How to Encrypt Files Containing Sensitive Data (using 7zip software or Microsoft password protection) How to Create Strong Passwords

Size: px
Start display at page:

Download "How to Encrypt Files Containing Sensitive Data (using 7zip software or Microsoft password protection) How to Create Strong Passwords"

Transcription

1 How to Encrypt Files Containing Sensitive Data (using 7zip software or Microsoft password protection) How to Create Strong Passwords School IT Systems Support Herts for Learning Ltd SROB220, Robertson House, Six Hills Way, Stevenage, Herts, SG1 2FQ Doc Ref S1218 V3 Published January 2014 School IT Systems Support (SITSS) Herts for Learning Ltd, 2014 Technical Support Centre Accredited by the Learning and Performance Institute (formerly, Institute of IT Training) RM Approved Support Partner Fully accredited by Capita SIMS for proven quality of SIMS support

2

3 CONTENTS FOREWORD... 1 DOWNLOADING THE SOFTWARE (7-ZIP)... 2 ENCRYPTING DOCUMENTS, FILES OR FOLDERS... 4 TO ACCESS THE FILE (DECRYPTION) z extension files... 6.zip extension files... 6 HOW TO SECURELY ENCRYPT A WORD OR EXCEL DOCUMENT (SIMILAR METHODS EXIST IN THE OTHER MS OFFICE PRODUCTS)... 8 Using Word Using Excel Using Word and Excel Using Word and Excel Removing Password Protection from a Word and Excel 2003 Document Removing Password Protection from a Word and Excel 2007 Document Removing Password Protection from a Word and Excel 2010 Document CREATE STRONG PASSWORDS PROTECT YOUR PASSWORDS FROM PRYING EYES TOP TIPS FOR INTERNET SAFETY AT WORK S1218 V3

4

5 School IT Systems Support Foreword Schools may choose to use any provider other than the HCC preferred supplier of Microsoft Outlook 365 ( ). However, it is vital that all files containing sensitive or personal data are encrypted or at least password protected (until your school has software encryption such as 7-zip) before transmitting electronically. This document offers a solution using 7-zip software and instructions on password protecting an Excel or Word document. It is recommended that such protocols are included in the school s ICT Acceptable Use Policy which should be issued to all users. For more information on Microsoft Outlook 365 please click on the following links. The following link discusses Data Security within Outlook FX aspx?CTT=1 BUT note that the transport of s to users is still vulnerable unless they use a specific secure method of accessing the . Each workstation that will be used for sending such s will require this software installation. Your technical support supplier may be able to deploy this software as a package to the relevant workstations. All SITSS managed schools will have 7-zip software installed on CC3 and CC4 machines. If you have any issues installing this software then contact your technical support provider. Call the Service Desk on Select Option 1 followed by Option 2 if you would like general help or advice regarding and internet connectivity or sitss.internet@lea.herts.sch.uk Doc Ref S1218 V3 1 of 18

6 School IT Systems Support Downloading the Software (7-zip) 1. Go to 2. Select the Download for any of the Windows version of the.msi ignore the blocker at this stage if it appears 3. A notification will appear at the bottom of the screen, click on Run 4. If the warning as below is displayed select Run (if no warning is displayed go to step 7) 5. The Setup box will then display, accept the location offered and click Install 6. The Welcome to 7-Zip dialogue will open 2 of 18 Doc Ref S1218 V3

7 School IT Systems Support 7. Click Next 8. Tick to accept the terms and click Next 9. Accept the default Custom Setup and click Next 10. Click Install 11. Click Finish to close the installation Doc Ref S1218 V3 3 of 18

8 School IT Systems Support Encrypting documents, Files or Folders 1. To encrypt your documents, files or folders run the 7Zip File Manager program from the Start, All Programs area 2. Select the location of the file that you wish to encrypt in the drop down box 3. Highlight the file and then select Add Browse Button Enter Password Encrypt file names The Add to Archive window will open and you will be offered a number of options. 4. Archive. This is where the encrypted document or folder will be saved. The default location is the same folder as the original document. You have the option to save to another folder by selecting the Browse button and browsing to the required folder 5. Archive Format. The default format is 7z but it is recommended that this is changed to zip format by using the dropdown option. Using the zip format means that the recipient of the will be able to use any standard zip software, including the Microsoft built-in zip compression, and therefore will have no need to install 7zip themselves 4 of 18 Doc Ref S1218 V3

9 School IT Systems Support Change to zip 6. Enter the password that you require which should be EIGHT characters, mixing numbers and letters. Re-enter the password. The recipient of the ed document will need to know this password in order for them to open it. They should be notified of the password in a separate communication for obvious reasons 7. You can select that the file name is also encrypted if you wish. It is recommended that the file name or the subject name of the does not contain information that could identify individuals 8. All the other defaults can be left as they are 9. Click OK 10. A file will then be created in the location that you chose. It will be the same name as the original file but with a.zip or.7z file extension 11. Open your program, attach the encrypted document to the and then send it to the intended recipient. Please note that the recipient must also have 7- Zip installed on the PC upon which the attachment is to be opened if you leave the file extension to be.7z If you have any issues installing this software then please contact your technical support provider. Doc Ref S1218 V3 5 of 18

10 School IT Systems Support To Access the File (decryption).7z extension files 1. To access the file Open the and Save the encrypted document to a folder, My Documents for example Extract Enter Password 2. Open 7Zip file manager, select the document and click Extract 3. Enter the password which should have been sent in a separate communication 4. By default the decrypted document will be extracted to the same folder as where the encrypted document was saved to, now access the file using the usual application ie Microsoft Word or Excel.zip extension files 1. Open the 2. Double click on the zipped attachment 3. You can chose to Open or Save the attachment first 4. When selecting to Open the file by double clicking, the follow dialogue box will open 6 of 18 Doc Ref S1218 V3

