SlideShare uma empresa Scribd logo
1 de 38
BOROUGH OFWEST CHESTER
InformationTechnologyTraining
Session 10 – July 25, 2013
William Mann, Chief Information Officer
• Interactive Projectors
• Introduction toWest Chester Connect
• MicrosoftOffice 365
• Sharepoint
• Spyware 101
• SimCardTroubles
• SecuringYour Mobile Devices
• SummertimeTechTips
• Facebook - Security
• Facebook -Your History
• Questions & Answers
Interactive Presentations
Room 240 and the Borough Council Chambers have both been upgraded to
include the ability to easily conduct interactive presentations.
Interactive Presentations
PROCEEDTO DEMONSTRATION
West Chester Connect
What isWest Chester Connect?
West Chester Connect allows citizens to submit quality of life, environmental and public
safety issues directly to the appropriate department through the use of their smartphone.
The West Chester Connect app can be downloaded for free in the app stores for iPhone,
Android, Blackberry and Windows phones.
West Chester Connect
PROCEEDTO SMARTPHONE DEMONSTARTION
This demonstration will include downloading and using the publicWest Chester Connect
smartphone app.
West Chester Connect
The CitySourced Console
Through the CitySourced Console we can manage the “work orders” from an PC.
The URL is console.citysourced.com.Our customer ID is “90”. Any employee who
needs access has been issued a username & password. If additional employees need
access please contact me.
West Chester Connect
The CitySourced Console
From the console staff can open, review, update, close and create work orders.
This demonstration will include downloading and using the publicWest Chester
Connect smartphone app.
Microsoft Office 365
Our organization has now been fully upgraded to the Microsoft Office 365.
The first change you can see is the newWeb Outlook.You can login to your
Microsoft Account at login.microsoftonline.com.
Microsoft Office 365
Our organization has now been fully upgraded to the Microsoft Office 365.
The first change you can see is the newWeb Outlook.You can login to your
Microsoft Account at login.microsoftonline.com.
Microsoft Office 365
Licenses and Account Access
There are 2 license types:
1. ExchangeOnline (Plan 1)
2. Office 365 Enterprise E3
Plan assignment is based on the employee’s role in the organization.
ExchangeOnline – Plan 1 offers email services while Office 365 Enterprise E3
brings full Microsoft Office access with the ability to download Office 2013 on up to
3 computers and access to Office products throughWeb Office.
Microsoft Office 365
Web Outlook Demonstration
You can perform all Outlook functions throughWeb Outlook.
Microsoft Office 365
Installing Microsoft Office 2013
If you have a Office 365 E3 Enterprise license you can install Office 2013 on up to 5 computers.
To do this click on the settings wheel on the far right upper menu bar and select (1) Office 365
Settings and then (2) “software”.
Microsoft Office 365
Installing Microsoft Office 2013
If you are running Office 2010 on your office PC, and you only have Exchange Online please
Submit a work order if you would like to be upgraded to Office 2013.
Office 2013 offers many advantages over previous Office versions, including Skydrive
and Sharepoint interrogation as well as social media connection options.
Microsoft Office 365
Sharepoint
Shared organizational documents will be stored and available on our new Sharepoint site.
You can access Sharepoint from the 365 login screen, by selecting “Sites”. From here you
Will be able to access your site, the staff (team) site and more.
Microsoft Office 365
Sharepoint
Opening theTeam “staff” site will allow you to access any shared documents that have
been posted.
Microsoft Office 365
Sharepoint
SharepointWalkthrough
Spyware 101
Spyware is software that's installed without your consent, whether it be a traditional
computer, an application in your web-browser, or a mobile application residing on your
device. In short, spyware communicates personal, confidential information about you
to an attacker.The information might be reports about your online browsing habits or
purchases, but it can also be modified to record things like keystrokes on the keyboard,
credit card information, passwords, or login credentials.
This software normally gets onto a computer by attaching itself to some other
program that the user intentionally downloads and installs. Sometimes this is done
completely discreetly, but other times the desired software will include information in
the license agreement actually describing the spyware — without using the term
"spyware" — and forcing the user to agree to install it in order to install the desired
program.Alternatively, spyware can get into a computer through all the avenues that
other malware takes, such as when the user visits a compromised website or opens a
malicious attachment in an email.
Original article posted on 7/23/2013,West ChesterTech Blog
Spyware 101
There are 2 problems with Spyware. First, and perhaps most importantly, it can steal
personal information that can be used for identity theft. If the malicious software has
access to every piece of information on your computer, including browsing history, email
accounts, saved passwords used for online banking and shopping in addition to social
networks, it can harvest more than enough information to create a profile imitating your
identity.
The second, and more common, problem is the damage spyware can do to your
computer. This is where I usually get the phone call. Spyware can take up an enormous
amount of your computer's resources, making it run slowly, lag in between applications or
while online, frequent system crashes or freezes and even overheat your computer
causing permanent damage. It can also manipulate search engine results and deliver
unwanted websites in your browser, which can lead to potentially harmful websites or
fraudulent ones. It can also cause your home page to change and can even alter some of
your computer's settings.
Original article posted on 7/23/2013,West ChesterTech Blog
Spyware 101
The best way to control spyware is by preventing it from getting on your computer in the
first place. However not downloading programs and never clicking on email attachments
isn't always an option. Sometimes, even a trusted website can become compromised and
infect your computer — even if you've done nothing wrong.
Many people are turning to internet security solutions with reliable antivirus detection
capabilities and proactive protection. If your computer is already infected, many security
providers offer spyware removal utilities to assist in identifying and removing spyware.
There are a number of free antivirus solutions available, such as Microsoft's Security
Essentials which promises unlimited protection at no cost.There are also excellent paid
options as well to protect your PC, and yourself which I have covered many times in the
past.
Original article posted on 7/23/2013,West ChesterTech Blog
SIMCardTroubles
It took a long time but the humble SIM card that sits within your phone, along with at least
seven billion others, has finally been hacked. Of the seven billion modern SIM cards in
circulation, it is suspected that hundreds of millions (yes, hundreds of millions) are
susceptible. What Does this mean?
The hacks allow a would-be attacker to infect your SIM with a virus that sends premium
text messages, or records your phone calls — and, in some cases, access the secure,
sandboxed details stored on your SIM by mobile payment apps, giving a hacker access to
your bank and credit card details.
Original article posted on 7/23/2013,West ChesterTech Blog
SIMCardTroubles
SIM cards are not merely a piece of laminated memory that stores the data that your
phone needs to connect to a cellular network. In actuality, the SIM card in your phone is
actually a small computer, with memory, a processor, and even an operating system.
Original article posted on 7/23/2013,West ChesterTech Blog
SIMCardTroubles
SIM cards are not merely a piece of laminated memory that stores the data that your
phone needs to connect to a cellular network. In actuality, the SIM card in your phone is
actually a small computer, with memory, a processor, and even an operating system.
Original article posted on 7/23/2013,West ChesterTech Blog
Like any computer chip that runs an operating system and apps, a SIM card can be
hacked. In this case, modern SIM cards run a very simpleOS that loads up Java Card — a
version of the Java virtual machine for smart cards (of which SIMs are a variety of). Java
Card essentially runs small Java applets, and each applet is encapsulated and firewalled
(sandboxed) by the JavaVM, preventing sensitive data from leaking to other apps.Your
