west chester tech training session 7

25
Borough of West Chester • NEW WIRELESS NETWORK • BOROUGH FACEBOOK PAGE (POLICY REVIEW) • BOROUGH – PUBLIC DROPBOX ACCOUNT • CHARGING YOUR PHONE DURING POWER OUTAGES • SKYDRIVE • AVOIDING PC VIRUSES DURING THE HOLIDAYS • WINDOWS 8 DEMONSTRATION • EMAIL PRIVACY / FILE OWNERSHIP • MY 5 EMAIL SECURITY TIPS Information Technology Training Session 7 – December 6, 2012 William Mann, Chief Information Officer

Upload: william-mann

Post on 01-Nov-2014

1.709 views

Category:

Documents


0 download

DESCRIPTION

The December 2012

TRANSCRIPT

Page 1: West Chester Tech Training session 7

Borough of West Chester

• NEW WIRELESS NETWORK

• BOROUGH FACEBOOK PAGE (POLICY REVIEW)

• BOROUGH – PUBLIC DROPBOX ACCOUNT

• CHARGING YOUR PHONE DURING POWER OUTAGES

• SKYDRIVE

• AVOIDING PC VIRUSES DURING THE HOLIDAYS

• WINDOWS 8 DEMONSTRATION

• EMAIL PRIVACY / FILE OWNERSHIP

• MY 5 EMAIL SECURITY TIPS

Information Technology Training Session 7 – December 6, 2012

William Mann, Chief Information Officer

Page 2: West Chester Tech Training session 7

New Wireless Network in Service

A new “cloud based” wireless network is in service. Connecting your mobile devices has never been easier.

http://tinyurl.com/wcboro2012

There are 2 difference SSID’s available.

A SSID is the name of a wireless local area network (WLAN). All wireless devices on a WLAN must employ the same SSID in order to communicate with each other.

1. “WC-Wireless” is available to all, including guests in the municipal building. The WAP (wireless access key) for this is 4016106962700.

2. “WC-Staff” will be in service shortly to authorized personnel only. This SSID will provide access to our LAN (local area network).

William Mann, Chief Information Officer

Page 3: West Chester Tech Training session 7

The Borough of West Chester – Public Dropbox Account

The Borough of Chester now has a public Dropbox account. This account is available to anyone who would like access to Borough Council meeting agendas and supporting documents.

http://tinyurl.com/wcboro2012 William Mann, Chief Information Officer

Page 4: West Chester Tech Training session 7

The Borough of West Chester’s official Facebook Page

On October 1 we launched our official “Borough of West Chester” Facebook Page.

The mission of our Facebook page is to increase the Borough’s presence on the internet and positively interact with out community and visitors.

www.facebook.com/WestChesterBorough William Mann, Chief Information Officer

Page 5: West Chester Tech Training session 7

The Borough of West Chester’s official Facebook Page

Policy of Behavior • Profanity of any kind shall not be permitted on the webpage.

• Statements and comments of a harassing or threatening nature shall not be permitted on the webpage.

• Illegal activity of any type shall not be permitted on the webpage.

• Comments singling out individual employees in a negative or unprofessional manner shall be removed.

• Employees and other parties associated with the Borough of West Chester shall not engage in self-promotion.

• Unauthorized photos of Borough of West Chester employees are strictly prohibited.

Facebook Policy

William Mann, Chief Information Officer

Page 6: West Chester Tech Training session 7

The Borough of West Chester’s official Facebook Page

Policy of Behavior continued

Any statements or comments of the above nature shall be removed immediately upon discovery by any of the Facebook administrators. Borough of West Chester employees involved in any activity of this nature shall be disciplined by the Borough Manager’s office. Persons who engage in any of the activities described in the “policy of behavior” are subject to being banned from the Borough of West Chester Facebook page.

Facebook Policy

Responding to Comments Employees shall not engage in comments without the prior approval of their department manager. Only the original author of a posting shall respond to comments unless another staff member has been authorized by either the author or the department manager.

