Welcome. 4 Common Security Best Practices. to the. Online Training Course
|
|
- Gwenda Stafford
- 8 years ago
- Views:
Transcription
1 Welcome to the 4 Common Security Best Practices Online Training Course
2 Disclaimer 2
3 Introduction Information Security means protecting information from unauthorized access, use, disclosure, inspection and recording. Much of this information is transmitted through which, if not securely used, could result in unauthorized interception of confidential data. This presentation will outline 4 of the most common best practices seen within Flextronics today and how these common practices should be implemented to improve our Information Security. 1. Internal s 2. Confidential Information Tagging 3. Distribution Lists 4. Password Protecting Key s 3
4 Internal s Sending Confidential Information Internal s refers to s sent from one Flextronics user to another Flextronics user. Practice: Users will often attach confidential documents to s and send them internally. Even though we have many security solutions in place, these confidential documents can still be retrieved by unauthorized persons in the company. Better Practice: Supply a secured link (hyperlink) to the document within the that requires the recipient to click the link and authenticate to view the information. Flextronics utilizes a large Sharenet/eRoom/document management architecture to store confidential documents. If an unauthorized user intercepts the , they must also have the appropriate permissions to click the link and view the document within the Flextronics document management repository. 4
5 Internal s Creating a Link to a Document Save the document to a secure Flextronics Repository (such as sharenet). Right-Click the document in the repository and select Copy Shortcut. Type the message, right-click a word, normally the word here as seen in the screen shot and select Hyperlink. Alternatively, simply past the shortcut into the , for example. In the address field of the Edit Hyperlink window, paste the shortcut that was copied from the online repository, then click OK. When the recipient reads the , he must then click the link, which will only open the document if the user has the appropriate permissions. Links appear in blue and are normally underlined. If you do not have access to a document repository, this can requested through Service-Now. Catalog Item New Sharenet Site. Or click the request access link on an existing sharenet site. 5
6 Confidential Information Tagging Confidential Information Tagging is the process of using a watermark or disclaimer to indicate a document is confidential. Tagging raises awareness to the importance of maintaining the confidentiality of the information to any user with access to the information. Practice: Users do not consistently tag all confidential data. Better Practice : Always tag documents containing confidential information and if sending the document through , also mark the as confidential. Many Office Productivity applications offer a confidential watermark feature. A disclaimer similar to that shown on slide 2 of this presentation can be added to the document as well. In Microsoft Outlook, when composing the , click the options button on the message and select Confidential. 6
7 Distribution Lists Many users create distribution lists for ease of collaboration with a larger group of individuals. Practice: Users will create a distribution list and continue to use it without periodically updating the members of the distribution list and by sending information to an out-of-date distribution list can result in unauthorized users receiving confidential data. Better Practice : Periodically (e.g., quarterly) review distribution lists to ensure confidential documents and s are only sent to people that have a business reason to receive the information. Keep distribution lists small, maximum of 10 people for ease of review. Ensure you can identify each user on your distribution lists. There should be no guessing as to whether or not a person in the distribution list is authorized to receive the information. Create separate distribution lists for internal users and external users. 7
8 Password Protecting Key s Password protection is a very simple way to mitigate the risk of unauthorized access to confidential data. is very easy to intercept on the internet, password protecting all confidential documents within an will make it much more difficult for this information to be retrieved. Practice: Users do not password protect confidential files sent via . Better Practice : Always password protect confidential files sent through . Microsoft Office Products allow the creation of a password on the file directly. If the file cannot be directly password protected, use a zipping application (7zip) which will allow for password protection. Send the password protected zip file or document in one without the password and a second to the recipient with the password. If one of the two s is intercepted by a 3rd party, they will only have either the password protected document or just a password. Without both the password and the password protected document, it is much more difficult to exploit the confidential information. 8
