west chester tech blog - training class - session 10
TRANSCRIPT
BOROUGH OF WEST CHESTERInformation Technology Training
Session 10 – July 25, 2013
William Mann, Chief Information Officer
• Interactive Projectors• Introduction to West Chester Connect• Microsoft Office 365• Sharepoint• Spyware 101• SimCard Troubles• Securing Your Mobile Devices • Summertime Tech Tips• Facebook - Security• Facebook - Your History• Questions & Answers
Interactive Presentations Room 240 and the Borough Council Chambers have both been
upgraded to include the ability to easily conduct interactive presentations.
Interactive Presentations
PROCEED TO DEMONSTRATION
West Chester Connect
What is West Chester Connect?
West Chester Connect allows citizens to submit quality of life, environmental and public safety issues directly to the appropriate department through the use of their smartphone.
The West Chester Connect app can be downloaded for free in the app stores for iPhone, Android, Blackberry and Windows phones.
West Chester Connect
PROCEED TO SMARTPHONE DEMONSTARTION
This demonstration will include downloading and using the public West Chester Connect smartphone app.
West Chester Connect
The CitySourced Console
Through the CitySourced Console we can manage the “work orders” from an PC.
The URL is console.citysourced.com. Our customer ID is “90”. Any employee who needs access has been issued a username & password. If additional employees need access please contact me.
West Chester Connect
The CitySourced Console
From the console staff can open, review, update, close and create work orders.
This demonstration will include downloading and using the public West Chester Connect smartphone app.
Microsoft Office 365
Our organization has now been fully upgraded to the Microsoft Office 365.
The first change you can see is the new Web Outlook. You can login to your Microsoft Account at login.microsoftonline.com.
Microsoft Office 365
Our organization has now been fully upgraded to the Microsoft Office 365.
The first change you can see is the new Web Outlook. You can login to your Microsoft Account at login.microsoftonline.com.
Microsoft Office 365
Licenses and Account Access
There are 2 license types:
1. Exchange Online (Plan 1)2. Office 365 Enterprise E3
Plan assignment is based on the employee’s role in the organization.
Exchange Online – Plan 1 offers email services while Office 365 Enterprise E3 brings full Microsoft Office access with the ability to download Office 2013 on up to 3 computers and access to Office products through Web Office.
Microsoft Office 365
Web Outlook Demonstration
You can perform all Outlook functions through Web Outlook.
Microsoft Office 365
Installing Microsoft Office 2013
If you have a Office 365 E3 Enterprise license you can install Office 2013 on up to 5 computers.To do this click on the settings wheel on the far right upper menu bar and select (1) Office 365 Settings and then (2) “software”.
Microsoft Office 365
Installing Microsoft Office 2013
If you are running Office 2010 on your office PC, and you only have Exchange Online pleaseSubmit a work order if you would like to be upgraded to Office 2013.
Office 2013 offers many advantages over previous Office versions, including Skydrive and Sharepoint interrogation as well as social media connection options.
Microsoft Office 365
Sharepoint
Shared organizational documents will be stored and available on our new Sharepoint site. You can access Sharepoint from the 365 login screen, by selecting “Sites”. From here youWill be able to access your site, the staff (team) site and more.
Microsoft Office 365
Sharepoint
Opening the Team “staff” site will allow you to access any shared documents that havebeen posted.
Microsoft Office 365
Sharepoint
Sharepoint Walkthrough
Spyware 101
Spyware is software that's installed without your consent, whether it be a traditional computer, an application in your web-browser, or a mobile application residing on your device. In short, spyware communicates personal, confidential information about you to an attacker. The information might be reports about your online browsing habits or purchases, but it can also be modified to record things like keystrokes on the keyboard, credit card information, passwords, or login credentials.
This software normally gets onto a computer by attaching itself to some other program that the user intentionally downloads and installs. Sometimes this is done completely discreetly, but other times the desired software will include information in the license agreement actually describing the spyware — without using the term "spyware" — and forcing the user to agree to install it in order to install the desired program. Alternatively, spyware can get into a computer through all the avenues that other malware takes, such as when the user visits a compromised website or opens a malicious attachment in an email.
Original article posted on 7/23/2013, West Chester Tech Blog
Spyware 101
There are 2 problems with Spyware. First, and perhaps most importantly, it can steal personal information that can be used for identity theft. If the malicious software has access to every piece of information on your computer, including browsing history, email accounts, saved passwords used for online banking and shopping in addition to social networks, it can harvest more than enough information to create a profile imitating your identity.