11 School IT Systems Support 5. Enter the password that has been sent to you in a separate 6. The opened file can then be saved to a location of your choice Doc Ref S1218 V3 7 of 18

12 School IT Systems Support How to Securely Encrypt a Word or Excel Document (similar methods exist in the other MS Office products) Using Word Create your document 2. When finished, choose the Save As option from the File menu 3. In the Save As dialogue box, choose Tools > Security Options 4. Enter the password that you require which should be EIGHT characters, mixing numbers and letters. The recipient of the ed document will need to know this password in order for them to open it. They should be notified of the password in a separate communication for obvious reasons 5. Select the Advanced Button 6. From the dropdown in the Encryption Type Box, choose RC 4 Microsoft RSA SChannel Cryptograhic Provider 7. Click Ok 8 of 18 Doc Ref S1218 V3

13 School IT Systems Support 8. Confirm your password remember that passwords cannot be recovered so ensure that you make a note of passwords and the corresponding documents 9. Click Ok and Save your document 10. Attach the document in the as required. Remember the subject of the should not identify individuals and the password should be sent to the recipient in a different communication Using Excel Create and finish your document 2. Select the File menu and choose the Save As option 3. In the Save As dialogue box, select Tools > General Options 4. The Save Options box will then open. Enter the password that you require which should be EIGHT characters, mixing numbers and letters. The recipient of the ed document will need to know this password in order for them to open it. They should be notified of the password in a separate communication for obvious reasons Doc Ref S1218 V3 9 of 18

14 School IT Systems Support 5. Click Advanced and in the dropdown on the Encryption Type box choose RC 4 Microsoft RSA SChannel Cryptograhic Provider 6. Click OK 7. Re-enter password - remember that passwords cannot be recovered so ensure that you make a note of passwords and the corresponding documents. Click Ok 8. Continue to Save the document to a location of your choice 9. Attach the document in the as required. Remember the subject of the should not identify individuals and the password should be sent to the recipient in a different communication. Using Word and Excel Click the Microsoft Office Button, point to Prepare 2. Select Encrypt Document 10 of 18 Doc Ref S1218 V3

15 School IT Systems Support 3. Enter the password that you require which should be EIGHT characters, mixing numbers and letters. The recipient of the ed document will need to know this password in order for them to open it. They should be notified of the password in a separate communication for obvious reasons 4. Click Ok 5. Re-enter the password to confirm and click OK 6. Continue saving your document to a location of your choice 7. Click No if presented with this message 8. Attach the document in the as required. Remember the subject of the should not identify individuals and the password should be sent to the recipient in a different communication Using Word and Excel Create and finish your document 2. Select the File menu and click on Protect Document drop-down 3. Click Encrypt with Password 4. Enter the required Password and re-enter when prompted The password that you enter should be EIGHT characters, mixing numbers and letters. The Doc Ref S1218 V3 11 of 18

16 School IT Systems Support recipient of the ed document will need to know this password in order for them to open it. They should be notified of the password in a separate communication for obvious reasons 5. Click OK 6. The document now shows that a password is required to open this document 7. Save or Save as as normal Removing Password Protection from a Word and Excel 2003 Document 1. Use the password to Open the document 2. Select the File menu and choose the Save As option 3. In the Save As dialogue box, select Tools > General Options 4. The Save Options box will then open, delete the passwords 12 of 18 Doc Ref S1218 V3

17 School IT Systems Support 5. Click Ok 6. Continue to Save your document to a location of your choice 7. The Save Options box will then open, delete the passwords 8. Continue to Save your document to a location of your choice Removing Password Protection from a Word and Excel 2007 Document 1. Use the password to open the document 2. Click the Microsoft Office Button, point to Prepare, and then click Encrypt Document 3. In the Encrypt Document dialog box, delete the encrypted password in the Password box, and then click OK 4. Save the file Removing Password Protection from a Word and Excel 2010 Document 1. Open the file using the password 2. Select the File menu and click on Protect Document drop-down Doc Ref S1218 V3 13 of 18

18 School IT Systems Support 3. Select Encrypt with Password 4. Remove the password from the Password field 5. Click OK 6. Save the file 14 of 18 Doc Ref S1218 V3

19 School IT Systems Support Create Strong Passwords Strong passwords are important protections to help you have safer online transactions. Keys to password strength: length and complexity An ideal password is long and has letters, punctuation, symbols, and numbers Whenever possible, use at least 14 characters or more The greater the variety of characters in your password, the better Use the entire keyboard, not just the letters and characters you use or see most often Create a strong password you can remember There are many ways to create a long, complex password. Here is one way that may make remembering it easier: What to do Suggestion Example Start with a sentence or two (about 10 words total). Think of something meaningful to you. Long and complex passwords are safest I know my security. Turn your sentences into a row of letters. Use the first letter of each word. lacpasikms (10 characters) Add complexity. Make only the letters in the first half of the alphabet uppercase. lacpasikms (10 characters) Add length with numbers. Put two numbers that are meaningful to you between the two sentences. lacpas56ikms (12 characters) Add length with punctuation. Put a punctuation mark at the beginning.?lacpas56ikms (13 characters) Add length with symbols. Put a symbol at the end.?lacpas56ikms" (14 characters) Doc Ref S1218 V3 15 of 18

20 School IT Systems Support Protect your passwords from prying eyes The easiest way to "remember" passwords is to write them down. It is okay to write passwords down, but keep them secure. It is critical that you remember your password. If you forget your password and you have used Microsoft software, Microsoft cannot retrieve it. Store the passwords that you write down in a secure place away from the information that they help protect. Use strong passwords that combine uppercase and lowercase letters, numbers, and symbols. Weak passwords don't mix these elements. Strong password: Y6dh!et5. Weak password: House27. Passwords should be 8 or more characters in length. A pass phrase that uses 14 or more characters is better. For more information, see Help protect your personal information with strong passwords Cyber criminals use sophisticated tools that can rapidly decipher passwords. Avoid creating passwords using: o Dictionary words in any language o Words spelled backwards, common misspellings, and abbreviations o Sequences or repeated characters. Examples: , , abcdefg, or adjacent letters on your keyboard (qwerty) o Personal information. Your name, birthday, driver's license, passport number, or similar information 16 of 18 Doc Ref S1218 V3

