Basic Computer Security Part 3

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Basic Computer Security Part 3"

Transcription

1 Basic Computer Security Part 3 Presenter David Schaefer, MBA OCC Manager of Desktop Support Adjunct Security Instructor: Walsh College, Oakland Community College, Lawrence Technology University

2 Welcome to Basic Computer Security Passwords vs. Passphrases Regular Backup Strategies Protecting our Children

3 Passwords & Social Engineering By Jimmy Kimmel

4 Passwords vs. Passphrases Your username and password protects confidential data Good password pointers: Don t make passwords that are easy to guess 1. Don t use passwords like god or Pets Name Birthdate 2. Use passwords that are easy to remember If you keep forgetting your passwords they are not too helpful

5 Passwords vs. Passphrases 3. Make your password longer The Longer the password the harder it is for unethical attackers to use programs that can guess the passwords quickly. Use Multiple words for your password aka passphrase (see comic by xkcd):

6 Passwords vs. Passphrases 4. Use Different Passwords for different accounts Example: Don t use your Facebook password for your Twitter account or your work account.» If one of the passwords gets stolen, then only one account will be compromised. 5. Use a password manager such as KeePass (example) to encrypt and store multiple passwords and usernames. This stores all your passwords for you. Only open the password manager when you need it and if you think your computer is infected, don t open it. This makes it simple because you only need to remember the password to your computer and the password manager program (yes they should be different) Be sure to back it up to a safe location

7 Password Safe Example

8 Passwords vs. Passphrases 6. Never share your passwords with anyone including coworkers or friends. If anyone else knows your password it s no longer secure. 7. Do not use public computers to log into a highly sensitive network such as a: Work Computer Bank Account Or any other system that has your highly sensitive information on Since anyone can use these computers they may be infected with a Key Logger program designed to capture your key strokes 8. Only log onto systems you trust and know that is safe. 9. Change your password immediately if you mistakenly gave your password away or found out it was compromised. 10. Be careful when answering personal questions on websites like Facebook Those answers can be used for security questions and against you later they are also easy to look up.

9 Passwords vs. Passphrases 11. Use two factor authentication if available to you. You need more than just your password to login using two factors» Example: Setting up your phone to get a security code that you have to put in instead of the password when you login. 12. If you no longer use an account, disable or delete it.

10 Regular Backup Strategies Backup Strategies are important to ensuring your data is available for you to use in case of a: Computer malfunction Someone accidently deleting/altering your data For home consider using offline media USB hard drives for larger amounts of data USB thumb smaller amounts of data Utilize a Data Backup Strategy Maintain two full copies of your backup on Separate devices For highly critical data store it in a separate location Stagger the backups over periods of times like 3 months This minimizes the chances of you backing up corrupted data to all devices

11 Common Backup Tools Time Machine for Mac Great tool to use, basically you the following to your computer: Hard drive Airport Extreme with a hard drive attached Turn on Time Machine, and let it go It even has an option to encrypt the data! Windows Windows Backup Easy Transfer Manually coping the files you need over to the hard drive Internet Services (aka Cloud) such as: Mozy or Carbonite may have to pay monthly fees

12 Protecting Our Children Security doesn t stop at us We need to protect the gift of children Three types of dangers that children will face Threats from Themselves May share too much information about themselves, passwords, social security numbers, family, phone number, addresses, or location» May even lead to identity theft» Accounts may be compromised Employers and Universities may perform background checks on what kids have posted

13 Protecting Our Children Strangers Physically or emotionally may hurt our children Pretend to be someone else and build trust with our babies Friends» Exploits trust for their own purpose Bullying» Make fun of or harass by publically posting comments and humiliating our kids» Sending of harassing messages to mobile devices» Messages may be anonymous

14 Protecting Our Children 1. Make sure you are talking to your children about these risks Education is the best defense for you children 2. Make sure they are selective about who they talk to 3. Make sure they don t share any private information Define what is private vs. what is not Also what is appropriate vs. non appropriate to talk about 4. Make sure they are comfortable to talking to you if they are a victim of any of the threats.

15 Protecting Our Children 5. Have a private computer for only your children to use. Ensures they don t accidently infect your main computer that you use for online banking, etc. Put the computer in a public area you can monitor Make sure they don t have administrator rights 6. For mobile devices Consider having a centralized charging station in your bedroom Children can place the mobile devices at the charging stations before they go to bed.

16 Protecting Our Children 7. Establish rules for using computer related devices State: How long they can use the computer Who to report problems to What they can or can t do online Post the rules by your children's computer 8. Use Filtering or monitoring capabilities in your operating system Allows you to control what children can do online such as: What times they can access the computer What websites they may visit May prevent them from accidently accessing something inappropriate or dangerous to the computer Consider purchasing software if your operating system doesn t have it Commercial software may have more advanced features Some of these programs may have monitoring capabilities to tell you what websites they are looking at

17 Linux Load app called Nanny..

18 Default Windows Parental Controls Set specific time limits on your children's computer use. Prevent your children from playing games you don't want them to play. Keep your children from running specific programs.

