Title: New Employee Orientation Information Technology Overview
1New Employee OrientationInformation
Technology Overview
University Services
2Agenda
- What systems does the central U of M support and
where can I get help? - What systems does my department support and where
can I get help? - How do I log on to my desktop?
- How do I keep my computer and U of M data secure?
- Keep your passwords secure
- Keep your email secure
- Protect your computer from viruses
- Keep U of M private data secure
- Keep U of M laptops secure
- Protect yourself from Internet Fraud
- U of M Security Policies
- Software and hardware discounts for U of M staff
3U of M IT Structure
If you are unsure who to contact with a question,
begin with your departmental IT personnel.
4How can I get support on my departmental systems?
Call U of M 1-Help for questions on central
systems.
5What systems does the central U of M support
(OIT)?
- There are a number of applications that you may
use in your job that are not supported by your
departmental IS area, but are supported by the
central University (OIT). - Internet Accounts (x.500)
- CUFS (U of M general ledger will be replaced by
PeopleSoft in the future) - PeopleSoft (Student registration and Payroll)
- Voice Mail
6How can I get support on central U of M systems
(OIT)?
7How can I get support on central U of M systems
(OIT)?
8How can I get support on central U of M systems
(OIT)?
9How can I get support on central U of M systems
(OIT)?
10How can I get support on central U of M systems?
11Where can I get training on UMCal?
12How do I schedule a U Services conference room in
UMCal?
- Refer to the UMCal Basics handout for information
on how to schedule a U Services resource
(conference room) using UMCal. - Please cancel a conference room reservation if
you your meeting is cancelled or rescheduled.
13How can I get Email training?
14How can I get Voicemail Training?
15How can I get Desktop Application Training?
16Your U of M Desktop
- Your desktop is used to carry out your job
responsibilities as an employee of the U of M and
U Services. - Your desktop allows you to launch applications
that you need to do your job.
17How do I log in to my desktop?Auxiliary
Services/FM/CPPM/U Services
You must log in to Novell each day in order to
access your files and network applications. Your
Novell username and password are supplied by your
area tech department.
18Changing your Novell Password
You will be prompted to change your password when
it expires
19Changing your Novell Password
Enter your new password at the prompts.
20Trouble logging in to Novell?
Verify that the Workstation only box is not
checked. If this is checked, you are not logging
in to the network.
21How do I log in to my desktop?EHS/DPS
You must log in to Windows Domain (Active
Directory) each day in order to access your files
and network applications. Your Windows Domain
username and password are supplied by your area
tech department.
22Changing your Windows Domain passwordEHS/DPS
You will be prompted to change your password when
it expires
23Why is Desktop Security So Important?
- In a February 13, 2006 Wall Street Journal
article on computer security it was stated that
most security incidents are caused by a lack of
common sense or a lack of awareness of the risk.
Users need to understand their roles and
responsibilities.
24How do I keep my computer secure?
- Log off completely at the end of the day.
- Lock your screen by pressing CTRL/ALT/Delete/Enter
if you are leaving your desk for more than a few
minutes. - Ensure that only technical personnel in your
department work on your desktop.
25How do I keep my computer secure?
- Make sure your desktop is physically secured.
- NEVER plug your home computer/laptop into the U
of Ms network without the consent of your
departmental IT staff.
26Keep your passwords secure
- Your passwords are the key to your computer and
your data. - Have a strategy for creating a password,
remembering and changing it. - Do not share your password with anyone under any
circumstances.
27Keep your passwords secure (Cont.)
- Keep passwords in a locked location, not taped to
your computer! - Refer to OIT Systems Security Guidelines for help
in choosing a password http//www1.umn.edu/oi
t/security/passwordguide.html - Test the strength of your password by entering it
into Microsofts Password Checker
http//www.microsoft.com/athome/security/privacy/p
assword_checker.mspx
28Keep your email secure
- Do not use a non-University provided email
account to send University-related information as
they are not appropriate or secure. Only
xxx.umn.edu addresses are supported by OIT and
centrally administered email servers. - Never open an email attachment from an unknown
source.
29Protect your computer from viruses
- Do not download free software or games.
- Do not click on e-cards unless it the sender is
someone you know. If the sender lists a friend
or a family member do not open it. Friends and
family do not send anonymous postcards.
30Keep U of M private data secure (see handout)
- Know the meaning of the term private data and
what it means to protect it. Legally, private
data includes social security number, private
health information, date of birth (handout) - Do not store U of M private data on a laptop. A
laptop computer or other portable device such as
a Personal Digital Assistant (PDA) is very
susceptible to loss and theft. Staff should
assume that these devices can be lost or stolen.
