West Chester Tech Blog - Training Class - Session 10

38

Click here to load reader

Transcript of West Chester Tech Blog - Training Class - Session 10

Page 1: West Chester Tech Blog - Training Class - Session 10

BOROUGH OF WEST CHESTERInformation Technology Training

Session 10 – July 25, 2013

William Mann, Chief Information Officer

• Interactive Projectors• Introduction to West Chester Connect• Microsoft Office 365• Sharepoint• Spyware 101• SimCard Troubles• Securing Your Mobile Devices • Summertime Tech Tips• Facebook - Security• Facebook - Your History• Questions & Answers

Page 2: West Chester Tech Blog - Training Class - Session 10

Interactive Presentations Room 240 and the Borough Council Chambers have both been

upgraded to include the ability to easily conduct interactive presentations.

Page 3: West Chester Tech Blog - Training Class - Session 10

Interactive Presentations

PROCEED TO DEMONSTRATION

Page 4: West Chester Tech Blog - Training Class - Session 10

West Chester Connect

What is West Chester Connect?

West Chester Connect allows citizens to submit quality of life, environmental and public safety issues directly to the appropriate department through the use of their smartphone.

The West Chester Connect app can be downloaded for free in the app stores for iPhone, Android, Blackberry and Windows phones.

Page 5: West Chester Tech Blog - Training Class - Session 10

West Chester Connect

PROCEED TO SMARTPHONE DEMONSTARTION

This demonstration will include downloading and using the public West Chester Connect smartphone app.

Page 6: West Chester Tech Blog - Training Class - Session 10

West Chester Connect

The CitySourced Console

Through the CitySourced Console we can manage the “work orders” from an PC.

The URL is console.citysourced.com. Our customer ID is “90”. Any employee who needs access has been issued a username & password. If additional employees need access please contact me.

Page 7: West Chester Tech Blog - Training Class - Session 10

West Chester Connect

The CitySourced Console

From the console staff can open, review, update, close and create work orders.

This demonstration will include downloading and using the public West Chester Connect smartphone app.

Page 8: West Chester Tech Blog - Training Class - Session 10

Microsoft Office 365

Our organization has now been fully upgraded to the Microsoft Office 365.

The first change you can see is the new Web Outlook. You can login to your Microsoft Account at login.microsoftonline.com.

Page 9: West Chester Tech Blog - Training Class - Session 10

Microsoft Office 365

Our organization has now been fully upgraded to the Microsoft Office 365.

The first change you can see is the new Web Outlook. You can login to your Microsoft Account at login.microsoftonline.com.

Page 10: West Chester Tech Blog - Training Class - Session 10

Microsoft Office 365

Licenses and Account Access

There are 2 license types:

1. Exchange Online (Plan 1)2. Office 365 Enterprise E3

Plan assignment is based on the employee’s role in the organization.

Exchange Online – Plan 1 offers email services while Office 365 Enterprise E3 brings full Microsoft Office access with the ability to download Office 2013 on up to 3 computers and access to Office products through Web Office.

Page 11: West Chester Tech Blog - Training Class - Session 10

Microsoft Office 365

Web Outlook Demonstration

You can perform all Outlook functions through Web Outlook.

Page 12: West Chester Tech Blog - Training Class - Session 10

Microsoft Office 365

Installing Microsoft Office 2013

If you have a Office 365 E3 Enterprise license you can install Office 2013 on up to 5 computers.To do this click on the settings wheel on the far right upper menu bar and select (1) Office 365 Settings and then (2) “software”.

Page 13: West Chester Tech Blog - Training Class - Session 10

Microsoft Office 365

Installing Microsoft Office 2013

If you are running Office 2010 on your office PC, and you only have Exchange Online pleaseSubmit a work order if you would like to be upgraded to Office 2013.

Office 2013 offers many advantages over previous Office versions, including Skydrive and Sharepoint interrogation as well as social media connection options.

Page 14: West Chester Tech Blog - Training Class - Session 10

Microsoft Office 365

Sharepoint

Shared organizational documents will be stored and available on our new Sharepoint site. You can access Sharepoint from the 365 login screen, by selecting “Sites”. From here youWill be able to access your site, the staff (team) site and more.