19 Default OS X Yosemite Parental controls Specify apps a child can access Limit by age appropriate Web limit access to websites or allow unrestricted People Restrict content via game center, mail, and messages Time limits weekday, weekdays, and bedtime Hide Block profanity using the built in camera Dictation Burning CDs/DVDs Changing password Changing Printer settings

20 Default Parental Controls Android Have to setup a user account per each person you want to limit access to apps Will also need to password protect these settings from the kids otherwise they can change them

21 Default Apple Mobile Devices Need to enable restrictions Also enable password

22 ios Apps you can restrict Safari Camera (also disables FaceTime) FaceTime itunes Store ibooks Store In-App Purchases Siri AirDrop CarPlay (available only with iphone 5 or later) Installing apps Deleting apps

23 ios Content Restrictions Ratings (select the country in the ratings section to automatically apply the appropriate content ratings for that region) Music and podcasts Movies TV shows Books Apps Siri Websites If you don t use Touch ID for paid and in-app purchases, you can choose between two options for how often you need to enter your password for these purchases.

24 ios Privacy Setting Restrictions Location Services Contacts Calendars Reminders Photos Bluetooth sharing Microphone Twitter Facebook Advertising

25 ios settings and accounts & Features in Game Center Accounts (you can prevent changes to Mail, Contacts, Calendars, icloud, Twitter, Facebook, Vimeo, Flickr, itunes, App Store, imessage, and FaceTime) Background app refresh Find My Friends (available when you install the Find My Friends app) Volume limit Cellular data use (available only on cellular-enabled ios devices) Multiplayer games Adding friends

26 Parental Control Software Android Sample

27 Parental Control Software Android Website Sample

28 Sample Website Activities and Apps

29 Sample Website

30 Activities Logged and Block Control

31 Great Tools to limit activities! Sorry kids

32 Lot of packages let you try the software for free Depending on the app, they may: limit functions limits amount of kids you can monitor limits amount of devices

33 Then you have free apps.. K9 Web Protection Great blocking program Spyrix Free Keylogger Windows Live Family Safety Blocker not a monitor Kidlogger allows password protection Monitors keystrokes, clipboard, skype chats, usb media insertion, website URLs Naomi Filters out adult content

34 Parental Control Free apps vs. Paid Apps Paid applications Generally Speaking: Can include more functionality Combine multiple features from the free apps into one application Can be central managed You create a user account for your kid Then assign that account to multiple computers» Those settings follow the user account as the kid moves from device to device

35 The End Hope you enjoyed this presentation Passwords vs. Passphrases Regular Backup Strategies Protecting our Children

36 My Personal Contact Info My Web Page: My Address:

Apple Deployment Programs Apple ID for Students: Parent Guide

Apple Deployment Programs Apple ID for Students: Parent Guide Apple Deployment Programs Apple ID for Students: Parent Guide As a parent or guardian, you want the best learning environment for your student. One that makes learning relevant for each student and allows

More information

Mobile Device Management ios Policies

Mobile Device Management ios Policies Mobile Device Management ios Policies Introduction ios policies allow administrators to use mobile device management features of CentraStage and push them, over the air (OTA), to ios devices (in other

More information

1:1 ipad Program Device Setup Guide

1:1 ipad Program Device Setup Guide 1:1 ipad Program Device Setup Guide BYOD ipad Setup Guide Choosing Restrictions ipad Restrictions Restrictions are an important part of encouraging your child s responsible use of their ipad. Each family

More information

Basic Computer Security Part 2

Basic Computer Security Part 2 Basic Computer Security Part 2 Presenter David Schaefer, MBA OCC Manager of Desktop Support Adjunct Security Instructor: Walsh College, Oakland Community College, Lawrence Technology University Welcome

More information

Backing Up Your Files. External Hard Drives

Backing Up Your Files. External Hard Drives Backing Up Your Files As we become more and more dependent on technology to help accomplish our everyday tasks, we tend to forget how easily the information stored on our computers can be lost. Imagine

More information

FINAL DRAFT. APPLE ios 9 SECURITY TECHNICAL IMPLEMENTATION GUIDE (STIG) CONFIGURATION TABLE. Version 1, Release 0.1.

FINAL DRAFT. APPLE ios 9 SECURITY TECHNICAL IMPLEMENTATION GUIDE (STIG) CONFIGURATION TABLE. Version 1, Release 0.1. FINAL DRAFT APPLE ios 9 SECURITY TECHNICAL IMPLEMENTATION GUIDE (STIG) CONFIGURATION TABLE Version 1, Release 0.1 18 September 2015 Developed by Apple and for the DoD LIST OF TABLES Page Table 1: Non-Supervised

More information

itunes: About ios backups

itunes: About ios backups itunes: About ios backups itunes can back up your settings, Messages, Camera Roll, documents, saved games, and other data. Backups don't contain content synced to the device, such as movies, music, podcasts,

More information

1. You will have knowledge of all the features of Yosemite and ios 8 that allow employees and business owners to collaborate on their work.