9 Password Protecting Key s How to Password Protect Microsoft Office Documents? 1. Open the Word, Power Point, or Excel document you wish to password protect. 2. On the menu, Select File -> Save As. 3. Select Tools -> General Options from the Save As Window as shown below. Left: Office 2003 Right: Office A new window will pop up displaying two fields, Password to open and Password to modify. 5. Create a password with one mandatory special character (@#$% for example); one upper case letter, one lower case letter and a number. (minimum 8 character password recommended). 6. Click OK, then click Save when finished. This will be the password protected document to be sent in . Reminder: Send the password protected document in a separate from the password. 9
10 Password Protecting Key s How to Password Protect Documents using 7zip? 1. 7zip is the selected Flextronics approved zipping program. It can be installed from here: Approved Software Applications or by contacting your Help Desk. 2. Once 7zip is installed, zipping and adding a password to the zipped file is a simple process. 3. Right click on the file you wish to compress (zip) and password protect and click Add to archive. 10
11 Password Protecting Key s How to Password Protect Documents using 7zip? 4. On the window that appears, select Archive Format Zip from the drop down. 5. In the Encryption Section of the window, enter a complex password containing a mandatory special character, at least one upper case letter, lower case letter and number. The more complex the password, the safer the file. 6. Click OK once completed and 7zip will create a zipped version of the file. Example Zipped File 11
12 Thank You You can now close the browser to exit the course Download Course file(s)
How To Encrypt a File using Windows Explorer and WinZip. For Use With All PII Data
How To Encrypt a File using Windows Explorer and WinZip For Use With All PII Data As an employee or a contractor, you share in the responsibility for protecting the privacy of individuals whose information
More informationMoving your GroupWise archive to Outlook 2010 Key step to take the day after your e-mail upgrade
Moving your GroupWise archive to Outlook 2010 Key step to take the day after your e-mail upgrade About this guide /transformation Who should use it This guide is intended for those DBHDD (Department of
More informationEJGH Email Encryption User Tip Sheet 10-11-2013 1 of 8
EJGH Email Encryption User Tip Sheet 10-11-2013 1 of 8 External Users Decrypting Secure Messages The following sections describe how users external to EJGH receive and decrypt secure messages. Reading
More informationBackground Information
User Guide 1 Background Information ********************************Disclaimer******************************************** This is a government system intended for official use only. Using this system
More informationPaperClip. em4 Cloud Client. Manual Setup Guide
PaperClip em4 Cloud Client Manual Setup Guide Copyright Information Copyright 2014, PaperClip Inc. - The PaperClip32 product name and PaperClip Logo are registered trademarks of PaperClip Inc. All brand
More informationWakefield Council Secure email and file transfer User guide for customers, partners and agencies
Wakefield Council Secure email and file transfer User guide for customers, partners and agencies The nature of the work the council carries out means that we often deal with information that is sensitive
More informationMICROSOFT OUTLOOK 2003
MICROSOFT OUTLOOK 2003 Follow these steps to update an Outlook 2003 account to send and receive e-mail using GCMUNI's new mail settings. Before you start, you must change your temporary GCMUNI e-mail password.
More informationManaging Contacts in Outlook
Managing Contacts in Outlook This document provides instructions for creating contacts and distribution lists in Microsoft Outlook 2007. In addition, instructions for using contacts in a Microsoft Word
More informationPaperClip. em4 Cloud Client. Setup Guide
PaperClip em4 Cloud Client Setup Guide Copyright Information Copyright 2014, PaperClip Inc. - The PaperClip32 product name and PaperClip Logo are registered trademarks of PaperClip Inc. All brand and product
More informationFor all other applications, including new applications, please visit www.apvma.gov.au
This content only applies to transition applications that were received before 1 July 2014. The content will be relevant for these applications until 30 June 2015. For all other applications, including
More informationOrganization Name National Institutional Facilitation Technologies (Pvt.) Ltd. Business Division Name Information Security Solutions (NIFTeTRUST)
Organization Name National Institutional Facilitation Technologies (Pvt.) Ltd. Business Division Name Information Security Solutions (NIFTeTRUST) Document Name Digital ID Installation Guide (Microsoft
More informationFrequently Asked Questions
Frequently Asked Questions What is Xythos? Xythos is a secure web-based file storage system that allows you to place files in a central location so they can be accessed via the internet. You can upload,
More informationBacking up Microsoft Outlook Email For the PC Using MS Outlook 2000 Keith Roberts
WIN1020 November 2003 Backing up Microsoft Outlook Email For the PC Using MS Outlook 2000 Keith Roberts INTRODUCTION... 1 PREPARATION... 1 BACKING UP EMAIL... 2 RESTORING EMAIL FROM A PERSONAL FILE FOLDER...
