Download presentation
Presentation is loading. Please wait.
Published byClaribel Evans Modified over 8 years ago
1
1 IT Desktop Management Desktop Computing At CTC June 2006 Prepared by Angela Mars IT Education and Training
2
2 Table of Contents The IT Help Desk page 4 Contacting the IT Help Desk page 5 Information required by the IT Help Desk page 6 Locating the computer’s serial number page 7 HR Computer Usage Policy no. 295 page 9 Internet Use Statistics page 10 Email account and Postini ® Information page 13 Safe email practices page 14 Recommended email etiquette page 15 Outlook Web Access ® page 16 How to create strong passwords page 17 Password tactics page 18
3
3 IT Desktop Management IT Help Desk June 2006 Prepared by Angela Mars IT Education and Training
4
4 Direct all support questions/issues to the IT Help Desk at extension 3103 or by email at help.desk@ctcd.edu. Be sure to visit the Information Technology website at http://www.ctcd.edu/infotech/ctcitd/index.html. The IT Help Desk IT Help Desk Services: ● Access to e-mail and spam filtering services. ● Resetting passwords. ● Questions about desktop products and services. ● Problem resolution with computing and telephone services. ● Moving computers and peripherals. ● Questions about software licenses, purchasing new software, or software upgrades. ● Telecommunications and voice mail inquiries. About the IT Help Desk The IT Help Desk is a customer service entity focused on providing prompt and courteous assistance to the CTC community. It is the first point of contact for information and support of computing and telephone services offered by the CTC IT Division.
5
5 Direct all support questions/issues to the IT Help Desk at extension 3103 or by email at help.desk@ctcd.edu. Be sure to visit the Information Technology website at http://www.ctcd.edu/infotech/ctcitd/index.html. Contacting the IT Help Desk Steps to complete before contacting the IT Help Desk: ● Ensure that the computer and monitor are on. ● Check to make sure all cables are secure. ● Check with others to see if they are experiencing the same problem. ● Make note of when you first noticed the issue. ● Make note of exactly what you were doing before the issue occurred. ● Write down the exact wording from any error messages. ● Remove any disks from your computer before rebooting. ● Reboot your computer. Some issues are fixed by restarting a program or computer system. If possible, be sure to save your work first! ● If you have a problem with a World Wide Web site, check several different websites for the same issue.
6
6 Direct all support questions/issues to the IT Help Desk at extension 3103 or by email at help.desk@ctcd.edu. Be sure to visit the Information Technology website at http://www.ctcd.edu/infotech/ctcitd/index.html. Information Needed By The IT Help Desk Information needed by the IT Help Desk: ● Contact name. ● Department. ● Building and room number. ● Phone number. ● Type of equipment. ● Computer serial number. ● Problem, please be specific and include exact wording of any error messages. ● A service ticket number will be issued. Use the service ticket number when updating information or requesting a status.
7
7 Locating the Computer’s Serial Number To locate your computer’s serial number: 1.Right-click on the My Computer icon. 1.Select Properties. 1.Select the Computer Name tab.
8
8 IT Desktop Management HR Computer Usage Policy no. 295 June 2006 Prepared by Angela Mars IT Education and Training
9
9 HR Computer Usage Policy no. 295 What is HR Computer Usage Policy no. 295? HR Computer Usage Policy no. 295 provides guidelines to protect the College, its computing resources, and employees from liability, harassment, and business interruptions due to inappropriate computer usage. Inappropriate uses: ● Using Emoticons/Wallpaper/Screensavers/Marquee screensavers. ● Listening to Internet radio. ● Using public IM tools and chatting. ● Downloading/installing unauthorized applications. ● Downloading MP3 music and playing/downloading movies to DVD. A copy of the CTC Computer Usage Policy can be found at: http://www.ctcd.edu/infotech/ctcitd/Education/documents/pdfdocs/CTC%20Computer%20Usage%20Guidelines.pdf
10
10 Internet Use Statistics Instant Messaging ● Nearly 80 percent of instant messaging in companies is done over public IM services such as AOL, MSN and Yahoo, exposing companies to security risks. (Radicati, 2003) ● There are more than 43 million users of consumer IM at work. (IDC, 2003) Peer-To-Peer File-Sharing ● Forty-five percent of the executable files downloaded through Kazaa contain malicious code. (Trusecure, 2004) ● A company can be liable for up to $150K per pirated work if it is allowing employees to use the corporate network to download copyrighted material. (RIAA, 2003) General Misuse of the Internet ● One-third of time spent online at work is non-work-related. (Websense, IDC) ● Internet misuse at work is costing American corporations more than $85 billion annually in lost productivity. (Websense, 2003) Hacking ● 75% of companies cited employees as a likely source of hacking attacks. (CSI/FBI, 2003) ● 45% of businesses had reported unauthorized access by insiders. (CSI/FBI, 2003)
11
