Updates from December, 2015 Toggle Comment Threads | Keyboard Shortcuts

  • wpadmin 9:10 am on December 7, 2015 Permalink | Reply  

    Information Technology Services: Did You Know November 2015 

    San Jacinto College

    Information Technology Services

    Did You Know?

    What is:
    Adware, Spyware, and Malware

    How To:
    Save Bookmarks in Mozilla Firefox
    Laptop Care and Laptop Security
     
    What’s New:
    IT Security & Reports
    ITS Patch Management
    Upcoming Changes for ITS Quick Help
     
    Techie Lingo:
    Computer Name

    Technology Facts:
    7 Facts About Cyber Security and Phishing
     

    WHAT IS?

    What is adware, spyware, and malware?
    Security threats are everywhere. The threats we are focusing on this time are the unknowingly installed applications known as adware, spyware, and malware. If you use a computer that has access to the Internet then you are vulnerable to get infected with these kinds of applications. In order to help you, we have provided a brief definition of each.
    Adware is software that generates advertisements such as pop-up windows or hotlinks on web pages that are not part of the actual web page.
    Spyware is software that collects and transmits user specific behavior and information, with or without permission. Sometimes, permission to collect and transmit is assumed to have been given simply by the act of installing software or loading a Web page.
    Malware is short for malicious software. It comes in different forms but its main intent is to cause harm to your computer. The damage can vary. Typical forms of malware are computer viruses and worms.

    How do you get it?
    There are many ways that you can get infected by adware, spyware, and malware. Most infections occur without your direct knowledge.
    It can be installed with another program. Many free programs install some form of spyware. They may or may not tell you that they’re doing this. If they do tell you, they will do so in the license agreement.
    It may be secretly installed when you visit a web site or click a link, especially advertising links or those that say you won something.
    It can be installed by clicking a link provided in a phishing email. For example, click HERE to reactive your email account.  If the email looks suspicious, contact Tech Support immediately.
    Sometimes an e-mail or web site may make you think that you need to download something in order to view what they have to offer. For example, an e-mail may say that someone sent you an electronic greeting card but that you need to download a special viewer to see it, or a web site may say that you need to download a special “media player” to view their site.
    It may pretend to be something essential, helpful, or desirable: Spyware may masquerade as some type of security warning, a “free virus scan,” or even a spyware removal program to get you to click on it.
    OnGuardOnline.gov offers great information on phishing scams and much more. Test your knowledge by playing their Phishing Scams (Game).

    HOW TO:

    Save Bookmarks in Mozilla Firefox

    Firefox Sync, originally branded Mozilla Weave, is a feature that allows Mozilla Firefox users to partially synchronize bookmarks, browsing history, preferences, and so much more. If you use Firefox and save bookmarks, this feature may be beneficial to you as it will allow you to move your bookmarks over the next time there is an update to Firefox on your San Jac issued computer. To learn more about how to create an account and sign in to Sync, please click here.

    Laptop Care

    Employees who have been issued a laptop receive a docking station which allows the laptop to connect to devices such as monitors, keyboards, mice, and network cables in the office. Take care to prevent damage by properly docking and undocking your laptop.

    Here are one-page instructions to learn more:
    Dell E-Port
    Dell E-Port Plus

    Please review the tips below to help maintain your assigned laptop:


    1.     Allow your laptop to receive important updates and security maintenance from ITS.
    ·         Leave your laptop turned on and docked when it’s in the office.
    ·         Turn on and connect your laptop to the internet on a regular basis.
    ·         If the laptop has been turned off for an extended period of time, leave the laptop turned on and connected to the internet for at least an hour after your turn it on next.
    2.     Remember to keep liquids and foods away from your laptop so accidental spills don’t interfere with your laptop usage.
    3.     Laptop display monitors are one of the more sensitive parts prone to breaking or malfunction; handle them accordingly.
    ·         Make sure there are no small items, such as a pen or pencil, on the keyboard when closing the lid.
    ·         Close the lid by gently pressing on the top-center.
    ·         Do not lift the laptop by holding the display.
    ·         Keep all items heavier than a mouse pad off of the laptop, whether open or closed.
    4.     Let your laptop breath so it can perform its best.
    ·         Maintain a clear area around the sides of the laptop to allow proper ventilation.
    ·         Keep the laptop away from dusty environments; the fans inside will become ineffective in cooling down the system.
    ·         Even in normal environments, we recommend submitting a request to Tech Support at least once a year to clean out the internals.

    *Note: In the event that your laptop becomes damaged, contact Tech Support for assistance; we’re here to get your device working again.

