How to Encrypt Files Containing Sensitive Data (using 7zip software or Microsoft password protection) How to Create Strong Passwords

Size: px
Start display at page:

Download "How to Encrypt Files Containing Sensitive Data (using 7zip software or Microsoft password protection) How to Create Strong Passwords"

Transcription

1 How to Encrypt Files Containing Sensitive Data (using 7zip software or Microsoft password protection) How to Create Strong Passwords School IT Systems Support Herts for Learning Ltd SROB220, Robertson House, Six Hills Way, Stevenage, Herts, SG1 2FQ Doc Ref S1218 V3 Published February 2014 School IT Systems Support (SITSS) Herts for Learning Ltd, 2014 Technical Support Centre Accredited by the Learning and Performance Institute (formerly, Institute of IT Training) RM Approved Support Partner Fully accredited by Capita SIMS for proven quality of SIMS support

2

3 CONTENTS FOREWORD... 1 DOWNLOADING THE SOFTWARE (7-ZIP)... 2 ENCRYPTING DOCUMENTS, FILES OR FOLDERS... 4 TO ACCESS THE FILE (DECRYPTION) z extension files... 6.zip extension files... 6 HOW TO SECURELY ENCRYPT A WORD OR EXCEL DOCUMENT (SIMILAR METHODS EXIST IN THE OTHER MS OFFICE PRODUCTS)... 8 Using Word Using Excel Using Word and Excel Using Word and Excel Removing Password Protection from a Word and Excel 2003 Document Removing Password Protection from a Word and Excel 2007 Document Removing Password Protection from a Word and Excel 2010 Document CREATE STRONG PASSWORDS PROTECT YOUR PASSWORDS FROM PRYING EYES TOP TIPS FOR INTERNET SAFETY AT WORK S1218 V3

4

5 School IT Systems Support Foreword Schools may choose to use any provider other than the HCC preferred supplier of Microsoft Outlook 365 ( ). However, it is vital that all files containing sensitive or personal data are encrypted or at least password protected (until your school has software encryption such as 7-zip) before transmitting electronically. This document offers a solution using 7-zip software and instructions on password protecting an Excel or Word document. It is recommended that such protocols are included in the school s ICT Acceptable Use Policy which should be issued to all users. For more information on Microsoft Outlook 365 please click on the following links. The following link discusses Data Security within Outlook FX aspx?CTT=1 BUT note that the transport of s to users is still vulnerable unless they use a specific secure method of accessing the . Each workstation that will be used for sending such s will require this software installation. Your technical support supplier may be able to deploy this software as a package to the relevant workstations. All SITSS managed schools will have 7-zip software installed on CC3 and CC4 machines. If you have any issues installing this software then contact your technical support provider. Call the Service Desk on Select Option 1 followed by Option 2 if you would like general help or advice regarding and internet connectivity or sitss.internet@lea.herts.sch.uk Doc Ref S1218 V3 1 of 19

6 School IT Systems Support Downloading the Software (7-zip) 1. Go to 2. Select the Download for any of the Windows version of the.msi ignore the blocker at this stage if it appears 3. A notification will appear at the bottom of the screen, click on Run 4. If the warning as below is displayed select Run (if no warning is displayed go to step 7) 5. The Setup box will then display, accept the location offered and click Install 6. The Welcome to 7-Zip dialogue will open 2 of 19 Doc Ref S1218 V3

7 School IT Systems Support 7. Click Next 8. Tick to accept the terms and click Next 9. Accept the default Custom Setup and click Next 10. Click Install 11. Click Finish to close the installation Doc Ref S1218 V3 3 of 19

8 School IT Systems Support Encrypting documents, Files or Folders 1. To encrypt your documents, files or folders run the 7Zip File Manager program from the Start, All Programs area 2. Select the location of the file that you wish to encrypt in the drop down box 3. Highlight the file and then select Add Browse Button Enter Password Encrypt file names The Add to Archive window will open and you will be offered a number of options. 4. Archive. This is where the encrypted document or folder will be saved. The default location is the same folder as the original document. You have the option to save to another folder by selecting the Browse button and browsing to the required folder 5. Archive Format. The default format is 7z but it is recommended that this is changed to zip format by using the dropdown option. Using the zip format means that the recipient of the will be able to use any standard zip software, including the Microsoft built-in zip compression, and therefore will have no need to install 7zip themselves 4 of 19 Doc Ref S1218 V3

9 School IT Systems Support Change to zip 6. Enter the password that you require which should be EIGHT characters, mixing numbers and letters. Re-enter the password. The recipient of the ed document will need to know this password in order for them to open it. They should be notified of the password in a separate communication for obvious reasons 7. You can select that the file name is also encrypted if you wish. It is recommended that the file name or the subject name of the does not contain information that could identify individuals 8. All the other defaults can be left as they are 9. Click OK 10. A file will then be created in the location that you chose. It will be the same name as the original file but with a.zip or.7z file extension 11. Open your program, attach the encrypted document to the and then send it to the intended recipient. Please note that the recipient must also have 7- Zip installed on the PC upon which the attachment is to be opened if you leave the file extension to be.7z If you have any issues installing this software then please contact your technical support provider. Doc Ref S1218 V3 5 of 19

10 School IT Systems Support To Access the File (decryption).7z extension files 1. To access the file Open the and Save the encrypted document to a folder, My Documents for example Extract Enter Password 2. Open 7Zip file manager, select the document and click Extract 3. Enter the password which should have been sent in a separate communication 4. By default the decrypted document will be extracted to the same folder as where the encrypted document was saved to, now access the file using the usual application ie Microsoft Word or Excel.zip extension files 1. Open the 2. Double click on the zipped attachment 3. You can chose to Open or Save the attachment first 4. When selecting to Open the file by double clicking, the follow dialogue box will open 6 of 19 Doc Ref S1218 V3

11 School IT Systems Support 5. Enter the password that has been sent to you in a separate 6. The opened file can then be saved to a location of your choice Doc Ref S1218 V3 7 of 19