Page 15: West Chester Tech Blog - Training Class - Session 10

Microsoft Office 365

Sharepoint

Opening the Team “staff” site will allow you to access any shared documents that havebeen posted.

Page 16: West Chester Tech Blog - Training Class - Session 10

Microsoft Office 365

Sharepoint

Sharepoint Walkthrough

Page 17: West Chester Tech Blog - Training Class - Session 10

Spyware 101

Spyware is software that's installed without your consent, whether it be a traditional computer, an application in your web-browser, or a mobile application residing on your device. In short, spyware communicates personal, confidential information about you to an attacker. The information might be reports about your online browsing habits or purchases, but it can also be modified to record things like keystrokes on the keyboard, credit card information, passwords, or login credentials.

This software normally gets onto a computer by attaching itself to some other program that the user intentionally downloads and installs. Sometimes this is done completely discreetly, but other times the desired software will include information in the license agreement actually describing the spyware — without using the term "spyware" — and forcing the user to agree to install it in order to install the desired program. Alternatively, spyware can get into a computer through all the avenues that other malware takes, such as when the user visits a compromised website or opens a malicious attachment in an email.

Original article posted on 7/23/2013, West Chester Tech Blog

Page 18: West Chester Tech Blog - Training Class - Session 10

Spyware 101

There are 2 problems with Spyware. First, and perhaps most importantly, it can steal personal information that can be used for identity theft. If the malicious software has access to every piece of information on your computer, including browsing history, email accounts, saved passwords used for online banking and shopping in addition to social networks, it can harvest more than enough information to create a profile imitating your identity.

The second, and more common, problem is the damage spyware can do to your computer. This is where I usually get the phone call. Spyware can take up an enormous amount of your computer's resources, making it run slowly, lag in between applications or while online, frequent system crashes or freezes and even overheat your computer causing permanent damage. It can also manipulate search engine results and deliver unwanted websites in your browser, which can lead to potentially harmful websites or fraudulent ones. It can also cause your home page to change and can even alter some of your computer's settings.

Original article posted on 7/23/2013, West Chester Tech Blog

Page 19: West Chester Tech Blog - Training Class - Session 10

Spyware 101

The best way to control spyware is by preventing it from getting on your computer in the first place. However not downloading programs and never clicking on email attachments isn't always an option. Sometimes, even a trusted website can become compromised and infect your computer — even if you've done nothing wrong.

Many people are turning to internet security solutions with reliable antivirus detection capabilities and proactive protection. If your computer is already infected, many security providers offer spyware removal utilities to assist in identifying and removing spyware. There are a number of free antivirus solutions available, such as Microsoft's Security Essentials which promises unlimited protection at no cost. There are also excellent paid options as well to protect your PC, and yourself which I have covered many times in the past.

Original article posted on 7/23/2013, West Chester Tech Blog

Page 20: West Chester Tech Blog - Training Class - Session 10

SIMCard Troubles

It took a long time but the humble SIM card that sits within your phone, along with at least seven billion others, has finally been hacked. Of the seven billion modern SIM cards in circulation, it is suspected that hundreds of millions (yes, hundreds of millions) are susceptible. What Does this mean?

The hacks allow a would-be attacker to infect your SIM with a virus that sends premium text messages, or records your phone calls — and, in some cases, access the secure, sandboxed details stored on your SIM by mobile payment apps, giving a hacker access to your bank and credit card details.

Original article posted on 7/23/2013, West Chester Tech Blog

Page 21: West Chester Tech Blog - Training Class - Session 10

SIMCard Troubles

SIM cards are not merely a piece of laminated memory that stores the data that your phone needs to connect to a cellular network. In actuality, the SIM card in your phone is actually a small computer, with memory, a processor, and even an operating system.

Original article posted on 7/23/2013, West Chester Tech Blog

Page 22: West Chester Tech Blog - Training Class - Session 10

SIMCard Troubles

SIM cards are not merely a piece of laminated memory that stores the data that your phone needs to connect to a cellular network. In actuality, the SIM card in your phone is actually a small computer, with memory, a processor, and even an operating system.