1. You will have knowledge of all the features of Yosemite and ios 8 that allow employees and business owners to collaborate on their work. Collaboration Collaboration simply means to work together and that is exactly what Yosemite and ios 8 do for individuals and organisations. Quite often organisations face challenges around how to get technology,

More information

Introduction to AirWatch and Configurator

Introduction to AirWatch and Configurator Introduction to AirWatch and Configurator Overview AirWatch integrates seamlessly with Apple Configurator to enable IT administrators to effectively deploy and manage Apple ios devices. Deploying a large

More information

Deploying iphone and ipad Mobile Device Management

Deploying iphone and ipad Mobile Device Management Deploying iphone and ipad Mobile Device Management ios supports Mobile Device Management (MDM), giving businesses the ability to manage scaled deployments of iphone and ipad across their organizations.

More information

It s 2 o clock: Who Has Your Data? Josh Krueger Chief Technology Officer Integrity Technology Solutions

It s 2 o clock: Who Has Your Data? Josh Krueger Chief Technology Officer Integrity Technology Solutions It s 2 o clock: Who Has Your Data? Josh Krueger Chief Technology Officer Integrity Technology Solutions Your home is your business and your farm is your network. But who has access to it? Can you protect

More information

STOP. THINK. CONNECT. Online Safety Quiz

STOP. THINK. CONNECT. Online Safety Quiz STOP. THINK. CONNECT. Online Safety Quiz Round 1: Safety and Security Kristina is on Facebook and receives a friend request from a boy she doesn t know. What should she do? A. Accept the friend request.

More information

Deploying iphone and ipad Security Overview

Deploying iphone and ipad Security Overview Deploying iphone and ipad Security Overview ios, the operating system at the core of iphone and ipad, is built upon layers of security. This enables iphone and ipad to securely access corporate services

More information

HOW TO STAY SAFE. Smartphones

HOW TO STAY SAFE. Smartphones HOW TO STAY SAFE Smartphones Smartphones provide a variety of interesting activities and ways for young people to engage with their friends and families. However, it is important to be aware of what these

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions 1) What does SkyBest Internet Guardian do? Prevents e-mail and image spam from reaching your inbox Halts access to dangerous Web pages Stops Web sites from installing dangerous

More information

Today s mobile ecosystem means shared responsibility

Today s mobile ecosystem means shared responsibility It seems just about everybody has a mobile phone now, including more than three-quarters of U.S. teens and a rapidly growing number of younger kids. For young people as well as adults, the technology has

More information

School Technology 101 for Parents. Tips for Monitoring Your Child s Digital Life

School Technology 101 for Parents. Tips for Monitoring Your Child s Digital Life School Technology 101 for Parents Tips for Monitoring Your Child s Digital Life ipad Helpful Tips Look at your child s ipad daily 70% of students surveyed last year said parents looked at their ipads rarely

More information

Password Depot for Android

Password Depot for Android Password Depot for Android Table Of Contents Table Of Contents... 2 User interface... 3 Action Bar... 3 Overflow Menu... 4 Entry menu... 5 Context Bar... 6 Settings... 7 Creating a password file... 8 Opening

More information

A Parents Guide to. 2015 ConnectSafely.org saferinternet.org.uk

A Parents Guide to. 2015 ConnectSafely.org saferinternet.org.uk A Parents Guide to 2015 ConnectSafely.org saferinternet.org.uk At the UK Safer Internet Centre, one of our key objectives is to develop new educational and awareness-raising resources for parents in the

More information

Data Recovery User Guide

Data Recovery User Guide Data Recovery User Guide Contents How to Use Syncios Data Recovery for windows?... 3 1. How to download and install Data Recovery... 3 2. How to Register Syncios Data Recovery Windows Version... 3 3. Data

More information

Understanding Security Threats in the Cyber World. Beth Chancellor, Chief Information Security Officer

Understanding Security Threats in the Cyber World. Beth Chancellor, Chief Information Security Officer Understanding Security Threats in the Cyber World Beth Chancellor, Chief Information Security Officer Agenda Phishing Credit Card Fraud & Identity Theft Cloud Services Social Networking Wireless Phishing

More information

Your Device. Apple s Servers. What is icloud? How Does icloud Work? Step 1) Turn on icloud. Can Apple look at my stuff? No!

