ClarITy Working to make Information Technology clear

Size: px
Start display at page:

Download "ClarITy Working to make Information Technology clear"

Transcription

1 INFORMATION TECHNOLOGY SERVICES ClarITy Working to make Information Technology clear Inside this issue: Volume 1, Issue 1 Summer 2009 Oracle upgrade 2 Core Router upgrade 2 Welcome to ClarITy Information Technology Services is happy to provide you with the very first issue of our newsletter ClarITy. We plan on publishing new issues three times a year Summer, Fall and Spring. In addition we will also publish an annual edition which focuses on Student Orientation and will be geared to in-coming students. We hope you will find ClarITy informative, educational and fun. Please feel free to send your feedback, suggestions and comments to us via at helpdesk@plymouth.edu. Pay-2-Print ready to go PSU Chooses New Anti-virus Software The Telecom System and Voic upgrade What are phishing scams and how can I avoid them? Summer-time is Project-time at ITS and the Summer of 2009 is no exception. Each of the various ITS workgroups are working to make upgrades to a variety of database, network, telecom, and desktop systems. Be sure to consult the ITS Projects Calendar below and the information contained in this newsletter to familiarize yourself with any Planned Service Outages. Finally, should you have questions or concerns or if you need additional information, we are always here to help. Simply call us (603) or stop by the Information Desk in the library. Have a great Summer! ITS Summer Project Calendar Sunday, June 21st Oracle upgrade to databases which support myplymouth Services Summer-time is Projecttime in Information Technology Services Summer classroom & cluster upgrades 5 Sunday, June 28st 6 am - 10am Late June, early July (date tentative) Upgrade to Hyde Hall Core Router Systems Teams begin to deploy new Avira Anti-virus to PSU owned computers How well do you know your ITS colleagues? 6 July 1st July 3rd and 4th Summer upgrades to clusters and classrooms begin Helpdesk is Closed in observance of Independence day July 31st (date tentative ) Upgrade to telephone system and voic system. Early August Telecom moves to Highland Hall basement August Helpdesk Student Training Week August 29th Helpdesk Closed for pre-fall semester break

2 Page 2 ClarITy June 21st Oracle Upgrade On Sunday, June 21 st the MIS team will be performing an Oracle upgrade to the servers which host various PSU databases. This upgrade is part of the preparations taking place for the Banner 8 upgrade scheduled for mid-october. The Oracle upgrade on June 21st is part of the preparations taking place for the Banner 8 upgrade this Fall. During the upgrade, access to myplymouth and Zimbra mail will be intermittent. Access to the various services which reside within myplymouth will be unavailable. This includes access to services such as Banner INB, PSC1, Banner Courtyard, Banner Student, Blackboard and R-25. The entire upgrade is planned to occur within the normal Sunday maintenance window from 6 am 10 am. Should you encounter any problems accessing these services after 10 am, please contact the Helpdesk for assistance. We can be reached at (603) or via at helpdesk@plymouth.edu Hyde Core Router Upgrade tentatively scheduled for June 28th Networking Team will be replacing the Hyde Hall Core Network Router which manages all PSU network traffic, including internet access. The upgrade is tentatively scheduled for Sunday June 28th and timing is dependant upon the pre-requisite electrical work being completed on time. This upgrade is part of the on-going 5-year campus network infrastructure replacement cycle and is necessary in order to replace aging equipment. During the upgrade, all campus Internet access will be down. This includes all internet traffic in and out of the campus and in all campus buildings. The entire upgrade is planned to occur within the normal Sunday maintenance window from 6 am 10 am. Should you encounter any problems accessing network services after 10 am, please contact the Helpdesk for assistance. We can be reached at (603) Pay-to-print ready to go Work on the PSU Pay-2-print program is now complete and beginning on July 1st, the e- commerce portion of the PSU pay-2-print system will be in place located on the main welcome page in the Go-Sidebar under the Dashboard heading. Pay-2-Print was implemented as a way to increase awareness of wasteful printing Students who exceed their $20 (approx 400 b/w page) print quota each semester are now able to purchase additional printing privileges online at their convenience. This service is available 24/7 and students will no longer be required to visit the helpdesk in order to increase their print quota. Questions about the Pay-2-Print program should be addressed to the ITS helpdesk at the main Information Desk in the library or by calling (603)

3 Volume 1, Issue 1 Page 3 Telecom to upgrade telephone system and voic In late July or early August the Telecom Team will be doing a full upgrade to the telephone system and voic system. This upgrade, tentatively scheduled for July 31st, is required to replace aging telephone infrastructure and is part of the phased integrated messaging project begun last summer with 5-digit dialing and virtual voic for students. In order to minimize the impact to the campus, this upgrade will take place beginning at 5 pm on a Friday evening and will continue into the early hours on Saturday morning. Auto-attendant greetings will require a new recording. Telecom will contact the administrator of each auto-attendant with information and instructions. All other recorded messages and greetings will be carried over to the new system. The upgrade to the voic system will allow Telecom to offer additional voice messaging features in the near future. However, It is important to understand that during the upgrade all telephone and voic services will be down, including telephone access to 911. Look for additional information via and posted in myplymouth as the update date draws closer. Questions about the upgrade and the related outage should be addressed to the Telecom office at (603) or via at networking@plymouth.edu. PSU chooses new Anti-virus software. Information Technology Services has decided not to renew the Institution s license with McAfee anti-virus and in exchange has selected Avira as its new supported anti-virus client for all PSU owned equipment. The change to Avira was based upon many factors, including a forecasted $25,000 cost savings over the course of the 3 year license. The Systems Team tested a variety of anti-virus clients and found Avira to be the most effective at providing all-around protection at a cost effective price. In addition, Avira was highly rated by AV-Comparatives, an Austrian Non-Profit-Organization, which is highly regarded in the technology arena for providing independent anti-virus software evaluations and making them publically accessible. The Systems Team will begin deploying Avira to PSU owned machines via the network at the end of June. Users will know that Avira has been installed when they see the Avira Red Umbrella icon on their desktops. Avira has been selected as the ITS supported anti-virus on PSU owned equipment. In addition, PSU students are no longer required to have McAfee anti-virus on their computers in order to connect to the PSU network, and now may choose from a list of more than 50 popular anti-virus clients. Questions about the anti-virus solutions should be addressed at the ITS helpdesk at the main Information Desk in the library or by calling (603)

