CLEO Remote Access Services CLEO Remote Desktop Access User Guide v1.3

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "CLEO Remote Access Services CLEO Remote Desktop Access User Guide v1.3"

Transcription

1 CLEO ~Remote Access Services Remote Desktop Access User guide CLEO Remote Access Services CLEO Remote Desktop Access User Guide v1.3 August 2007 page 1 of 16 CLEO 2007 CLEO Remote Access Services 3SGD User Guide v1.4

2 1. Introduction 3 2. Requirements School Requirements Licensing Home/Remote User Requirements Potential Security Issues of using the internet to Access Schools Systems How to Reduce the Risks Passwords File Security How Malware could present a risk to your computer Social Engineering Web browser Java runtime Username and password for SGD Username and password for SIMS SGD Technical Support 16 September 2007 page 2 of 16

3 1. Introduction The Cumbria and Lancashire Education Online (CLEO) Regional Broadband Consortium (RBC) is made up of the two local authorities Cumbria County Council and Lancashire County Council and provides broadband connectivity to schools across the region. Through its network providers Lancaster University Network Services (LUNS), the RBC aims to provide an efficient and secure IP network for all the schools connected to it. In addition CLEO is also interconnected with all the other 9 English RBCs via the Universities JANET Network. The DfES Harnessing Technology Strategy (published March 2005) lays out key priorities for increasing the flexibility and opportunities for study and learning using ICT. CLEO s remote access services are one step in CLEO helping schools to address the personalised learning agenda over the coming years. To date there have been many reasons why schools across CLEO wish to have remote access to their school network including: Access by teachers and pupils Remotely administering the school network Access to a school hosted virtual learning environment (VLE) Access to resources and software on the school network Access to management information systems All CLEO remote access services are provided to support school staff in delivering the curriculum and for teaching and learning. They are also intended for managing and administering schools and their ICT networks. However, by using a Remote Access solution to administer your school network, schools must ensure that all users are fully aware of the Terms and Conditions. CLEO now have a range of remote access solutions that are provided free of charge to schools who are connected to the CLEO broadband service; CLEO Web Gateway CLEO Remote Management Access CLEO Remote Desktop Access CLEO WebDAV This user guide details of the CLEO Remote Desktop Access service. The service uses Sun s Secure Global Desktop (SGD) application. 2. Requirements 2.1. School Requirements September 2007 page 3 of 16

4 One of the strengths of the CLEO network is the protection it provides all schools connected to it, as they are part of a private network with strict security in place to protect all schools from viruses, trojans and security breaches wherever possible. The regional broadband consortium takes security of the CLEO network very seriously. Opening the network to remote users can increase the risk to individual schools and their PC networks. With this in mind CLEO has developed a number of guides and terms and conditions to help schools understand the requirements and preparation required before implementing remote access for an individual school. CLEO offers its remote access services to schools on an annual renewable basis and only after schools have recognised the risks, as well as advantages, from enabling remote access to your school network and address them from the outset. The following documents can be found on the CLEO website Introduction to CLEO Remote Access Services A Short Guide for Headteachers and Senior Managers Introduction to CLEO Remote Access Services A Detailed Guide to the Benefits and Risks for Headteachers and Senior Managers Best Practice Guide to Preparing Your School Network and Remote Users PCs CLEO Remote Access Services Terms & Conditions, and Acceptable Use Policy Creating a School Acceptable Use Policy for Remote Access - Helpful Headings CLEO Remote Desktop Access is a centrally provided service which uses Sun s Secure Global Desktop (SGD). CLEO is centrally hosting the required SGD server and connections to schools are done through the CLEO Broadband network. To allow users to access their desktop, Sun SGD requires the school to either designate certain network PC's and to leave them switched on or to be running Terminal Services. Each user will require a separate desktop ip/terminal services ip. For more information on Terminal Services, schools should contact their Local Authority ICT Support. Each designated desktop will need to be running Microsoft Windows XP Professional or later and have Windows Remote Desktop enabled. A useful guide to setting up Remote Desktop on your school PC s can be found on the Microsoft Website at September 2007 page 4 of 16

5 2.2. Licensing SUN SGD licenses have been purchased for all schools connected on the CLEO network. It was decided that any licenses purchased by CLEO for SGD in 2007 were to be prioritised for enabling teachers and management staff to access school MIS systems effectively. The license is based on 5000 concurrent users, so remote Desktop Access usernames and passwords will be enabled for all staff but logging on the system will be on a first come, first served basis. CLEO offer no guarantee of access, but will be evaluating the popularity of this service. These licenses are provided free of charge to the school. Expanding the number of SGD licenses for schools can only be done when the results of the infrastructure scalability testing and certain CLEO system upgrades have been completed. We hope to get back to schools in early 2008 with more information. Therefore, there is no current requirement for schools to apply for SGD licenses. CLEO is not providing any licenses other than for SGD. It is the schools responsibility to ensure that appropriate licensing is in place for their remote users to connect to the school network. Some software licenses, such as OEM licenses, do not cover the use of the product via remote access. Due to the variation in schools licensing agreements, we would advise schools to contact their license providers to check if any of the following products would be required; Microsoft Windows External Connector License Microsoft Windows Client Access Licenses Microsoft Office licenses for Remote Users This list is not exhaustive and schools should consult their licence providers for any software they wish to use Home/Remote User Requirements Having prepared the desktops/servers within your institution to support remote access, then remote client PC s also need to be prepared. Enforcing such requirements when the PC is not on the premises of an institution requires careful consideration. Schools should develop suitable administration and management procedures to ensure that staff, teachers and/or pupils accessing the facilities in the school using remote access are adequately supported and have sufficient information to minimise the risks involved. All September 2007 page 5 of 16

