SlideShare a Scribd company logo
1 of 25
Borough of West Chester
                                           Information Technology Training
                                                       Session 7 – December 6, 2012

• NEW WIRELESS NETWORK
• B O R O U G H FA C E B O O K PA G E ( P O L I C Y R E V I E W )
• BOROUGH – PUBLIC DROPBOX ACCOUNT
• CHARGING YOUR PHONE DURING POWER
  O U TA G E S
• SKYDRIVE
• AV O I D I N G P C V I R U S E S D U R I N G T H E H O L I D AY S
• W I N D O W S 8 D E M O N S T R AT I O N
• E M A I L P R I VA C Y / F I L E O W N E R S H I P
• MY 5 EMAIL SECURITY TIPS




                                              William Mann, Chief Information Officer
New Wireless Network in Service


A new “cloud based” wireless network is in service. Connecting your mobile devices has
never been easier.

  There are 2 difference SSID’s available.
   A SSID is the name of a wireless local area network (WLAN). All wireless devices on
   a WLAN must employ the same SSID in order to communicate with each other.


   1. “WC-Wireless” is available to all, including guests in the municipal building. The
      WAP (wireless access key) for this is 4016106962700.

   2. “WC-Staff” will be in service shortly to authorized personnel only. This SSID will
        provide access to our LAN (local area network).




http://tinyurl.com/wcboro2012                        William Mann, Chief Information Officer
The Borough of West Chester – Public Dropbox Account


The Borough of Chester now has a public Dropbox account. This account is available to
anyone who would like access to Borough Council meeting agendas and supporting
documents.




http://tinyurl.com/wcboro2012                     William Mann, Chief Information Officer
The Borough of West Chester’s official Facebook Page


On October 1 we launched our official
“Borough of West Chester” Facebook
Page.

 The mission of our Facebook page is to
 increase the Borough’s presence on
 the internet and positively interact
 with out community and visitors.




www.facebook.com/WestChesterBorough
                                                 William Mann, Chief Information Officer
The Borough of West Chester’s official Facebook Page



    Facebook Policy

Policy of Behavior

• Profanity of any kind shall not be permitted on the webpage.

• Statements and comments of a harassing or threatening nature shall not be permitted on
  the webpage.

• Illegal activity of any type shall not be permitted on the webpage.

• Comments singling out individual employees in a negative or unprofessional manner shall
  be removed.

• Employees and other parties associated with the Borough of West Chester shall not
  engage in self-promotion.

• Unauthorized photos of Borough of West Chester employees are strictly prohibited.




                                                                                  William Mann, Chief Information Officer
The Borough of West Chester’s official Facebook Page


  Facebook Policy
Policy of Behavior continued

Any statements or comments of the above nature shall be removed immediately upon discovery by any of the
Facebook administrators.

Borough of West Chester employees involved in any activity of this nature shall be disciplined by the Borough
Manager’s office.

Persons who engage in any of the activities described in the “policy of behavior” are subject to being banned from
the Borough of West Chester Facebook page.


                                             Responding to Comments

                                             Employees shall not engage in comments without the prior approval of their department
                                             manager.

                                             Only the original author of a posting shall respond to comments unless another staff member has
                                             been authorized by either the author or the department manager.




                                                                                    William Mann, Chief Information Officer
The Borough of West Chester’s official Facebook Page


   Facebook Policy
Dealing with Criticism

One of the greatest fears by some professionals in respect to social media is “the fear of criticism”. Public
employees are in the public eye and are supported by the tax payers they serve. Criticism on a professional level
must be accepted and anticipated.

Criticism on public social media websites of local government services is likely from time to time. If the criticism
does not mention individual names of employees and does not violate the “policy of behavior” in Section II the
comments shall not be deleted from the website.

