Basic Computer Security Part 3
|
|
- Avice Robbins
- 8 years ago
- Views:
Transcription
1 Basic Computer Security Part 3 Presenter David Schaefer, MBA OCC Manager of Desktop Support Adjunct Security Instructor: Walsh College, Oakland Community College, Lawrence Technology University
2 Welcome to Basic Computer Security Passwords vs. Passphrases Regular Backup Strategies Protecting our Children
3 Passwords & Social Engineering By Jimmy Kimmel
4 Passwords vs. Passphrases Your username and password protects confidential data Good password pointers: Don t make passwords that are easy to guess 1. Don t use passwords like god or Pets Name Birthdate 2. Use passwords that are easy to remember If you keep forgetting your passwords they are not too helpful
5 Passwords vs. Passphrases 3. Make your password longer The Longer the password the harder it is for unethical attackers to use programs that can guess the passwords quickly. Use Multiple words for your password aka passphrase (see comic by xkcd):
6 Passwords vs. Passphrases 4. Use Different Passwords for different accounts Example: Don t use your Facebook password for your Twitter account or your work account.» If one of the passwords gets stolen, then only one account will be compromised. 5. Use a password manager such as KeePass (example) to encrypt and store multiple passwords and usernames. This stores all your passwords for you. Only open the password manager when you need it and if you think your computer is infected, don t open it. This makes it simple because you only need to remember the password to your computer and the password manager program (yes they should be different) Be sure to back it up to a safe location
7 Password Safe Example
8 Passwords vs. Passphrases 6. Never share your passwords with anyone including coworkers or friends. If anyone else knows your password it s no longer secure. 7. Do not use public computers to log into a highly sensitive network such as a: Work Computer Bank Account Or any other system that has your highly sensitive information on Since anyone can use these computers they may be infected with a Key Logger program designed to capture your key strokes 8. Only log onto systems you trust and know that is safe. 9. Change your password immediately if you mistakenly gave your password away or found out it was compromised. 10. Be careful when answering personal questions on websites like Facebook Those answers can be used for security questions and against you later they are also easy to look up.
9 Passwords vs. Passphrases 11. Use two factor authentication if available to you. You need more than just your password to login using two factors» Example: Setting up your phone to get a security code that you have to put in instead of the password when you login. 12. If you no longer use an account, disable or delete it.
10 Regular Backup Strategies Backup Strategies are important to ensuring your data is available for you to use in case of a: Computer malfunction Someone accidently deleting/altering your data For home consider using offline media USB hard drives for larger amounts of data USB thumb smaller amounts of data Utilize a Data Backup Strategy Maintain two full copies of your backup on Separate devices For highly critical data store it in a separate location Stagger the backups over periods of times like 3 months This minimizes the chances of you backing up corrupted data to all devices
11 Common Backup Tools Time Machine for Mac Great tool to use, basically you the following to your computer: Hard drive Airport Extreme with a hard drive attached Turn on Time Machine, and let it go It even has an option to encrypt the data! Windows Windows Backup Easy Transfer Manually coping the files you need over to the hard drive Internet Services (aka Cloud) such as: Mozy or Carbonite may have to pay monthly fees
12 Protecting Our Children Security doesn t stop at us We need to protect the gift of children Three types of dangers that children will face Threats from Themselves May share too much information about themselves, passwords, social security numbers, family, phone number, addresses, or location» May even lead to identity theft» Accounts may be compromised Employers and Universities may perform background checks on what kids have posted
13 Protecting Our Children Strangers Physically or emotionally may hurt our children Pretend to be someone else and build trust with our babies Friends» Exploits trust for their own purpose Bullying» Make fun of or harass by publically posting comments and humiliating our kids» Sending of harassing messages to mobile devices» Messages may be anonymous
14 Protecting Our Children 1. Make sure you are talking to your children about these risks Education is the best defense for you children 2. Make sure they are selective about who they talk to 3. Make sure they don t share any private information Define what is private vs. what is not Also what is appropriate vs. non appropriate to talk about 4. Make sure they are comfortable to talking to you if they are a victim of any of the threats.