The second, and more common, problem is the damage spyware can do to your computer. This is where I usually get the phone call. Spyware can take up an enormous amount of your computer's resources, making it run slowly, lag in between applications or while online, frequent system crashes or freezes and even overheat your computer causing permanent damage. It can also manipulate search engine results and deliver unwanted websites in your browser, which can lead to potentially harmful websites or fraudulent ones. It can also cause your home page to change and can even alter some of your computer's settings.
Original article posted on 7/23/2013, West Chester Tech Blog
Spyware 101
The best way to control spyware is by preventing it from getting on your computer in the first place. However not downloading programs and never clicking on email attachments isn't always an option. Sometimes, even a trusted website can become compromised and infect your computer — even if you've done nothing wrong.
Many people are turning to internet security solutions with reliable antivirus detection capabilities and proactive protection. If your computer is already infected, many security providers offer spyware removal utilities to assist in identifying and removing spyware. There are a number of free antivirus solutions available, such as Microsoft's Security Essentials which promises unlimited protection at no cost. There are also excellent paid options as well to protect your PC, and yourself which I have covered many times in the past.
Original article posted on 7/23/2013, West Chester Tech Blog
SIMCard Troubles
It took a long time but the humble SIM card that sits within your phone, along with at least seven billion others, has finally been hacked. Of the seven billion modern SIM cards in circulation, it is suspected that hundreds of millions (yes, hundreds of millions) are susceptible. What Does this mean?
The hacks allow a would-be attacker to infect your SIM with a virus that sends premium text messages, or records your phone calls — and, in some cases, access the secure, sandboxed details stored on your SIM by mobile payment apps, giving a hacker access to your bank and credit card details.
Original article posted on 7/23/2013, West Chester Tech Blog
SIMCard Troubles
SIM cards are not merely a piece of laminated memory that stores the data that your phone needs to connect to a cellular network. In actuality, the SIM card in your phone is actually a small computer, with memory, a processor, and even an operating system.
Original article posted on 7/23/2013, West Chester Tech Blog
SIMCard Troubles
SIM cards are not merely a piece of laminated memory that stores the data that your phone needs to connect to a cellular network. In actuality, the SIM card in your phone is actually a small computer, with memory, a processor, and even an operating system.
Original article posted on 7/23/2013, West Chester Tech Blog
Like any computer chip that runs an operating system and apps, a SIM card can be hacked. In this case, modern SIM cards run a very simple OS that loads up Java Card — a version of the Java virtual machine for smart cards (of which SIMs are a variety of). Java Card essentially runs small Java applets, and each applet is encapsulated and firewalled (sandboxed) by the Java VM, preventing sensitive data from leaking to other apps. Your phone interacts with these apps via the SIM Application Toolkit (STK) to display information on your screen, and to interact with the outside world.
SIMCard TroublesOriginal article posted on 7/23/2013, West Chester Tech Blog
If your mobile phone is more then a couple years old you should contact your cellular provider and request a replacement SIM as the newer ones issued have mostly been programmed to avoid this problem.
Securing Your Mobile Devices
Our mobile devices (smartphones and tablets) are becoming a bigger and more important part of our daily lives everyday. Because of this, security concerns are growing and becoming more complex.
Securing Your Mobile Devices
Be careful when “checking in” on social sites: This is one of my personal weaknesses. I love to check in so that my friends can know what I am going. This is because Facebook, FourSquare and other geo-location programs are fun and sometimes you can score some deals for “checking in” at locations. However you should to be cautious of letting people know where you are – especially if you’re away from home.
Don’t remember your passwords: Don’t set user name and passwords to be remembered in your mobile browser or in apps and make sure you always log out of accounts when you access them.
Be careful what you share: Yes it’s fine to stay in touch with our friends and family via social networks, but be careful what you share. Even if your privacy settings are set to only let your friends see the information, it’s best to take the approach that once something is online, it lives forever. Think if you’re really ok with your grandmother or boss to see that update, picture or video.
Securing Your Mobile Devices
Don’t text or email personal information: While this might seem pretty basic, we may find we need to share credit card numbers or personal details with another person. But this should be done via a secure site or app or use your mobile’s other function (the phone itself - voice call). Emails and texts can be intercepted and then your information can fall into the wrong hands.
Always remember that legitimate organizations like banks will not ask you to text personal details!
Turn off your Bluetooth: If you’re not using this connection, it’s best to turn it off. Not only will this help save your battery life, but it prevents hackers from accessing your device through this technology.
Summertime Tech Tips
A trip to the shore for some sunshine and water may sound like the perfect getaway and in many ways it can be. However your smartphone probably will not agree. There is little doubt that many of us are addicted to our smartphones so here are some tips for keeping them safe this summer.
Seek some shade. Direct sunlight can cause overheating, so be sure to stash your devices somewhere shady. If you do trigger an “overheated” alert, be sure to turn off the device and move it to a cooler location. Do not place it inside a freezer!