Should a criticism comment or statement violate the “policy of behavior” in section II the comments shall be
removed immediately upon discovery by an administrator and the person making the comment banned from the
webpage. Borough of West Chester – Administrative Policy for the Borough of West Chester


                                       The “Facebook Team” for the Borough of West Chester includes:

                                       Rich Ashenfelder – Department of Recreation – rashenfelder@west-chester.com
                                       Judy Benes – Borough Manager’s Office – jbenes@west-chester.com
                                       Kathy Brooks – Building & Housing – kbrooks@west-chester.com
                                       Meghan Fogarty – Department of Public Works – mfogarty@west-chester.com
                                       Jennifer Glick – Department of Finance – jglick@west-chester.com
                                       Staci King – Police Department – sking@west-chester.com
                                       William Mann – Chief Information Officer – wmann@west-chester.com
                                       Hector Mojica – Parking Services – hmojica@west-chester.com
                                       Kevin Oakes – Department of Wastewater – koakes@west-chester.com




                                                                                        William Mann, Chief Information Officer
SkyDrive is Microsoft’s “cloud storage” solution which offers 8 GB of free
storage in the cloud.

I recommend SkyDrive because it easily connects your documents to Microsoft
Office allowing you to work on your files regardless of where you are or what
type of device you happen to be using.

This will become especially true as Windows 8, followed by the upcoming
Office 2013 become widely used.

You can sign up for a free account at www.skydrive.live.com.




                                              William Mann, Chief Information Officer
Keeping Your PC & Your Information Safe During the
                    Holidays
Keeping Your PC & Your Information Safe During the
                    Holidays




                            William Mann, Chief Information Officer
Keeping Your PC & Your Information Safe During the
                    Holidays




                           2012 Cyber Monday continues the trend.


                            William Mann, Chief Information Officer
Keeping Your PC & Your Information Safe During the
                      Holidays
1. When shopping online only provide your confidential information to secure sites
   – as identified by starting with “https” or by viewing the padlock icon in the URL.

2. Consider using a credit card for online purchases as compared with a debit card.
   Credit cards typically carry limitations of liability (if noted within a reasonable
   period of time) compared with debit cards where inappropriate or unauthorized
   use may drain your personal checking account. Your credit card may also offer
   buyer protection for goods not delivered as compared with your debit card
   provider.

3. When shopping online, use a gift card or one-time use card that is limited in its
   value to near or at the amount of the purchase.
Keeping Your PC & Your Information Safe During the
                      Holidays
4. Be on the lookout for fake (phishing) expeditions where mock websites are
   pretending to be your financial institution and requesting your personal banking
   information.

5. When you are using your debit or credit card at the mall or other crowded
   businesses, be careful of “shoulder surfers” who may be attempting to view your
   PIN as you type it into the reader. Maintain the anti-virus and anti-adware
   applications on your personal PC.

6. Be suspicious of on screen advertisements that direct you away from the site and
   business that you were intending to purchase from.




                                                William Mann, Chief Information Officer
Keeping Your PC & Your Information Safe During the
                      Holidays
7. When in doubt, call the website contact number listed to help ensure you are
   doing business with a reputable company. Be wary of emails that you are not
   expecting – even from your friends, colleagues, and family members that contain a
   holiday greeting.

8. It is common for fraudsters to use address books of email accounts to resend
   messages to those in the address book, and these messages typically carry
   malware that is intended to do harm to your computer or glean personal
   information.

9. Delete “Chain” emails or greeting card emails which frequently carry malware that
   may place files on your computer unbeknownst to you that can damage your
   computer or send files or information to thieves.




                                                William Mann, Chief Information Officer
Keeping Your PC & Your Information Safe During the
                      Holidays
10. Do not resend chain emails - even special holiday message emails to your
    friends, colleagues, or family members. Do not open attachments from emails that
    you are not expecting – even if it says “Ho-Ho-Ho” or another holiday greeting in
    the subject line.

11. Do not open attachments from emails that you are not expecting – even if it says
    “Ho-Ho-Ho” or another holiday greeting in the subject line.

And finally and the most important of all… please use common sense. If it sounds to
good to be true….. It probably is.




                                                 William Mann, Chief Information Officer
Windows 8 Demonstration & Discussion

Throughout 2013 you will here allot about the new Windows 8 operating system (OS).