15 Protecting Our Children 5. Have a private computer for only your children to use. Ensures they don t accidently infect your main computer that you use for online banking, etc. Put the computer in a public area you can monitor Make sure they don t have administrator rights 6. For mobile devices Consider having a centralized charging station in your bedroom Children can place the mobile devices at the charging stations before they go to bed.
16 Protecting Our Children 7. Establish rules for using computer related devices State: How long they can use the computer Who to report problems to What they can or can t do online Post the rules by your children's computer 8. Use Filtering or monitoring capabilities in your operating system Allows you to control what children can do online such as: What times they can access the computer What websites they may visit May prevent them from accidently accessing something inappropriate or dangerous to the computer Consider purchasing software if your operating system doesn t have it Commercial software may have more advanced features Some of these programs may have monitoring capabilities to tell you what websites they are looking at
17 Linux Load app called Nanny..
18 Default Windows Parental Controls Set specific time limits on your children's computer use. Prevent your children from playing games you don't want them to play. Keep your children from running specific programs.
19 Default OS X Yosemite Parental controls Specify apps a child can access Limit by age appropriate Web limit access to websites or allow unrestricted People Restrict content via game center, mail, and messages Time limits weekday, weekdays, and bedtime Hide Block profanity using the built in camera Dictation Burning CDs/DVDs Changing password Changing Printer settings
20 Default Parental Controls Android Have to setup a user account per each person you want to limit access to apps Will also need to password protect these settings from the kids otherwise they can change them
21 Default Apple Mobile Devices Need to enable restrictions Also enable password
22 ios Apps you can restrict Safari Camera (also disables FaceTime) FaceTime itunes Store ibooks Store In-App Purchases Siri AirDrop CarPlay (available only with iphone 5 or later) Installing apps Deleting apps
23 ios Content Restrictions Ratings (select the country in the ratings section to automatically apply the appropriate content ratings for that region) Music and podcasts Movies TV shows Books Apps Siri Websites If you don t use Touch ID for paid and in-app purchases, you can choose between two options for how often you need to enter your password for these purchases.
24 ios Privacy Setting Restrictions Location Services Contacts Calendars Reminders Photos Bluetooth sharing Microphone Twitter Facebook Advertising
25 ios settings and accounts & Features in Game Center Accounts (you can prevent changes to Mail, Contacts, Calendars, icloud, Twitter, Facebook, Vimeo, Flickr, itunes, App Store, imessage, and FaceTime) Background app refresh Find My Friends (available when you install the Find My Friends app) Volume limit Cellular data use (available only on cellular-enabled ios devices) Multiplayer games Adding friends
26 Parental Control Software Android Sample
27 Parental Control Software Android Website Sample
28 Sample Website Activities and Apps
29 Sample Website
30 Activities Logged and Block Control
31 Great Tools to limit activities! Sorry kids
32 Lot of packages let you try the software for free Depending on the app, they may: limit functions limits amount of kids you can monitor limits amount of devices
33 Then you have free apps.. K9 Web Protection Great blocking program Spyrix Free Keylogger Windows Live Family Safety Blocker not a monitor Kidlogger allows password protection Monitors keystrokes, clipboard, skype chats, usb media insertion, website URLs Naomi Filters out adult content
34 Parental Control Free apps vs. Paid Apps Paid applications Generally Speaking: Can include more functionality Combine multiple features from the free apps into one application Can be central managed You create a user account for your kid Then assign that account to multiple computers» Those settings follow the user account as the kid moves from device to device
35 The End Hope you enjoyed this presentation Passwords vs. Passphrases Regular Backup Strategies Protecting our Children
36 My Personal Contact Info My Web Page: My Address:
Apple Deployment Programs Apple ID for Students: Parent Guide
Apple Deployment Programs Apple ID for Students: Parent Guide As a parent or guardian, you want the best learning environment for your student. One that makes learning relevant for each student and allows
More informationMobile Device Management ios Policies
Mobile Device Management ios Policies Introduction ios policies allow administrators to use mobile device management features of CentraStage and push them, over the air (OTA), to ios devices (in other
More information1:1 ipad Program Device Setup Guide
1:1 ipad Program Device Setup Guide BYOD ipad Setup Guide Choosing Restrictions ipad Restrictions Restrictions are an important part of encouraging your child s responsible use of their ipad. Each family
More informationBasic Computer Security Part 2
Basic Computer Security Part 2 Presenter David Schaefer, MBA OCC Manager of Desktop Support Adjunct Security Instructor: Walsh College, Oakland Community College, Lawrence Technology University Welcome
More informationBacking Up Your Files. External Hard Drives
Backing Up Your Files As we become more and more dependent on technology to help accomplish our everyday tasks, we tend to forget how easily the information stored on our computers can be lost. Imagine
More informationFINAL DRAFT. APPLE ios 9 SECURITY TECHNICAL IMPLEMENTATION GUIDE (STIG) CONFIGURATION TABLE. Version 1, Release 0.1.