More informationVersion 4 Revised 5/2015
Email Encryption Manual Version 4 Revised 5/2015 This document provides information on sending, receiving, and saving encrypted emails using the WRC Group Message Center. Contents What is Email Encryption...
More informationUsing the City of Stamford / Stamford Public Schools. Web Email System
Using the City of Stamford / Stamford Public Schools Web Email System Open the Login Screen: Go to the following site: www.stamfordct.gov/mail and choose the login link. The login screen will look like
More informationAir Resources Board File Transfer Protocol (FTP)
Air Resources Board File Transfer Protocol (FTP) A Handbook for External Users (those not connected to the ARB network) July 2006 How do I use ARB FTP? What is the FTP server and who can use it? What software
More informationOutlook Express. Make Changes in Red: Open up Outlook Express. From the Menu Bar. Tools to Accounts - Click on Mail Tab.
Outlook Express Open up Outlook Express From the Menu Bar Tools to Accounts - Click on Mail Tab Click on mail.nefcom.net (default) Click on Properties button Click on the General tab User Information E-mail
More informationU.S. Bank Secure Mail
U.S. Bank Secure Mail @ Table of Contents Getting Started 3 Logging into Secure Mail 5 Opening Your Messages 7 Replying to a Message 8 Composing a New Message 8 1750-All Introduction: The use of email
More informationGDC4S Dropbox User Guide
GDC4S Dropbox User Guide Contents Foreword... 1 Dropbox User Guides... 1 Sign On... 2 Your Home Page... 3 Create/Send a New Message... 4 Adding a Previously Used Recipient... 4 Adding a New to You User...
More informationAppendix A: Encrypting a File and / or Email Message
Appendix A: Encrypting a File and / or Email Message Encryption is defined as the conversion of something to code or symbols so that its contents cannot be understood if intercepted. USDB has approved
More informationInstructions for Microsoft Outlook 2003
ElkhartNet, Inc. is dedicated to providing our email customers with excellent service and support. In a targeted effort to reduce SPAM and to provide more secure and faster email, we are changing our outgoing
More informationTo configure Outlook Express for your InfoMetrics E-mail address:
To configure Outlook Express for your InfoMetrics E-mail address: 1. Open Outlook Express 2. Click the Tools menu, and select Accounts... 3. Internet Accounts window will open, click Add and menu will
More informationFDIC Secure Email Procedures for External Users April 23, 2010
FDIC Secure Email Procedures for External Users April 23, 2010 This document contains information proprietary to the Federal Deposit Insurance Corporation. Table of Contents 1. Introduction...2 2. Receiving
More informationP309 - Proofpoint Encryption - Decrypting Secure Messages Business systems
Procedure P309 - Proofpoint Encryption - Decrypting Secure Messages Business systems P309 - Page: Page 1 of 12 Date of Release: 23 February 2011 Status: Final Document Reference: Title: P309 Release Number:
More informationSet Up E-mail Setup with Microsoft Outlook 2007 using POP3
Page 1 of 14 Help Center Set Up E-mail Setup with Microsoft Outlook 2007 using POP3 Learn how to configure Outlook 2007 for use with your 1&1 e-mail account using POP3. Before you begin, you will need
More informationExtracting an S/MIME certificate from a digital signature
Extracting an S/MIME certificate from a digital signature Instructions for Microsoft Outlook 2007 and 2010 Document User_Instruction_Outlook_Certificate_Handling Status Final Date: 03.06.2012 Version:
More informationInformationNOW SQL 2008 Database Backup and Restoration
InformationNOW SQL 2008 Database Backup and Restoration Backing up a SQL 2008 Database Users are advised to create frequent multiple offsite backups. Occasionally, it may be necessary to manually initiate