6 remote users must agree to follow the acceptable use policy and security guidelines Potential Security Issues of using the internet to Access Schools Systems When a computer is directly connected to the internet it can be contacted by any other computer in the world that is also on the internet. This means that there is a considerable risk of exposure to unwanted third parties and malware that could connect to and potentially compromise that computer. Computers in schools that are connected to the CLEO network are not contactable directly from the internet because there are sophisticated safe guards such as firewalls and private network address ranges in place to prevent this. On the other hand, computers in the home very often do not have such safeguards in place, so when you connect from home to your school s network via the internet you run the risk of infecting the school s systems with anything that has previously infected your home computer. For this reason, if you are using the CLEO remote access solution you MUST ensure that you have taken precautions to minimise any increased risk associated with your computer at home connecting to school computers. If you are accessing school data from outside the school environment there is a much greater risk of confidential information being disclosed to unauthorised third parties. Any disclosure of information could put children at risk and would be a breach of The Data Protection Act that could lead to disciplinary action against the members of staff involved How to Reduce the Risks Make sure that your computer has up to date Anti Virus Software. In Cumbria all school computers, teacher laptops and teachers home PC s and in Lancashire laptops for teachers and school computer systems are licensed to use Sophos Anti Virus. There are plenty of alternative anti virus software providers (some of them free) for those wishing to protect home PCs. When choosing an anti virus product for home use, make sure that you will be able to get regular updates new viruses are being created all the time. If you suspect that your PC has become infected with a virus (or other malware) don t use it to remotely access your school s system until you are certain that the virus has been deleted. If you do not know how to remove the virus yourself, seek competent help. Make sure that your computer has Windows Update turned on so that it has the latest operating system patches. September 2007 page 6 of 16

7 Use spam filtering services, most Internet Service Providers (ISP) offer the option of spam filtering, whilst this probably will not stop all the spam coming through it will greatly reduce it and lessen the risk of your pc being infected by a virus. Both Cumbria & Lancashire offer a spam filtering solution for users of their mail service and use of this is highly recommended Wireless network connections must be encrypted and should be set to use WPA2 encryption rather than the older WEP standard. If you are unsure what level of encryption is being used please use a cable. For more information refer to the Technical checks document. Turn on Phishing Filters on the Web browser to reduce the risk of phishing attacks. Use an anti spyware program to detect spyware, Windows Defender from Microsoft is available as a free download and is built in Windows vista. Sophos will also detect spyware. Run a weekly virus scan on your computer Passwords Use strong passwords. Passwords should be a minimum of 8 characters long and should contain a mix of letters, numbers and symbols. Try not to use words or phrases that could be easily guessed by somebody that knows you (e.g. names of family members or pets). Passwords should be changed regularly, at least once a term, ideally more often. If you have reason to suspect that somebody has obtained your password, change it immediately. Use a password protected screensaver to prevent anybody gaining access to your computer whilst you are temporarily away from it. Do not use password storing facilities found in some programs to automatically remember passwords. You should not reveal your passwords to anyone. If you have for any reason revealed your password to anyone you should change your password immediately remember you are just as liable for any misdemeanour caused by allowing somebody to logon using your credentials File Security Do not copy information from a school system onto a non school system. You may be in breach of the Data Protection Act if you do. Your internet browser should have file caching turned off. Caching is a process where your computer stores a copy of files visited on the internet on your local computer. The technical checks document that accompanies this guidance explains how to turn off caching. Regularly save your work on your school computer, you must not at any stage save work to your home computer. Some home internet connections are not as robust as you may be used to in school, and you September 2007 page 7 of 16

8 may lose data if your home internet connection fails whilst you are accessing your school system remotely. Do not openly work with sensitive information in public places especially where there is an opportunity for eavesdropping. Do not allow any unauthorised person, including family and friends, access to data held on your school s system. You will be breaching the Data Protection Act if you do. There is an accompanying document to this sheet that shows you how to check if you computer has up to date antivirus protection, how to use windows update and some of the other tools mentioned in this document How Malware could present a risk to your computer Malware is a general term for programs that can infect your computer in any number of ways. It can be downloaded onto your computer without you being aware, by visiting a website, through file sharing software or simply by clicking on an infected attachment. Some malware can search the hard disks of a compromised pc and go through the contacts and forward that information on to a third party. It could also search a system for keys or passwords. In general malware takes one of the following forms: Worms are a type of program that can infect a computer without any body doing anything. Computers that are on the internet without a firewall and up to date anti virus are particularly vulnerable to this form of attack. Once a worm has infected your computer it will try and infect others using your network connection, and it may also have other undesirable effects, such as destruction of data held on your PC. Computer viruses are another form of malware that require the user to do something such as click on an attachment before they infect a computer. If you do not recognise the sender on an please be very wary of clicking on unknown attachments. If you have any doubts delete the , if it is important the sender will try and get back in touch. Key logging software logs any keystrokes that you make and records the information. If used by criminals, this software can give access to your user names and passwords, such as your school network log on information and the SIMS passwords. It may also include personal information such as online banking details if it is used on your home pc. Once a computer is infected by a virus it may be used as part of a botnet, these are networks of computers that are essentially hijacked by a third September 2007 page 8 of 16