Original article posted on 7/23/2013, West Chester Tech Blog

Like any computer chip that runs an operating system and apps, a SIM card can be hacked. In this case, modern SIM cards run a very simple OS that loads up Java Card — a version of the Java virtual machine for smart cards (of which SIMs are a variety of). Java Card essentially runs small Java applets, and each applet is encapsulated and firewalled (sandboxed) by the Java VM, preventing sensitive data from leaking to other apps. Your phone interacts with these apps via the SIM Application Toolkit (STK) to display information on your screen, and to interact with the outside world. 

Page 23: West Chester Tech Blog - Training Class - Session 10

SIMCard TroublesOriginal article posted on 7/23/2013, West Chester Tech Blog

If your mobile phone is more then a couple years old you should contact your cellular provider and request a replacement SIM as the newer ones issued have mostly been programmed to avoid this problem.

Page 24: West Chester Tech Blog - Training Class - Session 10

Securing Your Mobile Devices

Our mobile devices (smartphones and tablets) are becoming a bigger and more important part of our daily lives everyday. Because of this, security concerns are growing and becoming more complex.

Page 25: West Chester Tech Blog - Training Class - Session 10

Securing Your Mobile Devices

Be careful when “checking in” on social sites: This is one of my personal weaknesses. I love to check in so that my friends can know what I am going. This is because Facebook, FourSquare and other geo-location programs are fun and sometimes you can score some deals for “checking in” at locations. However you should to be cautious of letting people know where you are – especially if you’re away from home.

Don’t remember your passwords: Don’t set user name and passwords to be remembered in your mobile browser or in apps and make sure you always log out of accounts when you access them.

Be careful what you share: Yes it’s fine to stay in touch with our friends and family via social networks, but be careful what you share. Even if your privacy settings are set to only let your friends see the information, it’s best to take the approach that once something is online, it lives forever. Think if you’re really ok with your grandmother or boss to see that update, picture or video.

Page 26: West Chester Tech Blog - Training Class - Session 10

Securing Your Mobile Devices

Don’t text or email personal information: While this might seem pretty basic, we may find we need to share credit card numbers or personal details with another person. But this should be done via a secure site or app or use your mobile’s other function (the phone itself - voice call). Emails and texts can be intercepted and then your information can fall into the wrong hands.

Always remember that legitimate organizations like banks will not ask you to text personal details!

Turn off your Bluetooth: If you’re not using this connection, it’s best to turn it off. Not only will this help save your battery life, but it prevents hackers from accessing your device through this technology.

Page 27: West Chester Tech Blog - Training Class - Session 10

Summertime Tech Tips

A trip to the shore for some sunshine and water may sound like the perfect getaway and in many ways it can be. However your smartphone probably will not agree. There is little doubt that many of us are addicted to our smartphones so here are some tips for keeping them safe this summer.

Seek some shade. Direct sunlight can cause overheating, so be sure to stash your devices somewhere shady. If you do trigger an “overheated” alert, be sure to turn off the device and move it to a cooler location. Do not place it inside a freezer!

Page 28: West Chester Tech Blog - Training Class - Session 10

Summertime Tech Tips

Invest in a quality case. In the summertime, the living is easy – but not for your gadgets. Sticky fingers from ice cream, blowing sand and condensation are just a few of the perils the season brings for your devices. There are a ton of options on the market, including rugged cases to help protect from drops and waterproof options to help keep things safe poolside – or tabletop during meals.

Limit the glare. Sunlight can make your screen hard to read. You can tackle this in a few ways:

Adjust your brightness settings. Navigate to your device’s “Settings” menu, then select the “Display Settings.” You can modify both “Brightness” and “Backlight” options on most devices: the higher the brightness settings, the easier it is to read your screen in sunlight. Some devices also offer an “Auto Brightness” option that automatically adjusts your screen for optimal viewing.

Page 29: West Chester Tech Blog - Training Class - Session 10

Summertime Tech Tips

Purchase an anti-glare cover which will help make your screen more legible in bright light.

Find some shade. Relax under an umbrella or a tree for some temporary relief.

Low-Fi Stereo Fun! Summer means impromptu gatherings, which just beg for a great music. But if you do not have portable speakers handy, you can try this simple trick to pump up the volume. Place your music player in a bowl or glass to amplify your device’s speakers. It really works!