Windows 8 comes in 3
flavors.

• Windows 8 RT
• Windows 8 Pro
• Windows 8
  Enterprise*


* The same as Pro with
the exception of
Windows Media Center




                                                 William Mann, Chief Information Officer
Windows 8 Demonstration & Discussion

Throughout 2013 you will here allot about the new Windows 8 operating system (OS).




Windows 8 will operate
on the following
platforms.


• PC
• Tablets (RT or Pro)
• Smartphones




                                                 William Mann, Chief Information Officer
Know Your Email Risks and Rights

The recent FBI General Petraeus Probe is a reminder that email we use is owned,
managed and controlled by your employer. Even if you use your personal email on
your organization’s equipment it is subject to search and seizure by your employer.

All of this information can be used to hold you liable and end, even in your
termination.

Email messages while not the only thing that took down the top general in the United
States government it played a very large part.




                                                  William Mann, Chief Information Officer
2 Simple Email Rules to Rule Them All

I believe that 2 simple email rules will protect you from email trouble with your
employer.

1. Never ever send any email message to anyone that you would not say “face to
   face” to that person.

1. Never ever send any email to anyone that you would not be embarrassed or
   ashamed of if someone else read it.




Did you know?

 All of the email we send is “discoverable” regardless if it has
been deleted or not. All of our email is archived. Once it is
sent, it is owned by the Borough of West Chester.



                                                    William Mann, Chief Information Officer
File Ownership

The ongoing Pertraeus Probe should be a wake up call to everyone.

 • Any and all files that you create, edit or store on Borough property is owned by the
   Borough of West Chester and is subject to discovery.

 • Personal email that is created or stored on Borough property is subject to
   discovery.

 • The destruction or deletion of Borough documents and files is strictly restricted.

 • Employees may be disciplined or terminated for information resulting from
   discovery.

      What is Discovery?

      Discovery is the technical process of searching email and files.
      Through this process policy & procedure adherence is reviewed.


                                                  William Mann, Chief Information Officer
My 5 Tips for Email Security




While we are talking about email and before we proceed to the next slide
                    let’s take a minute to look at this.




                                         William Mann, Chief Information Officer
My 5 Tips for Email Security


1. Don’t Write It Down. The first rule of communication is to do it in person if
   possible and in written form only if necessary.

2. Keep personal and professional communications separate. Email, Instant
messages, text and photos that are personal need to be exchanged only using
personal accounts & personal hardware.

3. Don’t trust even prominent Cloud providers to protect messages. E-mail services
like Google’s are susceptible to hacking and there are well documented cases of
users having accounts broken into, emails deleted and
unauthorized messages sent.

4. Do not use Facebook as an email or texting service!

5. Remember that your information is only as safe as
the recipient’s email or texting service.


                                                  William Mann, Chief Information Officer
Do You Remember When Email was a BIG Deal?




                         William Mann, Chief Information Officer
Thank You for Attending.




           Our next tech training will be in the Spring.
In the meantime be sure to check out the West Chester Tech Blog.




                                    William Mann, Chief Information Officer

More Related Content

Viewers also liked

УМНЫЙ город: Пневматические системы удаления мусора
УМНЫЙ город: Пневматические системы удаления мусораУМНЫЙ город: Пневматические системы удаления мусора
УМНЫЙ город: Пневматические системы удаления мусораSergey Zhdanov
 
Cómo ganar clientes y no morir en el Intento
Cómo ganar clientes y no morir en el IntentoCómo ganar clientes y no morir en el Intento
Cómo ganar clientes y no morir en el IntentoIEBSchool
 
Web Experience Management Solution for Alfresco 4 with Crafter
Web Experience Management Solution for Alfresco 4 with CrafterWeb Experience Management Solution for Alfresco 4 with Crafter
Web Experience Management Solution for Alfresco 4 with CrafterAlfresco Software
 
Observación colaborativa
Observación colaborativaObservación colaborativa
Observación colaborativaeverdial
 