More informationPKI Contacts PKI for Fraunhofer Contacts
Fraunhofer Competence Center PKI PKI Contacts PKI for Fraunhofer Contacts User manual for communication partners of the Fraunhofer-Gesellschaft Author[s]: Uwe Bendisch, Maximilian Gottwald As at: 15.10.2013
More informationVersion 2.1.x. Barracuda Message Archiver. Outlook Add-In User's Guide
Version 2.1.x Barracuda Message Archiver Outlook Add-In User's Guide Barracuda Networks Inc. 3175 S. Winchester Blvd Campbell, CA 95008 http://www.barracuda.com Copyright Copyright 2005-2009, Barracuda
More informationOutlook Express. Make Changes in Red: Open up Outlook Express. From the Menu Bar. Tools to Accounts - Click on. User Information
Outlook Express Open up Outlook Express From the Menu Bar Tools to Accounts - Click on Mail Tab Click on mail.btconline.net mail (default) Click on Properties button Click on the General tab User Information
More informationMeredith Mass Transit Web Client User Guide For Ad Hoc Accounts
Meredith Mass Transit Web Client User Guide For Ad Hoc Accounts Mass Transit is an easy to use, flexible Web based file transfer program. A temporary (Ad Hoc) account has been created for you on the Meredith
More informationNICCA User Guide for digitally signing email Using Digital Signature Certificate (DSC) in Outlook Express
NICCA User Guide for digitally signing email Using Digital Signature Certificate (DSC) in Outlook Express 1. DESCRIPTION This guide explains the procedure for using the NICCA issued digital certificate
More informationSearching your Archive in Outlook (Normal)
Searching your Archive in Outlook (Normal) 1. View the Archive Add in toolbar. In Outlook 2007, the toolbar displays below the standard Outlook toolbars. In Outlook 2010, select the McAfee tab. 2. In the
More informationSecure Mail Registration and Viewing Procedures
Secure Mail Registration and Viewing Procedures May 2011 For External Secure Mail Recipients Contents This document provides a brief, end user oriented overview of the Associated Banc Corp s Secure Email
More informationHOW TO PURCHASE AND INSTALL YOUR VERISIGN DIGITAL SIGNATURE
HOW TO PURCHASE AND INSTALL YOUR VERISIGN DIGITAL SIGNATURE (Instructions prepared compliments of PDF-It!) Morgan Babin-Reporting Solutions pdf-it Home How to obtain a Verisign Digital Signature 2 Check
More informationtips A quick and easy guide to securing your private information www.pkware.com
tips A quick and easy guide to securing your private information tips A quick and easy guide to securing your private information Basic Information 1. How to install SecureZIP for Windows Desktop for individual
More informationOutlook Express. Make Changes in Red: Open up Outlook Express. From the Menu Bar. Tools to Accounts - Click on Mail Tab.
Outlook Express Open up Outlook Express From the Menu Bar Tools to Accounts - Click on Mail Tab Click on mail.nefcom.net (default) Click on Properties button Click on the General tab User Information E-mail
More informationThe Citrix service is now available to faculty and staff at Cypress College.
Hello Everyone, The Citrix service is now available to faculty and staff at Cypress College. The Citrix product will allow you to run Microsoft Windows applications through the web as if you were running
More informationSecure Email Client User Guide Receiving Secure Email from Mercantile Bank
Receiving Secure Email from Contents This document provides a brief, end-user overview of the Secure Email system which has been implemented by. Why Secure Email? When someone sends you an email, the email
More informationYou may use port 587 if port 25 is blocked by your internet provider. This does not apply to customers using PolarComm internet.