FINAL DRAFT APPLE ios 9 SECURITY TECHNICAL IMPLEMENTATION GUIDE (STIG) CONFIGURATION TABLE Version 1, Release 0.1 18 September 2015 Developed by Apple and for the DoD LIST OF TABLES Page Table 1: Non-Supervised
More information1. You will have knowledge of all the features of Yosemite and ios 8 that allow employees and business owners to collaborate on their work.
Collaboration Collaboration simply means to work together and that is exactly what Yosemite and ios 8 do for individuals and organisations. Quite often organisations face challenges around how to get technology,
More informationSTOP. THINK. CONNECT. Online Safety Quiz
STOP. THINK. CONNECT. Online Safety Quiz Round 1: Safety and Security Kristina is on Facebook and receives a friend request from a boy she doesn t know. What should she do? A. Accept the friend request.
More informationIt s 2 o clock: Who Has Your Data? Josh Krueger Chief Technology Officer Integrity Technology Solutions
It s 2 o clock: Who Has Your Data? Josh Krueger Chief Technology Officer Integrity Technology Solutions Your home is your business and your farm is your network. But who has access to it? Can you protect
More informationHOW TO STAY SAFE. Smartphones
HOW TO STAY SAFE Smartphones Smartphones provide a variety of interesting activities and ways for young people to engage with their friends and families. However, it is important to be aware of what these
More informationDeploying iphone and ipad Mobile Device Management
Deploying iphone and ipad Mobile Device Management ios supports Mobile Device Management (MDM), giving businesses the ability to manage scaled deployments of iphone and ipad across their organizations.
More informationitunes: About ios backups
itunes: About ios backups itunes can back up your settings, Messages, Camera Roll, documents, saved games, and other data. Backups don't contain content synced to the device, such as movies, music, podcasts,
More informationIntroduction to AirWatch and Configurator
Introduction to AirWatch and Configurator Overview AirWatch integrates seamlessly with Apple Configurator to enable IT administrators to effectively deploy and manage Apple ios devices. Deploying a large
More informationSchool Technology 101 for Parents. Tips for Monitoring Your Child s Digital Life
School Technology 101 for Parents Tips for Monitoring Your Child s Digital Life ipad Helpful Tips Look at your child s ipad daily 70% of students surveyed last year said parents looked at their ipads rarely
More informationToday s mobile ecosystem means shared responsibility
It seems just about everybody has a mobile phone now, including more than three-quarters of U.S. teens and a rapidly growing number of younger kids. For young people as well as adults, the technology has
More informationDeploying iphone and ipad Security Overview
Deploying iphone and ipad Security Overview ios, the operating system at the core of iphone and ipad, is built upon layers of security. This enables iphone and ipad to securely access corporate services
More informationA Parents Guide to. 2015 ConnectSafely.org saferinternet.org.uk
A Parents Guide to 2015 ConnectSafely.org saferinternet.org.uk At the UK Safer Internet Centre, one of our key objectives is to develop new educational and awareness-raising resources for parents in the
More informationUnderstanding Security Threats in the Cyber World. Beth Chancellor, Chief Information Security Officer
Understanding Security Threats in the Cyber World Beth Chancellor, Chief Information Security Officer Agenda Phishing Credit Card Fraud & Identity Theft Cloud Services Social Networking Wireless Phishing
More informationFrequently Asked Questions
Frequently Asked Questions 1) What does SkyBest Internet Guardian do? Prevents e-mail and image spam from reaching your inbox Halts access to dangerous Web pages Stops Web sites from installing dangerous
More informationStaying Safe Online. A Practical Guide for Parents and Children.