2011 - Análisis de las correlaciones entre diversos parámetros operacionales ...
2011 - Análisis de las correlaciones entre diversos parámetros operacionales ...2011 - Análisis de las correlaciones entre diversos parámetros operacionales ...
2011 - Análisis de las correlaciones entre diversos parámetros operacionales ...WALEBUBLÉ
 
Working in a Global Environment - Success Strategies for Today's Information ...
Working in a Global Environment - Success Strategies for Today's Information ...Working in a Global Environment - Success Strategies for Today's Information ...
Working in a Global Environment - Success Strategies for Today's Information ...SJSU School of Information
 
congstar (Deutsche Telekom) CMS Relaunch with TYPO3
congstar (Deutsche Telekom) CMS Relaunch with TYPO3congstar (Deutsche Telekom) CMS Relaunch with TYPO3
congstar (Deutsche Telekom) CMS Relaunch with TYPO3AOE
 
Ponencia 2012 B Entretejiendo realidades campesinas hacia la formación para l...
Ponencia 2012 B Entretejiendo realidades campesinas hacia la formación para l...Ponencia 2012 B Entretejiendo realidades campesinas hacia la formación para l...
Ponencia 2012 B Entretejiendo realidades campesinas hacia la formación para l...Escuela Normal Superior de Neiva
 

Viewers also liked (13)

УМНЫЙ город: Пневматические системы удаления мусора
УМНЫЙ город: Пневматические системы удаления мусораУМНЫЙ город: Пневматические системы удаления мусора
УМНЫЙ город: Пневматические системы удаления мусора
 
Estudio Juan 8 58
Estudio Juan 8 58Estudio Juan 8 58
Estudio Juan 8 58
 
Cómo ganar clientes y no morir en el Intento
Cómo ganar clientes y no morir en el IntentoCómo ganar clientes y no morir en el Intento
Cómo ganar clientes y no morir en el Intento
 
Web Experience Management Solution for Alfresco 4 with Crafter
Web Experience Management Solution for Alfresco 4 with CrafterWeb Experience Management Solution for Alfresco 4 with Crafter
Web Experience Management Solution for Alfresco 4 with Crafter
 
Observación colaborativa
Observación colaborativaObservación colaborativa
Observación colaborativa
 
2011 - Análisis de las correlaciones entre diversos parámetros operacionales ...
2011 - Análisis de las correlaciones entre diversos parámetros operacionales ...2011 - Análisis de las correlaciones entre diversos parámetros operacionales ...
2011 - Análisis de las correlaciones entre diversos parámetros operacionales ...
 
Working in a Global Environment - Success Strategies for Today's Information ...
Working in a Global Environment - Success Strategies for Today's Information ...Working in a Global Environment - Success Strategies for Today's Information ...
Working in a Global Environment - Success Strategies for Today's Information ...
 
Nanyang Scholarship 2014
Nanyang Scholarship 2014Nanyang Scholarship 2014
Nanyang Scholarship 2014
 
congstar (Deutsche Telekom) CMS Relaunch with TYPO3
congstar (Deutsche Telekom) CMS Relaunch with TYPO3congstar (Deutsche Telekom) CMS Relaunch with TYPO3
congstar (Deutsche Telekom) CMS Relaunch with TYPO3
 
Ponencia 2012 B Entretejiendo realidades campesinas hacia la formación para l...
Ponencia 2012 B Entretejiendo realidades campesinas hacia la formación para l...Ponencia 2012 B Entretejiendo realidades campesinas hacia la formación para l...
Ponencia 2012 B Entretejiendo realidades campesinas hacia la formación para l...
 
