Faculty Meeting November 1, 2016 Tim Unten, MBA

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

Lorna Moloney – 30 November  Portable document format -PDF was developed in the early 1990s as a way to share documents, including text formatting.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
#10 Useful Reports Election Eligibility February
BASIC COMPUTER SKILLS Instructional Support Services Isaac and Kaitlin.
Installing SAS 9.3 Raymond R. Balise Health Research and Policy.
Installing SAS 9.3 Raymond R. Balise Health Research and Policy.
Chapter 41 Exploring Windows XP Vol. 1 Part Four – The World Wide Web and Windows XP.
Things Your Mother Never Taught You (that every 6-year old already knows)
Free Software Alternatives: Avast! Anti-virus
Installing New Software Dean Steichen Sept
FIRST COURSE Computer Concepts Internet and Microsoft Office Get to Know Your Computer.
Microsoft Office 2013 ®® Appendix A Introduction to Cloud Computing.
Software Unit 2 – Hardware & Software Technologies 1st ESO – IES Poeta Julián Andúgar Antonio Ruiz Hernández.
Chapter 1: Windows XP. Contents of Desktop Lesson 1 (P.4)
IT Q&A Series Faculty Meeting June 3, 2014 Tim Unten, MBA.
Elite Networking & Consulting Presents: Everything You Wanted To Know About Data Insurance* * But Were Afraid To Ask Elite Networking & Consulting, LLC,
PC Maintenance How to keep your computer healthy.
The Strickland Group Founded in employees Information Technology consulting – Software Development – HelpDesk Support – Network Infrastructure.
IT Q&A Series EMT Meeting Nov 9, 2013 Tim Unten, MBA.
#5 Useful Reports Training Record Report February
September 2015 LCCU Meeting How can you manage the Adobe Flash security risk? How can you keep Flash and other software updated? We’ll answers members’
Homework #2 John Bach IST 110 Section 031 JMB6824 9/15/2012.
Computer Software. In This Presentation You Will Learn 1.The names of some important types of software. 2.Software Vs. Hardware 3.The function of the.
Teacher In-service January 25, 2013 Presented by Kevin Pedersen of.
Useful Reports Certifications Report February
IT Q&A Series Faculty Meeting Nov 5, 2013 Tim Unten, MBA.
Basic Computer Maintenance Clean and Cool Deleting Temporary Files Scandisk Backup Your Data How to run scandisk? Click on Start-Programs-Accessories-
]  Computer News  OneNote  Tip  Your Computer Problems  November meeting 16 th  Anyone Try SkyDrive ??
#7 Useful Reports AUXOP Progress February In order to view AUXDATA reports, you must have a pdf reader program installed on your computer. Adobe’s.
ILT Guide for Students: Using Office Access your s and files CNWL Student Guide on OneDrive & Office 365 In college: Log in on a computer and.
IT Q&A Series Faculty Meeting November 3, 2015 Tim Unten, MBA.
Navigating the Course 1. Course Materials 2 Software: Notepad (or TextEdit on a Mac) – comes with operating system Internet Explorer Web Browser FireFox.
Vulnerabilities in Operating Systems Michael Gaydeski COSC December 2008.
Goals Be able to identify the parts of a URL Determine the safeness of a link Know the best places to find the info you need Know how to deal with toolbars.
Upgrading your PC to the latest Windows operating system.
Remove [Browser Hijackers] For more information regarding [Browser Hijackers] Please Visit:
U3A Computing CMP Class Leader – Brian Moore Week 7 of 10 weeks. Mondays 4:15 to 5:45 pm 11/11/13.
Protecting Against Cyber Attacks PLEASE TAKE A MINUTE TO LOOK AT THIS IMPORTANT MESSAGE. THIS IS HAPPENING HERE AND NOW! LET US SAVE YOU AND YOUR INFORMATION.
Presented by: SBS CyberSecurity © SBS CyberSecurity, LLC
Faculty Meeting October 4, 2016 Tim Unten, MBA
WannaCry/WannaCrypt Ransomware
Welcome to Microsoft Office 365.
Managing Windows Security
How to Install Norton Antivirus in your Computer
If you use Firefox to open or download a Microsoft Word
Partner Chat TROUBLESHOOTING TIPS FOR USING
Faculty Meeting May 3, 2016 Tim Unten, MBA
How to Fi
MICROSOFT OUTLOOK and Outlook service Provider
Cyber Security & IT: What’s Next?
Cyber Security Awareness Workshop
Tablet & O365 Basics.
Trends in Ransomware Distribution
Digital signatures and document or encryption
Microsoft Windows Ver.1.01.
Computer Software.
Encryption Ransomware
Microsoft Office Support Phone Number
Computer Terminology: Software and File Formats
Copyright © 2008 Pearson Prentice Hall. All rights reserved.
4 ways to stay safe online 1. Avoid viruses and phishing scams
DTC Spring Kick-Off January 8th 2015.
Left Click to view the next slide.
You have Flash installed on your computer.
WannaCry Ransomware Overview
Connecting Remotely Winter 2014.
You have Flash installed on your computer.
How to insert the Ringtone Nightmare video clip (
Cybersecurity Simplified: Ransomware
Presentation transcript:

Faculty Meeting November 1, 2016 Tim Unten, MBA IT Q&A Series Faculty Meeting November 1, 2016 Tim Unten, MBA

Task Manager Open Task Manager Close stuck apps (aka Image Name) Ctrl + Alt + Delete > Start Task Manager Right click an empty part of your Taskbar > Start Task Manager Close stuck apps (aka Image Name) Explorer – explorer.exe Word – WINWORD.EXE Excel – EXCEL.EXE PowerPoint – POWERPNT.EXE Outlook – OUTLOOK.EXE Firefox – firefox. exe IE – iexplore.exe Chrome – chrome.exe Adobe Acrobat – Acrobat.exe Click the Image Name > End Process

Task Manager Caution! You may lose data if you use this method. Use only as last resort. If you close explore.exe, your desktop and task bar will disappear. To make them reappear: From the Task Manager, click File > New Task (Run…) > type “explorer” > click OK

Ransomware on the rise What is it? Malicious software designed to encrypt files, or otherwise block access to a computer, until a ransom is paid

Ransomware How do I get it? What can I do to prevent it? Drive by downloads Infected email attachments Messenger apps (infected images) Removable flash drives What can I do to prevent it? Backup, backup, backup! Do not click on suspicious web links, or open email attachments

Ransomware What should I do if I’m a victim? Do not pay the ransom! Doing so doesn’t guarantee that you’ll get your files back, and you’re enabling the criminals to grow their business Check these sites to see if your files can be decrypted for free https://noransom.kaspersky.com/ https://www.nomoreransom.org/

End of Life Software MS Office 2003 End of life 2007 October 10, 2017 2010 October 13, 2020 2013 April 11, 2023 2016 October 14, 2025 2013 (O365) February 2017 2016 (O365) Unannounced 2008 Mac 2011 Mac 2016 Mac Windows End of Life Date XP End of Life Vista April 11, 2017 7 January 14, 2020 8 January 10, 2023 10 October 14, 2025 Adobe Reader/Acrobat End of Life Date 9 End of Life X XI October 15, 2017 DC April 7, 2020

Questions? Submit your IT questions UntenT@dop.hawaii.edu PowerPoint slides will be posted on our website http://blog.hawaii.edu/dop > Resources > IT Tips & Guides Direct Link http://blog.hawaii.edu/dop/resources/it-tips-guides/