12 School IT Systems Support How to Securely Encrypt a Word or Excel Document (similar methods exist in the other MS Office products) IMPORTANT Please be aware that files exported from SIMS as.rtf or any none.doc,.docx,.xls or.xlsx type files cannot be encrypted directly as described in the following instructions. It may have appeared to allow you to encrypt but it will not ask for the password upon trying to open it. You will need to save the file as a Word or Excel document and then encrypt as described.you may see the following warning. Using Word Create your document 2. When finished, choose the Save As option from the File menu 3. In the Save As dialogue box, choose Tools > Security Options 4. Enter the password that you require which should be EIGHT characters, mixing numbers and letters. The recipient of the ed document will need to know this password in order for them to open it. They should be notified of the password in a separate communication for obvious reasons 5. Select the Advanced Button 8 of 19 Doc Ref S1218 V3

13 School IT Systems Support 6. From the dropdown in the Encryption Type Box, choose RC 4 Microsoft RSA SChannel Cryptograhic Provider 7. Click Ok 8. Confirm your password remember that passwords cannot be recovered so ensure that you make a note of passwords and the corresponding documents 9. Click Ok and Save your document 10. Attach the document in the as required. Remember the subject of the should not identify individuals and the password should be sent to the recipient in a different communication Using Excel 2003 Please see Important notice on page Create and finish your document 2. Select the File menu and choose the Save As option Doc Ref S1218 V3 9 of 19

14 School IT Systems Support 3. In the Save As dialogue box, select Tools > General Options 4. The Save Options box will then open. Enter the password that you require which should be EIGHT characters, mixing numbers and letters. The recipient of the ed document will need to know this password in order for them to open it. They should be notified of the password in a separate communication for obvious reasons 5. Click Advanced and in the dropdown on the Encryption Type box choose RC 4 Microsoft RSA SChannel Cryptograhic Provider 6. Click OK 7. Re-enter password - remember that passwords cannot be recovered so ensure that you make a note of passwords and the corresponding documents. Click Ok 8. Continue to Save the document to a location of your choice 9. Attach the document in the as required. Remember the subject of the should not identify individuals and the password should be sent to the recipient in 10 of 19 Doc Ref S1218 V3

15 School IT Systems Support a different communication. Using Word and Excel 2007 IMPORTANT Please be aware that files exported from SIMS as.rtf or any none.doc,.docx,.xls or.xlsx type files cannot be encrypted directly as described in the following instructions. It may have appeared to allow you to encrypt but it will not ask for the password upon trying to open it. You will need to save the file as a Word or Excel document and then encrypt as described.you may see the following warning. 1. Click the Microsoft Office Button, point to Prepare 2. Select Encrypt Document 3. Enter the password that you require which should be EIGHT characters, mixing numbers and letters. The recipient of the ed document will need to know this password in order for them to open it. They should be notified of the password in a separate communication for obvious reasons 4. Click Ok 5. Re-enter the password to confirm and click OK Doc Ref S1218 V3 11 of 19

16 School IT Systems Support 6. Continue saving your document to a location of your choice 7. Click No if presented with this message 8. Attach the document in the as required. Remember the subject of the should not identify individuals and the password should be sent to the recipient in a different communication Using Word and Excel 2010 IMPORTANT Please be aware that files exported from SIMS as.rtf or any none.doc,.docx,.xls or.xlsx type files cannot be encrypted directly as described in the following instructions. It may have appeared to allow you to encrypt but it will not ask for the password upon trying to open it. You will need to save the file as a Word or Excel document and then encrypt as described.you may see the following warning. 1. Create and finish your document 2. Select the File menu and click on Protect Document drop-down 3. Click Encrypt with Password 4. Enter the required Password and re-enter when prompted The password that you enter should be EIGHT characters, mixing numbers and letters. The recipient of the ed document will need to know this password in order for them to open 12 of 19 Doc Ref S1218 V3

17 School IT Systems Support it. They should be notified of the password in a separate communication for obvious reasons 5. Click OK 6. The document now shows that a password is required to open this document 7. Save or Save as as normal Removing Password Protection from a Word and Excel 2003 Document 1. Use the password to Open the document 2. Select the File menu and choose the Save As option 3. In the Save As dialogue box, select Tools > General Options 4. The Save Options box will then open, delete the passwords Doc Ref S1218 V3 13 of 19

18 School IT Systems Support 5. Click Ok 6. Continue to Save your document to a location of your choice 7. The Save Options box will then open, delete the passwords 8. Continue to Save your document to a location of your choice Removing Password Protection from a Word and Excel 2007 Document 1. Use the password to open the document 2. Click the Microsoft Office Button, point to Prepare, and then click Encrypt Document 3. In the Encrypt Document dialog box, delete the encrypted password in the Password box, and then click OK 4. Save the file Removing Password Protection from a Word and Excel 2010 Document 1. Open the file using the password 2. Select the File menu and click on Protect Document drop-down 14 of 19 Doc Ref S1218 V3

19 School IT Systems Support 3. Select Encrypt with Password 4. Remove the password from the Password field 5. Click OK 6. Save the file Doc Ref S1218 V3 15 of 19

20 School IT Systems Support Create Strong Passwords Strong passwords are important protections to help you have safer online transactions. Keys to password strength: length and complexity An ideal password is long and has letters, punctuation, symbols, and numbers Whenever possible, use at least 14 characters or more The greater the variety of characters in your password, the better Use the entire keyboard, not just the letters and characters you use or see most often Create a strong password you can remember There are many ways to create a long, complex password. Here is one way that may make remembering it easier: What to do Suggestion Example Start with a sentence or two (about 10 words total). Think of something meaningful to you. Long and complex passwords are safest I know my security. Turn your sentences into a row of letters. Use the first letter of each word. lacpasikms (10 characters) Add complexity. Make only the letters in the first half of the alphabet uppercase. lacpasikms (10 characters) Add length with numbers. Put two numbers that are meaningful to you between the two sentences. lacpas56ikms (12 characters) Add length with punctuation. Put a punctuation mark at the beginning.?lacpas56ikms (13 characters) Add length with symbols. Put a symbol at the end.?lacpas56ikms" (14 characters) 16 of 19 Doc Ref S1218 V3