Guia de recursos j m
Guia de recursos j mGuia de recursos j m
Guia de recursos j m
 
YounGo
YounGo YounGo
YounGo
 
NSG Deck
NSG DeckNSG Deck
NSG Deck
 

More from William Mann

Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingWilliam Mann
 
Technology Training - Security, Passwords & More
Technology Training - Security, Passwords & MoreTechnology Training - Security, Passwords & More
Technology Training - Security, Passwords & MoreWilliam Mann
 
Technology Training for Staff - April 6, 2017
Technology Training for Staff - April 6, 2017Technology Training for Staff - April 6, 2017
Technology Training for Staff - April 6, 2017William Mann
 
Why Digital Document Management?
Why Digital Document Management?Why Digital Document Management?
Why Digital Document Management?William Mann
 
Technology Training 11-10-2016
Technology Training  11-10-2016Technology Training  11-10-2016
Technology Training 11-10-2016William Mann
 
Tech training 19 Skype for Business
Tech training 19   Skype for BusinessTech training 19   Skype for Business
Tech training 19 Skype for BusinessWilliam Mann
 
Introducing Microsoft's Cloud - Session 16
Introducing Microsoft's Cloud - Session 16Introducing Microsoft's Cloud - Session 16
Introducing Microsoft's Cloud - Session 16William Mann
 
Technology Training - Session 15
Technology Training - Session 15Technology Training - Session 15
Technology Training - Session 15William Mann
 
West Chester Staff Technology Training - Website,LastPass and Tips!
West Chester Staff Technology Training   - Website,LastPass and Tips!West Chester Staff Technology Training   - Website,LastPass and Tips!
West Chester Staff Technology Training - Website,LastPass and Tips!William Mann
 
Heartbleed Explained & LastPass Demo
Heartbleed Explained & LastPass DemoHeartbleed Explained & LastPass Demo
Heartbleed Explained & LastPass DemoWilliam Mann
 
West Chester - Tech Training Session 11
West Chester - Tech Training Session 11West Chester - Tech Training Session 11
West Chester - Tech Training Session 11William Mann
 
What is West Chester Connect?
What is West Chester Connect?What is West Chester Connect?
What is West Chester Connect?William Mann
 
West Chester Tech Blog - Training Class - Session 10
West Chester Tech Blog - Training Class - Session 10West Chester Tech Blog - Training Class - Session 10
West Chester Tech Blog - Training Class - Session 10William Mann
 
Tech Training - Session 9
Tech Training - Session 9Tech Training - Session 9
Tech Training - Session 9William Mann
 
Tech Training - Session 8
Tech Training - Session 8Tech Training - Session 8
Tech Training - Session 8William Mann
 
Session 5 - Managing Microsoft Outlook and More
Session 5 - Managing Microsoft Outlook and MoreSession 5 - Managing Microsoft Outlook and More
Session 5 - Managing Microsoft Outlook and MoreWilliam Mann
 
Cloud computing 102711 - ccap
Cloud computing   102711 - ccapCloud computing   102711 - ccap
Cloud computing 102711 - ccapWilliam Mann
 

More from William Mann (20)

Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Ransomware 101
Ransomware 101Ransomware 101
Ransomware 101
 
Technology Training - Security, Passwords & More
Technology Training - Security, Passwords & MoreTechnology Training - Security, Passwords & More
Technology Training - Security, Passwords & More
 
Technology Training for Staff - April 6, 2017
Technology Training for Staff - April 6, 2017Technology Training for Staff - April 6, 2017
Technology Training for Staff - April 6, 2017
 
Why Digital Document Management?
Why Digital Document Management?Why Digital Document Management?
Why Digital Document Management?
 
Technology Training 11-10-2016
Technology Training  11-10-2016Technology Training  11-10-2016
Technology Training 11-10-2016
 
Tech training 19 Skype for Business
Tech training 19   Skype for BusinessTech training 19   Skype for Business
Tech training 19 Skype for Business
 
Introducing Microsoft's Cloud - Session 16
Introducing Microsoft's Cloud - Session 16Introducing Microsoft's Cloud - Session 16
Introducing Microsoft's Cloud - Session 16
 
Technology Training - Session 15
Technology Training - Session 15Technology Training - Session 15
Technology Training - Session 15
 
West Chester Staff Technology Training - Website,LastPass and Tips!
West Chester Staff Technology Training   - Website,LastPass and Tips!West Chester Staff Technology Training   - Website,LastPass and Tips!
West Chester Staff Technology Training - Website,LastPass and Tips!
 