4 Page 4 ClarITy What are phishing scams and how can I avoid them? What is Phishing? Phishing is an attempt to trick you into doing something you don't want to do. Phishing s try to coerce you into giving away your most valuable information bank account numbers, credit card numbers, passwords, social security number, even your mother's maiden name. The people behind phishing scams want your personal info, and they're willing to go to great lengths to trick you into handing over your identity. Phishing Scams Lead to Identity Theft Phishing scams often arrive as cleverly disguised s. They may appear to be sent by trustworthy companies like ebay, PayPal, your local bank, or even the University helpdesk. According to Webopedia.com, "phishing is a variation on fishing, the idea being that bait is thrown out with the hopes that while most will ignore the bait, some will be tempted into biting." Phishing Facts Approx. 59 million phishing s are sent each day. - 1 in 6 are opened. - In 2006, the average loss per victim was $1244 Phishing s may make threats like "Attention! Your account has been violated!" or "If you choose to ignore our request, we have no choice but to suspend your account." These matters seem urgent and unless you recognize the as a phishing scam, you might fall victim to it. From to the Web Clicking a link in a phishing typically takes you to fake website. The phishing site is designed to look like a company's real website. The phishing site may even link to the official site and may use the same graphics, colors, and logos. This is all done to lull you into a false sense of security. An online web form used in a phishing scam asks for your personal info. They want anything you'll give them, including your bank account numbers, credit card numbers, social security number, passwords, etc. Once they have this information, they might use it to apply for new credit cards, run up bills on your existing cards, or take out loans in your name. How to Recognize Phishing Scams How can you tell the difference between a phishing scam and a legitimate or website? Unfortunately, phishing scams are becoming more and more sophisticated and increasingly difficult to identify. However, there are several strategies you can use to recognize phishing scams. Be skeptical. Since you know phishing scams are out there, be skeptical of s you receive. Most companies don't wait until the last minute to spring emergencies like this on their customers. They send several notices, often times through the regular mail, or they call to warn you of potential security breaches. If you get s like this, look for clues that they might be fakes. Verify the web address and address. Checking the addresses is a good way of discovering a scam. If the first part of the web address consists of numbers, the site should probably not be trusted. For example, this is an untrustworthy address: Even though "ebay" is part of the address, the first part contains numbers (called an IP address). This is a sign that something may not be right. Look for signs of security. Real corporate websites use secure, encrypted web pages any time their customers are asked to send personal and financial information. Look for " in the web address. The "s" stands for "secure.

5 Volume 1, Issue 1 Page 5 Phishing Continued Also look for a locked padlock icon in the lower part of your browser window. The locked padlock icon indicates the site is encrypted, which means your data is protected when you send it over the Internet. If you don't see these signs, then the site could be a fake. Look for fishy details. Most legitimate corporate s and websites look professional. Phishing scams try to fool you, but like a photocopied dollar bill, they just don't look right. Look for bad grammar, bad spelling, and bad design. If your instincts tell you something's fishy, it probably is. Phishing scams are becoming more sophisticated each day, so this is not a sure-fire way of sniffing out a fake, but it's still a good place to start. Make a few phone calls. Before you click any links or fill out any forms, call the company and don't use the phone number in the . Get a real person on the phone to help you verify the legitimacy of the you received. If you can't reach a company representative by phone, call the Help Desk at The following sites have good information on phishing and reporting phishing scams: Anti-Phishing Working Group. Consumer Advice: How to Avoid Phishing Scams. 15 June < Federal Trade Commission (FTC). October How Not to Get Hooked by a Phishing Scam. 15 June < Never share your PSU password with anyone! ITS will never ask you for this information via an . Microsoft. October 15, Recognize phishing scams and fraudulent s. 15 June < Summer Classroom and Computer lab upgrades Multimedia classrooms and computer labs play an important role in the curriculum here at PSU. and it is important that our classrooms and computer labs be maintained and kept operational in order to support teaching. While some upgrades have been deferred until winter break and the spring semester, the following is a list of the classrooms and computer clusters which will receive technology upgrades this summer. Multimedia Classrooms: Hyde 113, Hyde 114, Hyde 115, Hyde 117, Hyde 213, Hyde 214, Hyde 215, Hyde 216, Hyde 217, Hyde 316, Hyde 318, Hyde 327, and Hyde 435J, Computer Labs: Lamson 030, Writing Center, Learning Commons MPC, Lamson Lower Level, Rounds 105, Memorial 312, Hyde 349/327, Boyd 117, Boyd 303 Some classroom and computer lab upgrades will be deferred until winter break or after the end of the Spring semester. Questions about the summer technology upgrades should be directed to the ITS helpdesk at (603) or via at helpdesk@plymouth.edu.