21 School IT Systems Support Protect your passwords from prying eyes The easiest way to "remember" passwords is to write them down. It is okay to write passwords down, but keep them secure. It is critical that you remember your password. If you forget your password and you have used Microsoft software, Microsoft cannot retrieve it. Store the passwords that you write down in a secure place away from the information that they help protect. Use strong passwords that combine uppercase and lowercase letters, numbers, and symbols. Weak passwords don't mix these elements. Strong password: Y6dh!et5. Weak password: House27. Passwords should be 8 or more characters in length. A pass phrase that uses 14 or more characters is better. For more information, see Help protect your personal information with strong passwords Cyber criminals use sophisticated tools that can rapidly decipher passwords. Avoid creating passwords using: o Dictionary words in any language o Words spelled backwards, common misspellings, and abbreviations o Sequences or repeated characters. Examples: , , abcdefg, or adjacent letters on your keyboard (qwerty) o Personal information. Your name, birthday, driver's license, passport number, or similar information Doc Ref S1218 V3 17 of 19

22 School IT Systems Support Top Tips for Internet Safety at Work 1. Defend your computer Keep all software current (including your Web browser) with automatic updates and install all security updates that your IT department recommends Use antivirus, antispam, and antispyware software and activate your firewall 2. Think before you share sensitive information Look for signs that a Web page is safe, before you enter sensitive personal or business data a Web address with https ( s for secure) and a closed padlock ( ) beside it Never give sensitive info in response to an or instant message (IM) request 3. Think before you click Pause before you open attachments or click links in or IM even if you know the sender; they could be phony. Confirm with the sender that the message is real or visit the official Web site by typing the address yourself Be wary of clicking links or buttons in pop-up windows 4. Use strong passwords Lock your online accounts, computer, phone, and other devices with passwords at least eight characters (longer is better), and include upper and lower case letters, numbers, and symbols Keep passwords and PINs secret. Don t disclose them to co-workers or businesses (like an Internet café operator), or be tricked into giving them away Don t use the same password everywhere 5. Protect yourself from scams Look out for alarmist messages, misspellings and grammatical errors, deals that sound too good to be true, requests for sensitive info like account numbers, and other signs of a scam Turn on a filter that warns you of suspicious Web sites 6. Protect your data on the go When you use public Wi-Fi, choose the most secure option, even if you have to pay for it. It could include password-protection and encryption Confirm the exact spelling of the wireless network you re connecting to Beware of clever (slightly misspelled) fakes 18 of 19 Doc Ref S1218 V3

23 School IT Systems Support Encrypt the data on your laptop (or USB flash drive) in case you lose it or it is stolen using software such as Truecrypt. Instructions available on the Grid within the document network_manager_guidance_for_schools_on_data_security_may_2010.doc at Guard your laptop, smartphone, and PDA as carefully as your wallet For further information or guidance on esafety please visit the Grid at For further information or guidance on Data Security please visit the Grid at Doc Ref S1218 V3 19 of 19

Egress Switch Best Practice Security Guide V4.x

Egress Switch Best Practice Security Guide V4.x Egress Switch Best Practice Security Guide V4.x www.egress.com 2007-2013 Egress Software Technologies Ltd Table of Contents Introduction... 4 Best Practice Installation... 4 System Administrators... 5

More information

IT Security DO s and DON Ts

IT Security DO s and DON Ts For more advice contact: IT Service Centre T: (01332) 59 1234 E: ITServiceCentre@derby.ac.uk Online: http://itservicecentre.derby.ac.uk Version: February 2014 www.derby.ac.uk/its IT Security DO s and DON

More information

Royal Mail Group. getting started. with Symantec Endpoint Encryption. A user guide from Royal Mail Technology

Royal Mail Group. getting started. with Symantec Endpoint Encryption. A user guide from Royal Mail Technology getting started with Symantec Endpoint Encryption A user guide from Royal Mail Technology For further help, contact the IT Helpdesk on 5415 2555 (01246 282555) March 2010 Contents 1 Introduction to Symantec

More information

Importing the DfE Deprivation Pupil Premium and Service Children Premium Files

Importing the DfE Deprivation Pupil Premium and Service Children Premium Files Importing the DfE Deprivation Pupil Premium and Service Children Premium Files School IT Systems Support Herts for Learning Ltd SROB220, Robertson House, Six Hills Way, Stevenage, Herts, SG1 2FQ Doc Ref

More information

HertSFX. User Guide V2.04. Hertfordshire s Secure File Exchange Portal. (Jan 2014) HertSFX User Guide V2.04 Jan 2014 Page 1 of 17

HertSFX. User Guide V2.04. Hertfordshire s Secure File Exchange Portal. (Jan 2014) HertSFX User Guide V2.04 Jan 2014 Page 1 of 17 Hertfordshire s Secure File Exchange Portal User Guide V2.04 (Jan 2014) HertSFX User Guide V2.04 Jan 2014 Page 1 of 17 CONTENTS 1. About HertSFX... 3 2. HertSFX Limitations... 3 3. Getting Started... 3

More information

Diamante WiFi Wireless Communication User Guide. Linksys E1200

Diamante WiFi Wireless Communication User Guide. Linksys E1200 Diamante WiFi Wireless Communication User Guide Linksys E1200 Release: February 2012; August 2011; February 2011 Patent Pending. Copyright 2012, Stenograph, L.L.C. All Rights Reserved. Printed in U.S.A.

More information

Backing up Microsoft Outlook Email For the PC Using MS Outlook 2000 Keith Roberts

Backing up Microsoft Outlook Email For the PC Using MS Outlook 2000 Keith Roberts WIN1020 November 2003 Backing up Microsoft Outlook Email For the PC Using MS Outlook 2000 Keith Roberts INTRODUCTION... 1 PREPARATION... 1 BACKING UP EMAIL... 2 RESTORING EMAIL FROM A PERSONAL FILE FOLDER...