This data should be stored on a secure server.
31Keep U of M private data secure (Cont.)
- Do not store U of M legally private data on your
home computer or laptop unless supported by U of
M technical staff. - Know the U of M policy on the Acceptable Use of
Information Technology. This policy outlines the
uses and associated behaviors that are acceptable
when using U of M technology (Handout).
32Keep U of M laptops secure
- If you have a U of M owned laptop, you must take
responsibility to keep it physically secured.
Laptops should NEVER be left unsecured in your
office. A laptop security lock is another way to
further detect theft. Locks may be purchased
through Techmart or the U of M Bookstores. - If a laptop is stolen, notify your manager and
your area IT Help Desk. They will file a police
report and notify OIT Security. This is in
accordance with the reporting procedures that are
defined in the USIS Security of Sensitive Data
policy (handout).
33Protect Yourself From Internet Fraud
We need to always be especially aware of scams
and potential fraudulent activity on the
internet. According to the 2005 Federal Trade
Commission Report, 59 of every 100,000
Minnesotans reported identity thefts last year.
Threats from the internet change rapidly.
34 Phishing Scams
Phishing is an identity theft scam that uses
fraudulent e-mails and web sites to entice
recipients into divulging personal information
(e.g., credit card numbers, passwords or social
security numbers). An email is sent requesting
that the recipient access a fake website (which
will usually be a replica of a trusted site) and
enter their personal details, including security
access codes.
35Phishing Scams (Cont.)
To see examples of recent Phishing scams, go
to http//www.millersmiles.co.uk/index.php
36Phishing Scams (Cont.)
- Be suspicious of any email with urgent requests
for personal financial information. - Avoid completing forms in email messages that ask
for personal financial information. - Dont use the links in an email to get to any web
page if you suspect the message might not be
authentic. Call the company or log onto the web
site directly by typing the address into your
browser.
37Phishing Scams (Cont.)
- If a U of M department is being impersonated by
the phishing scam, forward the email to
abuse_at_umn.edu along with a note about your
suspicions. - If another organization or company is the target,
send a copy of the email to the Federal Trade
Commission at http//www.consumer.gov/idtheft - Contact your departments Help Line if you have
any questions about suspicious emails.
38Spear Fishing
Spear Fishing is a newer identity theft tactic
that uses e-mails to target a specific
organization. In this case, the email is likely
to appear to be sent from within the recipients
own organization (e.g., a user within umn.edu)
and generally from someone in a position of
authority. In some cases, it is simply the
subject that can lure users, as in recent
phishing emails with the subject of President
Dead that attempts to shock the user into
opening it and clicking on the links.
39Pharming
Pharming uses email links to redirect
recipients to forged Web sites instead of
legitimate sites. Clicking on a link within an
email is always risky unless you know who sent it.
40Protect your home computer
- If you use your home computer to access U of M
systems, it is important to keep your computer
secure and to regularly patch and update your
software as needed.
41U of M Safe Computing Web Site
httpwww.safecomputing.umn.edu
- Security News
- Instructions on how to secure a personal machine
- Instructions for what to do if your computer is
infected with a virus - FREE Symantec AntiVirus for home use for all
staff and students
42Examples of what can be accessed from home
- UMCal
- Remote access to Email
- U of M Web Sites
- Dial up access (free)
- Voice Mail
- Departmental systems (use secure VPN client if
remote departmental system access is necessary)
43U of M Security Policies
- OIT Security has a number of important security
policies that may affect you. All employees must
comply with the Acceptable Use of Information
Resources policy. These polices are located at - http//www1.umn.edu/oit/policies/index.html
- Your department may also have their own security
polices that are aligned with these OIT Security
policies. Contact your departments technical
personnel if you have any questions on any of
these policies.
44Software and hardware purchases for U of M staff
- U of M faculty and staff are eligible to purchase
computer software and hardware at reduced prices
45Summary Questions
- Use your U of M internet password to access
personnel information and UMCal. - ? True ? False
- If I am having trouble logging into the network
in my department, I should call OIT (1-Help). - ? True ? False
- As long as I know that an email came from my
bank, I can respond to a request for information
using the link. - ? True ? False
46Summary Questions
- I am responsible, along with technical staff in
my department, for keeping my desktop secure. - ? True ? False
- It is OK to store private data on a laptop as
long as I lock it up when I am not using it. - ? True ? False
- If a laptop is stolen, you should report it
directly to the U of M police. - ? True ? False