phone interacts with these apps via the SIMApplicationToolkit (STK) to display
information on your screen, and to interact with the outside world.
SIMCardTroubles
Original article posted on 7/23/2013,West ChesterTech Blog
If your mobile phone is more then a couple years old you should contact your cellular
provider and request a replacement SIM as the newer ones issued have mostly been
programmed to avoid this problem.
SecuringYour Mobile Devices
Our mobile devices (smartphones and tablets) are becoming a bigger and
more important part of our daily lives everyday. Because of this, security
concerns are growing and becoming more complex.
SecuringYour Mobile Devices
Be careful when “checking in” on social sites:This is one of my personal
weaknesses. I love to check in so that my friends can know what I am going.This is
because Facebook, FourSquare and other geo-location programs are fun and
sometimes you can score some deals for “checking in” at locations. However you
should to be cautious of letting people know where you are – especially if you’re
away from home.
Don’t remember your passwords: Don’t set user name and passwords to be
remembered in your mobile browser or in apps and make sure you always log out
of accounts when you access them.
Be careful what you share: Yes it’s fine to stay in touch with our friends and family
via social networks, but be careful what you share. Even if your privacy settings are
set to only let your friends see the information, it’s best to take the approach that
once something is online, it lives forever.Think if you’re really ok with your
grandmother or boss to see that update, picture or video.
SecuringYour Mobile Devices
Don’t text or email personal information: While this might seem pretty basic, we
may find we need to share credit card numbers or personal details with another
person. But this should be done via a secure site or app or use your mobile’s other
function (the phone itself - voice call). Emails and texts can be intercepted and then
your information can fall into the wrong hands.
Always remember that legitimate organizations like banks will not ask you to text
personal details!
Turn off your Bluetooth: If you’re not using this connection, it’s best to turn it off.
Not only will this help save your battery life, but it prevents hackers from accessing
your device through this technology.
SummertimeTechTips
A trip to the shore for some sunshine and water may sound like the perfect
getaway and in many ways it can be. However your smartphone probably will not
agree.There is little doubt that many of us are addicted to our smartphones so
here are some tips for keeping them safe this summer.
Seek some shade. Direct sunlight can cause overheating, so be sure to stash your
devices somewhere shady. If you do trigger an “overheated” alert, be sure to turn
off the device and move it to a cooler location. Do not place it inside a freezer!
SummertimeTechTips
Invest in a quality case. In the summertime, the living is easy – but not for your
gadgets. Sticky fingers from ice cream, blowing sand and condensation are just a
few of the perils the season brings for your devices.There are a ton of options on
the market, including rugged cases to help protect from drops and waterproof
options to help keep things safe poolside – or tabletop during meals.
Limit the glare. Sunlight can make your screen hard to read. You can tackle this in a
few ways:
Adjust your brightness settings. Navigate to your device’s “Settings” menu, then
select the “Display Settings.”You can modify both “Brightness” and “Backlight”
options on most devices: the higher the brightness settings, the easier it is to read
your screen in sunlight. Some devices also offer an “Auto Brightness” option that
automatically adjusts your screen for optimal viewing.
SummertimeTechTips
Purchase an anti-glare cover which will help make your screen more legible in bright light.
Find some shade. Relax under an umbrella or a tree for some temporary relief.
Low-Fi Stereo Fun! Summer means impromptu gatherings, which just beg for a great
music. But if you do not have portable speakers handy, you can try this simple trick to
pump up the volume. Place your music player in a bowl or glass to amplify your device’s
speakers. It really works!
SummertimeTechTips
Identity theft is a serious crime that can have a lasting negative impact. Just one important piece of
information, like a Social Security card, a driver’s license or a bank account statement, can provide
a criminal what he needs to steal someone’s identity. What’s worse is victims may not realize their
identities have been stolen for weeks, months or years after the fact, allowing the crime to
perpetuate and destroy their credit.The good news is there are actions you can take to help
protect your identity while on vacation — and anywhere else you may be mobile and online.
Mobile Routers or Cellular Hotspots
Consider a portable router to create your own Wi-Fi hotspot for your own or your
family’s devices.You’ll need a local SIM data card, which is available at most electronic
stores or even airport kiosks.This will help you avoid using publicWi-Fi spots. All cellular
companies sell mobile hotspot devices.
Avoid Contact with Hackers
If you use publicWi-Fi, be very cautious of using unsecured networks. Make sure you are
logging into a secured or private network when you useWi-Fi. If you aren’t sure, don’t
visit sites that contain sensitive information, like bank accounts.
SummertimeTechTips
.Be Careful Being Social
Using social media while you travel can be a great way to share your family’s trip but remember —
checking in or posting pictures can alert someone that your home is vacant! Make sure to set your
home alarm, hire a house-sitter or maybe the best option is to delay posts until you are back home. If
you do really want to share these photos while you are on vacation, make sure to set your privacy
settings to “friends” only.This will help limit the number of people who actually see these pictures.
Make Sure It's Legit
Before logging onto a website from your mobile device, make sure the URL is legit.There
are plenty of URL spoof sites out there, created in order to steal your information.
Unfortunately many mobile browsers do not show the URL, so it is best to bookmark
your favorite sites after you type in the address.
Lock DownYour Social Networks
If you have a blog or social accounts — such as Facebook andTwitter — use the highest
security settings possible to ensure your information, posts and photos aren’t being
leaked onto the internet.
SummertimeTechTips
.
Strong Passwords
Use a mix of upper and lowercase letters, numbers, symbols and punctuation marks
to make your passwords harder to crack.
SecureYour Mobile Devices
Losing your mobile phone, tablet or laptop can be just as bad as losing your wallet. Be
sure to protect your mobile devices with strong passwords and encryption.Consider
installing wiping software on your mobile device so that you can remove your
information remotely if your phone is lost.
Facebook - Security
Protecting the information you share in Facebook
is more important then ever. If you are a Facebook
user be sure to take some time to adjust your
personal settings. Facebook has recently changed
how privacy settings work.
To check and edit your setting open yourTimeline
page and select “About”.
The “About” page has all of your information,
divided into sections.You can adjust any of these
sections by selecting “Edit” in each one.
Facebook - Security
Once you have selected “Edit” in any of the
sections you can change where the information
about you is being shared.
Definitions:
• Public – anyone on Facebook can view.
• Friends – only your friends can view.
• Only me – only you can view.
• Custom – you can choose specific people to
view.
Facebook -Your History
Did you know that you can download your entire Facebook history? It is actually
very easy to do. First open “Account Settings” and browse to the bottom of the
“General Account Settings” page. On the bottom you will see the option to
“Download a copy of your Facebook data.”
Facebook -Your History
Did you know that you can download your entire Facebook history? It is actually
very easy to do. First open “Account Settings” and browse to the bottom of the
“General Account Settings” page. On the bottom you will see the option to
“Download a copy of your Facebook data.”
Facebook -Your History
You will then be prompted for your password and afterward, select “Start My
Archive”.
Once completed, Facebook will email you
a copy of your Information.This can take
a long time, depending on how much
data is in your account and timeline.
SummertimeTechTips
.