6 ITS: Partners in reliable, innovative technology and services. INFORMATION TECHNOLOGY SERVICES Plymouth State University Information Technology Services 17 High Street, MSC #28 Plymouth, NH Phone: Fax: Information Technology Services (ITS) provides the technological infrastructure, applications and support for learning, teaching, research and administration at the University. ITS units are comprised of the Help Desk at the Learning Commons, academic computing, network, administrative systems, telecommunications, training and desktop support and the computer repair center. ITS also supports myplymouth, a web portal through which courses, communications and online services are available. Have questions or need help? the helpdesk at helpdesk@plymouth.edu or call us at (603) infotech/index.html How well do you know your ITS colleagues? There are 35 PSU employees who work for Information Technology Services. Can you guess which ITS staff member these facts pertain to? His hometown is in Connecticut He is the oldest of three children He built volcanoes in his backyard as a kid His first car was a red 1966 Saab He worked as a paperboy while in high school He has appeared in one theatrical production He is a PSU Alumnus Stumped? Look for the answer in the Fall issue of ClarITy!

Your security on click Jobs

Your security on click Jobs Your security on click Jobs At Click Jobs is a trading name of Raspberry Recruitment Limited, we're committed to helping you find the right job in a safe and secure environment. On these pages, you can

More information

Ages Donʼt Fall for Fake: Activity 1 Don t bite that phishing hook! Goals for children. Letʼs talk

Ages Donʼt Fall for Fake: Activity 1 Don t bite that phishing hook! Goals for children. Letʼs talk Ages 11-14 Donʼt Fall for : Activity 1 Don t bite that phishing hook! Children play a game where they study various emails and texts and try to decide which messages are legit and which are phishing scams.

More information

Online Scams. Ready to get started? Click on the green button to continue.

Online Scams. Ready to get started? Click on the green button to continue. Online Scams Hi, I m Kate. We re here to learn how to protect ourselves from online scams. We ll follow along with Kevin to learn what types of scams are out there, how to recognize the warning signs,

More information

To: The JCU Community

To: The JCU Community To: The JCU Community ICT Week in Review - Week ending 16th December, 2016 Topics in this Bulletin: JCU Cybersecurity Malicious Emails Cryptolocker Service available over the Christmas/New Year period

More information

TIPS TO AVOID PHISHING SCAMS

TIPS TO AVOID PHISHING SCAMS TIPS TO AVOID PHISHING SCAMS WHAT IS PHISHING? Phishing is the use of fraudulent email, websites, text messages and phone calls to trick people into disclosing personal financial or identity information,

More information

ANNUAL SECURITY AWARENESS TRAINING 2012

ANNUAL SECURITY AWARENESS TRAINING 2012 UMW Information Technology Security Program Annual Security Awareness Training for UMW Faculty and Staff ANNUAL SECURITY AWARENESS TRAINING 2012 NETWORK AND COMPUTER USE POLICY Users of information technology

More information

Six Steps to Protect Your Clients and Protect Yourself from Identity Theft

Six Steps to Protect Your Clients and Protect Yourself from Identity Theft Six Steps to Protect Your Clients and Protect Yourself from Identity Theft Ley Mills IRS Stakeholder Liaison January 26, 2018 Cost of Data Theft Example: Connecticut tax preparer with 800 clients; mostly

More information

Six Steps to Protect Your Clients and Protect Yourself from Identity Theft. Ley Mills IRS Stakeholder Liaison December 20, 2017

Six Steps to Protect Your Clients and Protect Yourself from Identity Theft. Ley Mills IRS Stakeholder Liaison December 20, 2017 Six Steps to Protect Your Clients and Protect Yourself from Identity Theft Ley Mills IRS Stakeholder Liaison December 20, 2017 Cost of Data Theft Example: Connecticut tax preparer with 800 clients; mostly

More information

Webomania Solutions Pvt. Ltd. 2017

Webomania Solutions Pvt. Ltd. 2017 The other name for link manipulation is Phishing or you can say link manipulation is type of phishing attack done generally to mislead the user to a replica website or a looka-like of some well-known site.

More information

Helpdesk. Shopping for Technology. Talkin Tech Highlights... Computing on the Go!

Helpdesk. Shopping for Technology. Talkin Tech Highlights... Computing on the Go! Helpdesk Volume 1, Issue 2 November 15, 2007 Printer-friendly version Make sure your newly purchased equipment complies with CCAC Hardware Standards, and learn what ITS can support. See CCAC Equipment

More information

Information Technology Services (ITS) Our Mission: "To provide technology solutions and support for the College community."

Information Technology Services (ITS) Our Mission: To provide technology solutions and support for the College community. Information Technology Services (ITS) Our Mission: "To provide technology solutions and support for the College community." Our Vision: "To deliver technology solutions that automate and simplify processes

More information

Phishing: Don t Phall Phor It Part 1

Phishing: Don t Phall Phor It Part 1 Phishing: Don t Phall Phor It Part 1 Software Training Services Welcome to Part 1 of the online course: Phishing: Don t Fall for it! 1 Objectives Definition of Phishing State of Phishing Today Recognizing

More information

FACTS WHAT DOES FARMERS STATE BANK DO WITH YOUR PERSONAL INFORMATION? WHY? WHAT? HOW? L QUESTIONS?

