. Account & Google Message Center Guide. January Prepared by: Angela Mars IT Education and Training
|
|
- Ashley Mitchell
- 5 years ago
- Views:
Transcription
1 Account & Google Message Center Guide January 2019 Prepared by: Angela Mars IT Education and Training
2 Table Of Contents Account Information Page 4 Safe Practices Page 5 Recommended Etiquette Page 6 Strong Passwords Page 7 Password Tactics Page 8 2
3 Table Of Contents Outlook Web Access Page 9 Google Apps Message Center Logging In Page 11 Google Apps Message Center Spam Folder Page 15 Google Apps Message Center Delivered Messages Folder Page 16 Google Apps Message Center Adding Contacts Page 17 3
4 Account Information Acquiring Accounts To acquire an account, the director or dean of your division must send an request with the following information to the IT Help Desk, at Employee s name Employee s start date Position title Department Building and room number Phone number Supervisor s name 4
5 Safe Practices Safe Habits Do not open messages or attachments from senders you do not know. If you are unsure about a message, contact the IT Help Desk at extension If the sender or the subject line looks suspicious, contact the sender before opening the message or attachment. Turn off your preview/reading pane. This can be done from your Menu Bar, under View. Some viruses can be activated by simply opening an infected message. Check IT Service Alert s for information on current security risks. 5
6 Recommended Etiquette Electronic Correspondence for the Workplace Be professional and courteous. Keep messages short and to the point. Use a relevant subject/title for all messages. Do not use distracting, oversized, or unprofessional backgrounds, signatures, colored fonts, or quotes. Do not type using all capital letters. This is considered SHOUTING and is impolite. Respond to messages as promptly as possible. Get permission from the sender before forwarding messages. 6
7 Strong Passwords How to Create Strong Passwords Good passwords are long. A good password needs to be at least eight characters long. The longer a password is, the harder it is to crack! Good passwords are complex. Use upper and lower case characters. Use numbers. Use special characters such #, _, $, or *. (Preferably, not just one at the end of your password.) Change your password regularly. At a minimum, passwords should be changed every forty-five days. Choose a password you can remember. Choose a phrase that you can remember. Then, substitute characters in the phrase. For example, I love working at CTC could be turned into i<3w@c_t_c! 7
8 Password Tactics Password Tactics to Avoid Do not write your password down. Notepads and sticky-notes can be easily taken, thrown away, or lost. Do not share your password with anyone. If you think someone may know your password, change it immediately. Do not use personal information to create a password. Passwords should not include information that can be easily guessed if someone knows you. Do not use words that can be found in a dictionary. Some password cracking programs contain dictionary files that can recognize permutations, such as password1. Do not choose the same password for everything. If a hacker guesses your password, they could have access to your online bank accounts, accounts, etc. 8
9 Outlook Web Access Accessing Your CTC Account 1. Open an internet browser. 2. Go to 3. Click on Logins link. 4. Click on the Outlook Web Access link. 5. Sign in using your CTC login and password (e.g., 9
10 Outlook Web Access Accessing Your CTC Account, (cont.) 6. Click on the Sign In link. 10
11 Google Apps Message Center Logging In 1. To access your Google Apps Message Center, click A welcome message will appear if this is your first visit. Click the I accept... button when you are ready to continue. 11
12 Google Apps Message Center Logging In, (cont.) 2. Sign in using the short version of your CTC address (i.e., your first initial and last name: and password. If you cannot remember your password or were never issued one, call or the IT Help Desk at extension (Continue to page 14 if you do not need IT Help Desk assistance.) 12
13 Google Apps Message Center Logging In, (cont.) 3. After the IT Help Desk has reset your password, you will receive an from Google that contains a temporary password. After signing in with this password, you will be asked to make a new password for yourself. Type in your new password twice and click the Change password button. 13
14 Google Apps Message Center Logging In, (cont.) 4. You will be given the option to enter your phone number as an additional security measure. This process is optional and can be skipped altogether. Select to either enter your number or click the Skip button. 14
