And more……. ‘Leadership and communication are inseparable. You can’t have one without the other.’ ---Claude I. Taylor.

Slides:



Advertisements
Similar presentations
Setting up a Gmail Account & Safety
Advertisements

Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
How to protect yourself, your computer, and others on the internet
Basic Communication on the Internet:
Track-able Bulk Management System. Agenda: Why TBMS? Track-able Bulk Management System (TBMS) TBMS Flow Benefits.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
What is Bad ? Spam, Phishing, Scam, Hoax and Malware distributed via
OBJECTIVE: THE STUDENT WILL REVIEW SKILLS ON TELECOMMUNICATIONS & KEYBOARDING –UNIT
COMPUTER BASICS METC 106. The Internet Global group of interconnected networks Originated in 1969 – Department of Defense ARPANet Only text, no graphics.
Unit 11 Communication & Collaboration.  Identify different communication methods  Identify advantages of electronic communication  Identify common.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
Spam and . Spam Spam is unwanted usually meant to sell something to the recipient. If a business or organization with which you are affiliated.
HUNTINGTON BEACH PUBLIC LIBRARY Basics. What is ? short for electronic mail send & receive messages over the internet.
Internet Fraud By: Noelle Woodman.
Scams Stevie's Scam School videos
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Professional Communication in the Workplace Lance Kissler, Marketing & Communications.
ICT Essential Skills. (electronic mail) Snail Mail.
user guide Having a strong password allows other users to struggle to guess. To make a strong password you should use up to 12 letters and 1 or 2.
User Guide Joseph Harris. Open To open an you need to double click on it and the selected should open.
. Open a Click on your inbox and click on a you want to open then it will open.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Information guide.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
SAFETY What to be aware of and how to avoid problems. **This is not meant to make you fearful of . The goal of this discussion is to make sure.
. Open a Click on your inbox and click on a you want to open then it will open.
etiquette Etiquette s always go to any of the following: Staff
Digital Citizenship Project.  The etiquette guidelines that govern behavior when communicating on the internet have become known as netiquette.
By Ciaran carney. ADD COM  Etiquette – Acceptable Use Policy  Use a suitable subject in the - this helps the reader to understand what the message.
NETIQUETTE GUIDELINES FOR DISTANCE EDUCATION COURSES.
Etiquette. It’s about Communication O Reply in a timely fashion O If from teacher, boss, etc. – READ and reply if needed O If from a teammate –
Basics. 2 Professional Development Centre Class Outline Part 1 - Introduction –Explaining –Parts of an address –Types of services.
How to use ? By Martyna Haliniak. How to log on? In order to log on, you have to type in your username & password in the text boxes, and then click.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Etiquette in the Workplace
Santa’s s By Morgan Johnson. Sending an attachment to Santa  Explain how you attached the . Just click attach and click the folder I.
Introduction to Business & Marketing February 24, 2012.
STAYING SAFE: Here are some safety tips when using Change your password regularly and keep it in a safe place. Don’t share your password with anyone.
LIBS100 Etiquette and Hoaxes May 16, 2005 L. Galloway.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
BASIC ETIQUETTE Use the BCC and CC appropriately. 3.
DIAGRAM. View of INBOX Subjectt Date Received From.
tool kit. USER GUIDE Etiquette (Acceptable use policy) – a list of rules that we observe Use a suitable subject in the - this helps.
Santa’s s By Alexander Britton. Sending an .
Professional Communications Mrs. Lopez-Wyatt. Why is etiquette important? We interact more with written word and the number of users and usage rates.
Basics What is ? is short for electronic mail. is a method for sending messages electronically from one computer.
Electronic Mail. Gmail Accounts USERNAME Skyward PASSWORD Same password as you use to log in to your computer.
“ Etiquette” By Keith C. Ivey Presentation by Allison Lange.
Any criminal action perpetrated primarily through the use of a computer.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
FLTCYBERCOM / C10F    U.S. FLEET CYBER COMMAND / U.S. TENTH FLEET    1 Overall Classification of this Briefing is UNCLASSIFIED//FOUO Phishing.
Account & Google Message Center Guide August 2015 Prepared by: Angela Mars IT Education and Training.
Ethical, Safety and other issues when using the Internet Displays a knowledge of networking in terms of user- access Demonstrates responsible.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Account & Google Message Center Guide August 2015 Prepared by: Angela Mars IT Education and Training.
Learn how to protect yourself against common attacks
Lesson 3 Safe Computing.
Unit 11 Communication & Collaboration
What to be aware of and how to avoid problems.
Unit 4 IT Security.
Protect Your Computer Against Harmful Attacks!
Electronic Mail Opening Activity: 411 of
Electronic Mail.
9 ways to avoid viruses and spyware
Professional Communications
Communication Etiquette
Setting up a Gmail Account & Safety Kamlesh Singh Bisht IT Specialist.
What is Phishing? Pronounced “Fishing”
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

