Information Technology Overview Welcome to NC State!

Slides:



Advertisements
Similar presentations
A Reliable and Secure Network TM105: ESTABLISHING SANE TECHNOLOGY POLICIES FOR YOUR PROGRAM.
Advertisements

Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
Financial Services Workshop Margaret Umphrey ECU Information Security Officer March 12, IT Security, East Carolina University.
HIPAA Basic Training for Privacy & Information Security Vanderbilt University Medical Center VUMC HIPAA Website:
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 25 & 27 November 2013.
1 Electronic Information Security – What Researchers Need to Know University of California Office of the President Office of Research May 2005.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
10 Essential Security Measures PA Turnpike Commission.
Page 1 CITS Active Directory Implementation UMass Dartmouth.
Penn State University College Of Education Understanding College of Education Resources.
New Data Regulation Law 201 CMR TJX Video.
Information Security Information Technology and Computing Services Information Technology and Computing Services
Securing Information in the Higher Education Office.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
Otterbein University Welcomes You New Student Information Guide Sep 2010.
IT Security Awareness: Information Security is Everyone’s Business A Guide to Information Technology Security at Northern Virginia Community College.
Learning In A Techno World How Safe is Your Cyberspace?
Using SWHS: The AUP [Acceptable Use Policy]
Staying Safe Online Keep your Information Secure.
Information Technologies and the University Making the Most of Our Abundant Resources.
Information Services Overview An introduction to DePaul’s technology especially for new employees.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
University Health Care Computer Systems Fellows, Residents, & Interns.
TECHNOLOGY GUIDE THREE Protecting Your Information Assets.
Technology Overview Kim Davis Coordinator of Technology Support Services.
California State University, Northridge Certification Process Team B Carlos Guzman John Kramer Stacey LaMotte University of Phoenix.
PLUG IT IN SIX Protecting Your Information Assets.
Data Security Overview. Data Security Periphery –Firewalls –Web Filtering –Intrusion Detection & Prevention Internal –Virus Protection –Anti Spy-ware.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
OCTOBER IS CYBER SECURITY AWARENESS MONTH. October is Cyber Security Awareness Month  Our Cyber Security Awareness Campaign focuses on topics such as.
Common sense solutions to data privacy observed by each employee is the crucial first step toward data security Data Privacy/Data Security Contact IRT.
The Medical College of Georgia HIPAA Privacy Rule Orientation.
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Security on Peer-to-Peer Networks.
Information Technology Nuts and Bolts Presented by Susana Ponte August 19, 2015.
Privacy and Security Challenge Just Browsing Keep out - Private! Pushing IT You sound like a broken record Legal Beagles
BCSD Computer Resources for Students
Payment Card Industry (PCI) Rules and Standards
Information Technology Services (ITS)
Yazoo City Municipal School District Technology Department
Hondros College Student Mail System
UW-Madison Guidelines for Managing the Records of Departing Employees*
INFORMATION TECHNOLOGY NEW USER ORIENTATION
To the ETS – Accounts Setup and Preferences Online Training Course
Student IT induction.
Chapter 6 Application Hardening
Student Monmouth College
Data Compromises: A Tax Practitioners “Nightmare”
Information Security Seminar
BCSD Computer Resources for Students
Acceptable Use Policy.
Education – Partnership – Solutions
Columbus State University
Student IT induction.
Red Flags Rule An Introduction County College of Morris
Welcom e Welcome to BKD! This presentation will show you some of the technology that you’ll be using everyday here in and out of the office.
Technology Resources Welcome to Texas State!.
Part 3.
INFORMATION TECHNOLOGY NEW USER ORIENTATION
Discovering Technology
INFORMATION TECHNOLOGY NEW USER ORIENTATION
To the ETS – Accounts Setup and Preferences Online Training Course
Computer and Network Services and Security
Training 101 : Accessing iBoomerang Tools
MIT Case Study Notes Paul B. Hill
School of Medicine Orientation Information Security Training
Presentation transcript:

Information Technology Overview Welcome to NC State!