15 Google Apps Message Center Spam Folder This is the folder you will automatically enter after signing into the Message Center. If you are missing mail that was sent to you, it may be stored in this folder. Click the checkbox next to the message you want to mark as safe and click the Not spam (deliver) button. 15
16 Google Apps Message Center Delivered Messages Folder Selecting Delivered from the top-left (under Message Center ) will take you to the Delivered messages folder. This is where potential spam messages are held. To mark messages as spam, select the message via checkbox and click the Report spam button. 16
17 Google Apps Message Center Adding Contacts 1. Click the Settings cog in the top-right corner of the Message Center and select Settings from the drop-down list. 2. Click the Add approved contacts link. 17
18 Google Apps Message Center Adding Contacts, (cont.) 3. Click the Add button. 4. Enter your contact s information into the Add a new contact window that appears. From there, you can add another contact or click Add when you are finished. 18
19 Q&A? Educational Requests: Contact Angela Mars Technical Questions: Contact the IT Help Desk
2 User Guide. Contents
E-mail User Guide 2 E-mail User Guide Contents Logging in to your web mail... 3 Changing your password... 5 Editing your signature... 6 Adding an e-mail account to Outlook 2010/2013/2016... 7 Adding an
More informationOverview. Your Postini Username and Password. Recovering Your Postini Password
Postini User Guide Overview... 2 Your Postini Username and Password... 2 Recovering Your Postini Password... 2 Logging Into Postini... 6 Viewing Quarantine... 9 Delivering Messages... 9 Accessing Your
More informationLOGGING IN AND OUT OF YOUR ACCOUNT
WELCOME TO EMAIL Email is one of the most important methods of communication in the world today. Not only does it allow you to contact one or more people almost instantly, but it also acts as your online
More informationRegistering as a parent
Powered by My Learning Registering as a parent 1 Table of Contents Registering using your browser (PC/tablet/mobile)... 2 What to do if you haven t received your activation code.... 4 What to do if you
More informationOffice365 End User Training & Self-Service Migration Manual Simplified
Office365 End User Training & Self-Service Migration Manual Simplified Version 1.0 University Systems and Security 5/25/2016 1 P a g e Table of Contents 2 P a g e Table of Contents Introduction to Office365...
More informationStudent Portal. A guide for students. Department of Education and Training, Western Australia,
Student Portal A guide for students Department of Education and Training, Western Australia, 2009 1 Table of Contents What is the Portal?...3 What will I need to access the portal?...3 Safety and responsibility
More informationIntroduction to
Introduction to Email Overview 1. What is Email?... 2 2. Creating an Email Account... 3 3. Managing Messages... 8 4. Sending and Replying to Emails... 9 5. Signing Out... 15 519-579-3800 * ConnectKW@waterlooregion.org
More informationHow do I use ProofPoint anti-spam software at the GC
How do I use ProofPoint anti-spam software at the GC This FAQ contains: ProofPoint Login instructions Introduction to ProofPoint web interface component Views available in Proofpoint ProofPoint Web Interface
More informationAccounts and Passwords
Accounts and Passwords Hello, I m Kate and we re here to learn how to set up an account on a website. Many websites allow you to create a personal account. Your account will have its own username and password.
More informationYour message is sent from your computer to a server (like the post office) where the
E-mail it s convenient, cheap and easy. Today, it is the most rapidly growing means of communication. All e-mail programs are slightly different. Gmail, Hotmail, and Yahoo! are some popular e-mail programs.
More informationTraining registration and user guide for the Alameda County Training & Education Center
Training registration and user guide for the Alameda County Training & Education Center Thank you for your interest in our learning offerings at the Alameda County Training & Education Center. Self-registration
More informationResource Account Instructions
Resource Account Instructions Contents: click to skip to a section Managing a Resource Email Account in Outlook Overview of Resource Accounts for Owners... 2 Email Retention and Archives... 2 Accessing
More information(electronic mail) is the exchange of computer-stored messages by telecommunication.