Your Device. Apple s Servers. What is icloud? How Does icloud Work? Step 1) Turn on icloud. Can Apple look at my stuff? No! 1 What is icloud? icloud is an online-based service that is owned and operated by Apple. It operates in cyberspace in the cloud and is run from many powerful Internet servers that are housed within Apple

More information

Store & Share Quick Start

Store & Share Quick Start Store & Share Quick Start What is Store & Share? Store & Share is a service that allows you to upload all of your content (documents, music, video, executable files) into a centralized cloud storage. You

More information

TIPS FOR USING OS X 10.8 MOUNTAIN LION

TIPS FOR USING OS X 10.8 MOUNTAIN LION Mac OS X Tutorial 10.8 Mountain Lion 1 TIPS FOR USING OS X 10.8 MOUNTAIN LION LAUNCHPAD Launchpad is an application launcher first introduced in OS X 10.7 Lion and improved upon in Mountain Lion. Launchpad

More information

Management Options ios

Management Options ios Management Options ios New Market ipads - January 2010 Several changes in a short period of time. Apple Lion Server came out June 2011. Apple Configurator came out in June 2012. Why Absolute or Alteris?

More information

Google Drive lets you store and share all your stuff, including documents, videos, images and other files that are important to

Google Drive lets you store and share all your stuff, including documents, videos, images and other files that are important to What are Docs & Drive? Docs Use Google Docs, Sheets and Slides for document editing anywhere, anytime. Google Docs is an online word processor that lets you create and format text documents and collaborate

More information

Defense Media Activity Guide To Keeping Your Social Media Accounts Secure

Defense Media Activity Guide To Keeping Your Social Media Accounts Secure Guide To Keeping Your Social Media Accounts Secure Social media is an integral part of the strategic communications and public affairs missions of the Department of Defense. Like any asset, it is something

More information

The End is Near. Options for File Management and Storage

The End is Near. Options for File Management and Storage The End is Near Options for File Management and Storage Options Google Drive icloud Drive USB Drives H:Drive icloud icloud IOS 8 icloud Drive icloud With icloud Drive, you can safely store all your presentations,

More information

OS X Yosemite - Features

OS X Yosemite - Features OS X Yosemite - Features OS X Yosemite is the operating system for Mac computers and is smart, very smart, and looks and sounds good too. This essay is about why OS X Yosemite is important for owners of

More information

Hello. Quick Start Guide

Hello. Quick Start Guide Hello. Quick Start Guide Welcome to your new MacBook Air. Let us show you around. This guide shows you what s on your Mac, helps you set it up, and gets you up and running with tips for the apps you ll

More information

Deploying iphone and ipad Mobile Device Management

Deploying iphone and ipad Mobile Device Management Deploying iphone and ipad Mobile Device Management ios supports Mobile Device Management (MDM), giving businesses the ability to manage scaled deployments of iphone and ipad across their organizations.

More information

1. Introduction... 1. 2. Activation of Mobile Device Management... 3. 3. How Endpoint Protector MDM Works... 5

1. Introduction... 1. 2. Activation of Mobile Device Management... 3. 3. How Endpoint Protector MDM Works... 5 User Manual I Endpoint Protector Mobile Device Management User Manual Table of Contents 1. Introduction... 1 1.1. What is Endpoint Protector?... 2 2. Activation of Mobile Device Management... 3 2.1. Activation

More information

DSHS CA Security For Providers

DSHS CA Security For Providers DSHS CA Security For Providers Pablo F Matute DSHS Children's Information Security Officer 7/21/2015 1 Data Categories: An Overview All DSHS-owned data falls into one of four categories: Category 1 - Public

More information

HomeNet. Gateway User Guide

HomeNet. Gateway User Guide HomeNet Gateway User Guide Gateway User Guide Table of Contents HomeNet Gateway User Guide Gateway User Guide Table of Contents... 2 Introduction... 3 What is the HomeNet Gateway (Gateway)?... 3 How do

More information

Outlook Web App (OWA) Quick Start Guide

Outlook Web App (OWA) Quick Start Guide As we move to AD, Office365 and Outlook from our comfort zone of Novell and GroupWise, remember that you have been using Microsoft for a long time. Yes, Office is a Microsoft product. Since Outlook is

More information

Personal Cloud. Support Guide for Mobile Apple Devices

Personal Cloud. Support Guide for Mobile Apple Devices Personal Cloud Support Guide for Mobile Apple Devices Storing and sharing your content 2 Getting started 2 How to use the application 2 Managing your content 2 Adding content manually 2 Downloading files

More information

A Parents' Guide to. 2014 ConnectSafely.org

A Parents' Guide to. 2014 ConnectSafely.org A Parents' Guide to 2014 ConnectSafely.org Top 5 Questions Parents Have About Instagram 1. Why do kids love Instagram? Because they love media, sharing it and socializing with it on their phones, and Instagram

More information

User Manual for Version 4.4.0.5. Mobile Device Management (MDM) User Manual

User Manual for Version 4.4.0.5. Mobile Device Management (MDM) User Manual User Manual for Version 4.4.0.5 Mobile Device Management (MDM) User Manual I Endpoint Protector Mobile Device Management User Manual Table of Contents 1. Introduction... 1 1.1. What is Endpoint Protector?...