Heartbleed Explained & LastPass Demo
Heartbleed Explained & LastPass DemoHeartbleed Explained & LastPass Demo
Heartbleed Explained & LastPass Demo
 
West Chester - Tech Training Session 11
West Chester - Tech Training Session 11West Chester - Tech Training Session 11
West Chester - Tech Training Session 11
 
What is West Chester Connect?
What is West Chester Connect?What is West Chester Connect?
What is West Chester Connect?
 
West Chester Tech Blog - Training Class - Session 10
West Chester Tech Blog - Training Class - Session 10West Chester Tech Blog - Training Class - Session 10
West Chester Tech Blog - Training Class - Session 10
 
Tech Training - Session 9
Tech Training - Session 9Tech Training - Session 9
Tech Training - Session 9
 
Tech Training - Session 8
Tech Training - Session 8Tech Training - Session 8
Tech Training - Session 8
 
SharePoint & More
SharePoint & MoreSharePoint & More
SharePoint & More
 
Session 5 - Managing Microsoft Outlook and More
Session 5 - Managing Microsoft Outlook and MoreSession 5 - Managing Microsoft Outlook and More
Session 5 - Managing Microsoft Outlook and More
 
Holiday scams
Holiday scamsHoliday scams
Holiday scams
 
Cloud computing 102711 - ccap
Cloud computing   102711 - ccapCloud computing   102711 - ccap
Cloud computing 102711 - ccap
 