What is email? E-mail (electronic mail) is the exchange of computer-stored messages by telecommunication. E-mail is one of the protocols included with the Transport Control Protocol/Internet Protocol (TCP/IP)
More informationWorkshop. Part 1: Creating your account. 1) In the top search bar, type in gmail.com 2) Click on create account
Email Workshop Purpose: The purpose of this class is to guide you through creating your own email account, and introduce you to the basic functions of your account. This packet will assist you with the
More informationMember Guide for Home Banking
Member Guide for Home Banking Table of Contents Enrollment... pg. 2 Login... pg.13 Navigating the Home Page... pg.14 Accounts Page... pg.15 Transfers... pg.16 Services Available... pg.17 Mail... pg.18
More informationKSI/KAI Cyber Security Policy / Procedures For Registered Reps
KSI/KAI Cyber Security Policy / Procedures For Registered Reps Password Protection 1) All electronic devices used in any way for KSI/KAI business must be password protected. 2) Passwords, where applicable,
More informationAustin Community College Google Apps Groups Step-by-Step Guide
The topics that will be covered in this workshop: Three Options (p.2) Creating a Group (p.3) Ø Option #1 (p.3) i. Access Levels (p. 4) ii. Add Members (p. 5) Ø Option #2 (p.6) Groups (p.7) Search (p.7)
More informationSecurity Awareness Training June 2016
Security Awareness Training June 2016 What is Information Security Awareness? The University of North Carolina at Chapel Hill protects its data network from thousands of daily intrusion attempts, but technical
More informationSecurity Awareness & Best Practices Best Practices for Maintaining Data Security in Your Business Environment
Security Awareness & Best Practices Best Practices for Maintaining Data Security in Your Business Environment Ray Colado, Information Security Analyst Raise awareness around information security to help
More informationLife After Webmail Reference Guide
Life After Webmail Reference Guide (An Introduction to Outlook Web Access 2007 Client User Interface) https://owa.wiu.k12.pa.us Westmoreland Intermediate Unit Information Technology Services 102 Equity
More informationUsing the City of Stamford / Stamford Public Schools. Web System
Using the City of Stamford / Stamford Public Schools Web Email System Open the Login Screen: Go to the following site: www.stamfordct.gov/mail and choose the login link. The login screen will look like
More informationOffice 365 Features. Click the links below for an online overview:
Office 365 Features http://www.jeffersonstate.edu/resources-for-instructors-de/ The Microsoft Office 365 Outlook Web App (OWA) allows users to access their mailbox using a web browser from any computer
More informationOutlook 2007 Web Access User Guide
Outlook 2007 Web Access User Guide Table of Contents Page i TABLE OF CONTENTS OUTLOOK 2007 MAIL... 1 Launch Outlook Web Access... 1 Screen Elements... 2 Inbox... 3 Read Mail... 3 Delete a Message... 3
More informationCyber Security Guide. For Politicians and Political Parties
Cyber Security Guide For Politicians and Political Parties Indian Election Integrity Initiative Design by ccm.design Cover Image by Paul Dufour Helping to Safeguard the Integrity of the Electoral Process
More informationWelcome to Facebook. Presented by Suzi Huisman
Welcome to Facebook Presented by Suzi Huisman PRESENTATION GUIDELINES No cell phones, please turn the sound off. Questions at the end, but at the presenter s discretion. See hhiccbb.org for link to slides
More informationOffice 365. Exporting and Importing Safe and Blocked Senders List
Office 365 Exporting and Importing Safe and Blocked Senders List Table of Contents Exporting Safe and Blocked Senders List... 3 Exporting Safe Senders List... 3 Exporting Blocked Senders List... 8 Importing
More informationUsing Outlook Live
EMAIL Using Outlook Live Contents: What is?... 3 Using... 3 Address... 3 Password... 3 The Windows Live Hotmail Welcome Screen... 5 Online Notification Status... 6 Help... 6 Inbox... 7 The Mail Inbox Toolbar...