9 party for their purposes. They may be used to unwittingly host unsuitable web sites or for other criminal purposes. Spam is unsolicited that often includes viruses or inappropriate content. In addition to carrying potential viruses, spam is time consuming Phishing scams are criminal attempts to steal users personal information by masquerading as a trustworthy business, such as a bank or auction website. A user may receive a link to a bank website in an which directs them to a bogus website in an attempt to get identity or bank details. This information is then used for criminal purposes Social Engineering The reason why many viruses can infect a computer is because they use social engineering techniques to get people to click on an attachment or web site link. They may attempt to disguise the attachment as a funny photo or something that a user will be curious enough to open, such as an electronic greeting. Other forms of social engineering include people pretending to be someone else and trying to get you to tell them your password. You may get someone pretending be technical support when you have never logged a call, trying to get you to reveal your password details to them. If you are unsure that the person you are talking to is who they say they are arrange to ring them back on a telephone number that is known to you. For more information about how to protect yourselves online please refer to any of the following websites: Web browser Sun Secure Global Desktop will run on a wide variety of web browsers operating under Windows XP, Windows Vista, Red Hat Linux 3, 4, Fedora Linux 5, or Mac OSX 10.4 operating systems. The browser will need to have Java tm technology enabled. Browsers and Client devices should support HTTP, HTTPS and SSH version 2 or later. September 2007 page 9 of 16

10 Java runtime The browser will need to have Java tm technology enabled. To download the latest version of Java go to; Click on the Free Java Download icon. The website will verify your operating system and select the most appropriate version of Java for you to download. Click verify installation. September 2007 page 10 of 16

11 The appropriate version of Java will now be installed Username and password for SGD CLEO propose using your network username for your SGD login. There will, however, be a separate password. These details will be sent to the school once the headteachers authorisation has been received by CLEO and the accounts have been set up. These details should be kept private and not revealed to anyone. If you feel that your password has been compromised you should inform your Local Authority ICT Support immediately. They will be able to reset your password. September 2007 page 11 of 16

12 2.5. Username and password for SIMS Usernames and passwords for SIMS/MIS access will remain the responsibility of the school and/or local authority. 3. SGD In Cumbria and Lancashire all SGD users will access the same web address/url Type in the url into your web browser Users will see the following screen. Most users will choose the log-in option The web browser will now connect to the SGD server September 2007 page 12 of 16

13 Insert your SGD username and password Your system tray will show 2 new icons confirming Java Platform is running and that an SGD is running. The webtop Sun SGD provides access to the users desktop via the SGD webtop Click on the Desktop icon or text to connect to your work machine. September 2007 page 13 of 16

14 You will then be asked to authenticate your network log on details. NB the connection is now to your school network so you should enter your school network username and password. When your desktop session is running a triangle appears in front of the link. A session toolbar also appears below the application link. Your school desktop will now load and be shown full screen September 2007 page 14 of 16

15 Users can toggle between their local and school desktops by using the windows key on their keyboard. Users can also manage printing from the webtop. SGD allows users to print to network printers via their network desktop. It also allows users to print to their local home printer. You should always log out of Secure Global Desktop before closing your web browser. This lets Secure Global Desktop shut down any applications that need not run any more and makes sure nobody can use a user's applications in their name without permission. If someone closes their web browser without logging out (or if their web browser crashes), they are not logged out of Secure Global Desktop. The user can log in to Secure Global Desktop again and can resume applications configured to be Webtop session resumable or Always resumable. To log out of Secure Global Desktop, click the Logout button on your webtop and click OK when prompted for confirmation. September 2007 page 15 of 16

16 4. Technical Support Technical support for the CLEO remote access services is provided by each of the Local Authority ICT School Support Services. All requests for CLEO remote access services are coordinated through these services if you have any queries during the setup process and preparation of your network they will be able to provide advice. Please note that, although the CLEO remote access services are free and the LA Schools ICT Support Services will advise you on the settings required they may charge for any additional work requested to assist you in preparing your network. Cumbria Schools Jeff Haslam Tel: Lancashire Schools The Westfield Centre Tel: Fax: September 2007 page 16 of 16

Best Practice Guide CLEO Remote Access Services

Best Practice Guide CLEO Remote Access Services Best Practice Guide CLEO Remote Access Services A Guide to Preparing Your School Network & Remote Users PCs V 5.0 Published: October 2007 Please refer to www.cleo.net.uk for the most recently published

More information

NETWORK AND INTERNET SECURITY POLICY STATEMENT

NETWORK AND INTERNET SECURITY POLICY STATEMENT TADCASTER GRAMMAR SCHOOL Toulston, Tadcaster, North Yorkshire. LS24 9NB NETWORK AND INTERNET SECURITY POLICY STATEMENT Written by Steve South November 2003 Discussed with ICT Strategy Group January 2004

More information

Infocomm Sec rity is incomplete without U Be aware,

Infocomm Sec rity is incomplete without U Be aware, Infocomm Sec rity is incomplete without U Be aware, responsible secure! HACKER Smack that What you can do with these five online security measures... ANTI-VIRUS SCAMS UPDATE FIREWALL PASSWORD [ 2 ] FASTEN

More information

A Guide to Information Technology Security in Trinity College Dublin

A Guide to Information Technology Security in Trinity College Dublin A Guide to Information Technology Security in Trinity College Dublin Produced by The IT Security Officer & Training and Publications 2003 Web Address: www.tcd.ie/itsecurity Email: ITSecurity@tcd.ie 1 2

More information

National Cyber Security Month 2015: Daily Security Awareness Tips

National Cyber Security Month 2015: Daily Security Awareness Tips National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.