FACTS WHAT DOES FARMERS STATE BANK DO WITH YOUR PERSONAL INFORMATION? WHY? WHAT? HOW? L QUESTIONS? FACTS WHAT DOES FARMERS STATE BANK DO WITH YOUR PERSONAL INFORMATION? WHY? WHAT? HOW? Financial companies choose how they share your personal information. Federal law gives consumers the right to limit

More information

Who We Are! Natalie Timpone

Who We Are! Natalie Timpone Who We Are! Natalie Timpone Manager of Security Business Management Office Enterprise Security Awareness Manager Carmelo Walsh Security, Risk, and Compliance Security Awareness Subject Matter Expert Who

More information

Personal Cybersecurity

Personal Cybersecurity Personal Cybersecurity The Basic Principles Jeremiah School, CEO How big is the issue? 9 8 7 6 5 4 3 2 1 Estimated global damages in 2018 0 2016 2018 2020 2022 2024 2026 2028 2030 Internet Users Billions

More information

Security Awareness. Chapter 2 Personal Security

Security Awareness. Chapter 2 Personal Security Security Awareness Chapter 2 Personal Security Objectives After completing this chapter, you should be able to do the following: Define what makes a weak password Describe the attacks against passwords

More information

FAQ. Usually appear to be sent from official address

FAQ. Usually appear to be sent from official  address FAQ 1. What is Phishing Email? A form of fraud by which an attacker masquerades as a reputable entity in order to obtain your personal information. Usually appear to be sent from official email address

More information

COMMON WAYS IDENTITY THEFT CAN HAPPEN:

COMMON WAYS IDENTITY THEFT CAN HAPPEN: COMMON WAYS IDENTITY THEFT CAN HAPPEN: OLD FASHIONED STEALING / DUMPSTER DIVING Thieves typically steal wallets and purses. They also steal mail such as credit card and bank statements, pre-approved credit

More information

ELECTRONIC BANKING & ONLINE AUTHENTICATION

ELECTRONIC BANKING & ONLINE AUTHENTICATION ELECTRONIC BANKING & ONLINE AUTHENTICATION How Internet fraudsters are trying to trick you What you can do to stop them How multi-factor authentication and other new techniques can help HELPING YOU STAY

More information

Newcomer Finances Toolkit. Fraud. Worksheets

Newcomer Finances Toolkit. Fraud. Worksheets Newcomer Finances Toolkit Fraud Worksheets Ottawa Community Loan Fund Fonds d emprunt Communautaire d Ottawa 22 O Meara St., Causeway Work Centre, Ottawa, ON K1Y 4N6 Tel: 613-594-3535 Fax: 613-594-8118

More information

Target Breach Overview

Target Breach Overview Target Breach Overview Q: Media reports are stating that Target experienced a data breach. Can you provide more specifics? A: Yes, Target has confirmed that it experienced unauthorized access to its systems

More information

Online Fraud and Identity Theft Guide. A Guide to Protecting Your Identity and Accounts

Online Fraud and Identity Theft Guide. A Guide to Protecting Your Identity and Accounts A Guide to Protecting Your Identity and Accounts As part of SunTrust s commitment to protecting your accounts and identity, we ve created the Online Fraud & Identity Theft Guide, which provides information

More information

Phishing Attacks. Mendel Rosenblum. CS142 Lecture Notes - Phishing Attack

Phishing Attacks. Mendel Rosenblum. CS142 Lecture Notes - Phishing Attack Phishing Attacks Mendel Rosenblum Phishing Basic idea: Get unsuspecting users to visit an evil Web site Convince them that the evil Web site is actually a legitimate site (such as a bank or PayPal) Trick

More information

Student Tech Guide. Get Help from the Information and Technology Solutions Center! link.mnsu.edu/studenttech. Big ideas. Real-world thinking.

Student Tech Guide. Get Help from the Information and Technology Solutions Center! link.mnsu.edu/studenttech. Big ideas. Real-world thinking. Student Tech Guide Get Help from the Information and Technology Solutions Center! Find this Student Tech Guide online at link.mnsu.edu/studenttech Big ideas. Real-world thinking. Get Started Your StarID

More information

Illini Union Online Space Request Form Tutorial

Illini Union Online Space Request Form Tutorial Illini Union Online Space Request Form Tutorial A few things to help you along your way This tutorial will serve as your go-to resource for navigating the Online Space Request Form. Please go through this

More information

1 of 11 10/1/ :26 AM

1 of 11 10/1/ :26 AM 1 of 11 10/1/2010 12:26 AM About Us Careers Calculators Contact Us Search Home Your Money HQ ID Theft & Fraud FRAUD ALERT E-mail Scams ID Theft and Fraud Avoid Becoming a Victim What To Do If You Are a

More information

Basics. IT services for postgraduate resarch students

Basics. IT services for postgraduate resarch students Basics IT services for postgraduate resarch students Get started Activate your computing account We re looking forward to welcoming you to the University of Liverpool! This guide will help you to understand

More information

FAQ: Privacy, Security, and Data Protection at Libraries

FAQ: Privacy, Security, and Data Protection at Libraries FAQ: Privacy, Security, and Data Protection at Libraries This FAQ was developed out of workshops and meetings connected to the Digital Privacy and Data Literacy Project (DPDL) and Brooklyn Public Library

More information

Move-Out, Shipping and Summer Storage Resources. Tulane University Parent Programs Webinar March 14, 2018, 7 pm central

Move-Out, Shipping and Summer Storage Resources. Tulane University Parent Programs Webinar March 14, 2018, 7 pm central Move-Out, Shipping and Summer Storage Resources Tulane University Parent Programs Webinar March 14, 2018, 7 pm central Webinar panelists Jon Tingley, Assistant Director for Facilities, Department of Housing

More information

This document and other HACCWeb documents are available at From the homepage, select Current Student link (on the left side), Log-ins,

This document and other HACCWeb documents are available at   From the homepage, select Current Student link (on the left side), Log-ins, This document and other HACCWeb documents are available at www.hacc.edu. From the homepage, select Current Student link (on the left side), Log-ins, and under HACCWeb, select the appropriate document.