More informationWebClass USER GUIDE. July 2017 v3.1
WebClass USER GUIDE July 2017 v3.1 Webclass User Guide Contents Webclass User Guide Contents... 1 1. Overview of Webclass... 2 2. User Name and Password Emailed to You... 2 3. Webclass Address... 2 4.
More informationPowerSchool Parent Portal Directions
P a g e 1 PowerSchool Parent Portal Directions If you need to create a new account OR if you need to link additional students to your account, please follow the instructions below. If you already have
More informationComputer Foundation Skills. Internet Webmail
Computer Foundation Skills Internet Webmail Table of Contents Contents Webmail... 4 Gmail Create an account... 5 Gmail - Passwords... 6 Gmail - Inbox... 7 Gmail View message... 7 Gmail Compose mail...
More informationOffice 365: . Accessing and Logging In. Mail
Office 365: Email This class will introduce you to Office 365 and cover the email components found in Outlook on the Web. For more information about the Microsoft Outlook desktop client, register for a
More informationEmployee Security Awareness Training
Employee Security Awareness Training September 2016 Purpose Employees have access to sensitive data through the work they perform for York. Examples of sensitive data include social security numbers, medical
More informationWeb Access to with Office 365
Web Access to Email with Office 365 Web Access to email allows you to access your LSE mailbox from any computer or mobile device connected to the internet. Be aware, however, that Outlook 365 looks and
More informationGoogle 2 factor authentication User Guide
Google 2 factor authentication User Guide Description: Updated Date: This guide describes how to setup Two factor authentication for your Google account. March, 2018 Summary ITSC is pleased to launch Two
More informationCompany System Administrator (CSA) User Guide
BMO HARRIS ONLINE BANKING SM FOR SMALL BUSINESS Company System Administrator (CSA) User Guide Copyright 2011 BMO Harris Bank N.A. TABLE OF CONTENTS WELCOME... 1 Who should use this guide... 1 What it covers...
More informationHow to Build a Culture of Security
How to Build a Culture of Security March 2016 Table of Contents You are the target... 3 Social Engineering & Phishing and Spear-Phishing... 4 Browsing the Internet & Social Networking... 5 Bringing Your
More informationHGC SUPERHUB HOSTED EXCHANGE
HGC SUPERHUB HOSTED EXCHANGE EMAIL OUTLOOK WEB APP (OWA) 2010 USER GUIDE V2013.6 HGC Superhub Hosted Email OWA User Guide @ 2014 HGC. All right reserved. Table of Contents 1. Get Started... 4 1.1 Log into
More informationUsing web-based
Using web-based Email 1. When you want to send a letter to a friend you write it, put it in an envelope, stamp it and put it in the post box. From there the postman picks it up, takes it to a sorting office
More informationOffice365 End User Training & Self-Service Migration Manual
Office365 End User Training & Self-Service Migration Manual Version 1.0 University Systems and Security 5/25/2016 1 P a g e Table of Contents 2 P a g e Table of Contents Introduction to Office365... 4
More informationSecurity Enhancements Sage Pastel Accounting Version 14 Build
Security Enhancements Sage Pastel Accounting Version 14 Build 14.0.7 Information about Passwords The upgrade you are about to install includes important changes that will affect the way you access and
More informationEVERY NATION OUTLOOK WEB ACCESS (OWA) USER S GUIDE
EVERY NATION OUTLOOK WEB ACCESS (OWA) USER S GUIDE Exchange 2003 Version Revised September 2005 TABLE OF CONTENTS WHAT S NEW IN OWA 2003?...2 General...2 Inbox and Message Composition...2 Tasks...2 INTRODUCTION
More information1. What is my address? 2. Can I use Outlook Express or another program instead? 3. How do I
3. Email 3. Email 1. What is my email address? 2. Can I use Outlook Express or another email program instead? 3. How do I A. check email from work? B. check email from home? C. check for new messages?
More informationIn this class, we'll talk about some of the features and advantages of Gmail, and study the Gmail window.