More information

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange The responsibility of safeguarding your personal information starts with you. Your information is critical and it must be protected from unauthorised disclosure, modification or destruction. Here we are

More information

INSTALLATION AND CONFIGURATION GUIDE (THIS DOCUMENT RELATES TO MDAEMON v15.5.0 ONWARDS)

INSTALLATION AND CONFIGURATION GUIDE (THIS DOCUMENT RELATES TO MDAEMON v15.5.0 ONWARDS) Web: Overview INSTALLATION AND CONFIGURATION GUIDE (THIS DOCUMENT RELATES TO MDAEMON v15.5.0 ONWARDS) This document provides an installation and configuration guide for MDaemon Messaging Server along with

More information

Malware & Botnets. Botnets

Malware & Botnets. Botnets - 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online

More information

Information Security

Information Security Information Security A staff guide to the University's Information Systems Security Policy Issued by the IT Security Group on behalf of the University. Information Systems Security Guidelines for Staff

More information

STRONGER ONLINE SECURITY

STRONGER ONLINE SECURITY STRONGER ONLINE SECURITY Enhanced online banking without compromise Manage your business banking efficiently and securely Internet banking has given business leaders and treasurers greater control of financial

More information

Payment Fraud and Risk Management

Payment Fraud and Risk Management Payment Fraud and Risk Management Act Today! 1. Help protect your computer against viruses and spyware by using anti-virus and anti-spyware software and automatic updates. Scan your computer regularly

More information

Student Halls Network. Connection Guide

Student Halls Network. Connection Guide Student Halls Network Connection Guide Contents: Page 3 Page 4 Page 6 Page 10 Page 17 Page 18 Page 19 Page 20 Introduction Network Connection Policy Connecting to the Student Halls Network Connecting to

More information

Online Banking Fraud Prevention Recommendations and Best Practices

Online Banking Fraud Prevention Recommendations and Best Practices Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee at Continental National Bank of Miami needs to know

More information

Cyber Security Education & Awareness. Guide for User s

Cyber Security Education & Awareness. Guide for User s Cyber Security Education & Awareness Guide for User s Release Q1 2010 Version 1.1 CONTENTS 1. Introduction 2. Protection against Nasty Code 3. System Security Maintenance 4. Personal Firewalls 5. Wireless

More information

Advice about online security

Advice about online security Advice about online security May 2013 Contents Report a suspicious email or website... 3 Security advice... 5 Genuine DWP contacts... 8 Recognising and reporting phishing and bogus emails... 9 How DWP

More information

Computer Security and Privacy

Computer Security and Privacy Computer Security and Privacy 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Guidelines for Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions 1) What does SkyBest Internet Guardian do? Prevents e-mail and image spam from reaching your inbox Halts access to dangerous Web pages Stops Web sites from installing dangerous

More information

Working Practices for Protecting Electronic Information

Working Practices for Protecting Electronic Information Information Security Framework Working Practices for Protecting Electronic Information 1. Purpose The following pages provide more information about the minimum working practices which seek to ensure that

More information

HomeNet. Gateway User Guide

HomeNet. Gateway User Guide HomeNet Gateway User Guide Gateway User Guide Table of Contents HomeNet Gateway User Guide Gateway User Guide Table of Contents... 2 Introduction... 3 What is the HomeNet Gateway (Gateway)?... 3 How do

More information

INTERNET & COMPUTER SECURITY March 20, 2010. Scoville Library. ccayne@biblio.org

INTERNET & COMPUTER SECURITY March 20, 2010. Scoville Library. ccayne@biblio.org INTERNET & COMPUTER SECURITY March 20, 2010 Scoville Library ccayne@biblio.org Internet: Computer Password strength Phishing Malware Email scams Identity Theft Viruses Windows updates Browser updates Backup

More information

Reliance Bank Fraud Prevention Best Practices

Reliance Bank Fraud Prevention Best Practices Reliance Bank Fraud Prevention Best Practices May 2013 User ID and Password Guidelines Create a strong password with at least 8 characters that includes a combination of mixed case letters and numbers.

More information

GETTING STARTED WITH A COMPUTER SYSTEM FACTSHEET

GETTING STARTED WITH A COMPUTER SYSTEM FACTSHEET FACTSHEET When setting up a small business there can be many areas of uncertainty, but getting your IT or computer systems right and connected does not need to be one of them. If your company is either

More information

Connecting Windows 7 to the network

Connecting Windows 7 to the network Connecting Windows 7 to the network This document outlines the procedure for setting up Windows 7 to use the College and University network. It assumes that the computer is set up and working correctly

More information

UCLH VPN User Guide. January 2009. VPN User Guide v1.3 20090106

UCLH VPN User Guide. January 2009. VPN User Guide v1.3 20090106 UCLH VPN User Guide January 2009 VPN User Guide v1.3 20090106 1. What is the VPN? The VPN (Virtual Private Network) provides users with secure access, using a web browser, to a standard terminal screen

More information

Business ebanking Fraud Prevention Best Practices

Business ebanking Fraud Prevention Best Practices Business ebanking Fraud Prevention Best Practices User ID and Password Guidelines Create a strong password with at least 8 characters that includes a combination of mixed case letters, numbers, and special

More information

INSTALLATION AND CONFIGURATION GUIDE (THIS DOCUMENT RELATES TO MDAEMON v9.5.0 ONWARDS)

INSTALLATION AND CONFIGURATION GUIDE (THIS DOCUMENT RELATES TO MDAEMON v9.5.0 ONWARDS) Web: Overview INSTALLATION AND CONFIGURATION GUIDE (THIS DOCUMENT RELATES TO MDAEMON v9.5.0 ONWARDS) This document is designed to provide a quick installation and configuration guide for MDaemon along