More information

Staying Safe Online. A Practical Guide for Parents and Children.

Staying Safe Online. A Practical Guide for Parents and Children. Staying Safe Online A Practical Guide for Parents and Children. Introduction Young people are growing up in a technology rich world. They are surrounded by various forms of technology and they use it extensively

More information

ios Education Deployment Overview

ios Education Deployment Overview ios Education Deployment Overview ipad brings an amazing set of tools to the classroom. Teachers can easily customize lessons with interactive textbooks, rich media, and online courses. And students stay

More information

Password Depot for ios

Password Depot for ios Password Depot for ios Table Of Contents First steps... 1 Creating a password file... 1 Creating new entries... 3 Adding entries / groups... 3 Copying or relocating entries / groups... 3 Deleting entries

More information

Security guide. small businesses and freelancers. Security guide 1

Security guide. small businesses and freelancers. Security guide 1 Security guide small businesses and freelancers Security guide 1 1. Introduction 3. The most dangerous types of threats 5. Will you let us protect you? 2. Where is the danger and how can we protect ourselves?

More information

Policy and Profile Reference Guide. BES10 Cloud Market Preview

Policy and Profile Reference Guide. BES10 Cloud Market Preview Policy and Profile Reference Guide BES10 Cloud Market Preview Published: 2014-02-04 SWD-20140204170848330 Contents About this guide... 13 What is BES10 Cloud?... 13 Key features of BES10 Cloud...14 IT

More information

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious programs,

More information

National Cybersecurity Awareness Campaign. Kids Presentation

National Cybersecurity Awareness Campaign. Kids Presentation National Cybersecurity Awareness Campaign Kids Presentation About Stop.Think.Connect. In 2009, President Obama asked the Department of Homeland Security to create the Stop.Think.Connect. Campaign to help

More information

The following information was provided by SANS and discusses IT Security Awareness. It was last updated in 2015.

The following information was provided by SANS and discusses IT Security Awareness. It was last updated in 2015. The following information was provided by SANS and discusses IT Security Awareness. It was last updated in 2015. By completing this module and the quiz, you will receive credit for CW 170, which is required

More information

Amazon WorkMail. User Guide Version 1.0

Amazon WorkMail. User Guide Version 1.0 Amazon WorkMail User Guide Amazon WorkMail: User Guide Copyright 2016 Amazon Web Services, Inc. and/or its affiliates. All rights reserved. Amazon's trademarks and trade dress may not be used in connection

More information

ipad User Guide For ios 7 Software

ipad User Guide For ios 7 Software ipad User Guide For ios 7 Software Contents 7 Chapter 1: ipad at a Glance 7 ipad Overview 8 Accessories 9 Multi-Touch screen 9 Sleep/Wake button 10 Home button 10 Volume buttons and the Side Switch 11

More information

Pryvate App User Manual

Pryvate App User Manual Pryvate App User Manual 2.0 Powered by Criptyque Pryvate is the most secure voice, email & chat app for business people & individuals that require a high level of communications encryption to protect their

More information

Backing up your digital image collection provides it with essential protection.

Backing up your digital image collection provides it with essential protection. Backing up your digital image collection provides it with essential protection. In this chapter, you ll learn more about your options for creating a reliable backup of your entire digital image library.

More information

Setting up iphone (ios6) to access UL StaffExchange

Setting up iphone (ios6) to access UL StaffExchange The set-up and maintance of your iphone is your responsibility. This document initially covers the setting up of your UL email, assuming you have the basic setup of the iphone done. It then goes on to

More information

ios Enterprise Deployment Overview

ios Enterprise Deployment Overview ios Enterprise Deployment Overview ios devices such as ipad and iphone can transform your business. They can significantly boost productivity and give your employees the freedom and flexibility to work

More information

ipod touch User Guide For ios 8.1 Software

ipod touch User Guide For ios 8.1 Software ipod touch User Guide For ios 8.1 Software Contents 8 Chapter 1: ipod touch at a Glance 8 ipod touch overview 8 Accessories 9 Multi-Touch screen 10 Buttons 11 Status icons 13 Chapter 2: Getting Started

More information

Reference Guide TEAM. Pogoplug Team. Reference Guide. 2012 Cloud Engines Inc., All Rights Reserved.

Reference Guide TEAM. Pogoplug Team. Reference Guide. 2012 Cloud Engines Inc., All Rights Reserved. Reference Guide Pogoplug Team Reference Guide Table of Contents Table of Contents 1. What s Included 2. Getting Started 3. Customizing the Pogoplug Interface a. Custom UI b. Custom Domain Name c. Custom

More information

This document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet.