And more……

‘Leadership and communication are inseparable. You can’t have one without the other.’ ---Claude I. Taylor

General Etiquette Rules ALL CAPS IS CONSIDERED SHOUTING So is over punctuating!!!!!! Not using capitalization or punctuation makes hard to read Text messaging abbreviations r confusing 2 ur co- workers Avoid emoticons Explain Acronyms Check spelling and grammar before sending Keep slang at a minimum

Think of these before you hit send Needed (Does the recipient need this to do their job) Timely Relevant Complete Appropriate Compliant (e-discovery) Professional Inoffensive Targeted Limit use of Reply to all Limit use of CC/BC Use Distribution Lists Carefully Best Channel

Format your s We need to test the upgrade before we proceed with the pilot in Pediatric Otolaryngology. Does the project have the funding to purchase a couple of the hardware upgrades so I can test with in this area? I can provide you a quote from Insight for the upgrade. I need to verify that it works as advertised before we advertise that we can do this for all devices.

Paragraphs and bullets clarify We need to test the upgrade before we proceed with the pilot in Pediatric Otolaryngology. Does the project have the funding to purchase a couple of the hardware upgrades so I can test with in this area? I will 1. provide you a quote from Insight for the upgrade 2. verify that it works as advertised before mass deployment

Building better s Strengthen the Subject Sculpt the body

Strengthen the Subject Use Keywords in Subject line Action: Prepare slides for Leadership Breakfast on June 17 Info: Update on Etiquette Presentation Confirmed: Presentation will be ready for review on June 6 th Delivery: Slide pack for June 17 th Leadership Breakfast Entire message in subject line June 17 th Leadership Breakfast Slides looks good (eom)

Sculpt the Body Break message into sections Action summary – What is the point of the Background – Detail, but organize into Key points Definitions If audience is in the know do not go into complete history Close – Next steps or actions items If you include attachments give explanation of what they are.

Rules 3 Volley Rule If a topic is bounced back and forth more than 3 times it is time to pick up the phone or schedule a meeting. 24 Hour Rule It is okay to write a heated , just wait 24 hours before you send it.

The Noise Daily approximately 180 billion s are sent An estimated 100 billion of these s may be unsolicited Unwanted Phishing Appear to be from legitimate site, businesses Request personal or financial information Only work if you click or respond, best to just delete Spam Ads and scams Replying or unsubscribing validates your address for more spam Do not reply, delete Virus Installed software without knowledge or consent Computer use monitored and controlled You must click or open program to infect

Why? What is the point of these s? Money - #1 reason Selling information on black market Health Care – approximately $50 per account Credit Cards – approximately $2-3 per account Who is behind this? Average hackers/scammers Organized criminals

Wording to make you feel that you have to comply or you cannot access your money. Leaves no way to contact someone to verify authenticity. No specific time to comply

When you hover over links you see that they don’t go to where you expect them.

Never open an attachment from someone you do not know.

Support groups will never ask for you to send you user id and password via

Who to contact? Address to knowReport abusive s to Incidents to Questions to Security Web Portalhttp://portal.wusm.wustl.edu/mscits/informationsecurity

Future Topics How to protect information? Safe computing for home and your children? Electr0nic Discovery?