Page 30: West Chester Tech Blog - Training Class - Session 10

Summertime Tech Tips

Identity theft is a serious crime that can have a lasting negative impact. Just one important piece of information, like a Social Security card, a driver’s license or a bank account statement, can provide a criminal what he needs to steal someone’s identity. What’s worse is victims may not realize their identities have been stolen for weeks, months or years after the fact, allowing the crime to perpetuate and destroy their credit. The good news is there are actions you can take to help protect your identity while on vacation — and anywhere else you may be mobile and online. Mobile Routers or Cellular HotspotsConsider a portable router to create your own Wi-Fi hotspot for your own or your family’s devices. You’ll need a local SIM data card, which is available at most electronic stores or even airport kiosks. This will help you avoid using public Wi-Fi spots. All cellular companies sell mobile hotspot devices.

Avoid Contact with HackersIf you use public Wi-Fi, be very cautious of using unsecured networks. Make sure you are logging into a secured or private network when you use Wi-Fi. If you aren’t sure, don’t visit sites that contain sensitive information, like bank accounts.

Page 31: West Chester Tech Blog - Training Class - Session 10

Summertime Tech Tips

. Be Careful Being SocialUsing social media while you travel can be a great way to share your family’s trip but remember — checking in or posting pictures can alert someone that your home is vacant! Make sure to set your home alarm, hire a house-sitter or maybe the best option is to delay posts until you are back home. If you do really want to share these photos while you are on vacation, make sure to set your privacy settings to “friends” only. This will help limit the number of people who actually see these pictures.Make Sure It's LegitBefore logging onto a website from your mobile device, make sure the URL is legit. There are plenty of URL spoof sites out there, created in order to steal your information. Unfortunately many mobile browsers do not show the URL, so it is best to bookmark your favorite sites after you type in the address.

Lock Down Your Social NetworksIf you have a blog or social accounts — such as Facebook and Twitter — use the highest security settings possible to ensure your information, posts and photos aren’t being leaked onto the internet.

Page 32: West Chester Tech Blog - Training Class - Session 10

Summertime Tech Tips

.

Strong PasswordsUse a mix of upper and lowercase letters, numbers, symbols and punctuation marks to make your passwords harder to crack.

Secure Your Mobile DevicesLosing your mobile phone, tablet or laptop can be just as bad as losing your wallet. Be sure to protect your mobile devices with strong passwords and encryption. Consider installing wiping software on your mobile device so that you can remove your information remotely if your phone is lost.

Page 33: West Chester Tech Blog - Training Class - Session 10

Facebook - Security

Protecting the information you share in Facebook is more important then ever. If you are a Facebook user be sure to take some time to adjust your personal settings. Facebook has recently changed how privacy settings work.

To check and edit your setting open your Timeline page and select “About”.

The “About” page has all of your information, divided into sections. You can adjust any of these sections by selecting “Edit” in each one.

Page 34: West Chester Tech Blog - Training Class - Session 10

Facebook - Security

Once you have selected “Edit” in any of the sections you can change where the information about you is being shared.

Definitions:

• Public – anyone on Facebook can view.• Friends – only your friends can view.• Only me – only you can view.• Custom – you can choose specific

people to view.

Page 35: West Chester Tech Blog - Training Class - Session 10

Facebook - Your History

Did you know that you can download your entire Facebook history? It is actually very easy to do. First open “Account Settings” and browse to the bottom of the “General Account Settings” page. On the bottom you will see the option to “Download a copy of your Facebook data.”

Page 36: West Chester Tech Blog - Training Class - Session 10

Facebook - Your History

Did you know that you can download your entire Facebook history? It is actually very easy to do. First open “Account Settings” and browse to the bottom of the “General Account Settings” page. On the bottom you will see the option to “Download a copy of your Facebook data.”

Page 37: West Chester Tech Blog - Training Class - Session 10

Facebook - Your History

You will then be prompted for your password and afterward, select “Start My Archive”.

Once completed, Facebook will email you a copy of your Information. This can take a long time, depending on how much data is in your account and timeline.

Page 38: West Chester Tech Blog - Training Class - Session 10

Summertime Tech Tips

.