Arizona Association of School Business Officials Hot Technology Topics John Moreno MIS Director Pendergast School District.

Slides:



Advertisements
Similar presentations
PayPal Phishing Example. Can you tell which is real? 1. 2.
Advertisements

The INTERNET.
Cyber Stalking Cyber Stalking Phishing Hacker 1. Never reveal your home address !!! This rule is especially important for women who are business professionals.
Employee Self Service (ESS) Registration
Sterling Heights Public Library Agenda n We’ll learn how to “clean up” the computers n We’ll review how SLC’s mail system works n We’ll review SpamLion.
Unit 11 Communication & Collaboration.  Identify different communication methods  Identify advantages of electronic communication  Identify common.
2014 Farm Bill: Section Plant Pest and Disease Management and Disaster Prevention FY15 Process: Submitting a Suggestion.
A guide to protecting your money and your identity KEEPING MONEY SAFE Keeping money safe Money Works: Level 1 Topic 3.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
How to set-up your lunch payment for St. Johnsbury Academy Go to: Select Register for Free Account.
Spam and . Spam Spam is unwanted usually meant to sell something to the recipient. If a business or organization with which you are affiliated.
Annual Safety & Security Briefing - 9/22/04 Teresa Downey – SLAC Computer Security Group & SCS Applications Group.
RSD Student Using Your .
Basics: Getting Started Uploading and Sharing Videos on YouTube. Basics: Getting Started Uploading and Sharing Videos on YouTube. 1.
Surrey Libraries Computer Learning Centres Totally New to Computers Easy Gmail September 2013 Easy Gmail Teaching Script.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Security Issues: Phishing, Pharming, and Spam
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Over 3,000 computers are affected monthly by Malware and Phishing.
User Account Administration
. Open a Click on your inbox and click on a you want to open then it will open.
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
etiquette Etiquette s always go to any of the following: Staff
Scams & Schemes Common Sense Media.
INTERNET SAFETY Tips for becoming a “surfer” dude!
Microsoft Outlook 2007 Basics Distance Learning (860) 343 – 5756 Chapman 633/632 Middlesex Community College Visit
SurplusSurplus Surplus Forum January 8, SurplusSurplus Changes at Surplus Presented by Margaret Chambers, Director.
Arizona Association of School Business Officials 52 nd Annual Summer Conference Does IP Telephony Make Sense in Schools or Your School? John Moreno Technology.
 Click “Learn More”  Then Click “Sign up”  Then Click “Sign up”
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
14 – 19 Area Prospectus Pilot Meeting 7 January 2009.
WEST VIRGINIA UNIVERSITY Office of Information Technology OFFICE 365 INFORMATION SESSION.
How to Log-in to EPIC for the First Time. to FY 2015 Form 471 Authorized Signer Looks Like:
Chapter 7 Phishing, Pharming, and Spam. Phishing Phishing is a criminal activity using computer security techniques. Phishers try to acquire information.
Survey Scams Sam Roberts. What is a Survey Scam?  A scam where someone asks you to fill out a survey answering personal question, business questions,
Outlook 2003 Rules Creating/Modifing Rules Junk By sender By receipient By Subject By John Marcus – Presentation.
SCAMS & SCHEMES PROTECTING YOUR IDENTITY. SCAMS WHAT IS A SCAM? ATTEMPT TO TRICK SOMEONE, USUALLY WITH THE INTENTION OF STEALING MONEY OR PRIVATE INFORMATION.
Project Scenario # 3 Daniel Gomez. I am the Information Systems Security Manager at Western Technical College. A virus has penetrated the network firewall.
And more……. ‘Leadership and communication are inseparable. You can’t have one without the other.’ ---Claude I. Taylor.
How to Create an Address How to Create a Free Account, Read and Answer your s. Yahoo! provides FREE . To create a free .
Mozilla. Why mozilla Main Components Browser features Loads very quickly Personal toolbar with your locations Can turn off pop-up windows good control.
Activity 4 Catching Phish. Fishing If I went fishing what would I be doing? On the Internet fishing (phishing) is similar!
SANSUEB SOFTWARE PRESENTS SkyTextMsg – Online Texting for your Business.
Santa’s s By Alexander Britton. Sending an .
PGES Participant Roster District Web Administrator Instructions User Permission –Instructions for setting up access by District WAAPOC 1.
Advanced Guide to ing. Introduction In this guide you and explain will learn how to use ing in an advanced way. I will go through on.
How to manage your s Tips and tricks. Use Folders Folders are used to manage files in your hard disk drive. Similarly you can create folders in your.
Catching Phish. If I went fishing what would I be doing? On the Internet fishing (phishing) is similar! On the internet people might want to get your.
 77.4% of the perpetrators are male.  50% live in one of the following states: California, New York, Florida, Texas, and Washington.  55.4% complainants.
Phishing, identity theft, and more
Identity theft vector of the electronic age
Welcome to DCISD Technology
Hotmail Tech Support phone number Ireland.
Welcome To Outlook Support Number
Welcome To Hotmail Support Number
Call Outlook customer support toll free number Ireland.
Outlook Technical Support Number Ireland
Accounting Services New York bulltaxaccountants.com.
Yahoo customer care number usa
Welcome to Yahoo Technical Support. Get Unlimited Technical Support for Yahoo Users
How To Use As Another Account On Gmail
Fastmail Password Recovery. Customer Service Number: For more details visit this link:
Presentation Title here
Create Links to STAT!Ref for your Web site

If I’d only known then what I know now about phishing…
Batch Parties Changes.
Management Suite v2.0 DoubleCheck Manager Management Suite v2.0.
Bell Ringer How can you protect your self online?
MyLion Registration Website | Mobile device
Presentation transcript:

Arizona Association of School Business Officials Hot Technology Topics John Moreno MIS Director Pendergast School District

Welcome Hot Topics –SPAM –Preventative Maintenance –UPS Systems –Patch Management System Agenda

SPAM, Not just for Any More How many ways through Technology do can we get SPAM? Do you know any of the addresses the SPAM comes from? The ID’s get created as quickly as you can setup and ID. POPUP ADS POP-UNDER ADS wicked cousins of spam eCards Cell phone spam Fax machine spam

Notes on SPAM It's estimated 12.4 billion pieces of spam are sent out every day. That junk mail accounts for around 40 percent of all . – ArID=128567&SecID=2http:// ArID=128567&SecID=2 Tsunami relief scams hit the Web FBI says to look out for spam messages offering to locate loved ones, collect money for relief aid. January 7, 2005: 3:36 PM EST NEW YORK (CNN/Money) – It was only a matter of time before fraudsters saw fit to capitalize on the tsunami disaster that killed more than 150,000 people, and the FBI said Friday that time has come. – ami_scams/?cnn=yeshttp://money.cnn.com/2005/01/07/technology/tsun ami_scams/?cnn=yes

Notes on SPAM (URL Links on SPAM) You are better off not replying to an and asking them to remove you from their list.

Preventative Maintenance What does this mean? How often? What systems? Did you know that this process is now being required for various Systems?

UPS Systems Do you have these systems? Helps protect your systems from Power surges, Rolling brown outs, etc. Go with someone reliable.

Patch Management Systems What is this? Who needs it? This is the next step. Explore your options before acting.

Thank You ! Q & A John Moreno Technology Director Contact Info