More information

Chapter 3 ADDRESS BOOK, CONTACTS, AND DISTRIBUTION LISTS

Chapter 3 ADDRESS BOOK, CONTACTS, AND DISTRIBUTION LISTS Chapter 3 ADDRESS BOOK, CONTACTS, AND DISTRIBUTION LISTS 03Archer.indd 71 8/4/05 9:13:59 AM Address Book 3.1 What Is the Address Book The Address Book in Outlook is actually a collection of address books

More information

Encryption. Introduction to using 7-Zip

Encryption. Introduction to using 7-Zip IT Services Training Guide Encryption Introduction to using 7-Zip It Services Training Team The University of Manchester email: its.training@manchester.ac.uk www.itservices.manchester.ac.uk/trainingcourses/coursesforstaff

More information

Searching your Archive in Outlook (Normal)

Searching your Archive in Outlook (Normal) Searching your Archive in Outlook (Normal) 1. View the Archive Add in toolbar. In Outlook 2007, the toolbar displays below the standard Outlook toolbars. In Outlook 2010, select the McAfee tab. 2. In the

More information

Rev. 06 JAN. 2008. Document Control User Guide: Using Outlook within Skandocs

Rev. 06 JAN. 2008. Document Control User Guide: Using Outlook within Skandocs Rev. 06 JAN. 2008 Document Control User Guide: Using Outlook within Skandocs Introduction By referring to this user guide, it is assumed that the user has an advanced working knowledge of Skandocs (i.e.

More information

TheGreenBow CryptoMailer. User Guide. Contact: support@thegreenbow.com. Website: www.thegreenbow.com

TheGreenBow CryptoMailer. User Guide. Contact: support@thegreenbow.com. Website: www.thegreenbow.com TheGreenBow CryptoMailer User Guide Contact: support@thegreenbow.com Website: www.thegreenbow.com All rights reserved. No parts of this work may be reproduced in any form or by any means - graphic, electronic,

More information

NeoMail Guide. Neotel (Pty) Ltd

NeoMail Guide. Neotel (Pty) Ltd NeoMail Guide Neotel (Pty) Ltd NeoMail Connect Guide... 1 1. POP and IMAP Client access... 3 2. Outlook Web Access... 4 3. Outlook (IMAP and POP)... 6 4. Outlook 2007... 16 5. Outlook Express... 24 1.

More information

School IT Systems Support Service Desk Online

School IT Systems Support Service Desk Online School IT Systems Support Service Desk Online Description: Author: Guidance for Service Desk Online Administrators Jenny Collins Revision No: 6 Last Edited: 24/05/12 Document Ref: S1006 Technical Support

More information

Information Systems Services. Getting Started with Enterprise Vault Email Archiving A guide for Outlook/Exchange users March 2008

Information Systems Services. Getting Started with Enterprise Vault Email Archiving A guide for Outlook/Exchange users March 2008 Information Systems Services Getting Started with Enterprise Vault Email Archiving March 2008 Contents 1. Introduction... 3 2. Supported operating systems, email clients and browsers... 3 3. Getting started

More information

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out

More information

Exporting emails from Outlook Version 1.00

Exporting emails from Outlook Version 1.00 Exporting emails from Outlook Version 1.00 The rapid growth in volume of emails means that there is a growing need to archive old emails to media such as external hard disks and DVD s. The document will

More information

How to install and use the File Sharing Outlook Plugin

How to install and use the File Sharing Outlook Plugin How to install and use the File Sharing Outlook Plugin Thank you for purchasing Green House Data File Sharing. This guide will show you how to install and configure the Outlook Plugin on your desktop.

More information

Background Information

Background Information User Guide 1 Background Information ********************************Disclaimer******************************************** This is a government system intended for official use only. Using this system

More information

Fax User Guide 07/31/2014 USER GUIDE

Fax User Guide 07/31/2014 USER GUIDE Fax User Guide 07/31/2014 USER GUIDE Contents: Access Fusion Fax Service 3 Search Tab 3 View Tab 5 To E-mail From View Page 5 Send Tab 7 Recipient Info Section 7 Attachments Section 7 Preview Fax Section

More information

How To Access A Secure Email From The State Of Iceland

How To Access A Secure Email From The State Of Iceland STATE OF IOWA External User's Guide to State of Iowa Secure Email System This guide contains step by step instructions for setting up and using the State of Iowa Secure Email system. Contents Secure Email...

More information

Outlook Web App McKinney ISD 5/27/2011

Outlook Web App McKinney ISD 5/27/2011 Outlook Web App McKinney ISD 5/27/2011 Outlook Web App Tutorial Outlook Web Access allows you to gain access to your messages, calendars, contacts, tasks and public folders from any computer with internet

More information

Outlook Web App User Guide

Outlook Web App User Guide Outlook Web App Table of Contents QUICK REFERENCE... 2 OUTLOOK WEB APP URL... 2 Imagine! Help Desk...... 2 OUTLOOK WEB APP MAIN WINDOW... 2 KEY NEW FEATURES... 3 GETTING STARTED WITH OUTLOOK... 4 LOGGING

More information

PORTLANDDIOCESE.ORG Email - How to Connect Table of Contents

PORTLANDDIOCESE.ORG Email - How to Connect Table of Contents 1 PORTLANDDIOCESE.ORG Email - How to Connect Table of Contents Email Access via a Web Browser... 2 Email Client Setup... 3 Outlook 2013 for Windows... 3 Outlook for Mac 2011... 4 Mac OS X 10.6+... 4 iphone

More information

Online Security Information. Tips for staying safe online

Online Security Information. Tips for staying safe online Online Security Information ProCredit Bank is committed to protecting the integrity of your transactions and bank account details. ProCredit Bank therefore uses the latest security software and procedures

More information

Using Outlook WebAccess

Using Outlook WebAccess Using Outlook WebAccess Outlook Toolbars - Terminology Update all folders New Move/Copy Reply Forward Check for New Messages Help Show/Hide Folders Delete Reply to All Show/Hide Reading Pain Search Address

More information

User Guide. Active Online Backup - Secure, automatic protection

User Guide. Active Online Backup - Secure, automatic protection Active Online Backup - Secure, automatic protection 1. Quick Setup... 1 2. Backup Selecting Folders and Files... 2 3. Backup - Changing Selected Folders and Files... 3 4. Checking on Your Backups... 4

More information

Secure Message Center User Guide

Secure Message Center User Guide Secure Message Center User Guide Using the Department of Banking Secure Email Message Center 2 Receiving and Replying to Messages 3 Initiating New Messages 7 Using the Address Book 9 Managing Your Account

More information

Secure Email Recipient Guide

Secure Email Recipient Guide Secure Email Recipient Guide Contents How to open your first Encrypted Message.... 3 Step-by-Step Guide to Opening Your First Envelope... 3 Step One:... 3 Step Two:... 4 Step Three:... 4 Step Four:...