This document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet. This document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet. Hft Safeguarding Group commissioned a member of Hft National

More information

National Cyber Security Month 2015: Daily Security Awareness Tips

National Cyber Security Month 2015: Daily Security Awareness Tips National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.

More information

Social Network Security. Frank K. F. Chow Vice-Chairperson Professional Information Security Association (PISA)

Social Network Security. Frank K. F. Chow Vice-Chairperson Professional Information Security Association (PISA) Social Network Security Frank K. F. Chow Vice-Chairperson Professional Information Security Association (PISA) How Do We Communicate Today? I can write you a letter by snail mail. I can write you a letter

More information

In the Cloud. Scoville Memorial Library February, 2013 ccayne@biblio.org

In the Cloud. Scoville Memorial Library February, 2013 ccayne@biblio.org In the Cloud Scoville Memorial Library February, 2013 ccayne@biblio.org What is the Cloud? You may have heard people using terms like the cloud, cloud computing, or cloud storage. But what exactly is the

More information

Online Safety for Middle and High School

Online Safety for Middle and High School Online Safety for Middle and High School Presented by Warren County Schools Technology Department 2010-2011 Internet & Technology Safety The purpose of this presentation is to TEACH YOU about INTERNET

More information

Seagate Dashboard User Manual

Seagate Dashboard User Manual Seagate Dashboard User Manual Model: Click here to access an up-to-date online version of this document. You will also find the most recent content as well as expandable illustrations, easier navigation,

More information

Access Tropical Cloud Desktop from Any Device

Access Tropical Cloud Desktop from Any Device Access Tropical Cloud Desktop from Any Device Tropical Business Solutions White Paper Contents What is Tropical Cloud Desktop?... 3 Information you are going to need... 3 How to connect to the Tropical

More information

1. Set a longer (and stronger) six-digit passcode. 2. Prevent apps from uploading your data

1. Set a longer (and stronger) six-digit passcode. 2. Prevent apps from uploading your data For Privacy and Security Change ios 9 Settings Immediately by Zack Whittaker ZDNet Security September 16, 2015 Source: http://www.zdnet.com/pictures/iphone-ipad-ios-9-privacy-security-settings-immediately/

More information

A Parents' Guide to ConnectSafely.org

A Parents' Guide to ConnectSafely.org A Parents' Guide to 2013 ConnectSafely.org Top 5 Questions Parents Have About Instagram 1. Why do kids love Instagram? For young people, Instagram is a media-sharing app with a whole lot of emphasis on

More information

MS ipad Acceptable Use Policy (AUP) 2015-2016

MS ipad Acceptable Use Policy (AUP) 2015-2016 Introduction Monte Vista provides network and technology resources to enrich the academic experience of students, faculty and staff. Our 1:1 ipad program is a natural extension of our mission to be a premiere

More information

Teachers Manual for iphone for Seniors

Teachers Manual for iphone for Seniors Teachers Manual for iphone for Seniors ISBN 978 90 5905 349 6 2 1. Introduction This course manual assumes a lesson structure consisting of nine points. These points have been divided into three groups.

More information

FAMILY. Reference Guide. Pogoplug Family. Reference Guide. 2012 Cloud Engines, Inc. All Rights Reserved.

FAMILY. Reference Guide. Pogoplug Family. Reference Guide. 2012 Cloud Engines, Inc. All Rights Reserved. Reference Guide Pogoplug Family Reference Guide Table of Contents Table of Contents 1. What s Included 2. Setting Up Your Pogoplug Device 3. Back Up a. Backing Up Your Computers b. Backing Up Your Mobile

More information

Flexible Identity Federation

Flexible Identity Federation Flexible Identity Federation User guide version 1.0.1 Publication History Date Description Revision 2015.09.25 initial release 1.0.0 2015.12.10 minor corrections 1.0.1 Copyright Orange Business Services

More information

GUIDE TO KEEPING YOUR SOCIAL MEDIA ACCOUNTS SECURE

GUIDE TO KEEPING YOUR SOCIAL MEDIA ACCOUNTS SECURE GUIDE TO KEEPING YOUR SOCIAL MEDIA ACCOUNTS SECURE Defense Media Activity TABLE OF CONTENTS PROTECTIVE MEASURES... 2 PREPARATION CHECKLIST... 2 IF YOU SUSPECT YOUR ACCOUNT IS COMPROMISED, THE FOLLOWING

More information

Creating an Apple ID Account Using the Internet on a Desktop or Laptop Computer

Creating an Apple ID Account Using the Internet on a Desktop or Laptop Computer Creating an Apple ID Account Using the Internet on a Desktop or Laptop Computer An Apple ID account is required to complete the device setup and to purchase apps. Your Apple ID is used for almost everything

More information

OUTLOOK WEB ACCESS. User Guide

OUTLOOK WEB ACCESS. User Guide OUTLOOK WEB ACCESS User Guide V3 2 August 2013 Not protectively marked GETTING STARTED Outlook Web Access (OWA) provides a useful means to remotely access Council email from outside of the council access.