West Chester Tech Training session 7

  • 1. Borough of West Chester Information Technology Training Session 7 – December 6, 2012 • NEW WIRELESS NETWORK • B O R O U G H FA C E B O O K PA G E ( P O L I C Y R E V I E W ) • BOROUGH – PUBLIC DROPBOX ACCOUNT • CHARGING YOUR PHONE DURING POWER O U TA G E S • SKYDRIVE • AV O I D I N G P C V I R U S E S D U R I N G T H E H O L I D AY S • W I N D O W S 8 D E M O N S T R AT I O N • E M A I L P R I VA C Y / F I L E O W N E R S H I P • MY 5 EMAIL SECURITY TIPS William Mann, Chief Information Officer
  • 2. New Wireless Network in Service A new “cloud based” wireless network is in service. Connecting your mobile devices has never been easier. There are 2 difference SSID’s available. A SSID is the name of a wireless local area network (WLAN). All wireless devices on a WLAN must employ the same SSID in order to communicate with each other. 1. “WC-Wireless” is available to all, including guests in the municipal building. The WAP (wireless access key) for this is 4016106962700. 2. “WC-Staff” will be in service shortly to authorized personnel only. This SSID will provide access to our LAN (local area network). http://tinyurl.com/wcboro2012 William Mann, Chief Information Officer
  • 3. The Borough of West Chester – Public Dropbox Account The Borough of Chester now has a public Dropbox account. This account is available to anyone who would like access to Borough Council meeting agendas and supporting documents. http://tinyurl.com/wcboro2012 William Mann, Chief Information Officer
  • 4. The Borough of West Chester’s official Facebook Page On October 1 we launched our official “Borough of West Chester” Facebook Page. The mission of our Facebook page is to increase the Borough’s presence on the internet and positively interact with out community and visitors. www.facebook.com/WestChesterBorough William Mann, Chief Information Officer
  • 5. The Borough of West Chester’s official Facebook Page Facebook Policy Policy of Behavior • Profanity of any kind shall not be permitted on the webpage. • Statements and comments of a harassing or threatening nature shall not be permitted on the webpage. • Illegal activity of any type shall not be permitted on the webpage. • Comments singling out individual employees in a negative or unprofessional manner shall be removed. • Employees and other parties associated with the Borough of West Chester shall not engage in self-promotion. • Unauthorized photos of Borough of West Chester employees are strictly prohibited. William Mann, Chief Information Officer
  • 6. The Borough of West Chester’s official Facebook Page Facebook Policy Policy of Behavior continued Any statements or comments of the above nature shall be removed immediately upon discovery by any of the Facebook administrators. Borough of West Chester employees involved in any activity of this nature shall be disciplined by the Borough Manager’s office. Persons who engage in any of the activities described in the “policy of behavior” are subject to being banned from the Borough of West Chester Facebook page. Responding to Comments Employees shall not engage in comments without the prior approval of their department manager. Only the original author of a posting shall respond to comments unless another staff member has been authorized by either the author or the department manager. William Mann, Chief Information Officer
  • 7. The Borough of West Chester’s official Facebook Page Facebook Policy Dealing with Criticism One of the greatest fears by some professionals in respect to social media is “the fear of criticism”. Public employees are in the public eye and are supported by the tax payers they serve. Criticism on a professional level must be accepted and anticipated. Criticism on public social media websites of local government services is likely from time to time. If the criticism does not mention individual names of employees and does not violate the “policy of behavior” in Section II the comments shall not be deleted from the website. Should a criticism comment or statement violate the “policy of behavior” in section II the comments shall be removed immediately upon discovery by an administrator and the person making the comment banned from the webpage. Borough of West Chester – Administrative Policy for the Borough of West Chester The “Facebook Team” for the Borough of West Chester includes: Rich Ashenfelder – Department of Recreation – rashenfelder@west-chester.com Judy Benes – Borough Manager’s Office – jbenes@west-chester.com Kathy Brooks – Building & Housing – kbrooks@west-chester.com Meghan Fogarty – Department of Public Works – mfogarty@west-chester.com Jennifer Glick – Department of Finance – jglick@west-chester.com Staci King – Police Department – sking@west-chester.com William Mann – Chief Information Officer – wmann@west-chester.com Hector Mojica – Parking Services – hmojica@west-chester.com Kevin Oakes – Department of Wastewater – koakes@west-chester.com William Mann, Chief Information Officer
  • 8. SkyDrive is Microsoft’s “cloud storage” solution which offers 8 GB of free storage in the cloud. I recommend SkyDrive because it easily connects your documents to Microsoft Office allowing you to work on your files regardless of where you are or what type of device you happen to be using. This will become especially true as Windows 8, followed by the upcoming Office 2013 become widely used. You can sign up for a free account at www.skydrive.live.com. William Mann, Chief Information Officer
  • 9. Keeping Your PC & Your Information Safe During the Holidays
  • 10. Keeping Your PC & Your Information Safe During the Holidays William Mann, Chief Information Officer
  • 11. Keeping Your PC & Your Information Safe During the Holidays 2012 Cyber Monday continues the trend. William Mann, Chief Information Officer
  • 12.