Staying Safe Online A Practical Guide for Parents and Children. Introduction Young people are growing up in a technology rich world. They are surrounded by various forms of technology and they use it extensively
More informationNational Cybersecurity Awareness Campaign. Kids Presentation
National Cybersecurity Awareness Campaign Kids Presentation About Stop.Think.Connect. In 2009, President Obama asked the Department of Homeland Security to create the Stop.Think.Connect. Campaign to help
More informationA Parents' Guide to. 2014 ConnectSafely.org
A Parents' Guide to 2014 ConnectSafely.org Top 5 Questions Parents Have About Instagram 1. Why do kids love Instagram? Because they love media, sharing it and socializing with it on their phones, and Instagram
More informationGoogle Drive lets you store and share all your stuff, including documents, videos, images and other files that are important to
What are Docs & Drive? Docs Use Google Docs, Sheets and Slides for document editing anywhere, anytime. Google Docs is an online word processor that lets you create and format text documents and collaborate
More informationStore & Share Quick Start
Store & Share Quick Start What is Store & Share? Store & Share is a service that allows you to upload all of your content (documents, music, video, executable files) into a centralized cloud storage. You
More informationHello. Quick Start Guide
Hello. Quick Start Guide Welcome to your new MacBook Air. Let us show you around. This guide shows you what s on your Mac, helps you set it up, and gets you up and running with tips for the apps you ll
More informationMS ipad Acceptable Use Policy (AUP) 2015-2016
Introduction Monte Vista provides network and technology resources to enrich the academic experience of students, faculty and staff. Our 1:1 ipad program is a natural extension of our mission to be a premiere
More informationDSHS CA Security For Providers
DSHS CA Security For Providers Pablo F Matute DSHS Children's Information Security Officer 7/21/2015 1 Data Categories: An Overview All DSHS-owned data falls into one of four categories: Category 1 - Public
More informationPassword Depot for Android
Password Depot for Android Table Of Contents Table Of Contents... 2 User interface... 3 Action Bar... 3 Overflow Menu... 4 Entry menu... 5 Context Bar... 6 Settings... 7 Creating a password file... 8 Opening
More informationOnline Safety for Middle and High School
Online Safety for Middle and High School Presented by Warren County Schools Technology Department 2010-2011 Internet & Technology Safety The purpose of this presentation is to TEACH YOU about INTERNET
More informationThis document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet.
This document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet. Hft Safeguarding Group commissioned a member of Hft National
More informationNational Cyber Security Month 2015: Daily Security Awareness Tips
National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.
More informationSocial Network Security. Frank K. F. Chow Vice-Chairperson Professional Information Security Association (PISA)
Social Network Security Frank K. F. Chow Vice-Chairperson Professional Information Security Association (PISA) How Do We Communicate Today? I can write you a letter by snail mail. I can write you a letter
More informationDigital Citizenship Lesson Plan
Digital Citizenship Lesson Plan This course is to help people to understand how to use the Internet in a safe, productive way. Additional resources and links are available on the TechTECS website. http://techtecs.com/digital-citizenship
More informationDefense Media Activity Guide To Keeping Your Social Media Accounts Secure
Guide To Keeping Your Social Media Accounts Secure Social media is an integral part of the strategic communications and public affairs missions of the Department of Defense. Like any asset, it is something
More informationOS X Yosemite - Features
OS X Yosemite - Features OS X Yosemite is the operating system for Mac computers and is smart, very smart, and looks and sounds good too. This essay is about why OS X Yosemite is important for owners of
More informationHomeNet. Gateway User Guide
HomeNet Gateway User Guide Gateway User Guide Table of Contents HomeNet Gateway User Guide Gateway User Guide Table of Contents... 2 Introduction... 3 What is the HomeNet Gateway (Gateway)?... 3 How do
More informationThe End is Near. Options for File Management and Storage
The End is Near Options for File Management and Storage Options Google Drive icloud Drive USB Drives H:Drive icloud icloud IOS 8 icloud Drive icloud With icloud Drive, you can safely store all your presentations,
More informationPassword Depot for ios
Password Depot for ios Table Of Contents First steps... 1 Creating a password file... 1 Creating new entries... 3 Adding entries / groups... 3 Copying or relocating entries / groups... 3 Deleting entries
More informationHow to wipe personal data and email from a lost or stolen mobile device
IS Doc no 858 How to wipe personal data and email from a lost or stolen mobile device This document explains what to do if your mobile device (iphone, ipod Touch, ipad, mobile phone etc.) is stolen or
More informationTIPS FOR USING OS X 10.8 MOUNTAIN LION
Mac OS X Tutorial 10.8 Mountain Lion 1 TIPS FOR USING OS X 10.8 MOUNTAIN LION LAUNCHPAD Launchpad is an application launcher first introduced in OS X 10.7 Lion and improved upon in Mountain Lion. Launchpad
More informationBacking up your digital image collection provides it with essential protection.