21 School IT Systems Support Top Tips for Internet Safety at Work 1. Defend your computer Keep all software current (including your Web browser) with automatic updates and install all security updates that your IT department recommends Use antivirus, antispam, and antispyware software and activate your firewall 2. Think before you share sensitive information Look for signs that a Web page is safe, before you enter sensitive personal or business data a Web address with https ( s for secure) and a closed padlock ( ) beside it Never give sensitive info in response to an or instant message (IM) request 3. Think before you click Pause before you open attachments or click links in or IM even if you know the sender; they could be phony. Confirm with the sender that the message is real or visit the official Web site by typing the address yourself Be wary of clicking links or buttons in pop-up windows 4. Use strong passwords Lock your online accounts, computer, phone, and other devices with passwords at least eight characters (longer is better), and include upper and lower case letters, numbers, and symbols Keep passwords and PINs secret. Don t disclose them to co-workers or businesses (like an Internet café operator), or be tricked into giving them away Don t use the same password everywhere 5. Protect yourself from scams Look out for alarmist messages, misspellings and grammatical errors, deals that sound too good to be true, requests for sensitive info like account numbers, and other signs of a scam Turn on a filter that warns you of suspicious Web sites 6. Protect your data on the go When you use public Wi-Fi, choose the most secure option, even if you have to pay for it. It could include password-protection and encryption Confirm the exact spelling of the wireless network you re connecting to Beware of clever (slightly misspelled) fakes Doc Ref S1218 V3 17 of 18

22 School IT Systems Support Encrypt the data on your laptop (or USB flash drive) in case you lose it or it is stolen using software such as Truecrypt. Instructions available on the Grid within the document network_manager_guidance_for_schools_on_data_security_may_2010.doc at Guard your laptop, smartphone, and PDA as carefully as your wallet For further information or guidance on esafety please visit the Grid at For further information or guidance on Data Security please visit the Grid at 18 of 18 Doc Ref S1218 V3

How to Encrypt Files Containing Sensitive Data (using 7zip software or Microsoft password protection) How to Create Strong Passwords

How to Encrypt Files Containing Sensitive Data (using 7zip software or Microsoft password protection) How to Create Strong Passwords How to Encrypt Files Containing Sensitive Data (using 7zip software or Microsoft password protection) How to Create Strong Passwords School IT Systems Support Standards and School Effectiveness Hertfordshire

More information

SIMS Discover Upgrade

SIMS Discover Upgrade SIMS Discover Upgrade For use with SIMS Autumn 2014 (version 7.160) School IT Systems Support Herts for Learning Ltd SROB220, Robertson House, Six Hills Way, Stevenage, Herts, SG1 2FQ Doc Ref Error! Unknown

More information

How to Download and Import DfE QWS QAN Catalogue and Performance Measures XML Files into SIMS

How to Download and Import DfE QWS QAN Catalogue and Performance Measures XML Files into SIMS How to Download and Import DfE QWS QAN Catalogue and Performance Measures XML Files into SIMS School IT Systems Support Herts for Learning Ltd SROB220, Robertson House, Six Hills Way, Stevenage, Herts,

More information

Discover Installation For use with SIMS Autumn 2014 (version 7.160)

Discover Installation For use with SIMS Autumn 2014 (version 7.160) Discover Installation For use with SIMS Autumn 2014 (version 7.160) Please check the Server & Workstation Requirements carefully before beginning! School IT Systems Support Herts for Learning Ltd SROB220,

More information

Create strong passwords

Create strong passwords Create strong passwords Passwords are the first line of defense against break-ins to your online accounts and computer, tablet, or phone. Poorly chosen passwords can render your information vulnerable

More information

Importing ATF Files into SIMS

Importing ATF Files into SIMS Importing ATF Files into SIMS Document Reference DMS004 Published/Updated May 2018 Fully accredited by Capita SIMS for proven quality of SIMS support Contact us via the ICT Service Desk at: 01438 844777

More information

Importing Pay Scales into Personnel 2016/2017

Importing Pay Scales into Personnel 2016/2017 Importing Pay Scales into Personnel 2016/2017 Please complete Document S1527 first if you HAVE APPLIED the Salary Pay Range Patch and are USING a Salary Pay Range for Teachers. School IT Systems Support

More information

General Maintenance Practices for SQL Servers (SIMS Servers and Office Masters)

General Maintenance Practices for SQL Servers (SIMS Servers and Office Masters) General Maintenance Practices for SQL Servers (SIMS Servers and Office Masters) ICT Services Herts for Learning Ltd SROB202, Robertson House, Six Hills Way, Stevenage, Herts, SG1 2FQ Doc Ref T051 Published

More information

Using your Employer Account

Using your Employer Account Effective November 1, 2013, EIT Benefit Funds ( Fund Office ) the monthly Employer Work Reports are no longer sent via mail to you and are only available to be printed directly from the EIT Benefit Funds'

More information

Pupil Premium in SIMS: Importing the Pupil Premium CSV File and Maintaining/Updating Pupil Premium

Pupil Premium in SIMS: Importing the Pupil Premium CSV File and Maintaining/Updating Pupil Premium Pupil Premium in SIMS: Importing the Pupil Premium CSV File and Maintaining/Updating Pupil Premium Document Reference DMS060 Published/Updated September 2018 Fully accredited by Capita SIMS for proven

More information

System Manager 7 Quick Guide (SIMS.net onwards)