William Mann, Chief Information Officer

Page 7: West Chester Tech Training session 7

The Borough of West Chester’s official Facebook Page

Dealing with Criticism One of the greatest fears by some professionals in respect to social media is “the fear of criticism”. Public employees are in the public eye and are supported by the tax payers they serve. Criticism on a professional level must be accepted and anticipated. Criticism on public social media websites of local government services is likely from time to time. If the criticism does not mention individual names of employees and does not violate the “policy of behavior” in Section II the comments shall not be deleted from the website. Should a criticism comment or statement violate the “policy of behavior” in section II the comments shall be removed immediately upon discovery by an administrator and the person making the comment banned from the webpage. Borough of West Chester – Administrative Policy for the Borough of West Chester

Facebook Policy

The “Facebook Team” for the Borough of West Chester includes: Rich Ashenfelder – Department of Recreation – [email protected] Benes – Borough Manager’s Office – [email protected] Brooks – Building & Housing – [email protected] Fogarty – Department of Public Works – [email protected] Jennifer Glick – Department of Finance – [email protected] Staci King – Police Department – [email protected] William Mann – Chief Information Officer – [email protected] Mojica – Parking Services – [email protected] Kevin Oakes – Department of Wastewater – [email protected]

William Mann, Chief Information Officer

Page 8: West Chester Tech Training session 7

SkyDrive is Microsoft’s “cloud storage” solution which offers 8 GB of free storage in the cloud.

I recommend SkyDrive because it easily connects your documents to Microsoft Office allowing you to work on your files regardless of where you are or what type of device you happen to be using.

This will become especially true as Windows 8, followed by the upcoming Office 2013 become widely used.

You can sign up for a free account at www.skydrive.live.com.

William Mann, Chief Information Officer

Page 9: West Chester Tech Training session 7

Keeping Your PC & Your Information Safe During the Holidays

Page 10: West Chester Tech Training session 7

Keeping Your PC & Your Information Safe During the Holidays

William Mann, Chief Information Officer

Page 11: West Chester Tech Training session 7

Keeping Your PC & Your Information Safe During the Holidays

2012 Cyber Monday continues the trend.

William Mann, Chief Information Officer

Page 12: West Chester Tech Training session 7
Page 13: West Chester Tech Training session 7

1. When shopping online only provide your confidential information to secure sites – as identified by starting with “https” or by viewing the padlock icon in the URL.

2. Consider using a credit card for online purchases as compared with a debit card. Credit cards typically carry limitations of liability (if noted within a reasonable period of time) compared with debit cards where inappropriate or unauthorized use may drain your personal checking account. Your credit card may also offer buyer protection for goods not delivered as compared with your debit card provider.

3. When shopping online, use a gift card or one-time use card that is limited in its value to near or at the amount of the purchase.

Keeping Your PC & Your Information Safe During the Holidays

Page 14: West Chester Tech Training session 7

4. Be on the lookout for fake (phishing) expeditions where mock websites are pretending to be your financial institution and requesting your personal banking information.

5. When you are using your debit or credit card at the mall or other crowded businesses, be careful of “shoulder surfers” who may be attempting to view your PIN as you type it into the reader. Maintain the anti-virus and anti-adware applications on your personal PC.

6. Be suspicious of on screen advertisements that direct you away from the site and business that you were intending to purchase from.

Keeping Your PC & Your Information Safe During the Holidays

William Mann, Chief Information Officer

Page 15: West Chester Tech Training session 7

7. When in doubt, call the website contact number listed to help ensure you are doing business with a reputable company. Be wary of emails that you are not expecting – even from your friends, colleagues, and family members that contain a holiday greeting.

8. It is common for fraudsters to use address books of email accounts to resend messages to those in the address book, and these messages typically carry malware that is intended to do harm to your computer or glean personal information.

9. Delete “Chain” emails or greeting card emails which frequently carry malware that may place files on your computer unbeknownst to you that can damage your computer or send files or information to thieves.