Mais conteúdo relacionado

Mais procurados

Report on Mobile security
Report  on Mobile securityReport  on Mobile security
Report on Mobile securityKavita Rastogi
 
Protecting Intellectual Property in the Age of WikiLeaks
Protecting Intellectual Property in the  Age of WikiLeaksProtecting Intellectual Property in the  Age of WikiLeaks
Protecting Intellectual Property in the Age of WikiLeaksSocialKwan
 
Taking Control of the Digital and Mobile User Authentication Challenge
Taking Control of the Digital and Mobile User Authentication ChallengeTaking Control of the Digital and Mobile User Authentication Challenge
Taking Control of the Digital and Mobile User Authentication ChallengeEMC
 
Implementing security on android application
Implementing security on android applicationImplementing security on android application
Implementing security on android applicationIAEME Publication
 
Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1newbie2019
 
Blue Coat 2013 Systems Mobile Malware Report
Blue Coat 2013 Systems Mobile Malware ReportBlue Coat 2013 Systems Mobile Malware Report
Blue Coat 2013 Systems Mobile Malware ReportContent Rules, Inc.
 
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?acijjournal
 
Security Threats for SMBs
Security Threats for SMBsSecurity Threats for SMBs
Security Threats for SMBsGFI Software
 
Bright talk intrusion prevention are we joking - henshaw july 2010 a
Bright talk   intrusion prevention are we joking - henshaw july 2010 aBright talk   intrusion prevention are we joking - henshaw july 2010 a
Bright talk intrusion prevention are we joking - henshaw july 2010 aMark Henshaw
 
C0c0n 2011 mobile security presentation v1.2
C0c0n 2011 mobile  security presentation v1.2C0c0n 2011 mobile  security presentation v1.2
C0c0n 2011 mobile security presentation v1.2Santosh Satam
 
ITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security SeminarITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security SeminarDaniel Versola
 
Cybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityCybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityBooz Allen Hamilton
 
State ofmobilesecurity
State ofmobilesecurityState ofmobilesecurity
State ofmobilesecurityGary Sandoval
 
IQT 2010 - The App Does That!?
IQT 2010 - The App Does That!?IQT 2010 - The App Does That!?
IQT 2010 - The App Does That!?Tyler Shields
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for LawyersMark Lanterman
 