More information

TELUS Business Connect Meeting User Guide. Video Conference. Web Share.

TELUS Business Connect Meeting User Guide. Video Conference. Web Share. TELUS Business Connect Meeting User Guide Video Conference. Web Share. Table of Contents 3 System requirements 4 Download & Install 6 Meet: Host a Meeting 8 Join a Meeting as participant 9 Invite participants

More information

End User Devices Security Guidance: Apple ios 8

End User Devices Security Guidance: Apple ios 8 GOV.UK Guidance End User Devices Security Guidance: Apple ios 8 Published Contents 1. Changes since previous guidance 2. Usage scenario 3. Summary of platform security 4. How the platform can best satisfy

More information

Norton Family Product Manual

Norton Family Product Manual Norton TM Family Product Manual Care for our Environment; It's the right thing to do. Symantec has removed the cover from this manual to reduce the Environmental Footprint of our products. This manual

More information

Cloud Services MDM. ios User Guide

Cloud Services MDM. ios User Guide Cloud Services MDM ios User Guide 10/24/2014 CONTENTS Overview... 3 Supported Devices... 3 System Capabilities... 3 Enrollment and Activation... 4 Download the Agent... 4 Enroll Your Device Using the Agent...

More information

High Speed Internet - User Guide. Welcome to. your world.

High Speed Internet - User Guide. Welcome to. your world. High Speed Internet - User Guide Welcome to your world. 1 Welcome to your world :) Thank you for choosing Cogeco High Speed Internet. Welcome to your new High Speed Internet service. When it comes to a

More information

easy-to-use platform. Our solution offers the best video, audio and screen-sharing quality across Window, Mac, ios, Android

easy-to-use platform. Our solution offers the best video, audio and screen-sharing quality across Window, Mac, ios, Android Getting Started On PC And Mac What is Zoom? Zoom, the cloud meeting company, unifies cloud video conferencing, simple online meetings and mobile collaboration into one easy-to-use platform. Our solution

More information

Online, Download Free ebook Address Search - ebook

Online, Download Free ebook  Address Search - ebook Online, Download Free ebook Email Address Search - ebook Online, Download Free ebook Email Address Search - ebook Downloading From Genuine URL >> http://f-ebook.esy.es/emailtrace/pdx/fph1 Tags: Get Free

More information

What is the Cloud? Computer Basics Web Apps and the Cloud. Page 1

What is the Cloud? Computer Basics Web Apps and the Cloud. Page 1 Computer Basics Web Apps and the Cloud What is the Cloud? You may have heard people using terms like the cloud, cloud computing, or cloud storage. But what exactly is the cloud? Basically, the cloud is

More information

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out

More information

Protect Yourself. Who is asking? What information are they asking for? Why do they need it?

Protect Yourself. Who is asking? What information are they asking for? Why do they need it? Protect Yourself Your home computer serves many purposes: email, shopping, social networking and more. As you surf the Internet, you should be aware of the various ways to protect yourself. Of primary

More information

A Parents Guide to. 2014 ConnectSafely.org

A Parents Guide to. 2014 ConnectSafely.org A Parents Guide to 2014 ConnectSafely.org Parenting in the age of social media can be tricky. Australians are amongst the highest users of social media in the world, averaging 22 hours per week per person.

More information

Supporting Apple ios Devices

Supporting Apple ios Devices Supporting Apple ios Devices 2016 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of their respective

More information

Digital Citizenship Lesson Plan

Digital Citizenship Lesson Plan Digital Citizenship Lesson Plan This course is to help people to understand how to use the Internet in a safe, productive way. Additional resources and links are available on the TechTECS website. http://techtecs.com/digital-citizenship

More information

...Some people / organizations will be a target REGARDLESS of what they do, but most will be a target / victim BECAUSE of what they do

...Some people / organizations will be a target REGARDLESS of what they do, but most will be a target / victim BECAUSE of what they do ...Some people / organizations will be a target REGARDLESS of what they do, but most will be a target / victim BECAUSE of what they do (2013 DATA BREACH INVESTIGATIONS REPORT p.1) MOBILE D EVICE S AFETY

More information

How-to Guide: Using FREE Technology to Communicate with Your Members

How-to Guide: Using FREE Technology to Communicate with Your Members American Student Dental Association How-to Guide: Using FREE Technology to Communicate with Your Members Table of Contents Group E-Mail Group Texting Team Communication Scheduling Tools Online Calendars

More information

Dictamus Manual. Dictamus is a professional dictation app for iphone, ipod touch and ipad. This manual describes setup and use of Dictamus version 10.

Dictamus Manual. Dictamus is a professional dictation app for iphone, ipod touch and ipad. This manual describes setup and use of Dictamus version 10. Dictamus Manual Dictamus is a professional dictation app for iphone, ipod touch and ipad. This manual describes setup and use of Dictamus version 10. Table of Contents Settings! 3 General! 3 Dictation!