11 Internet Use Statistics, cont. Pornography ● 70 percent of porn is downloaded between 9am and 5pm. (SexTracker) ● 37 percent of at-work Internet users in the US have visited an X-rated Web site from work. (ComScore Networks, Dec 2003) Spyware ● 1 in 3 companies have detected spyware on their network. (Websense UK Survey, 2003) ● There are more than 7,000 spyware programs. (Aberdeen Group, 2003) Streaming Media ● 77 percent of weekly online listening to Internet Radio takes place between 5 a.m. and 5 p.m. Pacific time. (Arbitron, 2004) ● 44 percent of corporate employees actively use streaming media. (Nielsen NetRatings, 2002) Viruses/Malicious Code ● Although 99% of companies use antivirus software, 82% of them were hit by viruses and worms. (CSI/FBI, 2003) ● The number of malicious code attacks with backdoors, which are often used to steal confidential data, rose nearly 50% in 2003. (Symantec, 2003) http://www.websense.com/global/en/PressRoom/MediaCenter/Research/InternetStatistics/
12
12 IT Desktop Management Email Accounts Postini ® Email Protection June 2006 Prepared by Angela Mars IT Education and Training
13
13 Email Account Information Acquiring email accounts To acquire an email account, the Director or Dean of your Division must send an email request with the following information to the IT Help Desk at help.desk@ctcd.edu.help.desk@ctcd.edu ●Employee’s name ●Employee’s start date ●Position Title ●Department ●Building and Room number ●Phone number ●Supervisor’s name
14
14 Safe Email Practices Safe email habits ● Do not open email if you do not know the sender. Contact the IT Help Desk at extension 3103. ● Do not open attachments if you do not know the sender. If you know the sender and the subject line looks suspicious, contact the sender before opening the attachment. ● Turn off your preview or reading pane. This can be done from your Menu Bar, under View. Some viruses can be activated by simply opening an infected message. ● Use your Symantec ® antivirus software. ● Check IT Service Alerts for security risks.
15
15 Recommended Email Etiquette Electronic Correspondence For The Workplace ● Be professional and courteous. ● Keep messages short and to the point. ● Use a meaningful subject for all messages. ● Do not use personalization, such as, backgrounds, signatures, colored fonts, and quotes. ● Do not type using all capital letters. This is considered SHOUTING and is impolite. ● Respond to messages promptly. ● Get permission from the sender before forwarding email messages.
16
16 Outlook Web Access ® Accessing your email from off-campus through Outlook Web Access ® 1.Open Internet Explorer ®. 1.Go to the CTC website at www.ctcd.edu.www.ctcd.edu 1.Click on the link for Faculty and Staff. 1.Click on the Outlook Web Access ® link. 1.When the login window pops up, type in your email address: john.doe@ctcd.edu. john.doe@ctcd.edu 1.Enter your password. 1.Press OK.
17
17 Strong Passwords How to create strong passwords ● Good passwords are long. A good password should include at least eight characters, more if possible. ● Good passwords are complex. Use upper and lower case characters. Use numbers. Use special characters such as @, #, $,*, and not just one at the end of your password. ● Change your password regularly. When you change your clocks, change your password. At a minimum, passwords should be changed every six months. ● Choose a password you can remember. Choose a phrase that you can remember and substitute characters for the phrase; for example: “I love potatoes and shrimp.” would be - i1Lpsas2.
18
18 Password Tactics Password tactics to avoid ● Do not write your password down. Passwords should not be written down and left near your computer, taped to your monitor, or under your keyboard...especially at work. ● Do not share your password with anyone. If you think someone may know your password, change it immediately. ● Do not use personal information to create a password. Passwords should not be related to information that can be easily guessed if someone knows you. ● Do not use words that can be found in a dictionary. Some password “cracking” programs contain dictionary files that can find dictionary words, including permutations such as password or password1. ● Do not choose the same password for everything. If a hacker guesses your password then they could have access to your online bank accounts, email accounts, etc.
19
19 Postini ® Information About Postini ® SPAM is unsolicited email usually sent by advertising companies to promote their products. The CTC IT Division uses a service developed by Postini ® to filter up to 95% of SPAM from entering the CTC network, however, you may receive an occasional SPAM message in your Inbox. If you do, Postini ® has three recommendations for you: 1.Check your settings in the Junk Email Settings screen at your Postini ® Message Center (click here to visit postini.com). By default, all settings should be set to “Aggressive”.here 2.Review your Approved Mailing List. 3.Forward your spam to Postini ® so they can add the sender to their filter system. Michael Hunter, Forwarding SPAM to Postini, 2006, http://www.ctcd.edu/infotech/ctcitd/Education/Tech%20Tips/email/postini.html
20
20 Postini ® Information How to forward spam to Postini ® : 1.Open a new email message (Ctrl + N) in MS Outlook. 1.Resize your Inbox and New Message windows so they are side by side. 1.Highlight the spam email and drag it from your Inbox to the body of the New Message window. This will create an attachment. Do not forward the spam email or save it to your computer and attempt to add it as an attachment because this may release any spyware attached to the spam email into your computer. 1.In the “To…” field type spam@postini.com. You do not need to type anything into the body of the email. 1.Click “Send”. Michael Hunter, Forwarding SPAM to Postini, 2006, http://www.ctcd.edu/infotech/ctcitd/Education/Tech%20Tips/email/postini.html
21
21 Q&A? Educational Requests: Contact Angela Mars angela.mars@ctcd.edu 254-501-3103 Technical Questions: Contact the IT Help Desk help.desk@ctcd.edu 254-501-3103
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.