Tutorial 3 Using Web-Based Services for Communication and Collaboration.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Santa’s s By Chantelle Cogin. Sending an attachment to Santa I made a new message and i pressed the insert button and choose what I wanted.
user guide Having a strong password allows other users to struggle to guess. To make a strong password you should use up to 12 letters and 1 or 2.
Working with iPads For Business. Clearing up the iCloud.
tool kit. USER GUIDE Etiquette (Acceptable use policy) – a list of rules that we observe Use a suitable subject in the - this helps.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
OCTOBER IS CYBER SECURITY AWARENESS MONTH. October is Cyber Security Awareness Month  Our Cyber Security Awareness Campaign focuses on topics such as.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Account & Google Message Center Guide August 2015 Prepared by: Angela Mars IT Education and Training.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
Common sense solutions to data privacy observed by each employee is the crucial first step toward data security Data Privacy/Data Security Contact IRT.
Computer Security Keeping you and your computer safe in the digital world.
Two account types on this campus: UWB Access AccountUW NetID Account & 1.Not everyone has one as it must be requested by your supervisor 2.You are.
Account & Google Message Center Guide August 2015 Prepared by: Angela Mars IT Education and Training.
Staying Austin College
Things To Avoid: 1-Never your password to anyone.
Practice Safe Computing
Cloud Storage Services
COM Orientation The template can be used to create presentations for community, civic, advocacy and government relations groups. It is also appropriate.
Lesson 2: Epic Security Considerations
9 ways to avoid viruses and spyware
Setting up a Gmail Account & Safety Kamlesh Singh Bisht IT Specialist.
Information Security in Your Office
Presentation transcript:

1 Technology Orientation

2 Acceptable Use Policy

3  Expectation of Privacy  “Users should have no expectation of privacy or confidentiality when using these resources.”  Representing MCOE  “…it is imperative that employees not use the Internet in such a way as to bring civil or criminal liability or public reproach upon the County Office of Education.”  Personal Use of Resources  Incidental, does not interfere, non-working time  Copyright  Software  Written Publications

4 Device Safety

5  Prevent Theft  Don’t leave valuables unattended  Store devices in locked locations  Prevent Hijacking  Don’t leave logged-in devices unattended  Use a strong password

6 Passwords

7 Password Practices  Vary your passwords  Avoid dictionary words  Avoid personal/common information  Use MiXeD Case  Use Random Numbers  Don’t write them down  Periodically change

8 Password Practices  Vary your passwords  Avoid dictionary words  Avoid personal/common information  Use MiXeD Case  Use Random Numbers  Don’t write them down  Periodically change  Password   apple3049  st4nf0rd  0dd88phr4se  k4Ku43bQ3smkS

9 Password Practices  Vary your passwords  Avoid dictionary words  Avoid personal/common information  Use MiXeD Case  Use Random Numbers  Don’t write them down  Periodically change   k4Ku43bQ3smkS

10 How many passwords? The Same Password   The Cloud  Secured Wireless  Web Help Desk All Different Passwords  Escape  Destiny  OMS  Meeting Room Manager  Promis  Smarter Balanced  Many more

11 How do I change or recover my password?  Windows  Press Control+Alt+Delete  Click on “Change a password…”  Follow on-screen instructions  Mac  Contact the Help Desk

12 Staying Safe

13 Secured Wireless  Use the “MCOE- Secured” wireless network whenever possible

14 Safety  “I am Prince Fayed W. Bolkiah, the eldest son of Prince Jeffrey Bolkiah former finance minister of Brunei, the tiny oil-rich sultanate on the Gulf Island of Borneo….  …I seek your good assistance….  …After due deliberation with my aids we decides to offer a certain percentage to you as compensation for your co- operation and kind sincerity to carry out this assignment…  …your financial compensation will be the 15% of the total cash. That is 15% of $500,000, ”

15

16

17

18 Avoiding Phishing  Never send personal information over  Type links yourself  Closely inspect URLs and sender*  If in doubt, call.

19 Malicious Attachments  Double check that the attachment is expected  Verify the sender  Pay careful attention to the attachment extension  When in doubt, call

20

21 Malicious Attachments  Double check that the attachment is expected  Verify the sender  Pay careful attention to the attachment extension  When in doubt, call.  Common Extensions .jpeg or.gif or.png .doc or.docx .xls or.xlsx .ppt or.pptx .pdf  Suspicious Extensions .exe,.dmg .rar,.tar.gz .zip

22 Etiquette

23 Being Professional  DON’T SHOUT!

24 Being Professional  Avoid all capital letters  Be careful when “replying all”  Write a specific subject line  Be concise  Be careful with humor

25 Being a Good Citizen  Try not to spam  Delete unnecessary s  Periodically clean out and archive your  Avoid large attachments  Send via Dropbox or Google Drive

26 Everywhere

27

28

29

30 Storage Resources

31 Network Storage

32 Storage Options Hard Drive  Stored on your computer  Not backed up automatically  Accessible from just your computer  No sharing options  Not accessible online Network (Virtual) Drive  Stored by MCOE  Backed up automatically  Accessible anywhere in MCOE network  Can easily be shared  Accessible online

33 thecloud.montereycoe.org * Requires a flash drive for security purposes

34 Learn and Do More

35 Get Set Up  Setting homepages and bookmarks  Setting up folders and shortcuts  Exploring and configuring preferences  Keyboard shortcuts

36 Extra Offerings  Technology Professional Development  Regularly Scheduled Classes  Customized Trainings

37

38 Extra Offerings  Technology Professional Development  Regularly Scheduled Classes  Customized Trainings  Microsoft Office and Adobe Creative Suite

39 Get Help  Help Desk  In Person  TIS Front Desk  By Phone   By   By Creating a Ticket  Whd.montereycoe.org  Process Duration

40 Questions