More information

SYNCSHIELD FEATURES. Preset a certain task to be executed. specific time.

SYNCSHIELD FEATURES. Preset a certain task to be executed. specific time. SYNCSHIELD FEATURES This document describes the diversity of SyncShield features. Please note that many of the features require a certain platform version, often earlier software versions do not support

More information

Report on Consumer Behaviors and Perceptions of Mobile Security. Presented by NQ Mobile & NCSA January 25, 2012

Report on Consumer Behaviors and Perceptions of Mobile Security. Presented by NQ Mobile & NCSA January 25, 2012 Report on Consumer Behaviors and Perceptions of Mobile Security Presented by NQ Mobile & NCSA January 25, 2012 Methodology Online survey of 1,158 consumers. Participants had to own a smartphone. Respondents

More information

How to wipe personal data and email from a lost or stolen mobile device

How to wipe personal data and email from a lost or stolen mobile device IS Doc no 858 How to wipe personal data and email from a lost or stolen mobile device This document explains what to do if your mobile device (iphone, ipod Touch, ipad, mobile phone etc.) is stolen or

More information

Acano solution. Acano Clients v1.7 Getting Started Guide. June 2015 76-1047-03-D

Acano solution. Acano Clients v1.7 Getting Started Guide. June 2015 76-1047-03-D Acano solution Acano Clients v1.7 Getting Started Guide June 2015 76-1047-03-D Contents Contents 1 Introduction... 4 1.1 cospaces... 4 1.2 cospace Users... 4 1.3 The Acano Client... 5 2 Overview... 6 2.1

More information

Guidance End User Devices Security Guidance: Apple ios 7

Guidance End User Devices Security Guidance: Apple ios 7 GOV.UK Guidance End User Devices Security Guidance: Apple ios 7 Updated 10 June 2014 Contents 1. Changes since previous guidance 2. Usage Scenario 3. Summary of Platform Security 4. How the Platform Can

More information

Desktop and Laptop Security Policy

Desktop and Laptop Security Policy Desktop and Laptop Security Policy Appendix A Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious

More information

Mobile Device Management AirWatch Enrolment ios Devices (ipad, iphone, ipod) Documentation - End User

Mobile Device Management AirWatch Enrolment ios Devices (ipad, iphone, ipod) Documentation - End User Mobile Device Management AirWatch Enrolment ios Devices (ipad, iphone, ipod) Documentation - End User Version 1.0 Contents Definitions... 1 Expected Time Taken to complete... 1 What do I need or need to

More information

Cyber Security: Beginners Guide to Firewalls

Cyber Security: Beginners Guide to Firewalls Cyber Security: Beginners Guide to Firewalls A Non-Technical Guide Essential for Business Managers Office Managers Operations Managers This appendix is a supplement to the Cyber Security: Getting Started

More information

Smartphone Safety. mobility.protectchildren.ca. A guide for parents/guardians. Supported by:

Smartphone Safety. mobility.protectchildren.ca. A guide for parents/guardians. Supported by: Smartphone Safety A guide for parents/guardians mobility.protectchildren.ca Supported by: SAFETY & TECHNO 2 LOGY Smartphones offer both communication and safety benefits for parents and tweens/teens.*

More information

Cyber safety Parent Easy Guide 63

Cyber safety Parent Easy Guide 63 Cyber safety Parent Easy Guide 63 The online world is part of everyday life for many children and young people. It is a huge virtual playground where they can play, learn and socialise. It can be accessed

More information

Celly FAQ. inbox cells people help. celly help. Common Support Questions. celly company. General. celly @ school. policies. About Cells.

Celly FAQ. inbox cells people help. celly help. Common Support Questions. celly company. General. celly @ school. policies. About Cells. Celly FAQ Common Support Questions inbox cells people help How do I change my username? How do I change the phone number on my Celly account? How do I set my password/reset my password? How can I mass

More information

References NYS Office of Cyber Security and Critical Infrastructure Coordination Best Practices and Assessment Tools for the Household

References NYS Office of Cyber Security and Critical Infrastructure Coordination Best Practices and Assessment Tools for the Household This appendix is a supplement to the Cyber Security: Getting Started Guide, a non-technical reference essential for business managers, office managers, and operations managers. This appendix is one of

More information

PhoneView Product Manual

PhoneView Product Manual PhoneView Product Manual PhoneView is a Mac application for accessing iphone, ipad or ipod touch imessages, SMS/MMS, WhatsApp messages, contacts, call history, voicemails, shared app data, Safari web bookmarks

More information

Certified Secure Computer User

Certified Secure Computer User Certified Secure Computer User Exam Info Exam Name CSCU (112-12) Exam Credit Towards Certification Certified Secure Computer User (CSCU). Students need to pass the online EC-Council exam to receive the

More information