Presentation is loading. Please wait.

Presentation is loading. Please wait.

New Employee IT Orientation

Similar presentations


Presentation on theme: "New Employee IT Orientation"— Presentation transcript:

1 New Employee IT Orientation

2 Password Policy, Social Engineering, & Internet Usage
Security Password Policy, Social Engineering, & Internet Usage

3 Why enforce a strong password policy?
All IEWC users log on to their local computer and to remote computers by using a combination of their user name and a password typed at the keyboard. Although alternative technologies for authentication, such as biometrics, smartcards, and one-time passwords, are available for all popular operating systems, most organizations still rely on traditional passwords and will continue to do so for years to come. Therefore it is very important that our organizations defines and enforces password policies for our computers that include mandating the use of strong passwords. Strong passwords meet a number of requirements for complexity - including length and character categories - that make passwords more difficult for attackers to determine. Establishing strong password policies for our organization can help prevent attackers from impersonating users and can thereby help prevent the loss, exposure, or corruption of sensitive information.

4 IEWC’s Password Policy
Domain, Office365, Barracuda, & Citrix Policy Selected Rule Comments Enforce password history 24 passwords remembered Prevents users from reusing passwords. Maximum password age 90 days The length of time before you are required to change passwords. Minimum password age 1 day Prevents users from cycling through their password history to reuse passwords. Minimum password length 8 characters Sets minimum password length. Password must meet complexity requirements Enabled Contain characters from three of the following four categories: English uppercase characters (A through Z) English lowercase characters (a through z) Base 10 digits (0 through 9) Non-alphabetic characters (for example, $, #, %)

5 Social Engineering Social engineering is the practice of obtaining confidential information by manipulation of legitimate users. A social engineer will commonly use the telephone or Internet to trick a person into revealing sensitive information or getting them to do something that is against typical policies. By this method, social engineers exploit the natural tendency of a person to trust his or her word, rather than exploiting computer security holes. It is generally agreed upon that “users are the weak link” in security and this principle is what makes social engineering possible. To learn more about how to detect Social Engineering attempts, click here.

6 Internet should be used for business purposes only.
Internet Usage Most streaming music and video services are blocked to prevent bandwidth degradation. File downloads are blocked to prevent malicious files from being downloaded accidentally. If a site that you browse to is blocked, you will see the message in the picture below. If a file download is blocked, you might be given the option to continue with the download if you trust it’s source. If you need a site unblocked, please contact IT via Support Request. Internet should be used for business purposes only.

7 Network Drives

8 (H:) Drive vs. (I:) Drive
The (H:) drive is your own personal network storage space. No one else can access your personal files and folders saved there. It’s best practice to save all of your vital files here, because the (H:) drive is backed up twice a day. In the case that your physical hard drive (the (C:) drive) fails, your files will not be jeopardized if you saved them to the network. IEWC (I:) Drive The (I:) drive is a public network storage area organized by regional location. Anyone within IEWC can view the drive. The (I:) drive can be used to share, and collaborate on files with internal employees. The (I:) drive is also backed up twice a day. There are other network drives specific to roles/departments. All network drives are accessible via Citrix, as well as from home (IEWC laptop) via Microsoft DirectAccess.

9 Applications & Communication Options

10 MS Outlook Key Points

11 In an effort to keep signatures authentic and uniform; IEWC employee’s signatures are controlled via Group Policy by a program named Exclaimer. You will not be able to edit your own signature. If you need your job title edited, it must be approved by HR first. Please contact IT via Support Request for any other signature changes. You will not be able to see what your signature looks like while composing messages, but you can trust that it will be added to the end of your message. Your signature will be visible to you in reply messages if you look through the thread. Inbound and outbound file attachments may be limited to 50MB. Compressed file attachments via are blocked inbound and outbound. These include but are not limited to: .exe, .mpeg, .wmv, and .zip should be used for business purposes only. For help on how to use Outlook , click here.

12 If you are currently setup for dial-in conferencing you would have received an from Microsoft online services notifying you of your new conference number, conference ID and PIN.     If this is an feature you feel you need or could use to increase collaboration please submit a support request to obtain a license to dial-in conferencing.  Remember you do not need dial-in conferencing to make a 1 to 1 call via skype for business or a 1 to 1 call over the phone.  This add-on is only for providing a conference bridge to have multiple people call in over the phone. Click here for Skype for Business training videos. Formerly known as:

13 IEWC Webmail: https://outlook. office365
IEWC Webmail: Username: Full IEWC address Password: the same password that you use to log onto your computer

14 Barracuda Mail Archiver: https://archiver. iewc. com/cgi-mod/index
Barracuda Mail Archiver: Username: first initial and last name (minus Password: the same password that you use to log onto your computer To learn how to use the Barracuda Mail Archiver, click here.

15 To access the Microsoft Home Use Program Web site: 1. Go to http://hup
To access the Microsoft Home Use Program Web site: 1. Go to 2. Select the country to which you want your order to be shipped to and choose the language for viewing the order Website. 3. Enter your corporate address and insert the following program code E32181BC5B Note: This program code is assigned to our organization for our sole use in accessing this site. You may not share this number with anyone outside our organization. 4. Place your order online, and it will be shipped to the location you have chosen. Please note that a fulfillment fee will be charged to cover packaging, shipping, and handling costs. We trust you will enjoy this benefit and look forward to your participation.

16 RightFax Your fax number is the last four digits of your office phone number, plus 500. For example: Office Number: Fax Number: Inbound fax messages automatically go to your Outlook inbox; outbound fax messages can be sent from any of the office copiers.

17 Citrix: https://apps. iewc
Citrix: Username: first initial and last name (minus Password: the same password that you use to log onto your computer You can access all corporate resources via Citrix, minus Skype for Business and the AX Suite.

18 SAP Basics Your SAP username will follow the same naming convention as usernames for other systems. (First initial followed by last name) Your SAP password(s) are separate from all other IEWC systems.

19 Cisco IP Phone Click here for guides. Cisco IP Phone

20 Cisco Voicemail Setup & Access

21 Cisco IP Phone Action Flow

22 IT Hardware Policy Click here to view the Hardware and Equipment Distribution Policies on SharePoint

23 Need Technical Support?
Enter a support request on TheWire Dial HELP (4357) from your desk phone


Download ppt "New Employee IT Orientation"

Similar presentations


Ads by Google