Backing up your digital image collection provides it with essential protection. In this chapter, you ll learn more about your options for creating a reliable backup of your entire digital image library.
More informationSecure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines
Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious programs,
More informationApple Configurator MDM Site - Review
Management Options ios New Market ipads - January 2010 Several changes in a short period of time. Apple Lion Server came out June 2011. Apple Configurator came out in June 2012. Why Absolute or Alteris?
More informationPolicy and Profile Reference Guide. BES10 Cloud Market Preview
Policy and Profile Reference Guide BES10 Cloud Market Preview Published: 2014-02-04 SWD-20140204170848330 Contents About this guide... 13 What is BES10 Cloud?... 13 Key features of BES10 Cloud...14 IT
More informationios Education Deployment Overview
ios Education Deployment Overview ipad brings an amazing set of tools to the classroom. Teachers can easily customize lessons with interactive textbooks, rich media, and online courses. And students stay
More information1. Introduction... 1. 2. Activation of Mobile Device Management... 3. 3. How Endpoint Protector MDM Works... 5
User Manual I Endpoint Protector Mobile Device Management User Manual Table of Contents 1. Introduction... 1 1.1. What is Endpoint Protector?... 2 2. Activation of Mobile Device Management... 3 2.1. Activation
More informationReport on Consumer Behaviors and Perceptions of Mobile Security. Presented by NQ Mobile & NCSA January 25, 2012
Report on Consumer Behaviors and Perceptions of Mobile Security Presented by NQ Mobile & NCSA January 25, 2012 Methodology Online survey of 1,158 consumers. Participants had to own a smartphone. Respondents
More informationAVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com
AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out
More informationOutlook Web App (OWA) Quick Start Guide
As we move to AD, Office365 and Outlook from our comfort zone of Novell and GroupWise, remember that you have been using Microsoft for a long time. Yes, Office is a Microsoft product. Since Outlook is
More informationThe following information was provided by SANS and discusses IT Security Awareness. It was last updated in 2015.