Summertime Tech Tips
Invest in a quality case. In the summertime, the living is easy – but not for your gadgets. Sticky fingers from ice cream, blowing sand and condensation are just a few of the perils the season brings for your devices. There are a ton of options on the market, including rugged cases to help protect from drops and waterproof options to help keep things safe poolside – or tabletop during meals.
Limit the glare. Sunlight can make your screen hard to read. You can tackle this in a few ways:
Adjust your brightness settings. Navigate to your device’s “Settings” menu, then select the “Display Settings.” You can modify both “Brightness” and “Backlight” options on most devices: the higher the brightness settings, the easier it is to read your screen in sunlight. Some devices also offer an “Auto Brightness” option that automatically adjusts your screen for optimal viewing.
Summertime Tech Tips
Purchase an anti-glare cover which will help make your screen more legible in bright light.
Find some shade. Relax under an umbrella or a tree for some temporary relief.
Low-Fi Stereo Fun! Summer means impromptu gatherings, which just beg for a great music. But if you do not have portable speakers handy, you can try this simple trick to pump up the volume. Place your music player in a bowl or glass to amplify your device’s speakers. It really works!
Summertime Tech Tips
Identity theft is a serious crime that can have a lasting negative impact. Just one important piece of information, like a Social Security card, a driver’s license or a bank account statement, can provide a criminal what he needs to steal someone’s identity. What’s worse is victims may not realize their identities have been stolen for weeks, months or years after the fact, allowing the crime to perpetuate and destroy their credit. The good news is there are actions you can take to help protect your identity while on vacation — and anywhere else you may be mobile and online. Mobile Routers or Cellular HotspotsConsider a portable router to create your own Wi-Fi hotspot for your own or your family’s devices. You’ll need a local SIM data card, which is available at most electronic stores or even airport kiosks. This will help you avoid using public Wi-Fi spots. All cellular companies sell mobile hotspot devices.
Avoid Contact with HackersIf you use public Wi-Fi, be very cautious of using unsecured networks. Make sure you are logging into a secured or private network when you use Wi-Fi. If you aren’t sure, don’t visit sites that contain sensitive information, like bank accounts.
Summertime Tech Tips
. Be Careful Being SocialUsing social media while you travel can be a great way to share your family’s trip but remember — checking in or posting pictures can alert someone that your home is vacant! Make sure to set your home alarm, hire a house-sitter or maybe the best option is to delay posts until you are back home. If you do really want to share these photos while you are on vacation, make sure to set your privacy settings to “friends” only. This will help limit the number of people who actually see these pictures.Make Sure It's LegitBefore logging onto a website from your mobile device, make sure the URL is legit. There are plenty of URL spoof sites out there, created in order to steal your information. Unfortunately many mobile browsers do not show the URL, so it is best to bookmark your favorite sites after you type in the address.
Lock Down Your Social NetworksIf you have a blog or social accounts — such as Facebook and Twitter — use the highest security settings possible to ensure your information, posts and photos aren’t being leaked onto the internet.
Summertime Tech Tips
.
Strong PasswordsUse a mix of upper and lowercase letters, numbers, symbols and punctuation marks to make your passwords harder to crack.
Secure Your Mobile DevicesLosing your mobile phone, tablet or laptop can be just as bad as losing your wallet. Be sure to protect your mobile devices with strong passwords and encryption. Consider installing wiping software on your mobile device so that you can remove your information remotely if your phone is lost.
Facebook - Security
Protecting the information you share in Facebook is more important then ever. If you are a Facebook user be sure to take some time to adjust your personal settings. Facebook has recently changed how privacy settings work.
To check and edit your setting open your Timeline page and select “About”.
The “About” page has all of your information, divided into sections. You can adjust any of these sections by selecting “Edit” in each one.
Facebook - Security
Once you have selected “Edit” in any of the sections you can change where the information about you is being shared.
Definitions:
• Public – anyone on Facebook can view.• Friends – only your friends can view.• Only me – only you can view.• Custom – you can choose specific
people to view.
Facebook - Your History
Did you know that you can download your entire Facebook history? It is actually very easy to do. First open “Account Settings” and browse to the bottom of the “General Account Settings” page. On the bottom you will see the option to “Download a copy of your Facebook data.”
Facebook - Your History
Did you know that you can download your entire Facebook history? It is actually very easy to do. First open “Account Settings” and browse to the bottom of the “General Account Settings” page. On the bottom you will see the option to “Download a copy of your Facebook data.”
Facebook - Your History
You will then be prompted for your password and afterward, select “Start My Archive”.
Once completed, Facebook will email you a copy of your Information. This can take a long time, depending on how much data is in your account and timeline.
Summertime Tech Tips
.