More information

Secure Global Desktop (SGD)

Secure Global Desktop (SGD) Secure Global Desktop (SGD) Table of Contents Checking your Java Version...3 Preparing Your Desktop Computer...3 Accessing SGD...5 Logging into SGD...6 Using SGD to Access Your Desktop...7 Using SGD to

More information

Get Started Guide - PC Tools Internet Security

Get Started Guide - PC Tools Internet Security Get Started Guide - PC Tools Internet Security Table of Contents PC Tools Internet Security... 1 Getting Started with PC Tools Internet Security... 1 Installing... 1 Getting Started... 2 iii PC Tools

More information

Brazosport College VPN Connection Installation and Setup Instructions. Draft 2 March 24, 2005

Brazosport College VPN Connection Installation and Setup Instructions. Draft 2 March 24, 2005 Brazosport College VPN Connection Installation and Setup Instructions Draft 2 March 24, 2005 Introduction This is an initial draft of these instructions. These instructions have been tested by the IT department

More information

Acceptable Use of ICT Policy. Staff Policy

Acceptable Use of ICT Policy. Staff Policy Acceptable Use of ICT Policy Staff Policy Contents INTRODUCTION 3 1. ACCESS 3 2. E-SAFETY 4 3. COMPUTER SECURITY 4 4. INAPPROPRIATE BEHAVIOUR 5 5. MONITORING 6 6. BEST PRACTICE 6 7. DATA PROTECTION 7 8.

More information

Online Security Information. Tips for staying safe online

Online Security Information. Tips for staying safe online Online Security Information ProCredit Bank is committed to protecting the integrity of your transactions and bank account details. ProCredit Bank therefore uses the latest security software and procedures

More information

Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses

Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses 2004 Microsoft Corporation. All rights reserved. This document is for informational purposes only.

More information

Welcome To The L.R.F.H.S. Computer Group Wednesday 27 th November 2013

Welcome To The L.R.F.H.S. Computer Group Wednesday 27 th November 2013 Welcome To The L.R.F.H.S. Computer Group Wednesday 27 th November 2013 BACKUP SECURITY AND THE CLOUD BACK UP ALWAYS BACK UP TO AN EXTERNAL DEVICE OR REMOVAL MEDIA- NEVER DIRECTLY ON TO YOUR COMPUTER IF

More information

High Speed Internet - User Guide. Welcome to. your world.

High Speed Internet - User Guide. Welcome to. your world. High Speed Internet - User Guide Welcome to your world. 1 Welcome to your world :) Thank you for choosing Cogeco High Speed Internet. Welcome to your new High Speed Internet service. When it comes to a

More information

Don t Fall Victim to Cybercrime:

Don t Fall Victim to Cybercrime: Don t Fall Victim to Cybercrime: Best Practices to Safeguard Your Business Agenda Cybercrime Overview Corporate Account Takeover Computer Hacking, Phishing, Malware Breach Statistics Internet Security

More information

Corporate Account Takeover & Information Security Awareness. Customer Training

Corporate Account Takeover & Information Security Awareness. Customer Training Corporate Account Takeover & Information Security Awareness Customer Training No computer system can provide absolute security under all conditions. NO SECURITY MEASURE OR LIST OF SECURITY MEASURES CAN

More information

Computer Security Maintenance Information and Self-Check Activities

Computer Security Maintenance Information and Self-Check Activities Computer Security Maintenance Information and Self-Check Activities Overview Unlike what many people think, computers are not designed to be maintenance free. Just like cars they need routine maintenance.

More information

GETTING STARTED ON THE WINDOWS SERVICE A GUIDE FOR NEW STAFF MEMBERS

GETTING STARTED ON THE WINDOWS SERVICE A GUIDE FOR NEW STAFF MEMBERS Your Login ID: GETTING STARTED ON THE WINDOWS SERVICE A GUIDE FOR NEW STAFF MEMBERS CONTENTS 1.0 Introduction... 3 1.1 Welcome to Edinburgh Napier University from Information Services!... 3 1.2 About Information

More information

Hang Seng HSBCnet Security. May 2016

Hang Seng HSBCnet Security. May 2016 Hang Seng HSBCnet Security May 2016 1 Security The Bank aims to provide you with a robust, reliable and secure online environment in which to do business. We seek to achieve this through the adoption of

More information

ScoMIS Encryption Service

ScoMIS Encryption Service Introduction This guide explains how to install the ScoMIS Encryption Service Software onto a laptop computer. There are three stages to the installation which should be completed in order. The installation

More information

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security ITSC Training Courses Student IT Competence Programme SI1 2012 2013 Prof. Chan Yuen Yan, Rosanna Department of Engineering The Chinese University of Hong Kong SI1-1 Course Outline What you should know

More information

Using the ScoMIS Remote Access Service (VPN Gateway) to access the ScoMIS SIMS.net Terminal Server Service.