Keeping Your PC & Your Information Safe During the Holidays

William Mann, Chief Information Officer

Page 16: West Chester Tech Training session 7

10. Do not resend chain emails - even special holiday message emails to your friends, colleagues, or family members. Do not open attachments from emails that you are not expecting – even if it says “Ho-Ho-Ho” or another holiday greeting in the subject line.

11. Do not open attachments from emails that you are not expecting – even if it says “Ho-Ho-Ho” or another holiday greeting in the subject line.

And finally and the most important of all… please use common sense. If it sounds to good to be true….. It probably is.

Keeping Your PC & Your Information Safe During the Holidays

William Mann, Chief Information Officer

Page 17: West Chester Tech Training session 7

Windows 8 Demonstration & Discussion

Throughout 2013 you will here allot about the new Windows 8 operating system (OS).

Windows 8 comes in 3 flavors.

• Windows 8 RT• Windows 8 Pro• Windows 8

Enterprise*

* The same as Pro with the exception of Windows Media Center

William Mann, Chief Information Officer

Page 18: West Chester Tech Training session 7

Windows 8 Demonstration & Discussion

Throughout 2013 you will here allot about the new Windows 8 operating system (OS).

Windows 8 will operate on the following platforms.

• PC• Tablets (RT or Pro)• Smartphones

William Mann, Chief Information Officer

Page 19: West Chester Tech Training session 7

Know Your Email Risks and Rights

The recent FBI General Petraeus Probe is a reminder that email we use is owned, managed and controlled by your employer. Even if you use your personal email on your organization’s equipment it is subject to search and seizure by your employer.

All of this information can be used to hold you liable and end, even in your termination.

Email messages while not the only thing that took down the top general in the United States government it played a very large part.

William Mann, Chief Information Officer

Page 20: West Chester Tech Training session 7

2 Simple Email Rules to Rule Them All

I believe that 2 simple email rules will protect you from email trouble with your employer.

1. Never ever send any email message to anyone that you would not say “face to face” to that person.

2. Never ever send any email to anyone that you would not be embarrassed or ashamed of if someone else read it.

Did you know?

All of the email we send is “discoverable” regardless if it has been deleted or not. All of our email is archived. Once it is sent, it is owned by the Borough of West Chester.

William Mann, Chief Information Officer

Page 21: West Chester Tech Training session 7

File Ownership

The ongoing Pertraeus Probe should be a wake up call to everyone.

• Any and all files that you create, edit or store on Borough property is owned by the Borough of West Chester and is subject to discovery.

• Personal email that is created or stored on Borough property is subject to discovery.

• The destruction or deletion of Borough documents and files is strictly restricted.

• Employees may be disciplined or terminated for information resulting from discovery.

What is Discovery?

Discovery is the technical process of searching email and files. Through this process policy & procedure adherence is reviewed.

William Mann, Chief Information Officer

Page 22: West Chester Tech Training session 7

My 5 Tips for Email Security

While we are talking about email and before we proceed to the next slide let’s take a minute to look at this.

William Mann, Chief Information Officer

Page 23: West Chester Tech Training session 7

My 5 Tips for Email Security

1. Don’t Write It Down. The first rule of communication is to do it in person if possible and in written form only if necessary.

2. Keep personal and professional communications separate. Email, Instant messages, text and photos that are personal need to be exchanged only using personal accounts & personal hardware.

3. Don’t trust even prominent Cloud providers to protect messages. E-mail services like Google’s are susceptible to hacking and there are well documented cases of users having accounts broken into, emails deleted and unauthorized messages sent.

4. Do not use Facebook as an email or texting service!

5. Remember that your information is only as safe as the recipient’s email or texting service.

William Mann, Chief Information Officer

Page 24: West Chester Tech Training session 7

Do You Remember When Email was a BIG Deal?

William Mann, Chief Information Officer

Page 25: West Chester Tech Training session 7

Thank You for Attending.

Our next tech training will be in the Spring. In the meantime be sure to check out the West Chester Tech Blog.

William Mann, Chief Information Officer