More information

Advice about online security

Advice about online security Advice about online security May 2013 Contents Report a suspicious email or website... 3 Security advice... 5 Genuine DWP contacts... 8 Recognising and reporting phishing and bogus emails... 9 How DWP

More information

Diamante WiFi Wireless Communication User Guide. CradlePoint CTR35

Diamante WiFi Wireless Communication User Guide. CradlePoint CTR35 Diamante WiFi Wireless Communication User Guide CradlePoint CTR35 Release: July 2011; March 2011 Patent Pending. Copyright 2011, Stenograph, L.L.C. All Rights Reserved. Printed in U.S.A. Stenograph, L.L.C.

More information

BlackBerry Internet Service. Version: 4.5.1. User Guide

BlackBerry Internet Service. Version: 4.5.1. User Guide BlackBerry Internet Service Version: 4.5.1 User Guide Published: 2014-05-22 SWD-20140522173857703 Contents 1 Getting started...7 About the messaging service plans for the BlackBerry Internet Service...7

More information

The United States Office Of Personnel Management eopf Human Resources Specialist Training Manual for eopf Version 4.0.

The United States Office Of Personnel Management eopf Human Resources Specialist Training Manual for eopf Version 4.0. The United States Office Of Personnel Management eopf Human Resources Specialist Training Manual for eopf Version 4.0. Copyright 1994-2007 by Northrop Grumman. All rights reserved. Northrop Grumman, the

More information

CITY OF BURLINGTON PUBLIC SCHOOLS MICROSOFT EXCHANGE 2010 OUTLOOK WEB APP USERS GUIDE

CITY OF BURLINGTON PUBLIC SCHOOLS MICROSOFT EXCHANGE 2010 OUTLOOK WEB APP USERS GUIDE CITY OF BURLINGTON PUBLIC SCHOOLS MICROSOFT EXCHANGE 2010 OUTLOOK WEB APP USERS GUIDE INTRODUCTION You can access your email account from any workstation at your school using Outlook Web Access (OWA),

More information

External End User Training Guide: Secure Email Extract

External End User Training Guide: Secure Email Extract External End User Training Guide: Secure Email Extract Version 6 August 12, 2013 Prepared by 7/29/2013: Kris Chromey, Training Coordinator Michelle Tuscher, Vault Implementation Coordinator Edited for

More information

User Guide. Version 3.0 April 2006

User Guide. Version 3.0 April 2006 User Guide Version 3.0 April 2006 2006 Obvious Solutions Inc. All rights reserved. Dabra and Dabra Network are trademarks of Obvious Solutions Inc. All other trademarks owned by their respective trademark

More information

2. To encrypt the drive for future use, click Yes (Fig 1, 2). This will start the encryption process.

2. To encrypt the drive for future use, click Yes (Fig 1, 2). This will start the encryption process. Dell Data Protection USB Drive Encryption Introduction To further protect PC s that have access to sensitive data, the Dell Data Protection (DDP) client detects and encrypts USB/Flash drives when they

More information

How To Restore Your Data On A Backup By Mozy (Windows) On A Pc Or Macbook Or Macintosh (Windows 2) On Your Computer Or Mac) On An Pc Or Ipad (Windows 3) On Pc Or Pc Or Micro

How To Restore Your Data On A Backup By Mozy (Windows) On A Pc Or Macbook Or Macintosh (Windows 2) On Your Computer Or Mac) On An Pc Or Ipad (Windows 3) On Pc Or Pc Or Micro Online Backup by Mozy Restore Common Questions Document Revision Date: June 29, 2012 Online Backup by Mozy Common Questions 1 How do I restore my data? There are five ways of restoring your data: 1) Performing

More information

PaymentNet Federal Card Solutions Cardholder FAQs

PaymentNet Federal Card Solutions Cardholder FAQs PaymentNet Federal Card Solutions It s easy to find the answers to your questions about PaymentNet! June 2014 Frequently Asked Questions First Time Login How do I obtain my login information?... 2 How

More information

River Valley Credit Union Online Banking

River Valley Credit Union Online Banking River Valley Credit Union Online Banking New user setup guide Members can self enroll for the service by answering a few simple questions. Before beginning the process, please make sure you have this information

More information

Setting Up Database Security with Access 97

Setting Up Database Security with Access 97 Setting Up Database Security with Access 97 The most flexible and extensive method of securing a database is called user-level security. This form of security is similar to methods used in most network

More information

Configuring your email client to connect to your Exchange mailbox

Configuring your email client to connect to your Exchange mailbox Configuring your email client to connect to your Exchange mailbox Contents Use Outlook Web Access (OWA) to access your Exchange mailbox... 2 Use Outlook 2003 to connect to your Exchange mailbox... 3 Add

More information

BlackBerry Link for Windows. Version: 1.2.3. User Guide

BlackBerry Link for Windows. Version: 1.2.3. User Guide BlackBerry Link for Windows Version: 1.2.3 User Guide Published: 2014-01-20 SWD-20140120093847797 Contents Related resources...5 Getting started...6 About BlackBerry Link... 6 Getting to know BlackBerry

More information

Outlook Web Access User Guide

Outlook Web Access User Guide Table of Contents Title Page How to login...3 Create a new message/send attachment...5 Remove the reading pane...10 Calendar functions...11 Distribution lists...11 Contacts list...13 Tasks...18 Options...19

More information

Outlook Web Access (OWA) 2010 Email Cheat Sheet

Outlook Web Access (OWA) 2010 Email Cheat Sheet June 9, 2014 Outlook Web Access (OWA) 2010 Email Cheat Sheet Outlook Web Access 2010 allows you to gain access to your messages, calendars, contacts, tasks and public folders from any computer with internet