Using the ScoMIS Remote Access Service (VPN Gateway) to access the ScoMIS SIMS.net Terminal Server Service. Using the ScoMIS Remote Access Service (VPN Gateway) to access the ScoMIS SIMS.net Terminal Server Service. The ScoMIS Remote Access Gateway offers a convenient method to connect direct to SIMS.net Terminal

More information

To p t i p s f o r s a f e o n l i n e b a n k i n g a n d s h o p p i n g

To p t i p s f o r s a f e o n l i n e b a n k i n g a n d s h o p p i n g To p t i p s f o r s a f e o n l i n e b a n k i n g a n d s h o p p i n g The Internet offers the opportunity to bank and shop in safety whenever you want. More than 15 million people in the UK now use

More information

Business Internet Banking / Cash Management Fraud Prevention Best Practices

Business Internet Banking / Cash Management Fraud Prevention Best Practices Business Internet Banking / Cash Management Fraud Prevention Best Practices This document provides fraud prevention best practices that can be used as a training tool to educate new Users within your organization

More information

Online Banking Customer Awareness and Education Program

Online Banking Customer Awareness and Education Program Online Banking Customer Awareness and Education Program Electronic Fund Transfers: Your Rights and Responsibilities (Regulation E Disclosure) Indicated below are types of Electronic Fund Transfers we are

More information

How to stay safe online

How to stay safe online How to stay safe online Everyone knows about computer viruses...or at least they think they do. Nearly 30 years ago, the first computer virus was written and since then, millions of viruses and other malware

More information

Section 12 MUST BE COMPLETED BY: 4/22

Section 12 MUST BE COMPLETED BY: 4/22 Test Out Online Lesson 12 Schedule Section 12 MUST BE COMPLETED BY: 4/22 Section 12.1: Best Practices This section discusses the following security best practices: Implement the Principle of Least Privilege

More information

Acceptable Use of ICT Policy For Staff

Acceptable Use of ICT Policy For Staff Policy Document Acceptable Use of ICT Policy For Staff Acceptable Use of ICT Policy For Staff Policy Implementation Date Review Date and Frequency January 2012 Every two Years Rev 1: 26 January 2014 Policy

More information

ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS

ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS $ ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS Boston Private Bank & Trust Company takes great care to safeguard the security of your Online Banking transactions. In addition to our robust security

More information

When registering on a jobsite, first ensure that the site is reputable and has a physical address and landline phone number.

When registering on a jobsite, first ensure that the site is reputable and has a physical address and landline phone number. Job searching online has become the most popular method of finding employment. Searching for the type of job you want is fast and easy, and you can see new jobs as soon as employers / agencies post them.

More information

Accessing your Staff (N and O drive) files from off campus

Accessing your Staff (N and O drive) files from off campus Accessing your Staff (N and O drive) files from off campus It is possible to access your N and O drive files while you are off campus, for example whilst working from home or travelling. This document

More information

E-MAIL FILTERING FAQ

E-MAIL FILTERING FAQ V8.3 E-MAIL FILTERING FAQ COLTON.COM Why? Why are we switching from Postini? The Postini product and service was acquired by Google in 2007. In 2011 Google announced it would discontinue Postini. Replacement:

More information

Connecting to Remote Desktop Windows Users

Connecting to Remote Desktop Windows Users Connecting to Remote Desktop Windows Users How to log into the College Network from Home 1. Start the Remote Desktop Connection For Windows XP, Vista and Windows 7 this is found at:- Star t > All Programs

More information

Top tips for improved network security

Top tips for improved network security Top tips for improved network security Network security is beleaguered by malware, spam and security breaches. Some criminal, some malicious, some just annoying but all impeding the smooth running of a

More information

CITY OF BOULDER *** POLICIES AND PROCEDURES

CITY OF BOULDER *** POLICIES AND PROCEDURES CITY OF BOULDER *** POLICIES AND PROCEDURES CONNECTED PARTNER EFFECTIVE DATE: SECURITY POLICY LAST REVISED: 12/2006 CHRISS PUCCIO, CITY IT DIRECTOR CONNECTED PARTNER SECURITY POLICY PAGE 1 OF 9 Table of

More information

Version: 2.0. Effective From: 28/11/2014

Version: 2.0. Effective From: 28/11/2014 Policy No: OP58 Version: 2.0 Name of Policy: Anti Virus Policy Effective From: 28/11/2014 Date Ratified 17/09/2014 Ratified Health Informatics Assurance Committee Review Date 01/09/2016 Sponsor Director

More information

Basic Computer Security Part 2

Basic Computer Security Part 2 Basic Computer Security Part 2 Presenter David Schaefer, MBA OCC Manager of Desktop Support Adjunct Security Instructor: Walsh College, Oakland Community College, Lawrence Technology University Welcome

More information

ICT Security Policy for Schools

ICT Security Policy for Schools WOLGARSTON HIGH SCHOOL Staffordshire ICT Security Policy for Schools A Statement of Policy Author: Readability Score: Frequency of Review: J Ablewhite 15-16 years Annually Amendments 2014 JA Page 1 of

More information

CBI s Corporate Internet Banking Inquiry Services gives you the ability to view account details and transactions anytime, anywhere.

CBI s Corporate Internet Banking Inquiry Services gives you the ability to view account details and transactions anytime, anywhere. Benefits & Features CBI s Corporate Internet Banking Inquiry Services gives you the ability to view account details and transactions anytime, anywhere. What can I do with Internet Banking? You can inquire

More information

Vodafone New Zealand Microsoft Privacy Statement Dated: August 2013

Vodafone New Zealand Microsoft Privacy Statement Dated: August 2013 Vodafone New Zealand Microsoft Privacy Statement Dated: August 2013 This Microsoft privacy statement sets out how your personal information is used by Vodafone in connection with the provision of the Microsoft

More information

Using a Firewall General Configuration Guide

Using a Firewall General Configuration Guide Using a Firewall General Configuration Guide Page 1 1 Contents There are no satellite-specific configuration issues that need to be addressed when installing a firewall and so this document looks instead

More information

Verizon Remote Access User Guide

Verizon Remote Access User Guide Version 17.12 Last Updated: August 2012 2012 Verizon. All Rights Reserved. The Verizon names and logos and all other names, logos, and slogans identifying Verizon s products and services are trademarks

More information

PC Security and Maintenance

PC Security and Maintenance PC Security and Maintenance by IMRAN GHANI PC Maintenance and Security-Forecast. Major sources of danger. Important steps to protect your PC. PC Security Tools. PC Maintenance Tools. Tips. PC Security-

More information

This guide will go through the common ways that a user can make their computer more secure.