Polar Communications has been working on redesigning our mail system. Some changes that customers need to be aware of with these changes are the following: Webmail: You must use http://webmail.polarcomm.com
More informationDownload and Installation Instructions. Android SDK and Android Development Tools (ADT) Microsoft Windows
Download and Installation Instructions for Android SDK and Android Development Tools (ADT) on Microsoft Windows Updated September, 2013 This document will describe how to download and install the Android
More informationOutlook Calendar Tips & Tricks
Outlook Calendar Tips & Tricks Outlook Calendar Quick Reference The following provides information on using various features and functionality in Outlook calendar. Outlook Resources Outlook Web Access
More informationBaylor Secure Messaging. For Non-Baylor Users
Baylor Secure Messaging For Non-Baylor Users TABLE OF CONTENTS SECTION ONE: GETTING STARTED...4 Receiving a Secure Message for the First Time...4 Password Configuration...5 Logging into Baylor Secure Messaging...7
More informationWebEx Scheduling A Meeting using the Quick Scheduler
WebEx Scheduling A Meeting using the Quick Scheduler OTS PUBLICATION: WX6 REVISED 0-7-4 04 TOWSON UNIVERSITY OFFICE OF TECHNOLOGY SERVICES =Shortcut =Advice =Caution Introduction You may schedule a WebEx
More informationSecure Message Center User Guide
Secure Message Center User Guide Using the Department of Banking Secure Email Message Center 2 Receiving and Replying to Messages 3 Initiating New Messages 7 Using the Address Book 9 Managing Your Account
More informationUSB Flash Security Free Edition Quick Start
Quick Start [For USB Flash Security Free Edition] 1 / 18 USB Flash Security Free Edition Quick Start Before use USB Flash Security 1. Free edition can only be installed on the USB Flash Drive up to 4GB
More informationHow to set up Outlook Anywhere on your home system
How to set up Outlook Anywhere on your home system The Outlook Anywhere feature for Microsoft Exchange Server 2007 allows Microsoft Office Outlook 2007 and Outlook 2003 users to connect to their Outlook
More informationMIDAS Authorization User Guide. Provider Portal
MIDAS Authorization User Guide Provider Portal Table of Contents Logging On... 2 Change Your Password... 4 Homepage/Welcome Screen... 5 Provider Management.. 5 Provider Demographics... 6 Provider Additional
More informationMessageGuard 3.0 User Guide
MessageGuard 3.0 User Guide Table of Contents Introduction... 3 Installing the MessageGuard Desktop Client... 3 Sending Secure E-mail Messages with the Desktop Client... 11 Reading Secure E-mail Messages
More informationMicrosoft Exchange Hosted Archive (MEHA)
Microsoft Exchange Hosted Archive (MEHA) All the Features of NYSeMAIL Archiving including Using for Business Continuity Using MEHA Using MEHA The Microsoft Exchange Hosted Archive (MEHA) can be accessed
More informationBillQuick Installation Guide for Microsoft SQL Server 2005 Express Edition
Time Billing and Project Management Software Built With Your Industry Knowledge BillQuick Installation Guide for Microsoft SQL Server 2005 Express Edition BQE Software, Inc. 2601 Airport Drive Suite 380
More informationConfiguring Your Email Client: Eudora 5.x
Configuring Your Email Client: Eudora 5.x Configuring Eudora for POP 1-1 Table of Contents Chapter 1. Introduction...1-1 What is an Email Client?...1-1 Who Should Read This Manual?...1-1 How Does Email
More informationWhen you have decided what to include in your signature, you will need to open the signatures and stationery dialogue box:
Signatures An email signature is a block of information which is added to the bottom of an email to give the recipient information about the sender. It functions in a similar way to using headed paper
More informationOutlook Web App. in Office 365. The Outlook Window. Signing In. (Outlook Exchange Faculty & Staff) Getting Started
Outlook Web App in Office 365 (Outlook Exchange Faculty & Staff) Getting Started The Outlook Window Navigation Bar Settings Navigation Pane View Pane Reading Pane Navigation Bar switch between Outlook,
More informationHow To Access A Secure Email From The State Of Iceland
STATE OF IOWA External User's Guide to State of Iowa Secure Email System This guide contains step by step instructions for setting up and using the State of Iowa Secure Email system. Contents Secure Email...
More informationSet up Outlook for your new student e mail with IMAP/POP3 settings
Set up Outlook for your new student e mail with IMAP/POP3 settings 1. Open Outlook. The Account Settings dialog box will open the first time you open Outlook. If the Account Settings dialog box doesn't
More information3. On the E-mail Accounts wizard window, select Add a new e-mail account, and then click Next.