More information

Quick Start : i-fax User Guide

Quick Start : i-fax User Guide Quick Start : i-fax User Guide Introduction Welcome to the i-fax System User Guide! This manual will help new users navigate i-fax System and perform common tasks. This manual is task-oriented. You will

More information

BlackBerry Internet Service Using the Browser on Your BlackBerry Smartphone Version: 2.8

BlackBerry Internet Service Using the Browser on Your BlackBerry Smartphone Version: 2.8 BlackBerry Internet Service Using the Browser on Your BlackBerry Smartphone Version: 2.8 User Guide SWDT653811-793266-0827104650-001 Contents Getting started... 3 About messaging service plans for BlackBerry

More information

Mikogo User Guide Linux Version

Mikogo User Guide Linux Version Mikogo User Guide Linux Version Table of Contents Registration 3 Downloading & Running the Application 4 Start a Session 5 Join a Session 6 Features 7 Participant List 7 Switch Presenter 8 Remote Control

More information

CWOPA Broadband Users. Windows Operating System

CWOPA Broadband Users. Windows Operating System CWOPA Broadband Users Windows Operating System October 2012 Background These instructions are to be used for VPN users who have been assigned a CWOPA username and password. If your machine has Internet

More information

ARGUS SUPPORT: INSTALLATION AND CONFIGURATION GUIDE FOR BEST PRACTICE

ARGUS SUPPORT: INSTALLATION AND CONFIGURATION GUIDE FOR BEST PRACTICE ARGUS SUPPORT: (03) 5335 2221 or support@argusconnect.com.au INSTALLATION AND CONFIGURATION GUIDE FOR BEST PRACTICE VERSION 1.6.1.x ArgusConnect Pty Ltd: Phone: (03) 5335 2220 Support: (03) 5335 2221 Email:

More information

General tips for increasing the security of using First Investment Bank's internet banking

General tips for increasing the security of using First Investment Bank's internet banking General tips for increasing the security of using First Investment Bank's internet banking Dear Clients, First Investment Bank (Fibank, the Bank) provides you with high level of protection and security

More information

BackupAssist v6 quickstart guide

BackupAssist v6 quickstart guide New features in BackupAssist v6... 2 VSS application backup (Exchange, SQL, SharePoint)... 3 System State backup... 3 Restore files, applications, System State and mailboxes... 4 Fully cloud ready Internet

More information

INSTALLING NOVA DATA ENCRYPTION SOFTWARE

INSTALLING NOVA DATA ENCRYPTION SOFTWARE INSTALLING NOVA DATA ENCRYPTION SOFTWARE Introduction 1. Here is what you will need to do to install the college s data encryption software on your computer, laptop, or USB storage device. The encryption

More information

Getting Started. Getting Started with Time Warner Cable Business Class. Voice Manager. A Guide for Administrators and Users

Getting Started. Getting Started with Time Warner Cable Business Class. Voice Manager. A Guide for Administrators and Users Getting Started Getting Started with Time Warner Cable Business Class Voice Manager A Guide for Administrators and Users Table of Contents Table of Contents... 2 How to Use This Guide... 3 Administrators...

More information

Bulk Downloader. Call Recording: Bulk Downloader

Bulk Downloader. Call Recording: Bulk Downloader Call Recording: Bulk Downloader Contents Introduction... 3 Getting Started... 3 Configuration... 4 Create New Job... 6 Running Jobs... 7 Job Log... 7 Scheduled Jobs... 8 Recent Runs... 9 Storage Device

More information

OWA - Outlook Web App

OWA - Outlook Web App OWA - Outlook Web App Olathe Public Schools 0 Page MS Outlook Web App OPS Technology Department Last Revised: May 1, 2011 Table of Contents MS Outlook Web App... 1 How to Access the MS Outlook Web App...

More information

Secure Email Client Guide

Secure Email Client Guide PRESIDIO BANK 33 Secure Email Client Guide THE BUSINESS BANK THAT WORKS 8/2013 Table of Contents Introduction.....3 Our Responsibility to Protect Confidential Information....4 Registering and Accessing

More information

Setting up a Personal Email Account

Setting up a Personal Email Account Setting up a Personal Email Account Having a personal email account is vital to accessing many services on the internet. Many sites, both useful and not so useful require you to make an account with them

More information

Barclaycard Spend Management Training Guide. December 2010

Barclaycard Spend Management Training Guide. December 2010 Barclaycard Spend Management Training Guide December 2010 About this Guide The following slides are intended to assist with cardholder and manager (approver) Barclaycard Spend Management training. The

More information

SMS Database System Quick Start. [Version 1.0.3]

SMS Database System Quick Start. [Version 1.0.3] SMS Database System Quick Start [Version 1.0.3] Warning ICP DAS Inc., LTD. assumes no liability for damages consequent to the use of this product. ICP DAS Inc., LTD. reserves the right to change this manual

More information

BCSD WebMail Documentation

BCSD WebMail Documentation BCSD WebMail Documentation Outlook Web Access is available to all BCSD account holders! Outlook Web Access provides Webbased access to your e-mail, your calendar, your contacts, and the global address

More information

Protect Yourself. Who is asking? What information are they asking for? Why do they need it?

Protect Yourself. Who is asking? What information are they asking for? Why do they need it? Protect Yourself Your home computer serves many purposes: email, shopping, social networking and more. As you surf the Internet, you should be aware of the various ways to protect yourself. Of primary

More information

Figure 1: Restore Tab

Figure 1: Restore Tab Apptix Online Backup by Mozy Restore How do I restore my data? There are five ways of restoring your data: 1) Performing a Restore Using the Restore Tab You can restore files from the Apptix Online Backup

More information

Installing your certificate on your Windows PC

Installing your certificate on your Windows PC Installing your certificate on your PC Choose your email software below to learn how to obtain and install a digital certificate. Microsoft Outlook Mail Using Outlook or Mail Step one Visit Comodo for

More information

Migrating From Bobcat Mail To Google Apps (Using Microsoft Outlook and Google Apps Sync)

Migrating From Bobcat Mail To Google Apps (Using Microsoft Outlook and Google Apps Sync) Migrating From Bobcat Mail To Google Apps (Using Microsoft Outlook and Google Apps Sync) This document is intended for those users moving from WVWC s Bobcat Mail system to the new Google Apps mail system