The following information was provided by SANS and discusses IT Security Awareness. It was last updated in 2015. By completing this module and the quiz, you will receive credit for CW 170, which is required
More information1. Set a longer (and stronger) six-digit passcode. 2. Prevent apps from uploading your data
For Privacy and Security Change ios 9 Settings Immediately by Zack Whittaker ZDNet Security September 16, 2015 Source: http://www.zdnet.com/pictures/iphone-ipad-ios-9-privacy-security-settings-immediately/
More informationGUIDE TO KEEPING YOUR SOCIAL MEDIA ACCOUNTS SECURE
GUIDE TO KEEPING YOUR SOCIAL MEDIA ACCOUNTS SECURE Defense Media Activity TABLE OF CONTENTS PROTECTIVE MEASURES... 2 PREPARATION CHECKLIST... 2 IF YOU SUSPECT YOUR ACCOUNT IS COMPROMISED, THE FOLLOWING
More informationAmazon WorkMail. User Guide Version 1.0
Amazon WorkMail User Guide Amazon WorkMail: User Guide Copyright 2016 Amazon Web Services, Inc. and/or its affiliates. All rights reserved. Amazon's trademarks and trade dress may not be used in connection
More informationCyber safety Parent Easy Guide 63
Cyber safety Parent Easy Guide 63 The online world is part of everyday life for many children and young people. It is a huge virtual playground where they can play, learn and socialise. It can be accessed
More informationios Enterprise Deployment Overview
ios Enterprise Deployment Overview ios devices such as ipad and iphone can transform your business. They can significantly boost productivity and give your employees the freedom and flexibility to work
More informationi-safe America Internet Safety Tips for Parents
i-safe America Internet Safety Tips for Parents Online predators are out there. They can infect your computer with viruses, they want to steal your personal information and possibly your identity, and
More informationUser Manual for Version 4.4.0.5. Mobile Device Management (MDM) User Manual
User Manual for Version 4.4.0.5 Mobile Device Management (MDM) User Manual I Endpoint Protector Mobile Device Management User Manual Table of Contents 1. Introduction... 1 1.1. What is Endpoint Protector?...
More informationSocial Networking Sites like Facebook, MSN
Most people, young and old, can use a computer and mobile phone these days. Using computers, mobile phones, Tablets (like the ipad) and the internet can be fun and let you keep in touch with friends and
More informationWhat is the Cloud? Computer Basics Web Apps and the Cloud. Page 1
Computer Basics Web Apps and the Cloud What is the Cloud? You may have heard people using terms like the cloud, cloud computing, or cloud storage. But what exactly is the cloud? Basically, the cloud is
More informationCelly FAQ. inbox cells people help. celly help. Common Support Questions. celly company. General. celly @ school. policies. About Cells.
Celly FAQ Common Support Questions inbox cells people help How do I change my username? How do I change the phone number on my Celly account? How do I set my password/reset my password? How can I mass
More information...Some people / organizations will be a target REGARDLESS of what they do, but most will be a target / victim BECAUSE of what they do
...Some people / organizations will be a target REGARDLESS of what they do, but most will be a target / victim BECAUSE of what they do (2013 DATA BREACH INVESTIGATIONS REPORT p.1) MOBILE D EVICE S AFETY
More informationPryvate App User Manual
Pryvate App User Manual 2.0 Powered by Criptyque Pryvate is the most secure voice, email & chat app for business people & individuals that require a high level of communications encryption to protect their
More informationA Parents Guide to. 2014 ConnectSafely.org
A Parents Guide to 2014 ConnectSafely.org Parenting in the age of social media can be tricky. Australians are amongst the highest users of social media in the world, averaging 22 hours per week per person.
More informationPersonal Cloud. Support Guide for Mobile Apple Devices
Personal Cloud Support Guide for Mobile Apple Devices Storing and sharing your content 2 Getting started 2 How to use the application 2 Managing your content 2 Adding content manually 2 Downloading files
More informationReference Guide TEAM. Pogoplug Team. Reference Guide. 2012 Cloud Engines Inc., All Rights Reserved.
Reference Guide Pogoplug Team Reference Guide Table of Contents Table of Contents 1. What s Included 2. Getting Started 3. Customizing the Pogoplug Interface a. Custom UI b. Custom Domain Name c. Custom
More informationHow-to Guide: Using FREE Technology to Communicate with Your Members
American Student Dental Association How-to Guide: Using FREE Technology to Communicate with Your Members Table of Contents Group E-Mail Group Texting Team Communication Scheduling Tools Online Calendars
More informationKingsley Park Primary School. 1-1 ipad Program BYOD
Kingsley Park Primary School 1-1 ipad Program BYOD 2016 Kingsley Park Primary School ipad 1-1 BYOD Program In 2015 KPPS implemented a 1-1 BYOD [bring your own device] Program for Grades 4-6. We will be
More informationMOBILE APPS. QA Testing for mobile applications
MOBILE APPS QA Testing for mobile applications How familiar are you with Apple devices? This question can be asked for apple devices as well as Android devices - depending on the company your interviewing
More informationParents guide to online safety. Practical, issue-focussed information and advice for parents of children of all ages.