More information

StorMan Software - Quickstart Guide

StorMan Software - Quickstart Guide StorMan Software Quickstart Guide Page 1 Table of Contents Introduction & Welcome 3 Software Licence Agreement 4 Installing StorMan & linking it to your new Company Datafile 4 Logging-in for the first

More information

Easy Attendant User Guide

Easy Attendant User Guide Welcome Easy Attendant will provide your business with a convenient and virtual means to answer your business incoming telephone calls. Easy Attendant is an easy to use solution that combines advanced

More information

Introduction to

Introduction to Introduction to Email gcflearnfree.org/print/email101/introduction-to-email Introduction Do you ever feel like the only person who doesn't use email? You don't have to feel left out. If you're just getting

More information

Here s what you ll need to know to get involved in our Summer 2016 classes, and one-on-one tutoring opportunities:

Here s what you ll need to know to get involved in our Summer 2016 classes, and one-on-one tutoring opportunities: Welcome to TechConnections, the City of Sacramento s technology program for adults ages 50+, based at Hart Senior. Our program is staffed primarily by volunteers. TechConnections classes are offered at

More information

Phishing. What do phishing s do?

Phishing. What do phishing  s do? Phishing We have become all too familiar with phishing emails but if that s the case, why do we as a community still fall victim? In this newsletter our goal is to provide you with some basic information

More information

Welcome! The Clarion University Libraries. In This Issue Welcome! CU Libraries Links: Inside The Clarion University Libraries

Welcome! The Clarion University Libraries. In This Issue Welcome! CU Libraries Links: Inside The Clarion University Libraries August 27, 2013 The Clarion University Libraries Volume 9, Number 1 In This Issue Welcome! Libraries Services And Hours Carlson Lab S.W.A.T. Team Library Tip: ID Cards Faculty Tip: Library Staffing Update

More information

Spam Protection Guide

Spam  Protection Guide Spam Email Protection Guide Version 1.0 Last Modified 5/29/2014 by Mike Copening Contents Overview of Spam at RTS... 1 Types of Spam... 1 Spam Tricks... 2 Imitation of 3 rd Party Email Template... 2 Spoofed

More information

Welcome to the UVU IT Service Desk

Welcome to the UVU IT Service Desk Welcome to the UVU IT Service Desk Agenda 1. Procedures Getting Help 2. Network & Email 3. myuvu Portal 4. Security 5. Outages & Emergencies 6. Software 7. Miscellaneous Getting Help Phone 801-863-8888

More information

NHSmail Migration Communications Plan Template

NHSmail Migration Communications Plan Template NHSmail Migration Communications Plan Template June 2018 Version 2 Copyright 2017Health and Social Care Information Centre. The Health and Social Care Information Centre is a non-departmental body created

More information

TO: Doctoral Students Expected to Register in EDD 1006 for Spring FROM: R. H. Red Owl, Ph.D., Professor

TO: Doctoral Students Expected to Register in EDD 1006 for Spring FROM: R. H. Red Owl, Ph.D., Professor TO: Doctoral Students Expected to Register in EDD 1006 for Spring 2015 FROM: R. H. Red Owl, Ph.D., Professor (redowl@liu.edu) SUBJECT: EDD 1006 Free Statistics Webinar and Webinar Preparation Session DATE:

More information

Federal Deposit Insurance Corporation. National Credit Union Administration. Office of the Comptroller of the Currency. Office of Thrift Supervision

Federal Deposit Insurance Corporation. National Credit Union Administration. Office of the Comptroller of the Currency. Office of Thrift Supervision YOU HAVE THE POWER TO STOP IDENTITY THEFT A message from the federal bank, credit union and thrift regulatory agencies Board of Governors of the Federal Reserve System Federal Deposit Insurance Corporation

More information

ParentConnection User Guide

ParentConnection User Guide ParentConnection User Guide Table of Contents How to Access ParentConnection for the Anchorage School District... Welcome Parents!... Computer Requirements... Finding ParentConnection & Logging In... Your

More information

Notice to our customers regarding Toll Fraud

Notice to our customers regarding Toll Fraud Notice to our customers regarding Toll Fraud - Beware of Toll Fraud. - Toll Fraud is a crime against you. Bizfon isn't responsible for your Toll Fraud. - You need to take steps to protect yourself from

More information

2017 Johns Hopkins Network Connectivity Guide

2017 Johns Hopkins Network Connectivity Guide 2017 Johns Hopkins Network Connectivity Guide ResNet, the JHU Student Residential Network, is the free high-speed wired and wireless internet network service available to students, on campus, and living

More information

Chapter 16: Advanced Security

Chapter 16: Advanced Security : Advanced Security IT Essentials: PC Hardware and Software v4.0 1 Purpose of this Presentation To provide to instructors an overview of : List of chapter objectives Overview of the chapter contents, including

More information

EasiPC Helpdesk. What is ITIL? m. 28 Charter Gate, Northampton, NN3 6QB e. t

EasiPC Helpdesk. What is ITIL? m. 28 Charter Gate, Northampton, NN3 6QB e. t EasiPC Helpdesk A different approach to supporting your school EasiPC currently provides class leading ICT support to schools and academies across Northamptonshire and beyond. To complement our growing

More information

Employee Security Awareness Training

Employee Security Awareness Training Employee Security Awareness Training September 2016 Purpose Employees have access to sensitive data through the work they perform for York. Examples of sensitive data include social security numbers, medical

More information

Frequently Asked Questions (FAQ)

Frequently Asked Questions (FAQ) Your personal information and account security is important to us. This product employs a Secure Sign On process that includes layers of protection at time of product log in to mitigate risk, and thwart

More information

Security Awareness. Presented by OSU Institute of Technology

Security Awareness. Presented by OSU Institute of Technology Security Awareness Presented by OSU Institute of Technology Information Technologies Division Security Awareness Topics Social Engineering Phishing Social Networks Displaying Sensitive Information Wireless

More information

Using the MyKidsSpending website

Using the MyKidsSpending website Using the MyKidsSpending website Use these links to jump to the portion of the guide discussing that topic: Creating your MyKidsSpending account, or adding more students Logging in to your account I can

More information

You will discuss topics related to ethical hacking, information risks, and security techniques which hackers will seek to circumvent.