More information

Last modified: November 22, 2013 This manual was updated for the TeamDrive Android client version 3.0.216

Last modified: November 22, 2013 This manual was updated for the TeamDrive Android client version 3.0.216 Last modified: November 22, 2013 This manual was updated for the TeamDrive Android client version 3.0.216 2013 TeamDrive Systems GmbH Page 1 Table of Contents 1 Starting TeamDrive for Android for the First

More information

INTRODUCTION TO EMAIL: & BASICS

INTRODUCTION TO EMAIL: & BASICS University of North Carolina at Chapel Hill Libraries Chapel Hill Public Library Carrboro Branch Library Carrboro Cybrary Durham Public Library INTRODUCTION TO EMAIL: & BASICS Getting Started Page 02 Prerequisites

More information

Infocomm Sec rity is incomplete without U Be aware,

Infocomm Sec rity is incomplete without U Be aware, Infocomm Sec rity is incomplete without U Be aware, responsible secure! HACKER Smack that What you can do with these five online security measures... ANTI-VIRUS SCAMS UPDATE FIREWALL PASSWORD [ 2 ] FASTEN

More information

Eastern Shore Community College. Employee Information Technology Handbook

Eastern Shore Community College. Employee Information Technology Handbook Eastern Shore Community College Employee Information Technology Handbook 6/5/2008 Table of Contents ESCC Network Account Quick Facts...3 Overview... 3 What is my login name and password?... 3 What happens

More information

Networking. General networking. Networking overview. Common home network configurations. Wired network example. Wireless network examples

Networking. General networking. Networking overview. Common home network configurations. Wired network example. Wireless network examples Networking General networking Networking overview A network is a collection of devices such as computers, printers, Ethernet hubs, wireless access points, and routers connected together for communication

More information

How To Use Senior Systems Cloud Services

How To Use Senior Systems Cloud Services Senior Systems Cloud Services In this guide... Senior Systems Cloud Services 1 Cloud Services User Guide 2 Working In Your Cloud Environment 3 Cloud Profile Management Tool 6 How To Save Files 8 How To

More information

GETTING STARTED ON THE WINDOWS SERVICE A GUIDE FOR NEW STAFF MEMBERS

GETTING STARTED ON THE WINDOWS SERVICE A GUIDE FOR NEW STAFF MEMBERS Your Login ID: GETTING STARTED ON THE WINDOWS SERVICE A GUIDE FOR NEW STAFF MEMBERS CONTENTS 1.0 Introduction... 3 1.1 Welcome to Edinburgh Napier University from Information Services!... 3 1.2 About Information

More information

Dial-up Installation for CWOPA Users (Windows Operating System)

Dial-up Installation for CWOPA Users (Windows Operating System) Dial-up Installation for CWOPA Users (Windows Operating System) 1 Table of Contents Download and Install Digital Certificates... 3 Internet Explorer 8/9 Certificate Installation.3 Windows XP Instructions

More information

NATIONAL CREDIT UNION ADMINISTRATION CREDIT UNION ONLINE: CREDIT UNION PROFILE AND 5300 CALL REPORT

NATIONAL CREDIT UNION ADMINISTRATION CREDIT UNION ONLINE: CREDIT UNION PROFILE AND 5300 CALL REPORT NATIONAL CREDIT UNION ADMINISTRATION CREDIT UNION ONLINE: CREDIT UNION PROFILE AND 5300 CALL REPORT INSTRUCTION GUIDE For Natural Person Credit Unions NCUA 10200 (REV 4) Table of Contents A. Introduction...

More information

Yale Software Library

Yale Software Library Yale Software Library http://www.yale.edu/its/software/ For assistance contact the ITS Help Desk 203-432-9000, helpdesk@yale.edu Two-factor authentication: Installation and configuration instructions for

More information

Core Essentials. Outlook 2010. Module 1. Diocese of St. Petersburg Office of Training Training@dosp.org

Core Essentials. Outlook 2010. Module 1. Diocese of St. Petersburg Office of Training Training@dosp.org Core Essentials Outlook 2010 Module 1 Diocese of St. Petersburg Office of Training Training@dosp.org TABLE OF CONTENTS Topic One: Getting Started... 1 Workshop Objectives... 2 Topic Two: Opening and Closing

More information

Transitioning from TurningPoint 5 to TurningPoint Cloud - LMS 1

Transitioning from TurningPoint 5 to TurningPoint Cloud - LMS 1 Transitioning from TurningPoint 5 to TurningPoint Cloud - LMS 1 A Turning Account is a unique identifier that is used to tie together all software accounts and response devices. A Turning Account is required

More information

Safe Practices for Online Banking

Safe Practices for Online Banking November 2012 Follow these guidelines to help protect your information while banking online. At First Entertainment Credit Union, our goal is to provide you with the best all around banking experience.

More information

Online Backup and Recovery Manager Setup for Microsoft Windows.

Online Backup and Recovery Manager Setup for Microsoft Windows. Online Backup and Recovery Manager Setup for Microsoft Windows. Backup Wizard Default Interface Recovery Wizard Online Backup and Recovery Manager Setup Backup Wizard After installing and launching the

More information

PORTLANDDIOCESE.ORG Email - How to Connect Table of Contents

PORTLANDDIOCESE.ORG Email - How to Connect Table of Contents 1 PORTLANDDIOCESE.ORG Email - How to Connect Table of Contents Email Access via a Web Browser... 2 Email Client Setup... 3 Outlook 2007, 2010 & 2013 for Windows... 3 Outlook for Mac 2011... 5 Mac OS X

More information

New Mexico Health Alert Network (HAN) NM HAN USER GUIDE NEW MEXICO DEPARTMENT OF HEALTH

New Mexico Health Alert Network (HAN) NM HAN USER GUIDE NEW MEXICO DEPARTMENT OF HEALTH New Mexico Health Alert Network (HAN) NM HAN USER GUIDE NEW MEXICO DEPARTMENT OF HEALTH April 2015 (This page intentionally left blank.) Purpose The New Mexico Department of Health s Health Alert Network

More information

Baylor Secure Messaging. For Non-Baylor Users

Baylor Secure Messaging. For Non-Baylor Users Baylor Secure Messaging For Non-Baylor Users TABLE OF CONTENTS SECTION ONE: GETTING STARTED...4 Receiving a Secure Message for the First Time...4 Password Configuration...5 Logging into Baylor Secure Messaging...7

More information

Protection from Fraud and Identity Theft

Protection from Fraud and Identity Theft Table of Contents Protection from Fraud & Identity Theft... 1 Simple Steps to Secure Your Devices... 1 Setting Up Your Computer and/or Mobile Device... 2 Adding Security Software... 2 Internet Safety Tips...

