SlideShare a Scribd company logo
1 of 11
Welcome to the IS Staff Induction Vanessa Wickham IT Training
Introduction I am Vanessa Wickham IT Training Team, Information Services ittraining@port.ac.uk Ext 3706
House Keeping Fire Hospitality Personal Comfort First Aid Ice Breaker
Aims of the Session To provide the user with an understanding of the: ,[object Object]
Information Security
Service Desk
Web site – Information Services
Manual,[object Object]
IT Security Group Work
IT Security Group Work ,[object Object]
 How can your computer catch a virus

More Related Content

What's hot

Addressing todays Governance Risk and Compliance Requirements
Addressing todays Governance Risk and Compliance RequirementsAddressing todays Governance Risk and Compliance Requirements
Addressing todays Governance Risk and Compliance Requirements
Watchful Software
 
ITeC Digital signage1
ITeC Digital signage1ITeC Digital signage1
ITeC Digital signage1
iteclearners
 

What's hot (9)

Users, Groups, Policies . . . Oh MY!
Users, Groups, Policies . . . Oh MY!Users, Groups, Policies . . . Oh MY!
Users, Groups, Policies . . . Oh MY!
 
Fitsec-remote work and cyber security
Fitsec-remote work and cyber securityFitsec-remote work and cyber security
Fitsec-remote work and cyber security
 
Don’t Get Caught by Phishing Emails!
Don’t Get Caught by Phishing Emails!Don’t Get Caught by Phishing Emails!
Don’t Get Caught by Phishing Emails!
 
10 Cyber Safety Tips Every Internet User Must Follow
10 Cyber Safety Tips Every Internet User Must Follow10 Cyber Safety Tips Every Internet User Must Follow
10 Cyber Safety Tips Every Internet User Must Follow
 
Addressing todays Governance Risk and Compliance Requirements
Addressing todays Governance Risk and Compliance RequirementsAddressing todays Governance Risk and Compliance Requirements
Addressing todays Governance Risk and Compliance Requirements
 
RightsWATCH Secure Collaboration with Azure RMS
RightsWATCH Secure Collaboration with Azure RMSRightsWATCH Secure Collaboration with Azure RMS
RightsWATCH Secure Collaboration with Azure RMS
 
Secureme
Secureme Secureme
Secureme
 
ITeC Digital signage1
ITeC Digital signage1ITeC Digital signage1
ITeC Digital signage1
 
How much should you reveal on social media
How much should you reveal on social mediaHow much should you reveal on social media
How much should you reveal on social media
 

Viewers also liked (7)

Induction program
Induction programInduction program
Induction program
 
Staff develpoment presentation
Staff develpoment presentationStaff develpoment presentation
Staff develpoment presentation
 
Aeo presentation induction training jan 2013
Aeo presentation induction training jan 2013Aeo presentation induction training jan 2013
Aeo presentation induction training jan 2013
 
Induction
InductionInduction
Induction
 
Induction program final
Induction program finalInduction program final
Induction program final
 
Checklist for New Employee Induction Program
Checklist for New Employee Induction ProgramChecklist for New Employee Induction Program
Checklist for New Employee Induction Program
 
Staff development
Staff developmentStaff development
Staff development
 

Similar to IS Staff Induction

Staying Safe, Having Fun, And Cruising The ‘Net
Staying Safe, Having Fun, And Cruising The ‘NetStaying Safe, Having Fun, And Cruising The ‘Net
Staying Safe, Having Fun, And Cruising The ‘Net
Daniel Owens
 
Social Engineering: Protecting Yourself on the Campus Network
Social Engineering: Protecting Yourself on the Campus NetworkSocial Engineering: Protecting Yourself on the Campus Network
Social Engineering: Protecting Yourself on the Campus Network
thowell
 

Similar to IS Staff Induction (20)