System Manager 7 Quick Guide (SIMS.net onwards) System Manager 7 Quick Guide (SIMS.net 7.142 onwards) Published December 11 School IT Systems Support Hertfordshire Development Centre Six Hills Way Stevenage SG1 2FQ Website: http://www.thegrid.org.uk/info/traded/sitss

More information

USER MANUAL FOR SECURE E MAIL MICROSOFT OUTLOOK (2003)

USER MANUAL FOR SECURE E MAIL MICROSOFT OUTLOOK (2003) YATANARPON TELEPORT COMPANY LTD., YATANARPON CERTIFICATION AUTHORITY USER MANUAL FOR SECURE E MAIL MICROSOFT OUTLOOK (2003) Yatanarpon Teleport Company Ltd., Hlaing Universities Campus, Hlaing Township,

More information

Safety and Security. April 2015

Safety and Security. April 2015 Safety and Security April 2015 Protecting your smartphone and your data 2 Set a passcode on your smartphone For some smartphone models: 1. Go to Settings. 2. Tap ID & Passcode. 3. Set a 4-digit passcode.

More information

FAQ: Privacy, Security, and Data Protection at Libraries

FAQ: Privacy, Security, and Data Protection at Libraries FAQ: Privacy, Security, and Data Protection at Libraries This FAQ was developed out of workshops and meetings connected to the Digital Privacy and Data Literacy Project (DPDL) and Brooklyn Public Library

More information

Importing Pay Scales into Personnel 2018/2019

Importing Pay Scales into Personnel 2018/2019 Importing Pay Scales into Personnel 2018/2019 Document Reference DMS017 Published/Updated April 2018 Fully accredited by Capita SIMS for proven quality of SIMS support Contact us via the ICT Service Desk

More information

Signing up for My Lahey Chart

Signing up for My Lahey Chart Signing up for My Lahey Chart What is My Lahey Chart? My Lahey Chart is a helpful service that allows you to connect with your doctor and your health information online, anytime. Using your personal computer

More information

Table of Contents. User Guide

Table of Contents. User Guide Table of Contents Locate Laptop Laptop Tracking & Data Security 2 Feature: 2 Port Locker Stop Information & File Leaks 3 Feature 3 BitDefender Internet Security Secure Your Every Bit 3 Feature: 3 PROTEGENT

More information

*Updated for SIMS and above* How do I run a report? preview a report? delete a report?... 3

*Updated for SIMS and above* How do I run a report? preview a report? delete a report?... 3 *Updated for SIMS 7.153 and above* How do I......run a report?... 1...preview a report?... 2...delete a report?... 3...add a report to Favourites?... 3...download and import new reports?... 4...export

More information

Datasheet - Sitekit CMS Secure Forms

Datasheet - Sitekit CMS Secure Forms Datasheet - Sitekit CMS Secure Forms Registered Office Business Unit Role Document Type Document Author Document Checked by Sitekit Ltd Sitekit House Broom Place Portree Isle of Skye IV51 9HL Sitekit.Solutions

More information

EVERY NATION OUTLOOK WEB ACCESS (OWA) USER S GUIDE

EVERY NATION OUTLOOK WEB ACCESS (OWA) USER S GUIDE EVERY NATION OUTLOOK WEB ACCESS (OWA) USER S GUIDE Exchange 2003 Version Revised September 2005 TABLE OF CONTENTS WHAT S NEW IN OWA 2003?...2 General...2 Inbox and Message Composition...2 Tasks...2 INTRODUCTION

More information

BitLocker to Go: Encryption for personal USB

BitLocker to Go: Encryption for personal USB BitLocker to Go: Encryption for personal USB [Windows 10] Encryption is an effective method of protecting data stored on portable USB devices such as flash drives and external hard drives. Encryption encodes

More information

OUTLOOK WEB ACCESS UOW USER GUIDE INDEX

OUTLOOK WEB ACCESS UOW USER GUIDE INDEX OUTLOOK WEB ACCESS UOW USER GUIDE INDEX ACCESSING MAIL... 2 SETTING UP... 2 OPTIONS... 3 VIEWING... 4 ARRANGE MESSAGES... 4 CREATING/SENDING A NEW MESSAGE... 5 REPLYING TO MESSAGES... 5 FORWARDING MESSAGES...

More information

Returning KS1 Phonics Screening Check Data (Year 1 Checks & Year 2 Rechecks) 2018

Returning KS1 Phonics Screening Check Data (Year 1 Checks & Year 2 Rechecks) 2018 Returning KS1 Phonics Screening Check Data (Year 1 Checks & Year 2 Rechecks) 2018 The FINAL deadline for submission is 5pm on Monday 25 th June 2018 The pass mark threshold for this year will be released

More information

INTERNET SAFETY IS IMPORTANT

INTERNET SAFETY IS IMPORTANT INTERNET SAFETY IS IMPORTANT Internet safety is not just the ability to avoid dangerous websites, scams, or hacking. It s the idea that knowledge of how the internet works is just as important as being

More information

ATTACHMENTS, INSERTS, AND LINKS...

ATTACHMENTS, INSERTS, AND LINKS... Conventions used in this document: Keyboard keys that must be pressed will be shown as Enter or Ctrl. Objects to be clicked on with the mouse will be shown as Icon or. Cross Reference Links will be shown

More information

Enroll a New Student

Enroll a New Student The txsuite How To Guide Series Connect tx Web-based Access for Teachers, Parents, and Students How to: Enroll a New Student Developed by the T E XA S CO M P U T E R CO O P E R AT I V E Business and Student

More information

Quick recap on ing Security Recap on where to find things on Belvidere website & a look at the Belvidere Facebook page

Quick recap on  ing  Security Recap on where to find things on Belvidere website & a look at the Belvidere Facebook page Workshop #7 Email Security Previous workshops 1. Introduction 2. Smart phones & Tablets 3. All about WatsApp 4. More on WatsApp 5. Surfing the Internet 6. Emailing Quick recap on Emailing Email Security