Gmail is a free email service provided by Google. In many ways, Gmail is like any other email service: You can send and receive emails, block spam, create an address book, and perform other basic email
More informationCorporate Online. Introducing Corporate Online
Corporate Online. Introducing Corporate Online Effective as at April 2015 About this Guide About Corporate Online Westpac Corporate Online is an internet-based electronic platform, providing a single point
More informationCyber Hygiene Guide. Politicians and Political Parties
Cyber Hygiene Guide Politicians and Political Parties Canadian Election Integrity Initiative Design by ccm.design Cover Image by Songquan Deng Helping to Safeguard the Integrity of the Electoral Process
More informationOakland University Obtaining Your 1098-T Electronically
Accessing a student 1098-T is easy - simply go to tra.vangent.com, click on First Time Student and follow the instructions. 1. Open a web browser (such as Internet Explorer, Safari, Chrome, Firefox, etc.
More informationGuide to your Northumbria Student
Guide to your Northumbria Student Email The Student Email System at Northumbria provides 25GB of space for all students. How to access On Campus: Access email from the Start menu on the Student Desktop
More informationOutlook Basic Final Assignment Completed Examples
Outlook Basic Final Assignment Completed Examples Task 1 Create a Signature, Contact, and Contact Group Image 1 Signature created with your personalized information Image 2 New contact created for Jane
More informationCreate strong passwords
Create strong passwords Passwords are the first line of defense against break-ins to your online accounts and computer, tablet, or phone. Poorly chosen passwords can render your information vulnerable
More information1. Log in Forgot password? Change language Dashboard... 7
Table of contents 1. Log in... 2 2. Forgot password?... 3 3. Change language... 6 4. Dashboard... 7 Page 1 of 8 IndFak has been updated to make it possible to use the following recommended browsers: Internet
More informationBANKVIC APP FREQUENTLY ASKED QUESTIONS
BANKVIC APP FREQUENTLY ASKED QUESTIONS TABLE OF CONTENTS TABLE OF CONTENTS... 1 ABOUT THE BANKVIC APP... 2 GETTING STARTED... 3 SECURITY... 4 FEATURES & FUNCTIONALITY... 5 PAYMENTS & TRANSFERS... 6 CARD
More informationIntroduction to
Introduction to E-mail Ramsey County Library Maplewood Library 3025 Southlawn Drive Maplewood, MN 55109 651-704-2033 Mounds View Library 2576 County Hwy. 10 Mounds View, MN 55112 763-717-3272 New Brighton
More informationDEALING WITH COMMUNICATIONS. Renée Railsback Colorado LTAP Director
DEALING WITH EMAIL COMMUNICATIONS Renée Railsback Colorado LTAP Director cltap@colorado.edu Top 10 Email Dos & Don ts 1. Never Assume Your Activities are Not Being Monitored Remember - no email is private.
More informationSECTION 5 USING STUDENT
SECTION 5 USING STUDENT EMAIL 5. USING STUDENT EMAIL On enrolling at the University all students automatically have an email account created. Account creation depends on a student successfully enrolling
More informationPilot document v1 Jan Getting Started with Smart Fleet
Pilot document v1 Jan 2015 Getting Started with Smart Fleet Thank you for taking out RSA Smart Fleet. In the following guide we are going to show you how to get set up to allow you to make the most out
More informationAdding Attachments in the Microsoft Outlook Web App
University Information Technology Services Learning Technologies, Training & Audiovisual Outreach Adding Email Attachments in the Microsoft Outlook Web App Attaching OneDrive Files The following explains
More informationBasics. Setting up an Account. Inbox. Your inbox is your starting place when you open your . Your inbox contains all the s that have
Email Basics Welcome to Email Basics. Today we will be covering how to send an email, how to add attachments, how to reply or forward an email, and how to use the different folders in your email account.