To Set Up Your E-mail Account in Microsoft Outlook 2003 1. Open Microsoft Outlook 03 3. On the E-mail Accounts wizard window, select Add a new e-mail account, and then click Next. 4. For your server type,
More informationArchive Add-in User Guide
Archive Add-in User Guide RESTRICTION ON USE, PUBLICATION, OR DISCLOSURE OF PROPRIETARY INFORMATION Copyright 2011 McAfee, Inc. This document contains information that is proprietary and confidential to
More informationInformationNOW SQL 2005 Database Backup and Restoration
InformationNOW SQL 2005 Database Backup and Restoration Backing up a SQL 2005 Database Users are advised to create an hourly or nightly database backup maintenance plan. Occasionally, it may be necessary
More informationHosted Microsoft Exchange Client Setup & Guide Book
Hosted Microsoft Exchange Client Setup & Guide Book Section 1 Microsoft Outlook Web Access (OWA) access directions Section 2 Windows 10 Mail App setup & configuration Section 3 Windows Mobile Phone ActiveSync
More informationDOMAIN CENTRAL HOSTING EMAIL
Welcome to our hosting services, we have created the following documents to help you get up and running as quickly as possible. If at any stage you encounter difficulties, you are welcome to send a help
More informationOutlook Express POP Instructions - Bloomsburg University Students
1. Open Outlook Express by clicking Start, All Programs, and Outlook Express. 2. Click on the Tools menu and click Accounts. 1 3. Click on Add Mail 4. Enter your name and click Next. 2 5. Enter your full
More informationUSING YOUR GMAIL ACCOUNT FOR SCRUBBING YOUR REGULAR EMAIL OF SPAM Beginners Kaffee Klatch Presented by Bill Wilkinson
USING YOUR GMAIL ACCOUNT FOR SCRUBBING YOUR REGULAR EMAIL OF SPAM Beginners Kaffee Klatch Presented by Bill Wilkinson The Gmail spam filter is highly acclaimed by many experts in the security and privacy
More informationBusiness Procedures: Send Secure Emails Created: 02-25-2014 Updated: 04-15-2014
Business Procedures: Send Secure Emails Created: 02-25-2014 Updated: 04-15-2014 Page 1 of 10 Overview From time to time it is necessary to be able to share confidential information with school districts
More information1 Login to your CSUF student email account and click on the Settings icon ( ) at the far right.
Connect to Your Student Email: Microsoft Outlook for PC Before you can access your student email account on your e-mail client, you must first enable POP/IMAP features on your student email account and
More informationSecureZIP User Guide
SecureZIP User Guide SecureZIP is an application for zipping files to save storage space as well as encrypting files with password control to protect information. SecureZIP not only works alone to perform
More information4. Click Next and then fill in your Name and E-mail address. Click Next again.
NOTE: Before installing PGP, Word needs to be disabled as your editor in Outlook. In Outlook, go to Tools: Options: Mail Format and uncheck Use Microsoft Office Word to edit e-mail messages. Failure to
More informationBank of Hawaii Protecting Confidential Email. What's in this User Guide
1 Bank of Hawaii Protecting Confidential Email Email is commonly used to transmit confidential information such as operational data, legal documents, or financial information. By default emails are sent
More information1. What is spam? An unsolicited commercial email sent to multiple email recipients against their wishes.
1. What is spam? An unsolicited commercial email sent to multiple email recipients against their wishes. 2. How do spammers get my email address? Here are some of the most popular means that spammers use
More informationOutlook Web App User Guide
Outlook Web App Table of Contents QUICK REFERENCE... 2 OUTLOOK WEB APP URL... 2 Imagine! Help Desk...... 2 OUTLOOK WEB APP MAIN WINDOW... 2 KEY NEW FEATURES... 3 GETTING STARTED WITH OUTLOOK... 4 LOGGING
More informationVirtual Office Remote Installation Guide
Virtual Office Remote Installation Guide Table of Contents VIRTUAL OFFICE REMOTE INSTALLATION GUIDE... 3 UNIVERSAL PRINTER CONFIGURATION INSTRUCTIONS... 12 CHANGING DEFAULT PRINTERS ON LOCAL SYSTEM...