Parents guide to online safety Practical, issue-focussed information and advice for parents of children of all ages. Cybersmart is a national cybersafety education program managed by the Australian Communications
More informationCloud Services MDM. ios User Guide
Cloud Services MDM ios User Guide 10/24/2014 CONTENTS Overview... 3 Supported Devices... 3 System Capabilities... 3 Enrollment and Activation... 4 Download the Agent... 4 Enroll Your Device Using the Agent...
More informationAccess Tropical Cloud Desktop from Any Device
Access Tropical Cloud Desktop from Any Device Tropical Business Solutions White Paper Contents What is Tropical Cloud Desktop?... 3 Information you are going to need... 3 How to connect to the Tropical
More informationNorton Family Product Manual
Norton TM Family Product Manual Care for our Environment; It's the right thing to do. Symantec has removed the cover from this manual to reduce the Environmental Footprint of our products. This manual
More informationFAMILY. Reference Guide. Pogoplug Family. Reference Guide. 2012 Cloud Engines, Inc. All Rights Reserved.
Reference Guide Pogoplug Family Reference Guide Table of Contents Table of Contents 1. What s Included 2. Setting Up Your Pogoplug Device 3. Back Up a. Backing Up Your Computers b. Backing Up Your Mobile
More informationPersonal Safety Tips For Public Information Technology
IDENTITY THEFT Practical Tips to Do Your Best David L. Haase November 21, 2015 OPCUG / PATACS 1 Today s Agenda Who is This Guy? Are You a Target? I.D. Theft vs. Stalking What Do Thieves Target? Have a
More informationIn the Cloud. Scoville Memorial Library February, 2013 ccayne@biblio.org
In the Cloud Scoville Memorial Library February, 2013 ccayne@biblio.org What is the Cloud? You may have heard people using terms like the cloud, cloud computing, or cloud storage. But what exactly is the
More informationTeachers Manual for iphone for Seniors
Teachers Manual for iphone for Seniors ISBN 978 90 5905 349 6 2 1. Introduction This course manual assumes a lesson structure consisting of nine points. These points have been divided into three groups.
More informationA guide for Purchasing and Syncing Apps on the ipad
A guide for Purchasing and Syncing Apps on the ipad All Apps for the ipad can only be purchased through the itunes Store. This can either be done via itunes on the designated MacBook or via the ipad itself.
More informationFIRBANK GRAMMAR SCHOOL
FIRBANK GRAMMAR SCHOOL TECHNOLOGY GUIDELINES AND PROCEDURES FOR THE USE OF TECHNOLOGY STUDENTS Updated 2014 1 FIRBANK GRAMMAR SCHOOL Table of Contents POLICY FOR THE ACCEPTABLE USE OF TECHNOLOGY - students...
More informationSupporting Apple ios Devices
Supporting Apple ios Devices 2016 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of their respective
More informationOUTLOOK WEB ACCESS. User Guide
OUTLOOK WEB ACCESS User Guide V3 2 August 2013 Not protectively marked GETTING STARTED Outlook Web Access (OWA) provides a useful means to remotely access Council email from outside of the council access.
More information10 steps to better secure your Mac laptop from physical data theft
10 steps to better secure your Mac laptop from physical data theft Executive summary: This paper describes changes Mac users can make to improve the physical security of their laptops, discussing the context
More informationWISE Online: An Internet and Mobile Phone Guide. http://esafety.ngfl-cymru.org.uk
WISE Online: An Internet and Mobile Phone Guide http://esafety.ngfl-cymru.org.uk File sharing and Copyright Everyone loves to file share to get music files. But here are some points to take note of: Downloading
More informationAffirmative Action Presentation
Affirmative Action Presentation Woodbridge Township School District A Guide to Social Media, Schools, and the Law. Woodbridge Township School District Staff Development 2012-2013 To provide school personnel,
More informationEnd User Devices Security Guidance: Apple ios 8
GOV.UK Guidance End User Devices Security Guidance: Apple ios 8 Published Contents 1. Changes since previous guidance 2. Usage scenario 3. Summary of platform security 4. How the platform can best satisfy
More informationTELUS Business Connect Meeting User Guide. Video Conference. Web Share.