    Laptop Security

    Every San Jacinto College employee that is assigned a laptop is responsible for the security of that laptop; this responsibility is heightened when traveling or otherwise away from the office.

    If a College-owned laptop is stolen or lost, the employee assigned to the laptop must immediately contact Campus Police (on-campus) or local police (off-campus), and contact Tech Support at 281.998.6137 (off-campus) x6137 (on-campus) or by email at TechSupport@sjcd.edu.  Provide Tech Support with the police report number, and police department contact information once it is provided; however, do not wait to contact Tech Support if you do not yet have those details.

    Follow these tips to help avoid a security incident:
    ·         Store your laptop in a locked or otherwise secured room.
    ·         Contact Tech Support and verify your computer is up-to-date with virus and firewall protection before traveling.  Public internet access, such as wireless in a coffee shop or even a hotel, is prone to malicious activity.
    ·         Keep your laptop in sight and in possession while in public areas.
    ·         When leaving your laptop unattended in a vehicle is necessary; place it in the trunk, a locked compartment, or otherwise conceal it from view prior to arriving at your destination.
    ·         Travel with your laptop in an inconspicuous bag or backpack properly designed to carry a laptop.
    ·         When storing your laptop in a hotel, use the in-room safe.
    ·         Bring your laptop with you on the plane as a carry-on item; do not check it as luggage.
    ·         Purchase and use an approved security lock for added assurance; however a security lock should not be relied upon as a sole means of physical security.

    WHAT’S NEW:

    IT Security & Reports

    Please visit http://www.sanjac.edu/its to view our two newest pages; IT Security and Reports (Contact Center & ITS Help Desk). There’s a lot of great information on these two pages so please stop by and take a look!

    ITS Patch Management

    Keeping operating systems and software updated is a task that never ends. Software companies like Microsoft, Adobe, and Oracle typically update their products soon after problems are discovered and the software engineers write new code.

    Starting December 1st, ITS will implement a new patch management process to help ensure we maintain a safe and secure computing environment. San Jacinto College employees will begin receiving notifications on their screen that an update patch has been installed on their PC or laptop.

    Once you receive a notification about the software update, you will have the option to click the notification to view additional information. If you click the first notice, you can choose to “reboot now” or postpone it for approximately 9 hours. Ignoring this notification will cause it to reappear again in about 3 hours. At that time, you can choose to “reboot now” or postpone it for approximately 6 hours.  Regardless of the option you select, please make sure you save your work beforehand as the mandatory reboot will occur once the time expires.

    This process is critical to ensuring San Jacinto College work computers are protected and have the latest fixes to known problems and vulnerabilities.

    Upcoming Changes for ITS Quick Help

    Starting Tuesday, January 5th, 2016, Quick Help at South Campus will move from S-6.152 to S-12.214. Also, we are excited to announce that Quick Help will be available at the District Offices starting Thursday, January 7th, 2016. It will be held in A2.201 every Thursday from 12 pm – 4 pm. Central and North Campuses will continue hosting Quick Help in the same rooms they are now. We look forward to seeing you at our new locations in 2016!

    ITS is currently hosting Quick Help Sessions on all three campuses. Techs are available to assist faculty and staff with general IT-related questions. We can assist with questions such as:
    ·        How to enter a service ticket?
    ·        How to obtain media training?
    ·        How to set up Office 365 email on a personal mobile device?
    ·        How to access your San Jac computer remotely?
    ·        How to access and use Tech Support Online?

    Our weekly Quick Help sessions are as follows:
    South
    S-6.152
    Every Tuesday
    12 pm – 4 pm

    Central
    C-1.219
    Every Wednesday
    12 pm – 4 pm

    North
    N-2.207
    Every Thursday
    12 pm – 4 pm

     

    TECHIE LINGO:

    Computer Name
    A computer’s name is a unique identifier that is given to each computer on our network.

    This is what the computer name stands for:
    OS12-227PC001
    O = Office or L for Lab
    S = Campus
    12 = Building
    227 = Room Number
    PC = Computer, LT for Laptop, or MC for Mac
    001 = Station Number

    How can I use my computer’s name?
    When you use the remote desktop connection which allows you to use your office computer from afar either on campus or off campus over the Secure Virtual Private Network or SSL VPN.  Also, when requesting support, Tech Support will need this unique name before we can install software or dispatch personal.

    How do you find my computer’s name (Windows Users)?

    —  Double-click the Computer icon on your desktop
    —  The computer name will be displayed in the lower left corner of the new window on your screen.

    How do you find my computer’s name (Mac Users)?