SECON'2017, Чемёркин Юрий, Безопасность данных мобильных приложений
SECON'2017, Чемёркин Юрий, Безопасность данных мобильных приложенийSECON'2017, Чемёркин Юрий, Безопасность данных мобильных приложений
SECON'2017, Чемёркин Юрий, Безопасность данных мобильных приложенийSECON
 

Mais procurados (20)

I.T Security Threats
I.T Security ThreatsI.T Security Threats
I.T Security Threats
 
How To Protect Your Website From Bot Attacks
How To Protect Your Website From Bot AttacksHow To Protect Your Website From Bot Attacks
How To Protect Your Website From Bot Attacks
 
Report on Mobile security
Report  on Mobile securityReport  on Mobile security
Report on Mobile security
 
Protecting Intellectual Property in the Age of WikiLeaks
Protecting Intellectual Property in the  Age of WikiLeaksProtecting Intellectual Property in the  Age of WikiLeaks
Protecting Intellectual Property in the Age of WikiLeaks
 
Taking Control of the Digital and Mobile User Authentication Challenge
Taking Control of the Digital and Mobile User Authentication ChallengeTaking Control of the Digital and Mobile User Authentication Challenge
Taking Control of the Digital and Mobile User Authentication Challenge
 
Implementing security on android application
Implementing security on android applicationImplementing security on android application
Implementing security on android application
 
Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1
 
Blue Coat 2013 Systems Mobile Malware Report
Blue Coat 2013 Systems Mobile Malware ReportBlue Coat 2013 Systems Mobile Malware Report
Blue Coat 2013 Systems Mobile Malware Report
 
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
Do New Mobile Devices in Enterprises Pose A Serious Security Threat?
 
Cyber Safety
Cyber Safety Cyber Safety
Cyber Safety
 
Security Threats for SMBs
Security Threats for SMBsSecurity Threats for SMBs
Security Threats for SMBs
 
Bright talk intrusion prevention are we joking - henshaw july 2010 a
Bright talk   intrusion prevention are we joking - henshaw july 2010 aBright talk   intrusion prevention are we joking - henshaw july 2010 a
Bright talk intrusion prevention are we joking - henshaw july 2010 a
 
New trends in Payments Security: NFC & Mobile
New trends in Payments Security: NFC & MobileNew trends in Payments Security: NFC & Mobile
New trends in Payments Security: NFC & Mobile
 
C0c0n 2011 mobile security presentation v1.2
C0c0n 2011 mobile  security presentation v1.2C0c0n 2011 mobile  security presentation v1.2
C0c0n 2011 mobile security presentation v1.2
 
ITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security SeminarITSolutions|Currie Network Security Seminar
ITSolutions|Currie Network Security Seminar
 
Cybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityCybersecurity in the Age of Mobility
Cybersecurity in the Age of Mobility
 
State ofmobilesecurity
State ofmobilesecurityState ofmobilesecurity
State ofmobilesecurity
 
IQT 2010 - The App Does That!?
IQT 2010 - The App Does That!?IQT 2010 - The App Does That!?
IQT 2010 - The App Does That!?
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for Lawyers
 
SECON'2017, Чемёркин Юрий, Безопасность данных мобильных приложений
SECON'2017, Чемёркин Юрий, Безопасность данных мобильных приложенийSECON'2017, Чемёркин Юрий, Безопасность данных мобильных приложений
SECON'2017, Чемёркин Юрий, Безопасность данных мобильных приложений
 

Destaque (7)

Usability for all budgets
Usability for all budgetsUsability for all budgets
Usability for all budgets
 
Mediajalostamo esittely
Mediajalostamo esittelyMediajalostamo esittely
Mediajalostamo esittely
 
PLEs if you PLEase
PLEs if you PLEasePLEs if you PLEase
PLEs if you PLEase
 
Mobile web-apps
Mobile web-appsMobile web-apps
Mobile web-apps
 
Microsoft Office SharePoint Server 2007
Microsoft Office SharePoint Server 2007Microsoft Office SharePoint Server 2007
Microsoft Office SharePoint Server 2007
 
Googleenegociosnainternetvascomarques 130411103701-phpapp02
Googleenegociosnainternetvascomarques 130411103701-phpapp02Googleenegociosnainternetvascomarques 130411103701-phpapp02
Googleenegociosnainternetvascomarques 130411103701-phpapp02
 
Techno Pedagogical Staff Learning Environment
Techno Pedagogical Staff Learning EnvironmentTechno Pedagogical Staff Learning Environment
Techno Pedagogical Staff Learning Environment
 

Semelhante a West Chester Tech Blog - Training Class - Session 10

ISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyMichael Davis
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security riskK. A. M Lutfullah
 
Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023K7 Computing Pvt Ltd
 
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsSophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsConnecting Up
 
Mobility, Security and the Enterprise: The Equation to Solve
Mobility, Security and the Enterprise: The Equation to SolveMobility, Security and the Enterprise: The Equation to Solve
Mobility, Security and the Enterprise: The Equation to SolveIcomm Technologies
 
computer_security.ppt
computer_security.pptcomputer_security.ppt
computer_security.pptAsif Raza
 
The Safest Way To Interact Online
The Safest Way To Interact OnlineThe Safest Way To Interact Online
The Safest Way To Interact Onlinepcsafe
 
Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014Joseph White MPA CPM
 
Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdfCybersecurity - Poland.pdf
Cybersecurity - Poland.pdfPavelVtek3
 
Chapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptxChapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptx1SI19IS064TEJASS
 