TELUS Business Connect Meeting User Guide Video Conference. Web Share. Table of Contents 3 System requirements 4 Download & Install 6 Meet: Host a Meeting 8 Join a Meeting as participant 9 Invite participants
More informationSYNCSHIELD FEATURES. Preset a certain task to be executed. specific time.
SYNCSHIELD FEATURES This document describes the diversity of SyncShield features. Please note that many of the features require a certain platform version, often earlier software versions do not support
More informationCreating an Apple ID on an iphone, ipad, or ipod touch with a Credit / Debit Card
To purchase and download from the itunes Store, you'll need to have an Apple ID. If you have used other Apple services such as icloud, the Mac App Store, or have purchased from the Apple Online Store,
More informationGuidance End User Devices Security Guidance: Apple ios 7
GOV.UK Guidance End User Devices Security Guidance: Apple ios 7 Updated 10 June 2014 Contents 1. Changes since previous guidance 2. Usage Scenario 3. Summary of Platform Security 4. How the Platform Can
More informationCertified Secure Computer User
Certified Secure Computer User Course Outline Module 01: Foundations of Security Essential Terminologies Computer Security Why Security? Potential Losses Due to Security Attacks Elements of Security The
More informationHigh Speed Internet - User Guide. Welcome to. your world.
High Speed Internet - User Guide Welcome to your world. 1 Welcome to your world :) Thank you for choosing Cogeco High Speed Internet. Welcome to your new High Speed Internet service. When it comes to a
More information2 nd - Watch My Online Neighborhood Video: https://www.commonsensemedia.org/videos/my- online- neighborhood
K- Going Places Safely Essential Question: How do I go places safely on the computer? Students will: discover the Internet can be used to visit far- away places and learn new things; compare how staying
More informationCreating an Apple ID Account Using the Internet on a Desktop or Laptop Computer
Creating an Apple ID Account Using the Internet on a Desktop or Laptop Computer An Apple ID account is required to complete the device setup and to purchase apps. Your Apple ID is used for almost everything
More informationYouth Online Behavior
Youth Online Behavior Created by: Andrea Pieters, Project Researcher, Youth and Education Christine Krupin, Project Researcher, Youth and Education June 1, 2010 Harris Interactive 6/21/2010 1 Methodology
More informationCyber Security: Beginners Guide to Firewalls
Cyber Security: Beginners Guide to Firewalls A Non-Technical Guide Essential for Business Managers Office Managers Operations Managers This appendix is a supplement to the Cyber Security: Getting Started
More informationFAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY:
FAMILY GUIDE TO Mobile Safety How to keep your children safe and connected in today s mobile world SPONSORED BY: Is Your Child Ready for a Mobile Phone? MOBILE PHONES ARE PART OF OUR LIVES. They re powerful
More informationDesktop and Laptop Security Policy
Desktop and Laptop Security Policy Appendix A Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious
More informationeasy-to-use platform. Our solution offers the best video, audio and screen-sharing quality across Window, Mac, ios, Android
Getting Started On PC And Mac What is Zoom? Zoom, the cloud meeting company, unifies cloud video conferencing, simple online meetings and mobile collaboration into one easy-to-use platform. Our solution
More informationInformation Technology Security Awareness Training. MIS Department
Information Technology Security Awareness Training Introduction Who am I? Why are we here? Ensure confidentiality of data Protect stability of IT infrastructure Shield District from legal liability Satisfy
More informationDictamus Manual. Dictamus is a professional dictation app for iphone, ipod touch and ipad. This manual describes setup and use of Dictamus version 10.
Dictamus Manual Dictamus is a professional dictation app for iphone, ipod touch and ipad. This manual describes setup and use of Dictamus version 10. Table of Contents Settings! 3 General! 3 Dictation!
More informationReferences NYS Office of Cyber Security and Critical Infrastructure Coordination Best Practices and Assessment Tools for the Household
This appendix is a supplement to the Cyber Security: Getting Started Guide, a non-technical reference essential for business managers, office managers, and operations managers. This appendix is one of
More information