This is the IT website. Submit a service request, find out hours and locations, reset your password and search for help. IT has service points across campus.

Slides:



Advertisements
Similar presentations
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
Advertisements

Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Tracking, Privacy, You & The 21 st Century When you talk online the internet listens.
Basics: Getting Started Uploading and Sharing Videos on YouTube. Basics: Getting Started Uploading and Sharing Videos on YouTube. 1.
Pam Richter – Technology Librarian Baldwin Borough Public Library Job Searching in the Digital Age.
Zinio Free Digital Magazines Select from 180 popular magazine titles No due dates – the issues are yours forever No fine or fees Read on your tablet, computer,
Do you know how to keep yourself safe?
Information Assurance Outreach. Overview Survey Results Password Security Safety Internet Privacy Social Media Privacy and Safety Technology Demonstration.
1. On your smartphone or tablet, visit the Apple App Store or the Google Play Store. Search for: In Case of Crisis Education OR, with the QR code reader.
Notes to Teachers At the time we embedded the links in these lessons, they all worked. If they don’t, you can google the website, find the link, open it.
How to Create (and use) Strong & Unique Passwords Larry Magid Co-director ConnectSafely.org.
How To Protect Your Privacy and Avoid Identity Theft Online.
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
Introduction to ITS SU. What we will cover ? Why it is important to you ? Netid account Printing SUmail Public Labs SURA/VPN AirOrangeX Getting.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Information/Technology Security and Safety for Kids!!
What is E-commerce Safety Precautions Password Strengths
JMU GenCyber Boot Camp Summer, Cyberspace Risks and Defenses Facebook Snapchat P2P filesharing Apps Craigslist Scams JMU GenCyber Boot Camp© 2015.
Security Awareness ITS SECURITY TRAINING. Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.
Stay Safe & Secure Online. Outline Passwords Everyday Security Security Physical Security Protecting Personal Information.
IT security By Tilly Gerlack.
 Facebook  Twitter  MySpace  Windows LiveSpace.
University Health Care Computer Systems Fellows, Residents, & Interns.
Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
Safer Online Shopping and Practices Presenter: Brian Moats Students Active In Leadership.
Chapter 7 Phishing, Pharming, and Spam. Phishing Phishing is a criminal activity using computer security techniques. Phishers try to acquire information.
MICHAEL J MONROE. What is ? Collection of online services and software offered by Apple. Compatible with Mac OSX, Windows, iPhone, and iPod Touch. Released:
How do I use my Ebooks? Nursing 100 Fall So what’s so great about an Ebook? They are inexpensive Environmentally friendly Lighter to carry Offer.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Cyber.
FitnessGram® 2015 Student Information System (SIS) Extract Import Training for Georgia School Year.
Tech Orientation (1) Your Laptop  Do not use someone else’s computers or accounts!
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Helping teachers connect instantly with students and parents.
30 Apps for Librarians Sana Moulder & Bryson Kopf.
Network Account Password Reset Manager WiFiStorage Printing & Photocopying LearningSpace (VLE) Turnitin (e-Submission) Marjon Mobile The Hub Where.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
Maryknoll Wireless Network Access Steps for Windows 7 As of Aug 20, 2012.
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
Two account types on this campus: UWB Access AccountUW NetID Account & 1.Not everyone has one as it must be requested by your supervisor 2.You are.
SuccessFactors - Frequently Asked Questions FAQs Question: I don't have easy access to a computer at work. What other options do I have? Answer: SuccessFactors.
Internet Safety.
Accessing and Using your VitalSource eBook
Hotspot Shield Protect Your Online Identity
Introduction to Web Safety
Student IT induction.
Safe and Secure: Choosing a Safe Screen Name
Protecting What’s Yours: Your Identity
Ways to protect yourself against hackers
Welcome to iSolutions – your IT support service
The Parent Portal Version 3.1 Last Updated on 24/04/2017.
Downloading the LAUSD Emergency Plan App from In Case of Crisis
Registering for Revel™
STOP. THINK. CONNECT. Online Safety Quiz.
Cybersecurity Awareness
HOW TO MAKE YOUR GMAIL ACCOUNT SECURE…. At Google, we take account security very seriously. To protect your account, we strongly recommend following the.
Call To  First of all, sign into “My Apple id page” of Apple and hit on “Manage My Apple ID”.  To proceed further, type your Apple.
Call us on (Toll-free). How to Manage the Norton Identity Safe Logins Those Login information that you store in Identity Safe includes.
Student IT induction.
Introduction to From the Saint Paul Public Library.
Digital $$ Quiz Test your knowledge.
Student IT induction.
Epic Introduction Basics
Epic Introduction Basics
Website Administrator Cornell
The Parent Portal Version 3.1 Last Updated on 24/04/2017.
What this activity will show you
How to Reset a Forgotten Windows Live Hotmail Password? | Call
Presentation transcript:

This is the IT website. Submit a service request, find out hours and locations, reset your password and search for help. IT has service points across campus. Our help desks are at Madill and ODY library. Madill is open during the day. ODY library is open day and night. We maintain a technology-rich teaching, learning and research environment that is robust, reliable and secure. Our ultimate goal it to prepare students to be technologically fluent in all of the ways appropriate for a liberally educated person. You are primarily responsible in making sure your computer and information is safe online. Review the AUP. Criminals want your username and password to your account. With it, they can reset passwords to other online accounts and access valuable information.

How do criminals get your account information? They can steal it. How do criminals get your password? They can ask for it. IT will never ask for your credentials or private information via . Never click a link in an . Open your browser and type the address that you know and trust. Think before you act: Be wary of communications that implores you to act immediately, offers something that sounds too good to be true, or asks for personal information. Double check: call the help desk. Call your bank. You must change your password every 365 days at St. Lawrence. Our requirements: at least 8 characters, three out of four character types (uppercase, lowercase, number, symbol), no parts of your username or full name that exceeds 2 consecutive characters. Consider a pass phrase. Spaces are symbols. We are all accustomed to technology making our lives easier. Safeguarding your data is worth the trouble.

Group your passwords. Keep SLU password unique. Get a password manager. There are three factors of authentication: something you know (password), something you have (cell phone), something you are (fingerprint). Two factor authentication combines two of these, most popular is password and phone. Free WiFi at a cafe or airport? Chances are it’s not secure. Limit the type of of business you conduct. Best practice: connect to our VPN. It secures your traffic by encrypting it.

This is Patrick. Patrick went skydiving and lost his phone. Back it up: Protect your valuable work, music, photos, and other digital information by making an electronic copy and storing it safely. If it’s not in three places, it’s not backed up. Enable ‘Find my iPhone’ or similar apps. ‘Prey’ is an app for iOS, Android, Mac and PC. Side note: Patrick did end up finding his phone with the ‘Find my iPhone’ app. Apple care doesn’t cover accidental damage. 30 second overview about public printing. Go to for information about what you’ve printed and to print via the web or in color. VTC.com. Go to the IT site to get an account. Watch some Photoshop courses and then impress your friends. Visit the IT website for information about how to get started with VTC.