More informationIntroduction to Office 365 and OneDrive
Introduction to Office 365 and OneDrive What is Office 365? Office 365 is a web-based service that provides anywhere-access to documents and Microsoft Office tools and applications such as Word, Excel,
More informationCMS 101. Webtop for Student Records. CMS Webtop for Student Records 1/29/2018. McGill - IT Training & Communications 1 AGENDA PART ONE
CMS 101 Webtop for Student Records AGENDA PART ONE Introduction What is Webtop? Access Webtop Webtop interface Search for documents View document Check Out Edit a document Annotate a PDF Check In a document
More information(1) Top Page. Before Using GCMS Plus. Chapter3. Top Page. Top Page is the initial screen displayed after you log in. My Menu
Chapter Before Using GCMS Plus Cautions for Smooth (1) is the initial screen displayed after you log in. My Menu The frequently-used screens can be registered as a My Menu item by each user. Create My
More informationWeb Cash Fraud Prevention Best Practices
Web Cash Fraud Prevention Best Practices Tips on what you can do to prevent Online fraud. This document provides best practices to avoid or reduce exposure to fraud. You can use it to educate your Web
More informationAdobe Security Survey
Adobe Security Survey October 2016 Edelman + Adobe INTRODUCTION Methodology Coinciding with National Cyber Security Awareness Month (NCSAM), Edelman Intelligence, on behalf of Adobe, conducted a nationally
More informationPORTAL REGISTRATION & ACCESS USER S AID
PORTAL REGISTRATION & ACCESS USER S AID These instructions will assist you registering for myrewadseveryday.com, changing your password, secret question or email address, and recovering your password and
More informationStaying Safe Online. My Best Internet Safety Tips. and the AgeWell Computer Education Center.
Staying Safe Online My Best Internet Safety Tips and the AgeWell Computer Education Center Welcome to our first Webinar of 2017! Agenda o How to use the Webinar Room o Upcoming CEC Classes o My tips for
More informationReview Ch. 3 Connecting to the World s Information. 2010, 2006 South-Western, Cengage Learning
Review Ch. 3 Connecting to the World s Information 2010, 2006 South-Western, Cengage Learning Networks Two linked computers is a network A network of computers located within a short distance is called
More informationGOOGLE APPS. GETTING STARTED Page 02 Prerequisites What You Will Learn. INTRODUCTION Page 03 What is Google? SETTING UP AN ACCOUNT Page 03 Gmail
GOOGLE APPS GETTING STARTED Page 02 Prerequisites What You Will Learn INTRODUCTION Page 03 What is Google? SETTING UP AN ACCOUNT Page 03 Gmail DRIVE Page 07 Uploading Files to Google Drive Sharing/Unsharing
More informationInformation Technology Services
Information Technology Services Quick Start Guide for Office 365 Outlook Web App Quick Start Guide Sections: Outlook Overview (Email)... 2 Mail Messages... 4 Create New Message... 4 Open or Save an E mail
More informationemeasures 2.0 USERS MANUAL
TABLE OF CONTENTS I Installation 1 A How to Install emeasures 2.0 1 B How to Open emeasures 2.0 1 II Going Online / Offline 2 A How to Login emeasures 2.0 2 B Password Guidelines 3 C How to Logoff emeasures
More informationThis handbook is designed to help you with all your Technology information.
Berryville School Technology Assistance Handbook 2017-18 It's more fun to compute...kraftwerk 1981 This handbook is designed to help you with all your Technology information. P. 2 - Setting up your Classroom
More informationContents. Signing In... 3 Answering Your Personal Security Question... 4 Forgetting Your Password... 4 Exploring the Learning Center Interface...
User Guide Contents Logging On... Signing In... Answering Your Personal Security Question... 4 Forgetting Your Password... 4 Exploring the Learning Center Interface... 5 Understanding Icons... 5 Understanding
More informationIntroduction to
Introduction to Email gcflearnfree.org/print/email101/introduction-to-email Introduction Do you ever feel like the only person who doesn't use email? You don't have to feel left out. If you're just getting
More informationSECURITY STORY WE NEVER SEE, TOUCH NOR HOLD YOUR DATA
SECURITY STORY WE NEVER SEE, TOUCH NOR HOLD YOUR DATA CTO Office www.digi.me another Engineering Briefing digi.me keeping your data secure at all times ALL YOUR DATA IN ONE PLACE TO SHARE WITH PEOPLE WHO
More informationConsumer Banking User Guide. Getting Started
Consumer Banking User Guide Getting Started Contents About the platform... 3 Installing the mobile banking app... 4 Opening mobile banking... 4 Accessing the online banking site... 4 Browser requirements...