More information

Returning Early Years Foundation Stage Profile 2018

Returning Early Years Foundation Stage Profile 2018 Returning Early Years Foundation Stage Profile 2018 Deadline for submission is 5pm on Monday 25 th June 2018 Document Reference DMS006 Published/Updated June 2018 Fully accredited by Capita SIMS for proven

More information

Your security on click Jobs

Your security on click Jobs Your security on click Jobs At Click Jobs is a trading name of Raspberry Recruitment Limited, we're committed to helping you find the right job in a safe and secure environment. On these pages, you can

More information

STEAM Clown Production. Passwords. STEAM Clown & Productions Copyright 2016 STEAM Clown. Page 1 - Cyber Security Class

STEAM Clown Production. Passwords. STEAM Clown & Productions Copyright 2016 STEAM Clown. Page 1 - Cyber Security Class Production Passwords Page 1 - Cyber Security Class Copyright 2016 Does It Matter? Is your email password the same as your Facebook password? Is that Good? Bad? Why? Page 2 - Cyber Security Class Copyright

More information

INTERNET SAFETY* GALEN GARRETSON RASCAL MARCH 2-3, * Sources include learnfree.org, PC World, wikpedia.com, techterms.com

INTERNET SAFETY* GALEN GARRETSON RASCAL MARCH 2-3, * Sources include learnfree.org, PC World, wikpedia.com, techterms.com INTERNET SAFETY* GALEN GARRETSON RASCAL MARCH 2-3, 2016 * Sources include learnfree.org, PC World, wikpedia.com, techterms.com SOME QUESTIONS TO ASK YOURSELF. HAVE YOU.. 1. Googled yourself to see what

More information

Secure Recipient Guide

Secure  Recipient Guide Secure Email Recipient Guide Contents How to open your first Encrypted Message.... 3 Step-by-Step Guide to Opening Your First Envelope... 3 Step One:... 3 Step Two:... 4 Step Three:... 4 Step Four:...

More information

VPN4ALL Mobile for Android 4.X Guide

VPN4ALL Mobile for Android 4.X Guide VPN4ALL Mobile for Android 4.X Guide How to setup VPN4ALL Mobile on your Android 4.X device - SmartPhone or Tablet - with an English language interface. In your Android 4.x device, go to 'Settings': Click

More information

Duo Travel Guide. duo.com

Duo Travel Guide. duo.com Duo Travel Guide duo.com Overview As a member of an organization protected by Duo, you already have secure access to applications and assets. This guide is designed to help you maintain that trusted access

More information

The Launch GDS can be updated via a wireless internet connection as well as by USB or cat5 cable.

The Launch GDS can be updated via a wireless internet connection as well as by USB or cat5 cable. LAUNCH Wifi Setup Procedure The Launch GDS can be updated via a wireless internet connection as well as by USB or cat5 cable. If you are in a wifi hotspot or have an open network available simply choose

More information

KSI/KAI Cyber Security Policy / Procedures For Registered Reps

KSI/KAI Cyber Security Policy / Procedures For Registered Reps KSI/KAI Cyber Security Policy / Procedures For Registered Reps Password Protection 1) All electronic devices used in any way for KSI/KAI business must be password protected. 2) Passwords, where applicable,

More information

Identity Finder: Managing Your Results

Identity Finder: Managing Your Results Updated 1/30/2012 Identity Finder: Managing Your Results The most important part of running Identity Finder is determining the most effective and secure way of managing the search results. Be sure to carefully

More information

CUSTOMER TIPS: HOW TO GUARD AGAINST FRAUD WHEN USING ONLINE BANKING OR ATM s

CUSTOMER TIPS: HOW TO GUARD AGAINST FRAUD WHEN USING ONLINE BANKING OR ATM s CUSTOMER TIPS: HOW TO GUARD AGAINST FRAUD WHEN USING ONLINE BANKING OR ATM s ATM Fraud - Watch out for the following scams. Scam 1 - you find you are having difficulty with your card. Someone will come

More information

BEST PRACTICES FOR PERSONAL Security

BEST PRACTICES FOR PERSONAL  Security BEST PRACTICES FOR PERSONAL Email Security Sometimes it feels that the world of email and internet communication is fraught with dangers: malware, viruses, cyber attacks and so on. There are some simple

More information

VERSION 7 JUNE Union Benefits. Employer User Guide Data Collection Tool

VERSION 7 JUNE Union Benefits. Employer User Guide Data Collection Tool VERSION 7 JUNE 2018 Union Benefits Employer User Guide Data Collection Tool About this guide This document is intended to provide an overview of the main sections of the Data Collection Tool ( DCT ) for

More information

How to Build a Culture of Security

How to Build a Culture of Security How to Build a Culture of Security March 2016 Table of Contents You are the target... 3 Social Engineering & Phishing and Spear-Phishing... 4 Browsing the Internet & Social Networking... 5 Bringing Your

More information

Websense Secure Messaging User Help

Websense Secure Messaging User Help Websense Secure Messaging User Help Welcome to Websense Secure Messaging, a tool that provides a secure portal for the transmission and viewing of sensitive, personal data in email. Use the portal to view

More information

Department of Technology MEDIA EXCHANGE WEB APPLICATION USER MANUAL

Department of Technology MEDIA EXCHANGE WEB APPLICATION USER MANUAL Department of Technology MEDIA EXCHANGE WEB APPLICATION USER MANUAL 1 Contents: MediaShuttle Transfer Application Configuration Settings and Internet Browser Settings.... 3 Firewall Settings... 5 Username

More information

ONLINE RESULTS SHEETS. Teacher Online Results Sheets (ORS) Information Booklet

ONLINE RESULTS SHEETS. Teacher Online Results Sheets (ORS) Information Booklet ONLINE RESULTS SHEETS Teacher Online Results Sheets (ORS) Information Booklet Obj Ref: A346263 Last updated: 3 September 2015 Contents Welcome to the Online Results Sheets...5 Who to contact for support...5