You will discuss topics related to ethical hacking, information risks, and security techniques which hackers will seek to circumvent. IDPS Effectiveness and Primary Takeaways You will discuss topics related to ethical hacking, information risks, and security techniques which hackers will seek to circumvent. IDPS Effectiveness and Primary

More information

OIT Services and Responsibilities

OIT Services and Responsibilities The (OIT) would like to take this opportunity to welcome you and provide you with information you may find useful as you begin employment with Weld County School District 6. You ll find within this document

More information

Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it?

Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it? LESSON PLAN Scams and Schemes Essential Question What is identity theft, and how can you protect yourself from it? Lesson Overview Students learn strategies for guarding against identity theft and scams

More information

Would you fall for the latest ingenious bank scam?

Would you fall for the latest ingenious bank scam? Would you fall for the latest ingenious bank scam? Mark Winterton and Jana Parkin suspected the Lloyds letter was fake when it arrived at their office but said they were 'very impressed' with the quality

More information

5LINX ID GUARD Product Overview. Credit/Presenter Goes Here

5LINX ID GUARD Product Overview. Credit/Presenter Goes Here 5LINX ID GUARD Product Overview Credit/Presenter Goes Here Statistics According to the FTC approximately 11 million people were victims of identity theft in 2009. It s estimated that $221 billion a year

More information

Train employees to avoid inadvertent cyber security breaches

Train employees to avoid inadvertent cyber security breaches Train employees to avoid inadvertent cyber security breaches TRAIN EMPLOYEES TO AVOID INADVERTENT CYBER SECURITY BREACHES PAGE 2 How much do you know about cyber security? Small business owners often lack

More information

Ole Miss

Ole Miss Technology @ Ole Miss ORIENTATION SPRING 2016 SUBTITLE WOULD GO HERE Online version available at: olemiss.edu/tech Official Ole Miss Mobile App Now available for ipad, iphone, Kindle Fire and Android devices.

More information

Taking control of your finances... 5 Use these tips to manage your finances

Taking control of your finances... 5 Use these tips to manage your finances In focus Index In focus... 2 Safeguard your NRI account Taking control of your finances... 5 Use these tips to manage your finances NRI Expert speak... 6 Mr. S. Shanbhag - Financial Expert, answers queries

More information

CallPilot Multimedia Messaging

CallPilot Multimedia Messaging CallPilot Multimedia Messaging User Guide Release 1.0 Standard 1.0 December 1998 P0886140 ii Welcome to CallPilot Multimedia Messaging CallPilot Multimedia Messaging from Nortel Networks is an advanced

More information

41% Opens. 73% Clicks. 35% Submits Sent

41% Opens. 73% Clicks. 35% Submits Sent Phishing Awareness Attackers engage with you through your email inbox, and unless you pay close attention, you can become a victim to their masquerade. What tactic are these attackers using? It is called

More information

utrgv.edu/it IT Services GETTING UTRGV

utrgv.edu/it IT Services GETTING UTRGV IT Services GETTING CONNECTED @ UTRGV IT Service Desk www.youtube.com- @utrgvit Welcome to UTRGV video IT Service Desk Need Help? Request help or report an incident IT Service Desk Edinburg / McAllen /

More information

Adding Newly Enrolled Students. Solomon Training for Teachers PROCESSES AND PROCEDURES 9/26/2016. Revised September 2016

Adding Newly Enrolled Students. Solomon Training for Teachers PROCESSES AND PROCEDURES 9/26/2016. Revised September 2016 Solomon Training for Teachers Revised September 2016 1 Solomon for the 2016-2017 School Year PROCESSES AND PROCEDURES 2 Adding Newly Enrolled Students If students need to be added to the timecard, please

More information

Identity Theft, Fraud & You. PrePare. Protect. Prevent.

Identity Theft, Fraud & You. PrePare. Protect. Prevent. PrePare. Protect. Prevent. Identity Theft, Fraud & You Fraud and identity theft incidents claimed fewer victims in 2010 than in previous years. But don t get too comfortable. Average out-of-pocket consumer

More information

UNI. CatID. Using your. for Continuing and Distance Education students. Table of contents

UNI. CatID. Using your. for Continuing and Distance Education students. Table of contents Using your UNI CatID for Distance Education students Table of contents Using this CatID Guide................... CatID username/passphrase............. elearning............................... UNI email...............................

More information

Phishing Activity Trends Report October, 2004

Phishing Activity Trends Report October, 2004 Phishing Activity Trends Report October, 2004 Phishing is a form of online identity theft that uses spoofed emails designed to lure recipients to fraudulent websites which attempt to trick them into divulging

More information

CLICK TO EDIT MASTER TITLE STYLE Fraud Overview and Mitigation Strategies

CLICK TO EDIT MASTER TITLE STYLE Fraud Overview and Mitigation Strategies Fraud Overview and Mitigation Strategies SUNTRUST TEAM: DOUG HICKMAN SENIOR VICE PRESIDENT FOUNDATIONS AND ENDOWMENTS SPECIALTY PRACTICE JAMES BERNAL ASSISTANT VICE PRESIDENT FOUNDATIONS AND ENDOWMENTS