    —  Click the Apple menu
    —  Next, click System Preferences
    —  Lastly, click Sharing Pane
    —  Your computer name is displayed in the Sharing Pane.

    TECHNOLOGY FACTS:

    7 Facts About Cyber Security and Phishing
    Be it a text from mom, an instant message from a friend or a seemingly harmless email, cybercriminals rely on human nature to get ahold of your financial information through the most common form of cyber attacks – phishing. Because it’s such a pervasive problem, the Department of Homeland Security named October as National Cyber Security Awareness Month to educate the public in all the ways cybercriminals use the names of trusted brands to take advantage of consumers. Understanding the facts about phishing can help change your online habits for the better.

    1.    Phishing Scams Rely on Brand Name Recognition
    In 2013, cyber security studies found that one-third of all phishing attacks are aimed at stealing your money. More than 30 percent of attacks used the names of leading banks, payment systems and online stores, including MasterCard, Visa and American Express. The most common brand name used that year was Amazon.com, with Apple and eBay rounding out the top three.
    2.    Social Networking Sites are at Risk
    Phishing is not limited to email and website pop-ups. Links in online ads, status updates, tweets and Facebook posts can lead you to criminal portals designed to steal your financial information. Forwarded information from friends and family across social networks can also perpetuate dangerous cyber scams. The best way to protect yourself is to avoid clicking on questionable links or entering login or financial information on a website that requires you to navigate to a separate site.
    3.    Beware of Misspelled Domain Names
    Phishing scams tied to brand names often make use of similar web addresses to take advantage of misdirected web traffic. The difference of a single character in an URL can lead you to a website that appears almost identical to a legitimate website for a brand, but it’s actually run by cybercriminals. Pay attention when you transact business online, and keep an eye on your credit report to watch for signs of suspicious activity that could be the work of cybercriminals and thieves.
    4.    Cybercriminals Can Hide Website Addresses
    Hovering your mouse over a link to verify the link’s address before you click on it isn’t a safe way to ensure the link isn’t part of a phishing scam. Cybercriminals can use special programming to hide or change the real address of a website. Be wary of emails with links or attachments that contain no information and consider using http://longul.org/ to expand short links.
    5.    Criminals use Legitimate URL
    Years ago, seeing a website address that began with “HTTPS” almost ensured an authentic website, but that’s no longer the case. Cybercriminals also purchase website security certificates to trick you into thinking that this use of security protocol means the website hosting the phishing scam is legitimate.
    6.    You Can’t Always Spot a Scam At First Sight
    Don’t expect to identify a phishing scam through text riddled with grammar and spelling mistakes. That was a hallmark of old-school cybercriminals. The scammers of today have access to sophisticated phishing tool kits that spell check and clone actual websites – making it harder to identify a scam at first glance. Even if the site or email appears to be from an enterprise you do business with, call their customer support to see if they sent you a message and never send personal information over email.
    7.    Phishing Sites Can Hide from Search Engines
    In an ideal world, search engines could always identify and block phishing sites and associated content. Unfortunately, the phishing tool kits available to cybercriminals can block search engines from recognizing phishing sites, even when a site is a clone of a legitimate brand site.

    Consumers can’t rely on third parties to protect them from these types of scams, but they shouldn’t be paranoid about navigating the web either. Careful browsing, frequent credit checks with a credit bureau and following these tips are some of the best ways to stay safe when navigating the Internet.

    Source: Transunion.com

     

    If you would like to see a topic featured in an upcoming “Did You Know?” publication, please feel free to e-mail Tech Support your suggestions.

    Send Us Feedback

    We look forward to hearing from you!

    TECHNOLOGY SERVICES

    Need to Contact Tech Support? Here’s where you can find us!

    By Phone:
    Off-Campus: 281.998.6137
    On-Campus: x6137

    By Email:
    TechSupport@sjcd.edu

    Online:
    https://techsupport.sanjac.edu
    Hours of Operation
    Monday – Thursday: 7:00 AM to 10:00 PM
    Friday: 7:00 AM to 7:00 PM
    Saturday: 8:00 AM to 5:00 PM (On-Call)
    Sunday: 12:00 PM to 5:00 PM (On-Call)

    For The Latest News and Information
    ITS Blog | Facebook | Twitter


     
  • wpadmin 4:22 pm on December 1, 2015 Permalink | Reply  

    Time to shop! Ceramic Club Fall Sale is on! 

    CeramicFlyer2015fall

     
c
Compose new post
j
Next post/Next comment
k
Previous post/Previous comment
r
Reply
e
Edit
o
Show/Hide comments
t
Go to top
l
Go to login
h
Show/Hide help
shift + esc
Cancel