More information

COMPUTER PASSWORDS POLICY

COMPUTER PASSWORDS POLICY COMPUTER PASSWORDS POLICY 1.0 PURPOSE This policy describes the requirements for acceptable password selection and maintenance to maximize security of the password and minimize its misuse or theft. Passwords

More information

Table of Contents. 3. Changing your Lotus Notes Password, page Choosing your Letterhead and Signature, page 6

Table of Contents. 3. Changing your Lotus Notes Password, page Choosing your Letterhead and Signature, page 6 Table of Contents 1. Logging onto Lotus Notes, page 3 2. Logging out of Lotus Notes, page 3 3. Changing your Lotus Notes Password, page 4 4. Navigating in Lotus Notes, page 5 5. Choosing your Letterhead

More information

jdoe 5. In the password field, enter in the same password you use to logon to your workstations. 6. Click OK.

jdoe 5. In the password field, enter in the same password you use to logon to your workstations. 6. Click OK. Outlook Web Access Quick Start Document Logging On 1. Open Internet Explorer. 2. Type http://webmail.min201.org in the address bar or go to www.min201.org and click on I Webmail. 3. Enter the following

More information

Step-by-step guide. Cambridge. Technicals. Interchange. Admin Instructions for Cambridge Technicals. A step-by-step guide for OCR Assessors TECHNICALS

Step-by-step guide. Cambridge. Technicals. Interchange. Admin Instructions for Cambridge Technicals. A step-by-step guide for OCR Assessors TECHNICALS Admin Instructions for A step-by-step for OCR Assessors a h c r e t n I o t e m o c l e W 1 This guidance demonstrates how to administer sampling and claims for via. Getting started with OCR is a free

More information

IBM Notes Client V9.0.1 Reference Guide

IBM Notes Client V9.0.1 Reference Guide IBM Notes Client V9.0.1 Reference Guide Revised 05/20/2016 1 Accessing the IBM Notes Client IBM Notes Client V9.0.1 Reference Guide From your desktop, double-click the IBM Notes icon. Logging in to the

More information

A practical guide to IT security

A practical guide to IT security Data protection A practical guide to IT security Ideal for the small business The Data Protection Act states that appropriate technical and organisational measures shall be taken against unauthorised or

More information

Quick Heal AntiVirus Pro Advanced. Protects your computer from viruses, malware, and Internet threats.

Quick Heal AntiVirus Pro Advanced. Protects your computer from viruses, malware, and Internet threats. AntiVirus Pro Advanced Protects your computer from viruses, malware, and Internet threats. Features List Ransomware Protection anti-ransomware feature is more effective and advanced than other anti-ransomware

More information

Your . A setup guide. Last updated March 7, Kingsford Avenue, Glasgow G44 3EU

Your  . A setup guide. Last updated March 7, Kingsford Avenue, Glasgow G44 3EU fuzzylime WE KNOW DESIGN WEB DESIGN AND CONTENT MANAGEMENT 19 Kingsford Avenue, Glasgow G44 3EU 0141 416 1040 hello@fuzzylime.co.uk www.fuzzylime.co.uk Your email A setup guide Last updated March 7, 2017

More information

COMMON WAYS IDENTITY THEFT CAN HAPPEN:

COMMON WAYS IDENTITY THEFT CAN HAPPEN: COMMON WAYS IDENTITY THEFT CAN HAPPEN: OLD FASHIONED STEALING / DUMPSTER DIVING Thieves typically steal wallets and purses. They also steal mail such as credit card and bank statements, pre-approved credit

More information

STATOIL ESOURCING PORTAL. Supplier user guide

STATOIL ESOURCING PORTAL. Supplier user guide STATOIL ESOURCING PORTAL Supplier user guide The esourcing portal is a web portal that enables online sourcing communication and collaboration between Statoil and their potential and actual suppliers.

More information

Worksheet - Reading Guide for Keys and Passwords

Worksheet - Reading Guide for Keys and Passwords Unit 2 Lesson 15 Name(s) Period Date Worksheet - Reading Guide for Keys and Passwords Background Algorithms vs. Keys. An algorithm is how to execute the encryption and decryption and key is the secret

More information

VPN4ALL Mobile for Android 2.X Guide

VPN4ALL Mobile for Android 2.X Guide VPN4ALL Mobile for Android 2.X Guide How to setup VPN4ALL Mobile on your Android 2.X device - SmartPhone or Tablet - with an English language interface. In your Android 2.x device, go to 'Settings': Click

More information

Using Outlook Live

Using Outlook Live EMAIL Using Outlook Live Contents: What is?... 3 Using... 3 Address... 3 Password... 3 The Windows Live Hotmail Welcome Screen... 5 Online Notification Status... 6 Help... 6 Inbox... 7 The Mail Inbox Toolbar...

More information

Changing Settings for ViewMail for Outlook (Version 8.0 Only)

Changing Settings for ViewMail for Outlook (Version 8.0 Only) Changing Settings for ViewMail for Outlook Note This content applies to ViewMail for Outlook version 8.0 only. For later ViewMail versions, see the Quick Start Guide for Cisco ViewMail for Microsoft Outlook

More information

How to use the HTC Desire C mobile devices

How to use the HTC Desire C mobile devices How to use the HTC Desire C mobile devices Orientation First, a quick overview of your primary buttons and areas of your phone. A B C D E F G H A) Headphone Jack B) Power Hold down to power your phone

More information

Cyber Security Guide for NHSmail

Cyber Security Guide for NHSmail Cyber Security Guide for NHSmail Version 3.0 February 2017 Copyright 2017Health and Social Care Information Centre. The Health and Social Care Information Centre is a non-departmental body created by statute,