NC State New Employee Orientation Distributed Environment Office of Information Technology College Support Departmental

NC State New Employee Orientation Getting Help Campus Wide Resource –515-HELP ( ) –Walk-in Center, West Dunn Building – Administrative, College, and Departmental – Ask your supervisor about IT support preferences

NC State New Employee Orientation Unity ID Everyone gets one, some use it more than others Other IDs should match, passwords will not

NC State New Employee Orientation Passwords Default Unity password Change your password! Password change required at least once a year User Identification and Authentication (UIA) system is used when resetting Administrative and Unity passwords –

NC State New Employee Orientation Computer Accounts Unity Account – services and IMAP file space –personal network file space –Support for personal web pages –Ability to allocate space based on usage: TSS Account –GroupWise and calendaring –Network file space for individual business data –Access to departmental networked file space for business data

NC State New Employee Orientation Other IT Accounts Administrative Application Specific –Most prevalent are HR and FIN systems –Requested via SAR (Security Access Request) Many other accounts in use –College specific –Department specific –Application specific Talk with your department’s IT support to find out what you need.

NC State New Employee Orientation Wireless Connectivity Primarily Convenience Network –Not secure –Not yet campus-wide Guest Access Available Ensure that equipment doesn’t cause problems –Access Points & Wireless Network Equipment –Also cordless phones, surveillance cameras - anything in the 2.4 or 5.8 GHz range could cause interference –AUP (Acceptable Use Policy) gives priority to NCSU wireless data network

NC State New Employee Orientation MyPack Portal mypack.ncsu.edu One-stop source for information and resources for campus community Access with UnityID and Password Requires password change for first access

NC State New Employee Orientation IT Security Anti-virus software Anti-virus, anti-spam mail filtering service (M+ Guardian and Puremessage) Patches Be careful of downloads –Spyware and Adware Beware of ID Theft Don’t give out your Unity password

NC State New Employee Orientation Security Phishing Viruses propagate quickly via Don’t open attachments that seem “strange” or unexpected Don’t open attachments from unknown sources Use common sense

NC State New Employee Orientation Physical Security Counts Protect hardware (workstations, laptops, etc.) Backup critical data Secure media (disks, tapes, etc.) Protect hardcopies of documents Store sensitive data in a secure location (servers) Make use of screensaver passwords

NC State New Employee Orientation Residual Data Web sites leave a trail (history and cookies) Ensure that applications are completely closed Remove data before disposing of hardware –

NC State New Employee Orientation Regulatory Information Campus Policies are on PRR site Use of IT systems are subject to Computer Use Policy and associated Regulations and Rules Peer-to-peer and DMCA FERPA HIPAA GLBA

NC State New Employee Orientation More Regulatory Info… Public Records Law Public Records Retention –You are responsible for keeping copies (electronic or paper) of your work Personnel File Privacy Protection for Social Security Numbers –NC State generates a unique id for all faculty, staff, and students

NC State New Employee Orientation More Regulatory Info… Information Security Acknowledgement Form –Pop-up window displays upon login to the MyPack Portal –Required for access to University data

NC State New Employee Orientation Assistive Technologies Faculty, staff and students should work with the Disability Services Office (DSO) directly Design web pages with accessibility in mind

NC State New Employee Orientation Training OIT provides training for a variety of technologies including administrative applications and an introduction to HR and Financials. College and departmental training NC State Computer Training Unit provides a discount for NC State employees DELTA provides training for faculty and staff engaged in using technology to support instruction.

NC State New Employee Orientation Are you informed to achieve? Do you know who to call for IT issues? Do you have a basic understanding of computer security? Do you have an idea of which regulatory issues you need to ask about? Be sure to ask supervisor for specifics affecting your unit Questions?

Welcome to NCSU! Please make sure you sign the attendance sheet and hand in your NEO evaluation! You’re free!