  • 13. Keeping Your PC & Your Information Safe During the Holidays 1. When shopping online only provide your confidential information to secure sites – as identified by starting with “https” or by viewing the padlock icon in the URL. 2. Consider using a credit card for online purchases as compared with a debit card. Credit cards typically carry limitations of liability (if noted within a reasonable period of time) compared with debit cards where inappropriate or unauthorized use may drain your personal checking account. Your credit card may also offer buyer protection for goods not delivered as compared with your debit card provider. 3. When shopping online, use a gift card or one-time use card that is limited in its value to near or at the amount of the purchase.
  • 14. Keeping Your PC & Your Information Safe During the Holidays 4. Be on the lookout for fake (phishing) expeditions where mock websites are pretending to be your financial institution and requesting your personal banking information. 5. When you are using your debit or credit card at the mall or other crowded businesses, be careful of “shoulder surfers” who may be attempting to view your PIN as you type it into the reader. Maintain the anti-virus and anti-adware applications on your personal PC. 6. Be suspicious of on screen advertisements that direct you away from the site and business that you were intending to purchase from. William Mann, Chief Information Officer
  • 15. Keeping Your PC & Your Information Safe During the Holidays 7. When in doubt, call the website contact number listed to help ensure you are doing business with a reputable company. Be wary of emails that you are not expecting – even from your friends, colleagues, and family members that contain a holiday greeting. 8. It is common for fraudsters to use address books of email accounts to resend messages to those in the address book, and these messages typically carry malware that is intended to do harm to your computer or glean personal information. 9. Delete “Chain” emails or greeting card emails which frequently carry malware that may place files on your computer unbeknownst to you that can damage your computer or send files or information to thieves. William Mann, Chief Information Officer
  • 16. Keeping Your PC & Your Information Safe During the Holidays 10. Do not resend chain emails - even special holiday message emails to your friends, colleagues, or family members. Do not open attachments from emails that you are not expecting – even if it says “Ho-Ho-Ho” or another holiday greeting in the subject line. 11. Do not open attachments from emails that you are not expecting – even if it says “Ho-Ho-Ho” or another holiday greeting in the subject line. And finally and the most important of all… please use common sense. If it sounds to good to be true….. It probably is. William Mann, Chief Information Officer
  • 17. Windows 8 Demonstration & Discussion Throughout 2013 you will here allot about the new Windows 8 operating system (OS). Windows 8 comes in 3 flavors. • Windows 8 RT • Windows 8 Pro • Windows 8 Enterprise* * The same as Pro with the exception of Windows Media Center William Mann, Chief Information Officer
  • 18. Windows 8 Demonstration & Discussion Throughout 2013 you will here allot about the new Windows 8 operating system (OS). Windows 8 will operate on the following platforms. • PC • Tablets (RT or Pro) • Smartphones William Mann, Chief Information Officer
  • 19. Know Your Email Risks and Rights The recent FBI General Petraeus Probe is a reminder that email we use is owned, managed and controlled by your employer. Even if you use your personal email on your organization’s equipment it is subject to search and seizure by your employer. All of this information can be used to hold you liable and end, even in your termination. Email messages while not the only thing that took down the top general in the United States government it played a very large part. William Mann, Chief Information Officer
  • 20. 2 Simple Email Rules to Rule Them All I believe that 2 simple email rules will protect you from email trouble with your employer. 1. Never ever send any email message to anyone that you would not say “face to face” to that person. 1. Never ever send any email to anyone that you would not be embarrassed or ashamed of if someone else read it. Did you know? All of the email we send is “discoverable” regardless if it has been deleted or not. All of our email is archived. Once it is sent, it is owned by the Borough of West Chester. William Mann, Chief Information Officer
  • 21. File Ownership The ongoing Pertraeus Probe should be a wake up call to everyone. • Any and all files that you create, edit or store on Borough property is owned by the Borough of West Chester and is subject to discovery. • Personal email that is created or stored on Borough property is subject to discovery. • The destruction or deletion of Borough documents and files is strictly restricted. • Employees may be disciplined or terminated for information resulting from discovery. What is Discovery? Discovery is the technical process of searching email and files. Through this process policy & procedure adherence is reviewed. William Mann, Chief Information Officer
  • 22. My 5 Tips for Email Security While we are talking about email and before we proceed to the next slide let’s take a minute to look at this. William Mann, Chief Information Officer
  • 23. My 5 Tips for Email Security 1. Don’t Write It Down. The first rule of communication is to do it in person if possible and in written form only if necessary. 2. Keep personal and professional communications separate. Email, Instant messages, text and photos that are personal need to be exchanged only using personal accounts & personal hardware. 3. Don’t trust even prominent Cloud providers to protect messages. E-mail services like Google’s are susceptible to hacking and there are well documented cases of users having accounts broken into, emails deleted and unauthorized messages sent. 4. Do not use Facebook as an email or texting service! 5. Remember that your information is only as safe as the recipient’s email or texting service. William Mann, Chief Information Officer
  • 24. Do You Remember When Email was a BIG Deal? William Mann, Chief Information Officer
  • 25. Thank You for Attending. Our next tech training will be in the Spring. In the meantime be sure to check out the West Chester Tech Blog. William Mann, Chief Information Officer