More informationPrerequisite. Getting Started. Email Signing and Encryption using Microsoft outlook 2007
Email Signing and Encryption using Microsoft outlook 2007 Prerequisite a. The user s email account has been added and correctly configured into Microsoft outlook. b. The user has an authentication certificate.
More informationSSL Intercept Mode. Certificate Installation Guide. Revision 1.0.0. Warning and Disclaimer
SSL Intercept Mode Certificate Installation Guide Revision 1.0.0 Warning and Disclaimer This document is designed to provide information about the configuration of CensorNet Professional. Every effort
More informationOutlook Operating Instructions. Internal Desktop Access
Outlook Operating Instructions Internal Desktop Access OUTLOOK OPERATING INSTRUCTIONS (INTERNAL DESKTOP ACCESS) FREQUENTLY ASKED QUESTIONS & ANSWERS Q: How do I check my email while on campus? A: Click
More informationMicrosoft Outlook Web Access Handbook
Microsoft Outlook Web Access Handbook Introduction Outlook Web access allows you to use a web browser (Internet Explorer or Firefox) to read your email, send email, and check your online calendar. This
More informationWelcome to HomeTown Bank s Secure E-mail! User Guide
Welcome to HomeTown Bank s Secure E-mail! User Guide To access the secure email message center, click the Secure Email link on the www.htbmn.com main web page. Select whether you are a new user of the
More informationTeacher Activities Page Directions
Teacher Activities Page Directions The Teacher Activities Page provides teachers with access to student data that is protected by the federal Family Educational Rights and Privacy Act (FERPA). Teachers
More informationPrerequisite. Getting Started. Email Signing and Encryption using Microsoft outlook 2010
Email Signing and Encryption using Microsoft outlook 2010 Prerequisite a. The user s email account has been added and correctly configured into Microsoft outlook. b. The user has an authentication certificate.
More informationProtus Virtual Fax Send Fax Plug-in Installation and User Guide
Protus Virtual Fax Send Fax Plug-in Installation and User Guide Virtual Fax Send Fax Plug-in The Virtual Fax Send Fax Plug-in is an add-in for Microsoft Outlook that places a Send Fax button on the toolbar,
More informationHow to install and use the File Sharing Outlook Plugin
How to install and use the File Sharing Outlook Plugin Thank you for purchasing Green House Data File Sharing. This guide will show you how to install and configure the Outlook Plugin on your desktop.
More informationInternet E-Mail Encryption S/Mime Standard
Internet E-Mail Encryption S/Mime Standard Disclaimer: Successfully setting up encryption functions in most e-mail clients is usually not a problematic task. However, it should be noted that, when configuring
More informationHertSFX. User Guide V2.04. Hertfordshire s Secure File Exchange Portal. (Jan 2014) HertSFX User Guide V2.04 Jan 2014 Page 1 of 17
Hertfordshire s Secure File Exchange Portal User Guide V2.04 (Jan 2014) HertSFX User Guide V2.04 Jan 2014 Page 1 of 17 CONTENTS 1. About HertSFX... 3 2. HertSFX Limitations... 3 3. Getting Started... 3
More informationGetting started with IMAP for Aggiemail What is IMAP?
Getting started with IMAP for Aggiemail What is IMAP? IMAP, or Internet Message Access Protocol, lets you download messages from Aggiemail s servers onto your computer so you can access your mail with
More informationOutlook Web Access E-mail
Outlook Web Access E-mail A. Accessing the mailbox via the Internet 1. Open your browser Firebox or Internet Explorer 2. In the URL address location box, key mail.asbury.edu for students and mail2.asbury.edu
More informationE-mail Encryption Recipient Guidelines
E-mail Encryption Recipient Guidelines Canadian Western Bank Group Human Resources Department November 1, 2013 This reference guide was developed for training and reference use only. Any discrepancies
More informationThis tutorial provides detailed instructions to help you download and configure Internet Explorer 6.0 for use with Web Commerce application.