Man in-the-browser tectia-whitepaper
Man in-the-browser tectia-whitepaperMan in-the-browser tectia-whitepaper
Man in-the-browser tectia-whitepaperHai Nguyen
 
Your Mobile Internet Device
Your Mobile Internet DeviceYour Mobile Internet Device
Your Mobile Internet DeviceChristian Nord
 
INSECURE Magazine - 35
INSECURE Magazine - 35INSECURE Magazine - 35
INSECURE Magazine - 35Felipe Prado
 
TheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptxTheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptxHAYDEECAYDA
 
Computer Secutity.
Computer Secutity.Computer Secutity.
Computer Secutity.angelaag98
 
Webinar Security: Apps of Steel transcription
Webinar Security:  Apps of Steel transcriptionWebinar Security:  Apps of Steel transcription
Webinar Security: Apps of Steel transcriptionService2Media
 
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfCybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfSoo Chin Hock
 

Semelhante a West Chester Tech Blog - Training Class - Session 10 (20)

Network monitoring white paper
Network monitoring white paperNetwork monitoring white paper
Network monitoring white paper
 
CS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptxCS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptx
 
ISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and Privacy
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security risk
 
Hamza
HamzaHamza
Hamza
 
Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023
 
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsSophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
 
Mobility, Security and the Enterprise: The Equation to Solve
Mobility, Security and the Enterprise: The Equation to SolveMobility, Security and the Enterprise: The Equation to Solve
Mobility, Security and the Enterprise: The Equation to Solve
 
computer_security.ppt
computer_security.pptcomputer_security.ppt
computer_security.ppt
 
The Safest Way To Interact Online
The Safest Way To Interact OnlineThe Safest Way To Interact Online
The Safest Way To Interact Online
 
Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014
 
Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdfCybersecurity - Poland.pdf
Cybersecurity - Poland.pdf
 
Chapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptxChapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptx
 
Man in-the-browser tectia-whitepaper
Man in-the-browser tectia-whitepaperMan in-the-browser tectia-whitepaper
Man in-the-browser tectia-whitepaper
 
Your Mobile Internet Device
Your Mobile Internet DeviceYour Mobile Internet Device
Your Mobile Internet Device
 
INSECURE Magazine - 35
INSECURE Magazine - 35INSECURE Magazine - 35
INSECURE Magazine - 35
 
TheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptxTheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptx
 
Computer Secutity.
Computer Secutity.Computer Secutity.
Computer Secutity.
 
Webinar Security: Apps of Steel transcription
Webinar Security:  Apps of Steel transcriptionWebinar Security:  Apps of Steel transcription
Webinar Security: Apps of Steel transcription
 
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfCybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
 

Mais de William Mann

Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingWilliam Mann
 
Technology Training - Security, Passwords & More
Technology Training - Security, Passwords & MoreTechnology Training - Security, Passwords & More
Technology Training - Security, Passwords & MoreWilliam Mann
 
Technology Training for Staff - April 6, 2017
Technology Training for Staff - April 6, 2017Technology Training for Staff - April 6, 2017
Technology Training for Staff - April 6, 2017William Mann
 
Why Digital Document Management?
Why Digital Document Management?Why Digital Document Management?
Why Digital Document Management?William Mann
 
Technology Training 11-10-2016
Technology Training  11-10-2016Technology Training  11-10-2016
Technology Training 11-10-2016William Mann
 
Tech training 19 Skype for Business
Tech training 19   Skype for BusinessTech training 19   Skype for Business
Tech training 19 Skype for BusinessWilliam Mann
 
Introducing Microsoft's Cloud - Session 16
Introducing Microsoft's Cloud - Session 16Introducing Microsoft's Cloud - Session 16
Introducing Microsoft's Cloud - Session 16William Mann
 
Technology Training - Session 15
Technology Training - Session 15Technology Training - Session 15
Technology Training - Session 15William Mann
 
West Chester Staff Technology Training - Website,LastPass and Tips!
West Chester Staff Technology Training   - Website,LastPass and Tips!West Chester Staff Technology Training   - Website,LastPass and Tips!
West Chester Staff Technology Training - Website,LastPass and Tips!William Mann
 
Heartbleed Explained & LastPass Demo
Heartbleed Explained & LastPass DemoHeartbleed Explained & LastPass Demo
Heartbleed Explained & LastPass DemoWilliam Mann
 
West Chester - Tech Training Session 11
West Chester - Tech Training Session 11West Chester - Tech Training Session 11
West Chester - Tech Training Session 11William Mann
 
What is West Chester Connect?
What is West Chester Connect?What is West Chester Connect?
What is West Chester Connect?William Mann
 
Tech Training - Session 9
Tech Training - Session 9Tech Training - Session 9
Tech Training - Session 9William Mann
 
Tech Training - Session 8
Tech Training - Session 8Tech Training - Session 8
Tech Training - Session 8William Mann
 
Session 5 - Managing Microsoft Outlook and More
Session 5 - Managing Microsoft Outlook and MoreSession 5 - Managing Microsoft Outlook and More
Session 5 - Managing Microsoft Outlook and MoreWilliam Mann
 
Cloud computing 102711 - ccap
Cloud computing   102711 - ccapCloud computing   102711 - ccap
Cloud computing 102711 - ccapWilliam Mann
 
Cloud computing presentation
Cloud computing   presentationCloud computing   presentation
Cloud computing presentationWilliam Mann
 

Mais de William Mann (20)

Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Ransomware 101
Ransomware 101Ransomware 101
Ransomware 101
 
Technology Training - Security, Passwords & More
Technology Training - Security, Passwords & MoreTechnology Training - Security, Passwords & More
Technology Training - Security, Passwords & More
 
Technology Training for Staff - April 6, 2017
Technology Training for Staff - April 6, 2017Technology Training for Staff - April 6, 2017
Technology Training for Staff - April 6, 2017
 
Why Digital Document Management?
Why Digital Document Management?Why Digital Document Management?
Why Digital Document Management?
 