More information

Us bank phishing letter. Us bank phishing letter

Us bank phishing letter. Us bank phishing letter Paieška Paieška Paieška Us bank phishing letter Us bank phishing letter > > Bank fraud is the use of potentially illegal means to obtain money, assets, or other property... "bank guarantees and standby

More information

UNO IT NEWSLETTER. University of New Orleans Information Technology

UNO IT NEWSLETTER. University of New Orleans Information Technology UNO IT NEWSLETTER University of New Orleans Information Technology Spring 2017 Year 2, Issue 1 Inside this issue Service Satisfaction Survey...1-2 Cybersecurity... 3-4 Academic Computing...5-6 Service

More information

CIS 101 Orientation Document Fall 2017

CIS 101 Orientation Document Fall 2017 CIS 101 Orientation Document Fall 2017 Fall 2017 ONLINE section 23989 To be successful in an online section you must be motivated, disciplined, and able to read and understand the material in the books

More information

PBX Fraud Information

PBX Fraud Information PBX Fraud Information Increasingly, hackers are gaining access to corporate phone and/or voice mail systems. These individuals place long distance and international calls through major telecom networks

More information

It pays to stop and think

It pays to stop and think It pays to stop and think Protect yourself from financial fraud Together we thrive 2 In the first six months of 2018, over 34,000 people were scammed out of 145.4m At HSBC, we work hard to keep our customers

More information

Lincoln University OIT Monthly Activity Summary. June Action Items

Lincoln University OIT Monthly Activity Summary. June Action Items Lincoln University OIT Monthly Activity Summary Prepared by: Joel Sovanski, OIT Technical Director June 211 Action Items Name Date Description Value Statement Telecom Services 6/2 Purchasing and OIT worked

More information

Substitute Bulletin WELCOME BACK ONLINE SUBSTITUTE PAGE

Substitute Bulletin WELCOME BACK ONLINE SUBSTITUTE PAGE August 2016 Volume 1, Issue 1 Substitute Bulletin WELCOME BACK We are excited to welcome each of you back for the 2016-2017 school year!! This is the first issue of the newsletter that will be published

More information

ITU WSIS THEMATIC MEETING ON CYBERSECURITY, GENEVA, SWITZERLAND, 28 JUNE -1 JULY PAPER ON THE STATE OF CYBERSECURITY IN UGANDA.

ITU WSIS THEMATIC MEETING ON CYBERSECURITY, GENEVA, SWITZERLAND, 28 JUNE -1 JULY PAPER ON THE STATE OF CYBERSECURITY IN UGANDA. ITU WSIS THEMATIC MEETING ON CYBERSECURITY, GENEVA, SWITZERLAND, 28 JUNE -1 JULY 2005. PAPER ON THE STATE OF CYBERSECURITY IN UGANDA. BY : UGANDA COMMUNICATIONS COMMISSION 1.0: Background Uganda, like

More information

How to Build a Culture of Security

How to Build a Culture of Security How to Build a Culture of Security March 2016 Table of Contents You are the target... 3 Social Engineering & Phishing and Spear-Phishing... 4 Browsing the Internet & Social Networking... 5 Bringing Your

More information

Duplication and/or selling of the i-safe copyrighted materials, or any other form of unauthorized use of this material, is against the law.

Duplication and/or selling of the i-safe copyrighted materials, or any other form of unauthorized use of this material, is against the law. Thank you for your interest in e-safety, and for teaching safe and responsible Internet use to your students. Educators are invited to access and download i-safe curriculum AT NO CHARGE under the following

More information

Online Security and Safety Protect Your Computer - and Yourself!

Online Security and Safety Protect Your Computer - and Yourself! Online Security and Safety Protect Your Computer - and Yourself! www.scscu.com Fraud comes in many shapes and sizes, but the outcome is simple: the loss of both money and time. That s why protecting your

More information

FOUNDATIONS OF INFORMATION SYSTEMS MIS 2749 COURSE SYLLABUS Fall, Course Title and Description

FOUNDATIONS OF INFORMATION SYSTEMS MIS 2749 COURSE SYLLABUS Fall, Course Title and Description FOUNDATIONS OF INFORMATION SYSTEMS MIS 2749 COURSE SYLLABUS Fall, 2013 Instructor s Name: Vicki Robertson E-mail: vrobrtsn@memphis.edu Course Title and Description Foundations of Information Systems. (3

More information

University of North Texas System Administration Identity Theft Prevention Program

University of North Texas System Administration Identity Theft Prevention Program University of North Texas System Administration Identity Theft Prevention Program I. Purpose of the Identity Theft Prevention Program The Federal Trade Commission ( FTC ) requires certain entities, including

More information

Phishing: When is the Enemy

Phishing: When  is the Enemy Phishing: When E-mail is the Enemy Phishing, once only a consumer worry, is creating headaches for e-mail administrators as businesses become the next target. CONTENTS Understanding the Enemy 2 Three Things

More information

3.5 SECURITY. How can you reduce the risk of getting a virus?

3.5 SECURITY. How can you reduce the risk of getting a virus? 3.5 SECURITY 3.5.4 MALWARE WHAT IS MALWARE? Malware, short for malicious software, is any software used to disrupt the computer s operation, gather sensitive information without your knowledge, or gain

More information

Frauds & Scams. Why is the Internet so attractive to scam artists? 2006 Internet Fraud Trends. Fake Checks. Nigerian Scam

Frauds & Scams. Why is the Internet so attractive to scam artists? 2006 Internet Fraud Trends. Fake Checks. Nigerian Scam Frauds & Scams Why is the Internet so attractive to scam artists? Anonymity Low cost Rapid growth Easy to adapt Be Cyber Savvy with C-SAFE 118 2006 Internet Fraud Trends Average Loss Online Auctions 34%