IE 6.0 Download and Set-up To use the Web Commerce e-commerce service, you need to: Gain access to the Internet Install Microsoft Internet Explorer 6.0 Configure Temporary Internet files in Internet Explorer.
More informationjohnireland@eircom.net
Email Electronic mail is the transmission of mainly text based messages across networks. This can be within a particular network - internal mail - or between networks - external mail. The most common network
More informationDepartment of Alcohol & Drug Programs. Information Management Services Division (IMSD) EMAIL ENCRYPTION INSTRUCTIONS
Department of Alcohol & Drug Programs (IMSD) EMAIL ENCRYPTION INSTRUCTIONS July 1, 2010 Why Do We Need Email Encryption? Code of Regulations, Title 45, Subtitle A, Part 164 The Health Insurance Portability
More informationSecure file transmission of PHI, RHI and sensitive information
Secure file transmission of PHI, RHI and sensitive information Background File Transfer Application (FTA) Web Application Use Outlook Plug In Use Workspace Use 2 Information Privacy & Security Executive
More informationSEC External Guide for Using Accellion
Securities and Exchange Commission Office of Information Technology SEC External Guide for Using Accellion The Securities and Exchange Commission National Exam Program Hotline (202) 551-3925 Washington,
More informationPatriots Email Outlook Configuration
Patriots Email Outlook Configuration Contents Configuration in Outlook... 2 Exchange/Active Sync Configuration... 2 IMAP and POP Configuration... 5 Retrieve Unique POP/IMAP Server... 5 IMAP or POP Setup
More informationSetting up secure e-mail communication with Ericsson. Guideline for Ericsson partners
Setting up secure e-mail communication with Ericsson Guideline for Ericsson partners In this presentation Introduction Technical prerequisites Getting started Exchanging Public Keys Sending a signed e-mail
More informationRemote Desktop Services
Remote Desktop Services AMERICAN INSTITUTES FOR RESEARCH AIR REMOTE DESKTOP SERVICES (RDS) GUIDE Overview Welcome to AIR Remote Desktop Services! AIR Remote Desktop Services can be accessed from a Windows
More informationOutlook Web Access is accessible to all users where Internet access is available. This document contains instructions on how to use OWA.
Welcome to the City of Sarasota s Outlook Web Access (OWA). As a member of the Board you are required to use your City-issued email address for correspondence that is related to the business of the Advisory
More informationConfiguring Your Email Client: Eudora 5.x. Quick Reference
Configuring Your Email Client: Eudora 5.x Quick Reference Table of Contents Chapter 1. Introduction...1-1 What is an Email Client?...1-1 Who Should Read This Manual?...1-1 POP, IMAP, and SSL: Which Protocol
More informationOutlook Web Access (OWA) 2010 Email Cheat Sheet
June 9, 2014 Outlook Web Access (OWA) 2010 Email Cheat Sheet Outlook Web Access 2010 allows you to gain access to your messages, calendars, contacts, tasks and public folders from any computer with internet
More informationCISCO SECURE MAIL. External User Guide. 1/15/15 Samson V.
1/15/15 Samson V. 1. These instructions are for users who reside outside the University of Colorado Denver that receive encrypted emails from faculty or staff of UC Denver. As a part of our HIPAA compliance
More informationInformation Systems Services. Getting Started with Enterprise Vault Email Archiving A guide for Outlook/Exchange users March 2008
Information Systems Services Getting Started with Enterprise Vault Email Archiving March 2008 Contents 1. Introduction... 3 2. Supported operating systems, email clients and browsers... 3 3. Getting started
More informationNew Mexico State University
E-mail Set Up for Microsoft Office Outlook 2003 Click on the option that describes you: I am setting up my NMSU e-mail with Outlook for the first time I currently use Outlook to view my NMSU e-mail and
More informationSEC External Guide for Using the E-mail Encryption Solution
Securities and Exchange Commission Office of Information Technology SEC External Guide for Using the E-mail Encryption Solution The Securities and Exchange Commission National Exam Program Hotline (202)551-3925
More information