Staying Safe, Having Fun, And Cruising The ‘Net
Staying Safe, Having Fun, And Cruising The ‘NetStaying Safe, Having Fun, And Cruising The ‘Net
Staying Safe, Having Fun, And Cruising The ‘Net
 
Infosec
InfosecInfosec
Infosec
 
Infosec
InfosecInfosec
Infosec
 
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
 
Security in the enterprise - Why You Need It
Security in the enterprise - Why You Need ItSecurity in the enterprise - Why You Need It
Security in the enterprise - Why You Need It
 
Hacking 1
Hacking 1Hacking 1
Hacking 1
 
Cyber Security Presentation By(Aashish Tanania)
Cyber Security Presentation By(Aashish Tanania)Cyber Security Presentation By(Aashish Tanania)
Cyber Security Presentation By(Aashish Tanania)
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
 
New Hire Information Security Awareness
New Hire Information Security AwarenessNew Hire Information Security Awareness
New Hire Information Security Awareness
 
Social Engineering: Protecting Yourself on the Campus Network
Social Engineering: Protecting Yourself on the Campus NetworkSocial Engineering: Protecting Yourself on the Campus Network
Social Engineering: Protecting Yourself on the Campus Network
 
Vulnerability Analyst interview Questions.pdf
Vulnerability Analyst interview Questions.pdfVulnerability Analyst interview Questions.pdf
Vulnerability Analyst interview Questions.pdf
 
Top DevOps Services Sydney.pdf
Top DevOps Services Sydney.pdfTop DevOps Services Sydney.pdf
Top DevOps Services Sydney.pdf
 
A Beginner's Guide To Cybersecurity For Startups
A Beginner's Guide To Cybersecurity For StartupsA Beginner's Guide To Cybersecurity For Startups
A Beginner's Guide To Cybersecurity For Startups
 
Cyberhunter Solutions Cyber Security Company Canada.pdf
Cyberhunter Solutions Cyber Security Company Canada.pdfCyberhunter Solutions Cyber Security Company Canada.pdf
Cyberhunter Solutions Cyber Security Company Canada.pdf
 
An Introduction To IT Security And Privacy In Libraries
 An Introduction To IT Security And Privacy In Libraries An Introduction To IT Security And Privacy In Libraries
An Introduction To IT Security And Privacy In Libraries
 
Cyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdfCyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdf
 
Security Basics Webinar
Security Basics WebinarSecurity Basics Webinar
Security Basics Webinar
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
 
Cybersecurity in communication
Cybersecurity in communicationCybersecurity in communication
Cybersecurity in communication
 
How to Build a Culture of Cyber Security for Your Business
How to Build a Culture of Cyber Security for Your BusinessHow to Build a Culture of Cyber Security for Your Business
How to Build a Culture of Cyber Security for Your Business
 

More from UOPITtraining (8)

Ig what&why
Ig what&whyIg what&why
Ig what&why
 
Is student induction 2013 instructor final
Is student induction 2013 instructor finalIs student induction 2013 instructor final
Is student induction 2013 instructor final
 
Is student induction 2013 instructor final
Is student induction 2013 instructor finalIs student induction 2013 instructor final
Is student induction 2013 instructor final
 
Is student induction 2013 instructor hr
Is student induction 2013 instructor hrIs student induction 2013 instructor hr
Is student induction 2013 instructor hr
 
IS student induction 2012 web
IS student induction 2012 webIS student induction 2012 web
IS student induction 2012 web
 
IT Anywhere, Anytime, Just In Time
IT Anywhere, Anytime, Just In TimeIT Anywhere, Anytime, Just In Time
IT Anywhere, Anytime, Just In Time
 
Is student induction 2011 Dentistry
Is student induction 2011 DentistryIs student induction 2011 Dentistry
Is student induction 2011 Dentistry
 
Jup03 maintenance v3
Jup03 maintenance v3Jup03 maintenance v3
Jup03 maintenance v3
 

Recently uploaded

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Recently uploaded (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 

IS Staff Induction