This guide will go through the common ways that a user can make their computer more secure. A beginners guide in how to make a Laptop/PC more secure. This guide will go through the common ways that a user can make their computer more secure. Here are the key points covered: 1) Device Password

More information

Airtel PC Secure Trouble Shooting Guide

Airtel PC Secure Trouble Shooting Guide Airtel PC Secure Trouble Shooting Guide Table of Contents Questions before installing the software Q: What is required from my PC to be able to use the Airtel PC Secure? Q: Which operating systems does

More information

Net Protector Admin Console

Net Protector Admin Console Net Protector Admin Console USER MANUAL www.indiaantivirus.com -1. Introduction Admin Console is a Centralized Anti-Virus Control and Management. It helps the administrators of small and large office networks

More information

Contents Security Centre

Contents Security Centre Contents Security Centre... 1 1. Search Engines... 2 2. Online Applications... 2 3. Virgin Money Credit Card Online Banking Security Measures... 2 3.1 Access Number, PIN and Password... 2 3.2 Keypad...

More information

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012 Sophos Enterprise Console Help Product version: 5.1 Document date: June 2012 Contents 1 About Enterprise Console...3 2 Guide to the Enterprise Console interface...4 3 Getting started with Sophos Enterprise

More information

Network and Workstation Acceptable Use Policy

Network and Workstation Acceptable Use Policy CONTENT: Introduction Purpose Policy / Procedure References INTRODUCTION Information Technology services including, staff, workstations, peripherals and network infrastructures are an integral part of

More information

SETTING UP REMOTE ACCESS ON EYEMAX PC BASED DVR.

SETTING UP REMOTE ACCESS ON EYEMAX PC BASED DVR. SETTING UP REMOTE ACCESS ON EYEMAX PC BASED DVR. 1. Setting up your network to allow incoming connections on ports used by Eyemax system. Default ports used by Eyemax system are: range of ports 9091~9115

More information

Dene Community School of Technology Staff Acceptable Use Policy

Dene Community School of Technology Staff Acceptable Use Policy Policy Overview Dene Community School of Technology The school provides computers for use by staff as an important tool for teaching, learning, and administration of the school. Use of school computers,

More information

Security Practices Essentials. Viruses McAfee Virus Software Critical Windows Updates Network Settings. Spyware Adaware Spybot Windows Defender

Security Practices Essentials. Viruses McAfee Virus Software Critical Windows Updates Network Settings. Spyware Adaware Spybot Windows Defender Security Practices Essentials Viruses McAfee Virus Software Critical Windows Updates Network Settings Spyware Adaware Spybot Windows Defender Security Practices Essentials: All computer passwords should

More information

ScoMIS Encryption Service

ScoMIS Encryption Service Introduction This guide explains how to implement the ScoMIS Encryption Service for a secondary school. We recommend that the software should be installed onto the laptop by ICT staff; they will then spend

More information

Cyber Security Awareness

Cyber Security Awareness Cyber Security Awareness User IDs and Passwords Home Computer Protection Protecting your Information Firewalls Malicious Code Protection Mobile Computing Security Wireless Security Patching Possible Symptoms

More information

Computer Network and Internet Security Awareness and Responsible Use. Indian River County School District 2014-2015

Computer Network and Internet Security Awareness and Responsible Use. Indian River County School District 2014-2015 Computer Network and Internet Security Awareness and Responsible Use Indian River County School District 2014-2015 1 Through the availability of electronic resources provided by the School District of

More information

Protecting your business from fraud

Protecting your business from fraud Protecting your business from fraud KEY TAKEAWAYS > Understand the most common types of fraud and how to identify them. > What to do if you uncover fraudulent activity or suspect you are a victim of fraud.

More information

Charter Business Desktop Security Administrator's Guide

Charter Business Desktop Security Administrator's Guide Charter Business Desktop Security Administrator's Guide Table of Contents Chapter 1: Introduction... 4 Chapter 2: Getting Started... 5 Creating a new user... 6 Recovering and changing your password...

More information

Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.

Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. 2001 2014 EdgeWave. All rights reserved. The EdgeWave logo is a trademark of EdgeWave Inc. All other trademarks and registered trademarks are hereby acknowledged. Microsoft and Windows are either registered

More information

McAfee.com Personal Firewall

McAfee.com Personal Firewall McAfee.com Personal Firewall 1 Table of Contents Table of Contents...2 Installing Personal Firewall...3 Configuring Personal Firewall and Completing the Installation...3 Configuring Personal Firewall...