More information

Storing Your Exercise Files

Storing Your Exercise Files Storing Your Exercise Files This appendix contains an overview for using this book with various file storage media, such as a USB flash drive or hard drive. Detailed instructions for downloading and unzipping

More information

TxEIS txconnect Training Guide August, 2012

TxEIS txconnect Training Guide August, 2012 August, 2012 Education Service Center 3001 North Freeway Fort Worth, Texas 76106 Contents Introduction...3 How to Display a Page in another Language..4 How to Display Help 5 How to Contact the Teacher..6

More information

Outlook Web Access (OWA) Tutorial

Outlook Web Access (OWA) Tutorial Outlook Web Access (OWA) Tutorial Outlook Web Access 2010 allows you to gain access to your email messages, calendars, contact, tasks and public folders from any computer with internet access. How to access

More information

ITConnect MAKING PHOTO PRINTS ONLINE. Choosing Safe Passwords. De-clutter Your Desktop. Reminders in Outlook. Technology made practical for home

ITConnect MAKING PHOTO PRINTS ONLINE. Choosing Safe Passwords. De-clutter Your Desktop. Reminders in Outlook. Technology made practical for home ITConnect Technology made practical for home JUNE 2014 Choosing Safe Passwords Here s how to create a safe password. De-clutter Your Desktop Are you ready to restore order and clean up your desktop? Reminders

More information

Target Breach Overview

Target Breach Overview Target Breach Overview Q: Media reports are stating that Target experienced a data breach. Can you provide more specifics? A: Yes, Target has confirmed that it experienced unauthorized access to its systems

More information

Getting Started The Outlook Web Access Window

Getting Started The Outlook Web Access Window QUICK Source Microsoft Outlook Web Access in Exchange Server 2003 Getting Started The Outlook Web Access Window ❶ ❷ ❸ ❹ ❺ ❻ ❼ ❽ Using the Reading Pane The Reading Pane allows you to view your e-mail messages

More information

SECURE USER GUIDE FOR EXTERNAL PARTNERS

SECURE  USER GUIDE FOR EXTERNAL PARTNERS SECURE E-MAIL USER GUIDE FOR EXTERNAL PARTNERS A guide for using encrypted electronic mail to protect the privacy and data integrity of sensitive information. October 2016 Data Classification: Public Information

More information

Thank you for purchasing the CharJi EVO CLOUD. This CharJi EVO CLOUD brings you a high speed wireless network connection.

Thank you for purchasing the CharJi EVO CLOUD. This CharJi EVO CLOUD brings you a high speed wireless network connection. Thank you for purchasing the CharJi EVO CLOUD. This CharJi EVO CLOUD brings you a high speed wireless network connection. This document will help you understand your CharJi EVO CLOUD so you can start using

More information

OUTLOOK ATTACHMENT EXTRACTOR 3

OUTLOOK ATTACHMENT EXTRACTOR 3 OUTLOOK ATTACHMENT EXTRACTOR 3 PROGRAM HELP GILLMEISTER SOFTWARE WWW.GILLMEISTER-SOFTWARE.COM 1 TABLE OF CONTENTS 1 Table of contents... 1 2 Start... 4 3 Main menu... 4 3.1 Menu entries of the group Menu...

More information

Lifespan Guide for using your Lifespan Network Account

Lifespan Guide for using your Lifespan Network Account Lifespan Guide for using your Lifespan Network Account Summary Instructions for setting up a new Lifespan network and Microsoft cloud account... 2 Set password... 2 Register for Self-Service Password Reset...

More information

2 User Guide. Contents

2  User Guide. Contents E-mail User Guide 2 E-mail User Guide Contents Logging in to your web mail... 3 Changing your password... 5 Editing your signature... 6 Adding an e-mail account to Outlook 2010/2013/2016... 7 Adding an

More information

Setting up Outlook Express to access your boxes

Setting up Outlook Express to access your  boxes Setting up Outlook Express to access your email boxes Basically there are 2 stages to this process the third only necessary if you use BT Internet as your Internet Service Provider (ISP) 1) Setting up

More information

Comodo Comodo Dome Antispam MSP Software Version 2.12

Comodo Comodo Dome Antispam MSP Software Version 2.12 Comodo Comodo Dome Antispam MSP Software Version 2.12 User Guide Guide Version 2.12.111517 Comodo Security Solutions 1255 Broad Street Clifton, NJ, 07013 Table of Contents 1 Introduction to Comodo Dome

More information

Comodo Antispam Gateway Software Version 2.12

Comodo Antispam Gateway Software Version 2.12 Comodo Antispam Gateway Software Version 2.12 User Guide Guide Version 2.12.112017 Comodo Security Solutions 1255 Broad Street Clifton, NJ, 07013 Table of Contents 1 Introduction to Comodo Antispam Gateway...3

More information

You can start the mail merge from Outlook, Word, Publisher, Microsoft Access or from bespoke software.

You can start the mail merge from Outlook, Word, Publisher, Microsoft Access or from bespoke software. IT Accessed have teamed up with people and technology harmonisation specialists Ryan Solutions to produce a series of articles for the UK's Chartered Institute of Personnel Development (CIPD). This article

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme file

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme file

More information

Registration and Login

Registration and Login Registration and Login When a parent accesses txconnect, the following Login page is displayed. The parent needs to register as a new user. How to Register as a New User The registration process is self-administered,

More information

Salesforce Classic Guide for iphone

Salesforce Classic Guide for iphone Salesforce Classic Guide for iphone Version 35.0, Winter 16 @salesforcedocs Last updated: October 27, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark

More information

General Use. Searching for Assets (All users) Browsing for Assets (All users) Viewing and Downloading an Asset (All Users)

General Use. Searching for Assets (All users) Browsing for Assets (All users) Viewing and Downloading an Asset (All Users) User Guide Rev1.1 Table of Contents General Use... 2 Searching for Assets (All users)... 2 Browsing for Assets (All users)... 2 Viewing and Downloading an Asset (All Users)... 2 Downloading Large Files