Technology Training 11-10-2016
Technology Training  11-10-2016Technology Training  11-10-2016
Technology Training 11-10-2016
 
Tech training 19 Skype for Business
Tech training 19   Skype for BusinessTech training 19   Skype for Business
Tech training 19 Skype for Business
 
Introducing Microsoft's Cloud - Session 16
Introducing Microsoft's Cloud - Session 16Introducing Microsoft's Cloud - Session 16
Introducing Microsoft's Cloud - Session 16
 
Technology Training - Session 15
Technology Training - Session 15Technology Training - Session 15
Technology Training - Session 15
 
West Chester Staff Technology Training - Website,LastPass and Tips!
West Chester Staff Technology Training   - Website,LastPass and Tips!West Chester Staff Technology Training   - Website,LastPass and Tips!
West Chester Staff Technology Training - Website,LastPass and Tips!
 
Heartbleed Explained & LastPass Demo
Heartbleed Explained & LastPass DemoHeartbleed Explained & LastPass Demo
Heartbleed Explained & LastPass Demo
 
West Chester - Tech Training Session 11
West Chester - Tech Training Session 11West Chester - Tech Training Session 11
West Chester - Tech Training Session 11
 
What is West Chester Connect?
What is West Chester Connect?What is West Chester Connect?
What is West Chester Connect?
 
Tech Training - Session 9
Tech Training - Session 9Tech Training - Session 9
Tech Training - Session 9
 
Tech Training - Session 8
Tech Training - Session 8Tech Training - Session 8
Tech Training - Session 8
 
SharePoint & More
SharePoint & MoreSharePoint & More
SharePoint & More
 
Session 5 - Managing Microsoft Outlook and More
Session 5 - Managing Microsoft Outlook and MoreSession 5 - Managing Microsoft Outlook and More
Session 5 - Managing Microsoft Outlook and More
 
Holiday scams
Holiday scamsHoliday scams
Holiday scams
 
Cloud computing 102711 - ccap
Cloud computing   102711 - ccapCloud computing   102711 - ccap
Cloud computing 102711 - ccap
 
Cloud computing presentation
Cloud computing   presentationCloud computing   presentation
Cloud computing presentation
 

Último

Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 

Último (20)

Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 

West Chester Tech Blog - Training Class - Session 10

  • 1. BOROUGH OFWEST CHESTER InformationTechnologyTraining Session 10 – July 25, 2013 William Mann, Chief Information Officer • Interactive Projectors • Introduction toWest Chester Connect • MicrosoftOffice 365 • Sharepoint • Spyware 101 • SimCardTroubles • SecuringYour Mobile Devices • SummertimeTechTips • Facebook - Security • Facebook -Your History • Questions & Answers
  • 2. Interactive Presentations Room 240 and the Borough Council Chambers have both been upgraded to include the ability to easily conduct interactive presentations.
  • 4. West Chester Connect What isWest Chester Connect? West Chester Connect allows citizens to submit quality of life, environmental and public safety issues directly to the appropriate department through the use of their smartphone. The West Chester Connect app can be downloaded for free in the app stores for iPhone, Android, Blackberry and Windows phones.
  • 5. West Chester Connect PROCEEDTO SMARTPHONE DEMONSTARTION This demonstration will include downloading and using the publicWest Chester Connect smartphone app.
  • 6. West Chester Connect The CitySourced Console Through the CitySourced Console we can manage the “work orders” from an PC. The URL is console.citysourced.com.Our customer ID is “90”. Any employee who needs access has been issued a username & password. If additional employees need access please contact me.
  • 7. West Chester Connect The CitySourced Console From the console staff can open, review, update, close and create work orders. This demonstration will include downloading and using the publicWest Chester Connect smartphone app.
  • 8. Microsoft Office 365 Our organization has now been fully upgraded to the Microsoft Office 365. The first change you can see is the newWeb Outlook.You can login to your Microsoft Account at login.microsoftonline.com.
  • 9. Microsoft Office 365 Our organization has now been fully upgraded to the Microsoft Office 365. The first change you can see is the newWeb Outlook.You can login to your Microsoft Account at login.microsoftonline.com.
  • 10. Microsoft Office 365 Licenses and Account Access There are 2 license types: 1. ExchangeOnline (Plan 1) 2. Office 365 Enterprise E3 Plan assignment is based on the employee’s role in the organization. ExchangeOnline – Plan 1 offers email services while Office 365 Enterprise E3 brings full Microsoft Office access with the ability to download Office 2013 on up to 3 computers and access to Office products throughWeb Office.
  • 11. Microsoft Office 365 Web Outlook Demonstration You can perform all Outlook functions throughWeb Outlook.
  • 12. Microsoft Office 365 Installing Microsoft Office 2013 If you have a Office 365 E3 Enterprise license you can install Office 2013 on up to 5 computers. To do this click on the settings wheel on the far right upper menu bar and select (1) Office 365 Settings and then (2) “software”.
  • 13. Microsoft Office 365 Installing Microsoft Office 2013 If you are running Office 2010 on your office PC, and you only have Exchange Online please Submit a work order if you would like to be upgraded to Office 2013. Office 2013 offers many advantages over previous Office versions, including Skydrive and Sharepoint interrogation as well as social media connection options.
  • 14. Microsoft Office 365 Sharepoint Shared organizational documents will be stored and available on our new Sharepoint site. You can access Sharepoint from the 365 login screen, by selecting “Sites”. From here you Will be able to access your site, the staff (team) site and more.
  • 15. Microsoft Office 365 Sharepoint Opening theTeam “staff” site will allow you to access any shared documents that have been posted.
  • 17. Spyware 101 Spyware is software that's installed without your consent, whether it be a traditional computer, an application in your web-browser, or a mobile application residing on your device. In short, spyware communicates personal, confidential information about you to an attacker.The information might be reports about your online browsing habits or purchases, but it can also be modified to record things like keystrokes on the keyboard, credit card information, passwords, or login credentials. This software normally gets onto a computer by attaching itself to some other program that the user intentionally downloads and installs. Sometimes this is done completely discreetly, but other times the desired software will include information in the license agreement actually describing the spyware — without using the term "spyware" — and forcing the user to agree to install it in order to install the desired program.Alternatively, spyware can get into a computer through all the avenues that other malware takes, such as when the user visits a compromised website or opens a malicious attachment in an email. Original article posted on 7/23/2013,West ChesterTech Blog
  • 18. Spyware 101 There are 2 problems with Spyware. First, and perhaps most importantly, it can steal personal information that can be used for identity theft. If the malicious software has access to every piece of information on your computer, including browsing history, email accounts, saved passwords used for online banking and shopping in addition to social networks, it can harvest more than enough information to create a profile imitating your identity. The second, and more common, problem is the damage spyware can do to your computer. This is where I usually get the phone call. Spyware can take up an enormous amount of your computer's resources, making it run slowly, lag in between applications or while online, frequent system crashes or freezes and even overheat your computer causing permanent damage. It can also manipulate search engine results and deliver unwanted websites in your browser, which can lead to potentially harmful websites or fraudulent ones. It can also cause your home page to change and can even alter some of your computer's settings. Original article posted on 7/23/2013,West ChesterTech Blog
  • 19. Spyware 101 The best way to control spyware is by preventing it from getting on your computer in the first place. However not downloading programs and never clicking on email attachments isn't always an option. Sometimes, even a trusted website can become compromised and infect your computer — even if you've done nothing wrong. Many people are turning to internet security solutions with reliable antivirus detection capabilities and proactive protection. If your computer is already infected, many security providers offer spyware removal utilities to assist in identifying and removing spyware. There are a number of free antivirus solutions available, such as Microsoft's Security Essentials which promises unlimited protection at no cost.There are also excellent paid options as well to protect your PC, and yourself which I have covered many times in the past. Original article posted on 7/23/2013,West ChesterTech Blog
  • 20. SIMCardTroubles It took a long time but the humble SIM card that sits within your phone, along with at least seven billion others, has finally been hacked. Of the seven billion modern SIM cards in circulation, it is suspected that hundreds of millions (yes, hundreds of millions) are susceptible. What Does this mean? The hacks allow a would-be attacker to infect your SIM with a virus that sends premium text messages, or records your phone calls — and, in some cases, access the secure, sandboxed details stored on your SIM by mobile payment apps, giving a hacker access to your bank and credit card details. Original article posted on 7/23/2013,West ChesterTech Blog
  • 21. SIMCardTroubles SIM cards are not merely a piece of laminated memory that stores the data that your phone needs to connect to a cellular network. In actuality, the SIM card in your phone is actually a small computer, with memory, a processor, and even an operating system. Original article posted on 7/23/2013,West ChesterTech Blog
  • 22. SIMCardTroubles SIM cards are not merely a piece of laminated memory that stores the data that your phone needs to connect to a cellular network. In actuality, the SIM card in your phone is actually a small computer, with memory, a processor, and even an operating system. Original article posted on 7/23/2013,West ChesterTech Blog Like any computer chip that runs an operating system and apps, a SIM card can be hacked. In this case, modern SIM cards run a very simpleOS that loads up Java Card — a version of the Java virtual machine for smart cards (of which SIMs are a variety of). Java Card essentially runs small Java applets, and each applet is encapsulated and firewalled (sandboxed) by the JavaVM, preventing sensitive data from leaking to other apps.Your phone interacts with these apps via the SIMApplicationToolkit (STK) to display information on your screen, and to interact with the outside world.