More information

THE LONG EATON SCHOOL

THE LONG EATON SCHOOL THE LONG EATON SCHOOL ICT Security Policy Rules, expectations and advice for students APPROVED BY GOVERNORS: Student ICT Policy Introduction Educational establishments are using computer facilities more

More information

Accessing the Media General SSL VPN

Accessing the Media General SSL VPN Launching Applications and Mapping Drives Remote Desktop Outlook Launching Web Applications Full Access VPN Note: To access the Media General VPN, anti-virus software must be installed and running on your

More information

BE SAFE ONLINE: Lesson Plan

BE SAFE ONLINE: Lesson Plan BE SAFE ONLINE: Lesson Plan Overview Danger lurks online. Web access, social media, computers, tablets and smart phones expose users to the possibility of fraud and identity theft. Learn the steps to take

More information

Deter, Detect, Defend

Deter, Detect, Defend Deter, Detect, Defend Deter Never provide personal information, including social security number, account numbers or passwords over the phone or Internet if you did not initiate the contact Never click

More information

Spam Management Service Users Guide

Spam Management Service Users Guide Spam Management Service Users Guide We bring business & technology TOGETHER! Beringer Associates, Inc. 1591 Hylton Road Pennsauken, NJ 08110 Phone: 800.796.4854 or 856.910.7771 Fax: 800.917.2056 or 856.910.7888

More information

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious programs,

More information

Secure Your Home Computer and Router. Windows 7 Abbreviated Version. LeRoy Luginbill, CISSP

Secure Your Home Computer and Router. Windows 7 Abbreviated Version. LeRoy Luginbill, CISSP Secure Your Home Computer and Router Windows 7 Abbreviated Version LeRoy Luginbill, CISSP TABLE OF CONTENTS Introduction... 2 Getting Ready... 5 Page 1 of 10 Introduction By giving the Introduction and

More information

Information Services. Accessing the University Network using a Virtual Private Network Connection (VPN), with Windows XP Professional

Information Services. Accessing the University Network using a Virtual Private Network Connection (VPN), with Windows XP Professional Information Services Accessing the University Network using a Virtual Private Network Connection (VPN), with Windows XP Professional Amendment & Authorisation History Ver Date Changes Name Author A 29/3/05

More information

Quarantine Network for Specialised Equipment.

Quarantine Network for Specialised Equipment. Quarantine Network for Specialised Equipment. Using Remote Desktop to get data in and out of the quarantine network V1.2 It is now possible to connect through a gateway or terminal server to PCs connected

More information

Connecting to securevirtual Workspace

Connecting to securevirtual Workspace Connecting to securevirtual Workspace The following document provides information on connecting to securevirtual Workspace. This Document includes: Connecting Using Remote Desktop Connection (RDC) Connecting

More information

Quarantined Messages 5 What are quarantined messages? 5 What username and password do I use to access my quarantined messages? 5

Quarantined Messages 5 What are quarantined messages? 5 What username and password do I use to access my quarantined messages? 5 Contents Paul Bunyan Net Email Filter 1 What is the Paul Bunyan Net Email Filter? 1 How do I get to the Email Filter? 1 How do I release a message from the Email Filter? 1 How do I delete messages listed

More information

Security Tips You are here: Home» Security Tips

Security Tips You are here: Home» Security Tips Security Tips You are here: Home» Security Tips Click on a the Security Icon to view detailed information on: Responsibility of the Bank Password Policy Guide Online Security Internet Security Tips Scam

More information

Cyber Security Awareness

Cyber Security Awareness Cyber Security Awareness William F. Pelgrin Chair Page 1 Introduction Information is a critical asset. Therefore, it must be protected from unauthorized modification, destruction and disclosure. This brochure

More information

For assistance with your computer, software or router we have supplied the following information: Tech Support 1-855-546-5000, press 1

For assistance with your computer, software or router we have supplied the following information: Tech Support 1-855-546-5000, press 1 For assistance with your computer, software or router we have supplied the following information: Tech Support 1-855-546-5000, press 1 Talk America Services Customer Service 1-855-546-5000, press 3 TALK

More information

Essentials of PC Security: Central Library Tech Center Evansville Vanderburgh Public Library

Essentials of PC Security: Central Library Tech Center Evansville Vanderburgh Public Library Essentials of PC Security: Central Library Tech Center Evansville Vanderburgh Public Library Why should you be concerned? There are over 1 million known computer viruses. An unprotected computer on the

More information

Cyber Essentials Questionnaire

Cyber Essentials Questionnaire Cyber Essentials Questionnaire Introduction The Cyber Essentials scheme is recommended for organisations looking for a base level Cyber security test where IT is a business enabler rather than a core deliverable.

More information

Network Connect Installation and Usage Guide

Network Connect Installation and Usage Guide Network Connect Installation and Usage Guide I. Installing the Network Connect Client..2 II. Launching Network Connect from the Desktop.. 9 III. Launching Network Connect Pre-Windows Login 11 IV. Installing

More information

Hamilton College Administrative Information Systems Security Policy and Procedures. Approved by the IT Committee (December 2004)

Hamilton College Administrative Information Systems Security Policy and Procedures. Approved by the IT Committee (December 2004) Hamilton College Administrative Information Systems Security Policy and Procedures Approved by the IT Committee (December 2004) Table of Contents Summary... 3 Overview... 4 Definition of Administrative

More information

Information Security. Louis Morgan, CISSP Information Security Officer

Information Security. Louis Morgan, CISSP Information Security Officer Information Security By Louis Morgan, CISSP Information Security Officer Why Bother with IT Security? Recent estimate - 900 million personal computers worldwide. Computer hackers are out there. How long

More information

What you can do prevent virus infections on your computer

What you can do prevent virus infections on your computer What you can do prevent virus infections on your computer A computer virus is program code which 'hides' in other files and can cause irreparable damage to your computer. Computer viruses spread easily

More information

Protect yourself online

Protect yourself online Protect yourself online Advice from Nottinghamshire Police s Pre Crime Unit Get daily updates: www.nottinghamshire.police.uk www.twitter.com/nottspolice www.facebook.com/nottspolice www.youtube.com/nottinghampolice

More information