More information

How to Buy TRVR Tokens

How to Buy TRVR Tokens How to Buy TRVR Tokens To participate in the distribution of TRVR tokens, you must send Ethers (ETH) to the address of the Token Sale smart contract. This process requires a MyEtherWallet and MetaMask

More information

Campus Solutions Self Service: Faculty Quick Reference Guide

Campus Solutions Self Service: Faculty Quick Reference Guide Campus Solutions Self Service: Faculty Table of Contents Introduction to Step Sheets... 1 The Faculty Center... 2 View Teaching Schedule... 3 Enter My Textbooks... 9 View Textbook Summary... 19 View Exam

More information

Formatting: Cleaning Up Data

Formatting: Cleaning Up Data Formatting: Cleaning Up Data Hello and welcome to our lesson on cleaning up data, which is one of the final ones in this Formatting Module. What we re going to be doing in this lesson is using some of

More information

Welcome Pack.

Welcome Pack. Welcome Pack This welcome pack is intended to get you up and running with your new account as smoothly as possible and contains the following information: What is the London Grid for Learning? Accessing

More information

Returning Key Stage 1 Teacher Assessments 2018

Returning Key Stage 1 Teacher Assessments 2018 Returning Key Stage 1 Teacher Assessments 2018 The FINAL deadline for submission is 5pm on Monday 25 h June 2018 Document Reference DMS007 Published/Updated June 2018 Fully accredited by Capita SIMS for

More information

Guide to credit card security

Guide to credit card security Contents Click on a title below to jump straight to that section. What is credit card fraud? Types of credit card fraud Current scams Keeping your card and card details safe Banking and shopping securely

More information

Microsoft Office 2016 Mail Merge

Microsoft Office 2016 Mail Merge Microsoft Office 2016 Mail Merge Mail Merge Components In order to understand how mail merge works you need to examine the elements involved in the process. In any mail merge, you'll deal with three different

More information

Security Awareness. Presented by OSU Institute of Technology

Security Awareness. Presented by OSU Institute of Technology Security Awareness Presented by OSU Institute of Technology Information Technologies Division Security Awareness Topics Social Engineering Phishing Social Networks Displaying Sensitive Information Wireless

More information

Wimba Pronto. Version 2.0. User Guide

Wimba Pronto. Version 2.0. User Guide Wimba Pronto Version 2.0 User Guide Wimba Pronto 2.0 User Guide Welcome to Wimba Pronto 1 What's New in Wimba Pronto 2.0 2 Getting Started 3 Wimba Pronto System Requirements 3 Creating a New Wimba Pronto

More information

Salesforce Classic Mobile Guide for iphone

Salesforce Classic Mobile Guide for iphone Salesforce Classic Mobile Guide for iphone Version 41.0, Winter 18 @salesforcedocs Last updated: November 30, 2017 Copyright 2000 2017 salesforce.com, inc. All rights reserved. Salesforce is a registered

More information

OneDrive for Business User Guide

OneDrive for Business User Guide Contents OneDrive for Business User Guide About OneDrive for Business and Office 365... 2 Storing university information in the Cloud... 2 Signing in... 2 The Office 365 interface... 3 The OneDrive for

More information

Copyright 2009 BOSMA Enterprises. Chapter 24.

Copyright 2009 BOSMA Enterprises. Chapter 24. Copyright 2009 BOSMA Enterprises Chapter 24 Email Email is a way for you to write short messages to friends, to businesses, to schools, or whoever you need to communicate with. It is much like sending

More information

College of Pharmacy Windows 10

College of Pharmacy Windows 10 College of Pharmacy Windows 10 Windows 10 is the version of Microsoft s flagship operating system that follows Windows 8; the OS was released in July 2015. Windows 10 is designed to address common criticisms

More information

Microsoft SharePoint is provided by Information Services for staff in Aberystwyth University.

Microsoft SharePoint is provided by Information Services for staff in Aberystwyth University. USING SHAREPOINT E-Services and Communications, Information Services, Aberystwyth University OBJECTIVES By the end of this training course you will be able to: Access SharePoint Customise a document library

More information

Minimum Standards for Connecting to the UCLA Network

Minimum Standards for Connecting to the UCLA Network Minimum Standards for Connecting to the UCLA Network Last April, the CSG approved a set of minimum standards for connecting to the UCLA network that were based on a policy that had been developed by Berkeley.

More information

Multi-Factor Authentication FAQs

Multi-Factor Authentication FAQs General FAQs What is Multi-factor Authentication (MFA)? Multi-factor authentication (MFA) seeks to decrease the likelihood that others can access your data. Specifically, it enhances the security of your

More information

Getting started with Hot Potatoes by Deborah Healey

Getting started with Hot Potatoes by Deborah Healey Getting started with Hot Potatoes by Deborah Healey Hot Potatoes lets you create interactive exercises that students can do on the web or from a diskette. It has five options: JBC lets you create multiple

More information

Nokia 9300 Device with BlackBerry Connect

Nokia 9300 Device with BlackBerry Connect Nokia 9300 Device with BlackBerry Connect Legal Notice Copyright 2005 Nokia. All rights reserved. Reproduction, transfer, distribution or storage of part or all of the contents in this document in any

More information

Studio 5.5. User Manual

Studio 5.5. User Manual Studio 5.5 User Manual 1 Table of Contents Safety Information... 3 Appearance and Key Function... 4 Introduction... 5 Call Functions... 6 Contacts... 7 Messaging... 8 Internet Browser... 9 Bluetooth...

More information

Edith Cowan University Information Technology Services Centre

Edith Cowan University Information Technology Services Centre Information There are three wireless networks on campus which give you access to the ECU website, the staff intranet, the internet and other ECU resources: ECU This is the easiest to use and safest wireless

More information