More information

Welcome to Cogeco Home Phone. Extended Home Phone User Guide

Welcome to Cogeco Home Phone. Extended Home Phone User Guide Welcome to Cogeco Home Phone Extended Home Phone User Guide Thank you for choosing Cogeco Home Phone. We re looking forward to providing you with superior phone service for your home. By choosing Cogeco,

More information

IT Support Center. Get the most up to date information about technology at IUP at the IT Support Center website:

IT Support Center. Get the most up to date information about technology at IUP at the IT Support Center website: Technology at IUP IT Support Center Get the most up to date information about technology at IUP at the IT Support Center website: http://www.iup.edu/itsupportcenter Log support calls online at through

More information

Maria Hishikawa MSIX Technical Lead Sarah Storms MSIX Contractor Security

Maria Hishikawa MSIX Technical Lead Sarah Storms MSIX Contractor Security Migrant Student Information Exchange (MSIX) Security, Privacy and Account Management Webinar Deloitte Consulting LLP. February 22, 2018 Maria Hishikawa MSIX Technical Lead Sarah Storms MSIX Contractor

More information

Security & Phishing

Security & Phishing Email Security & Phishing Best Practices In Cybersecurity Presenters Bill Shieh Guest Speaker Staff Engineer Information Security Ellie Mae Supervisory Special Agent Cyber Crime FBI 2 What Is Phishing?

More information

IT EQUIPMENT POLICY REPLACEMENT CYCLE

IT EQUIPMENT POLICY REPLACEMENT CYCLE IT EQUIPMENT POLICY REPLACEMENT CYCLE It is an objective of the Hibbing Community College (HCC) Information Technology department to regularly replace aging computer equipment with more modern items as

More information

READ ME. UITS UAEU

READ ME. UITS UAEU READ ME UITS Services @ UAEU Welcome new employee! On behalf of myself and UITS, I would like to welcome you to United Arab Emirates University and wish you every success here. The University Information

More information

Telephone Answering: The system answers the telephone for you when you are either on the phone or away from your desk.

Telephone Answering: The system answers the telephone for you when you are either on the phone or away from your desk. Voicemail Manual Last updated: July 31, 2007 There are two parts to this service: Telephone Answering: The system answers the telephone for you when you are either on the phone or away from your desk.

More information

How to recognize phishing s

How to recognize phishing  s Phishing email messages, websites, and phone calls are designed to steal money, steal data and/or destroy information. Cybercriminals can do this by installing malicious software on your computer or stealing

More information

Netiquette. IT Engineering II. IT Engineering II Instructor: Ali B. Hashemi

Netiquette. IT Engineering II. IT Engineering II Instructor: Ali B. Hashemi Netiquette IT Engineering II IT Engineering II Instructor: Ali B. Hashemi 1 1 Netiquette "Netiquette" is network etiquette, the do's and don'ts of online communication. Netiquette covers both common courtesy

More information

Preventing Tax Preparer Data Theft

Preventing Tax Preparer Data Theft Preventing Tax Preparer Data Theft Ley Mills Senior Stakeholder Liaison 32 Cost of Data Theft Example: Connecticut tax preparer with 800 clients; mostly individual with some business tax returns. $250,000

More information

DoD Spear-Phishing Awareness Training. Joint Task Force - Global Network Operations

DoD Spear-Phishing Awareness Training. Joint Task Force - Global Network Operations //FOUO DoD Spear-Phishing Awareness Training Joint Task Force - Global Network Operations Updated: 16 NOV 2006 //FOUO Objective Inform and increase the awareness of all Department of Defense personnel

More information

TABLE OF CONTENTS. Hello!

TABLE OF CONTENTS. Hello! Hello! As you prepare to begin your first year at Delaware Valley University there are people and services ready to help you be successful. The following pages provide an overview of information that while

More information

How To Remove Personal Antivirus Security Pro Virus Windows 8

How To Remove Personal Antivirus Security Pro Virus Windows 8 How To Remove Personal Antivirus Security Pro Virus Windows 8 When hackers break into government servers to steal your personal data, there's As for just relying on the antivirus built into Windows 8.x,

More information

Main area: Security Additional areas: Digital Access, Information Literacy, Privacy and Reputation

Main area: Security Additional areas: Digital Access, Information Literacy, Privacy and Reputation Public Wi Fi Created: March 2016 Last Updated: July 2018 Estimated time: Group or individual activity: Ages: 60 minutes [10 minutes] Activity #1 [15 minutes] Activity #2 [10 minutes] Activity #3 [10 minutes]

More information

Computer Science Technology Department

Computer Science Technology Department Computer Science Technology Department Houston Community College Department Phone Number: ab Houston Community College ITMT 1370 Windows Client Operating System - Windows 10 Course Syllabus Summer 2017

More information

vsuite Home Phone Feature Reference

vsuite Home Phone Feature Reference vsuite Home Phone Feature Reference Below is a list of features that are included with you new vsuite telephone service. Should you have any questions or problems with a feature please feel free to contact

More information

lyndaclassroom Getting Started Guide

lyndaclassroom Getting Started Guide lyndaclassroom Getting Started Guide This document explains Why lyndaclassroom might be right for you and your students How to register as an approved educator with lynda.com How to set up and submit your

More information

Intern Handbook City of Grand Forks Internship Program

Intern Handbook City of Grand Forks Internship Program Intern Handbook City of Grand Forks Internship Program Table of Contents Grand Forks Internship Program Policies 2 Dress Code 2 Work Hours 2 Attendance 2 Reporting Late & Leaving Early 2 Holidays 3 Pay

More information