More informationQuick recap on ing Security Recap on where to find things on Belvidere website & a look at the Belvidere Facebook page
Workshop #7 Email Security Previous workshops 1. Introduction 2. Smart phones & Tablets 3. All about WatsApp 4. More on WatsApp 5. Surfing the Internet 6. Emailing Quick recap on Emailing Email Security
More informationOUTLOOK WEB ACCESS (OWA) USER S GUIDE. Exchange 2003 Version - OWA Guide
OUTLOOK WEB ACCESS (OWA) USER S GUIDE Exchange 2003 Version - OWA Guide TABLE OF CONTENTS WHAT S NEW IN OWA 2003?...2 General...2 Inbox and Message Composition...2 Tasks...2 INTRODUCTION TO OWA...3 Web-Based
More informationUsing Outlook Web Access (OWA) for Employees
Using Outlook Web Access (OWA) for Employees Outlook Web Access (OWA) is started when you click the E-mail icon in mytri-cspace, or when you login directly at https://webmail.tri-c.edu. Below are some
More informationOffice 365 Faculty & Staff. Migration: June 26 th 30 th, 2017
Office 365 Faculty & Staff Migration: June 26 th 30 th, 2017 What is Office 365? Outlook Web App Office Online Skype for Business OneDrive What is Office 365? Outlook Web App Updates existing OWA No change
More informationNET 311 D INFORMATION SECURITY
1 NET 311 D INFORMATION SECURITY Networks and Communication Department TUTORIAL 6 :Securing Your Windows 8 System 4 Steps to secure your windows 8 system 2 1. Configure Windows 8 Settings. 2. Installing
More informationITConnect MAKING PHOTO PRINTS ONLINE. Choosing Safe Passwords. De-clutter Your Desktop. Reminders in Outlook. Technology made practical for home
ITConnect Technology made practical for home JUNE 2014 Choosing Safe Passwords Here s how to create a safe password. De-clutter Your Desktop Are you ready to restore order and clean up your desktop? Reminders
More informationTransUnion Direct Administrator Guide
TransUnion Direct Administrator Guide Administrator Guide Topics Welcome to TransUnion Direct... 2 Your Role and Responsibilities... 5 Getting Started... 6 Managing Users... 8 Managing a Company... 15
More informationSmarter Balanced Interim Assessment
Smarter Balanced Interim Assessment 2016-2017 Published September 6, 2016 Prepared by the American Institutes for Research Descriptions of the operation of the Assessment Viewing Application, Test Delivery
More informationGoogle Drive. Lesson Planet
Google Drive Lesson Planet 2014 www.lessonplanet.com Introduction Trying to stay up to speed with the latest technology can be exhausting. Luckily this book is here to help, taking you step by step through
More informationUsing the hierarchy... 4 Using Filter Groups... 7 Defining Filter Groups... 7 Example... 8 Linking Filter Groups Limiting functionality...