  • 23. SIMCardTroubles Original article posted on 7/23/2013,West ChesterTech Blog If your mobile phone is more then a couple years old you should contact your cellular provider and request a replacement SIM as the newer ones issued have mostly been programmed to avoid this problem.
  • 24. SecuringYour Mobile Devices Our mobile devices (smartphones and tablets) are becoming a bigger and more important part of our daily lives everyday. Because of this, security concerns are growing and becoming more complex.
  • 25. SecuringYour Mobile Devices Be careful when “checking in” on social sites:This is one of my personal weaknesses. I love to check in so that my friends can know what I am going.This is because Facebook, FourSquare and other geo-location programs are fun and sometimes you can score some deals for “checking in” at locations. However you should to be cautious of letting people know where you are – especially if you’re away from home. Don’t remember your passwords: Don’t set user name and passwords to be remembered in your mobile browser or in apps and make sure you always log out of accounts when you access them. Be careful what you share: Yes it’s fine to stay in touch with our friends and family via social networks, but be careful what you share. Even if your privacy settings are set to only let your friends see the information, it’s best to take the approach that once something is online, it lives forever.Think if you’re really ok with your grandmother or boss to see that update, picture or video.
  • 26. SecuringYour Mobile Devices Don’t text or email personal information: While this might seem pretty basic, we may find we need to share credit card numbers or personal details with another person. But this should be done via a secure site or app or use your mobile’s other function (the phone itself - voice call). Emails and texts can be intercepted and then your information can fall into the wrong hands. Always remember that legitimate organizations like banks will not ask you to text personal details! Turn off your Bluetooth: If you’re not using this connection, it’s best to turn it off. Not only will this help save your battery life, but it prevents hackers from accessing your device through this technology.
  • 27. SummertimeTechTips A trip to the shore for some sunshine and water may sound like the perfect getaway and in many ways it can be. However your smartphone probably will not agree.There is little doubt that many of us are addicted to our smartphones so here are some tips for keeping them safe this summer. Seek some shade. Direct sunlight can cause overheating, so be sure to stash your devices somewhere shady. If you do trigger an “overheated” alert, be sure to turn off the device and move it to a cooler location. Do not place it inside a freezer!
  • 28. SummertimeTechTips Invest in a quality case. In the summertime, the living is easy – but not for your gadgets. Sticky fingers from ice cream, blowing sand and condensation are just a few of the perils the season brings for your devices.There are a ton of options on the market, including rugged cases to help protect from drops and waterproof options to help keep things safe poolside – or tabletop during meals. Limit the glare. Sunlight can make your screen hard to read. You can tackle this in a few ways: Adjust your brightness settings. Navigate to your device’s “Settings” menu, then select the “Display Settings.”You can modify both “Brightness” and “Backlight” options on most devices: the higher the brightness settings, the easier it is to read your screen in sunlight. Some devices also offer an “Auto Brightness” option that automatically adjusts your screen for optimal viewing.
  • 29. SummertimeTechTips Purchase an anti-glare cover which will help make your screen more legible in bright light. Find some shade. Relax under an umbrella or a tree for some temporary relief. Low-Fi Stereo Fun! Summer means impromptu gatherings, which just beg for a great music. But if you do not have portable speakers handy, you can try this simple trick to pump up the volume. Place your music player in a bowl or glass to amplify your device’s speakers. It really works!
  • 30. SummertimeTechTips Identity theft is a serious crime that can have a lasting negative impact. Just one important piece of information, like a Social Security card, a driver’s license or a bank account statement, can provide a criminal what he needs to steal someone’s identity. What’s worse is victims may not realize their identities have been stolen for weeks, months or years after the fact, allowing the crime to perpetuate and destroy their credit.The good news is there are actions you can take to help protect your identity while on vacation — and anywhere else you may be mobile and online. Mobile Routers or Cellular Hotspots Consider a portable router to create your own Wi-Fi hotspot for your own or your family’s devices.You’ll need a local SIM data card, which is available at most electronic stores or even airport kiosks.This will help you avoid using publicWi-Fi spots. All cellular companies sell mobile hotspot devices. Avoid Contact with Hackers If you use publicWi-Fi, be very cautious of using unsecured networks. Make sure you are logging into a secured or private network when you useWi-Fi. If you aren’t sure, don’t visit sites that contain sensitive information, like bank accounts.
  • 31. SummertimeTechTips .Be Careful Being Social Using social media while you travel can be a great way to share your family’s trip but remember — checking in or posting pictures can alert someone that your home is vacant! Make sure to set your home alarm, hire a house-sitter or maybe the best option is to delay posts until you are back home. If you do really want to share these photos while you are on vacation, make sure to set your privacy settings to “friends” only.This will help limit the number of people who actually see these pictures. Make Sure It's Legit Before logging onto a website from your mobile device, make sure the URL is legit.There are plenty of URL spoof sites out there, created in order to steal your information. Unfortunately many mobile browsers do not show the URL, so it is best to bookmark your favorite sites after you type in the address. Lock DownYour Social Networks If you have a blog or social accounts — such as Facebook andTwitter — use the highest security settings possible to ensure your information, posts and photos aren’t being leaked onto the internet.
  • 32. SummertimeTechTips . Strong Passwords Use a mix of upper and lowercase letters, numbers, symbols and punctuation marks to make your passwords harder to crack. SecureYour Mobile Devices Losing your mobile phone, tablet or laptop can be just as bad as losing your wallet. Be sure to protect your mobile devices with strong passwords and encryption.Consider installing wiping software on your mobile device so that you can remove your information remotely if your phone is lost.
  • 33. Facebook - Security Protecting the information you share in Facebook is more important then ever. If you are a Facebook user be sure to take some time to adjust your personal settings. Facebook has recently changed how privacy settings work. To check and edit your setting open yourTimeline page and select “About”. The “About” page has all of your information, divided into sections.You can adjust any of these sections by selecting “Edit” in each one.
  • 34. Facebook - Security Once you have selected “Edit” in any of the sections you can change where the information about you is being shared. Definitions: • Public – anyone on Facebook can view. • Friends – only your friends can view. • Only me – only you can view. • Custom – you can choose specific people to view.
  • 35. Facebook -Your History Did you know that you can download your entire Facebook history? It is actually very easy to do. First open “Account Settings” and browse to the bottom of the “General Account Settings” page. On the bottom you will see the option to “Download a copy of your Facebook data.”
  • 36. Facebook -Your History Did you know that you can download your entire Facebook history? It is actually very easy to do. First open “Account Settings” and browse to the bottom of the “General Account Settings” page. On the bottom you will see the option to “Download a copy of your Facebook data.”
  • 37. Facebook -Your History You will then be prompted for your password and afterward, select “Start My Archive”. Once completed, Facebook will email you a copy of your Information.This can take a long time, depending on how much data is in your account and timeline.