More information

Changes to Skillnet Group Emails. Outlook and Outlook Express Users

Changes to Skillnet Group Emails. Outlook and Outlook Express Users Changes to Skillnet Group Emails Skillnet Group emails are moving from the current provider to our own exchange mail server. This will mean that you will have a much improved web-mail system and almost

More information

Internet Access Gateway Logon Instructions IAG Platform, XP

Internet Access Gateway Logon Instructions IAG Platform, XP Business Services Network (BSN) Internet Access Gateway Logon Instructions IAG Platform, XP Welcome to the Business Services Network a secure, private network for authorized users within which one may

More information

Auto Archiving Folders in Outlook XP

Auto Archiving Folders in Outlook XP Auto Archiving Folders in Outlook XP Your Outlook email account on the Exchange server is allotted 50 megabytes of storage space on the server. Items in the Inbox, Calendar, Sent Items, Deleted Items,

More information

HomeNet. Gateway User Guide

HomeNet. Gateway User Guide HomeNet Gateway User Guide Gateway User Guide Table of Contents HomeNet Gateway User Guide Gateway User Guide Table of Contents... 2 Introduction... 3 What is the HomeNet Gateway (Gateway)?... 3 How do

More information

SafeGuard Enterprise Web Helpdesk. Product version: 6 Document date: February 2012

SafeGuard Enterprise Web Helpdesk. Product version: 6 Document date: February 2012 SafeGuard Enterprise Web Helpdesk Product version: 6 Document date: February 2012 Contents 1 SafeGuard web-based Challenge/Response...3 2 Installation...5 3 Authentication...8 4 Select the Web Helpdesk

More information

User guide. Business Email

User guide. Business Email User guide Business Email June 2013 Contents Introduction 3 Logging on to the UC Management Centre User Interface 3 Exchange User Summary 4 Downloading Outlook 5 Outlook Configuration 6 Configuring Outlook

More information

User Guide Online Backup

User Guide Online Backup User Guide Online Backup Table of contents Table of contents... 1 Introduction... 2 Adding the Online Backup Service to your Account... 2 Getting Started with the Online Backup Software... 4 Downloading

More information

SECURE EMAIL USER GUIDE OUTLOOK 2000

SECURE EMAIL USER GUIDE OUTLOOK 2000 WELLS FARGO AUTHENTICATION SERVICES DATED: MAY 2003 TABLE OF CONTENTS GENERAL INFORMATION... 1 INSTALLING THE WELLS FARGO ROOT CERTIFICATE CHAIN.. 2 INSTALLING THE CERTIFICATES INTO IE... 3 SETTING UP

More information

Microsoft Outlook. KNOW HOW: Outlook. Using. Guide for using E-mail, Contacts, Personal Distribution Lists, Signatures and Archives

Microsoft Outlook. KNOW HOW: Outlook. Using. Guide for using E-mail, Contacts, Personal Distribution Lists, Signatures and Archives Trust Library Services http://www.mtwlibrary.nhs.uk http://mtwweb/cgt/library/default.htm http://mtwlibrary.blogspot.com KNOW HOW: Outlook Using Microsoft Outlook Guide for using E-mail, Contacts, Personal

More information

ScoMIS Encryption Service

ScoMIS Encryption Service Introduction This guide explains how to install the ScoMIS Encryption Service Software onto a laptop computer. There are three stages to the installation which should be completed in order. The installation

More information

MICROSOFT OFFICE 365 EXCHANGE ONLINE CLOUD

MICROSOFT OFFICE 365 EXCHANGE ONLINE CLOUD 6/4/14 Samson V. 1. Configure Outlook 2011 for Exchange Online Step 1 First we need to verify that your Office 2011 is up-to-date. Launch any Office 2011 product (Word, Excel, Outlook) and click on the

More information

IBM Security Access Manager for Enterprise Single Sign-On Version 8.2.1. User Guide IBM SC23-9950-05

IBM Security Access Manager for Enterprise Single Sign-On Version 8.2.1. User Guide IBM SC23-9950-05 IBM Security Access Manager for Enterprise Single Sign-On Version 8.2.1 User Guide IBM SC23-9950-05 IBM Security Access Manager for Enterprise Single Sign-On Version 8.2.1 User Guide IBM SC23-9950-05

More information

Contents. McAfee Internet Security 3

Contents. McAfee Internet Security 3 User Guide i Contents McAfee Internet Security 3 McAfee SecurityCenter... 5 SecurityCenter features... 6 Using SecurityCenter... 7 Fixing or ignoring protection problems... 16 Working with alerts... 21

More information

Internet Explorer 7. Getting Started The Internet Explorer Window. Tabs NEW! Working with the Tab Row. Microsoft QUICK Source

Internet Explorer 7. Getting Started The Internet Explorer Window. Tabs NEW! Working with the Tab Row. Microsoft QUICK Source Microsoft QUICK Source Internet Explorer 7 Getting Started The Internet Explorer Window u v w x y { Using the Command Bar The Command Bar contains shortcut buttons for Internet Explorer tools. To expand

More information

DSHS CA Security For Providers

DSHS CA Security For Providers DSHS CA Security For Providers Pablo F Matute DSHS Children's Information Security Officer 7/21/2015 1 Data Categories: An Overview All DSHS-owned data falls into one of four categories: Category 1 - Public

More information

Identity Finder: Managing Your Results

Identity Finder: Managing Your Results Identity Finder: Managing Your Results The most important part of running Identity Finder is determining the most effective and secure way of managing the search results. Be sure to carefully read and

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information