CONTENTS Software Required............................................................... 2 Setting up the Web Server........................................................ 2 Bells and Whistles Settings
More informationAuckland District SUPPORT SERVICES Board Policy Health Board (Section 7) Manual ELECTRONIC MAIL
Auckland District SUPPORT SERVICES Board Policy Health Board (Section 7) Manual Overview Purpose Electronic mail (email) is a business communication tool within ADHB and this policy outlines use of email
More informationBasics at Deerfield Public Library
Email Basics at Deerfield Public Library Class Outline: 1) How does Email work? 2) Understand the Anatomy of an Email Address 3) Tour the Features of your Inbox 4) Writing and Sending an email 5) Questions,
More informationClick to go to how to add a room reservation from: Outlook 365 (desktop) Outlook 2016 Outlook Web App. Reserve a room using Outlook 365 (desktop):
Click to go to how to add a room reservation from: Outlook 365 (desktop) Outlook 2016 Outlook Web App Reserve a room using Outlook 365 (desktop): Open your calendar in Outlook. Click on New Meeting. Select
More informationDirections for Students to Retrieve 1098-Ts Electronically
Directions for Students to Retrieve 1098-Ts Electronically Kutztown University has contracted with Vangent, Inc. a General Dynamics company, to process your 1098-T. As part of this service you have access
More informationBEST PRACTICES FOR PERSONAL Security
BEST PRACTICES FOR PERSONAL Email Security Sometimes it feels that the world of email and internet communication is fraught with dangers: malware, viruses, cyber attacks and so on. There are some simple
More informationAN INTRODUCTION TO OUTLOOK WEB ACCESS (OWA)
INFORMATION TECHNOLOGY SERVICES AN INTRODUCTION TO OUTLOOK WEB ACCESS (OWA) The Prince William County School Division does not discriminate in employment or in its educational programs and activities against
More informationQuick Start. for Users. Online Banking
Quick Start for Users Online Banking Table of Contents Getting Started... 1 Multifactor Authentication.... 2 Log In.... 3 Reset Your Password.... 4 Reset Your Security Question... 6 Change Your Phone Number....
More informationUSER MANUAL FOR SECURE E MAIL MICROSOFT OUTLOOK (2003)
YATANARPON TELEPORT COMPANY LTD., YATANARPON CERTIFICATION AUTHORITY USER MANUAL FOR SECURE E MAIL MICROSOFT OUTLOOK (2003) Yatanarpon Teleport Company Ltd., Hlaing Universities Campus, Hlaing Township,
More informationOctopus Online Service Safety Guide
Octopus Online Service Safety Guide This Octopus Online Service Safety Guide is to provide you with security tips and reminders that you should be aware of when using online and mobile services provided
More informationTHE LHH. For New Users. Using a webcam, you can record your responses to standard interview questions and assess your performance.
THE LHH THE LHH INTERVIEW Powered by Montage CENTER For New Users Using a webcam, you can record your responses to standard interview questions and assess your performance. Access 1. LOG IN to the Career
More informationCommonfund Client Reporting Portal
Commonfund Single Sign On Help Effective Tuesday, February 18, 2014, Commonfund has implemented a new, single sign-on login that provides enhanced security and flexibility in managing your login credentials.
More informationChoic Enterprise Administration Guide DigiPortal Software, Inc.
I Table of Contents Foreword 0 Part I Introduction 2 Part II ChoiceMail Administrative Login 2 Part III Accessing the administration section 3 Part IV ChoiceMail's Administrative Login Screen Part V The
More informationCloud Services. Spam Manager. Quarantine Admin Guide
Cloud Services Spam Manager Quarantine Admin Guide 10/23/2014 CONTENTS Introduction... 2 About Spam Quarantine Tasks... 2 Quarantine Deployment Tasks... 2 Before Activation of Spam Manager... 4 After Activation
More informationSouth Central Power Stop Scams
Don t get tricked. People around the country have been receiving emails and phone calls from scammers. South Central Power wants to help you keep your money and prevent scams. Review the helpful tips below.
More informationE-Postal Services 1. The E-Postal Service is used to targeted groups at NMU. It is NOT used to all students or employee groups.
E-Postal Services 1 The E-Postal Service is used to email targeted groups at NMU. It is NOT used to email all students or employee groups. CONTENTS OF THIS GUIDE Contact Information... 1 Who Can I Email
More informationUser Registration Guide for SciFinder Key Contacts
User Registration Guide for SciFinder Key Contacts COPYRIGHT 2013 AMERICAN CHEMICAL SOCIETY ALL RIGHTS RESERVED; PRINTED IN THE USA. Quoting or copying of material from this publication for educational
More informationInterim Registration
Interim Registration Students will need to do two things with Banner Web to register for an Interim project: Look at the descriptions of the projects and write down the project name and Course Reference
More information