SlideShare ist ein Scribd-Unternehmen logo
1 von 28
Welcome to the  OIT Help Desk! This sign is designed to give you information that is important to your Computing life!
http://www.onguardonline.gov
1. Protect your personal information. It’s valuable.  To miminize your risk of identity theft, don’t share your personal information unless you know how it will be used and protected.  Don’t reply to or click on links in any email asking for your personal information.
2. Know who you’re dealing with. When shopping online, look for a seller’s physical address and a working telephone number.  Before downloading free software, read the fine print – some downloads come with spyware.
3. Use anti-virus and anti-spyware sofware, as well as a firewall. Update them all regularly; many update automatically.  Look for anti-virus software that removes or quarantines viruses, and for anti-spyware software that can undo changes spyware makes to your system.  Make sure your firewall is on and set up properly.
4. Be sure to set up your operating system and Web browser software properly, and update them regularly. Select security settings high enough to reduce your risk of being hacked.  Make sure to regularly update your system with the latest patches.
5. Protect your passwords. Keep your passwords in a secure place, and don’t share them on the Internet, over email, or on the phone.
6. Back up important files. If you have important files stored on your computer, copy them onto a removable disc, and store it in a safe place.
7. Learn who to contact if something goes wrong online. Visit OnGuardOnline.gov and click on “File a Complaint” to learn how to respond if problems occur when you’re online.
To learn more, visit OnGuardOnline.gov STOP – THINK – CLICK
Central Alert Emergency Notification for  Central Michigan University  is done through  Central Alert Sign up at: https://myaccount.cmich.edu
Blackboard 9 @ CMU! Blackboard 9.0 is scheduled to launch August 14-15, 2010! What’s New in Blackboard 9? ,[object Object]
Integrated Control Panel
Edit Mode Feature
Assignment Improvements
Improved Group Tools
Blogs
Journals
Wikis
My PlacesQuestions? Concerns? Blackboard 9 tutorials are available FaCIT will be offering training sessions for faculty Contact the Help Desk with any questions ,[object Object]
Click to chat: Located on My Bb Home under Tools
E-mail: helpdesk@cmich.edu,[object Object]
Help Desk Hours Monday – Thursday 7:00 am to Midnight Midnight Friday 7:00 am to 7:00 pm 7:00 pm Saturday Noon to 6:00 pm Sunday Noon to Midnight 6:00 pm Midnight
TheCMUMicrosoft Campus Agreement allows university employees, including student employees, to purchase media that will enable them to install specific Microsoft  software for work at home purposes, such as Microsoft Office, Visio and other titles. See one of the Help Desk Consultants for more information!
Find                            on: CMICHHELPDESK CMICH-OIT-Communications www.tinyurl.com/oitblog
CONNECT: CMU Cellular Services NEW! Blackberry Tour Now Available                    Exclusively from CMU - $99 ,[object Object]

Weitere ähnliche Inhalte

Was ist angesagt?

Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@R_Yanus
 
Presentation internet safety & security by idaho web marketing meetup
Presentation   internet safety & security by idaho web marketing meetupPresentation   internet safety & security by idaho web marketing meetup
Presentation internet safety & security by idaho web marketing meetupJason Weaver
 
Et 5083 week 3 assignment - technology safety, security, & filtering traini...
Et 5083   week 3 assignment - technology safety, security, & filtering traini...Et 5083   week 3 assignment - technology safety, security, & filtering traini...
Et 5083 week 3 assignment - technology safety, security, & filtering traini...jsoderst75
 
Cybersafety basics.ppt cs
Cybersafety basics.ppt csCybersafety basics.ppt cs
Cybersafety basics.ppt csVinay Soni
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeAtlantic Training, LLC.
 
Computer safety
Computer safetyComputer safety
Computer safetyahentz
 
Building An Information Security Awareness Program
Building An Information Security Awareness ProgramBuilding An Information Security Awareness Program
Building An Information Security Awareness ProgramBill Gardner
 
Security Awareness 9-10-09 v5 Web Browser
Security Awareness 9-10-09 v5 Web BrowserSecurity Awareness 9-10-09 v5 Web Browser
Security Awareness 9-10-09 v5 Web BrowserCatherine MacAllister
 
New Hire Information Security Awareness
New Hire Information Security AwarenessNew Hire Information Security Awareness
New Hire Information Security Awarenesshubbargf
 
A day that will be remembered
A day that will be rememberedA day that will be remembered
A day that will be rememberedwolverine0614
 
Security Awareness Training: Are We Getting Any Better at Organizational and ...
Security Awareness Training: Are We Getting Any Better at Organizational and ...Security Awareness Training: Are We Getting Any Better at Organizational and ...
Security Awareness Training: Are We Getting Any Better at Organizational and ...Enterprise Management Associates
 
Internet Publication
Internet PublicationInternet Publication
Internet PublicationDré Davis
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingWilliam Mann
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness TrainingDenis kisina
 
Itsa end user 2013
Itsa end user 2013Itsa end user 2013
Itsa end user 2013salleh1n
 

Was ist angesagt? (20)

Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Presentation internet safety & security by idaho web marketing meetup
Presentation   internet safety & security by idaho web marketing meetupPresentation   internet safety & security by idaho web marketing meetup
Presentation internet safety & security by idaho web marketing meetup
 
Basic Security Training for End Users
Basic Security Training for End UsersBasic Security Training for End Users
Basic Security Training for End Users
 
End-User Security Awareness
End-User Security AwarenessEnd-User Security Awareness
End-User Security Awareness
 
Et 5083 week 3 assignment - technology safety, security, & filtering traini...
Et 5083   week 3 assignment - technology safety, security, & filtering traini...Et 5083   week 3 assignment - technology safety, security, & filtering traini...
Et 5083 week 3 assignment - technology safety, security, & filtering traini...
 
Cybersafety basics.ppt cs
Cybersafety basics.ppt csCybersafety basics.ppt cs
Cybersafety basics.ppt cs
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community College
 
Dos and Don'ts of Internet Security
Dos and Don'ts of Internet SecurityDos and Don'ts of Internet Security
Dos and Don'ts of Internet Security
 
Computer safety
Computer safetyComputer safety
Computer safety
 
Building An Information Security Awareness Program
Building An Information Security Awareness ProgramBuilding An Information Security Awareness Program
Building An Information Security Awareness Program
 
Security Awareness 9-10-09 v5 Web Browser
Security Awareness 9-10-09 v5 Web BrowserSecurity Awareness 9-10-09 v5 Web Browser
Security Awareness 9-10-09 v5 Web Browser
 
New Hire Information Security Awareness
New Hire Information Security AwarenessNew Hire Information Security Awareness
New Hire Information Security Awareness
 
Security awareness
Security awarenessSecurity awareness
Security awareness
 
A day that will be remembered
A day that will be rememberedA day that will be remembered
A day that will be remembered
 
Security Awareness Training: Are We Getting Any Better at Organizational and ...
Security Awareness Training: Are We Getting Any Better at Organizational and ...Security Awareness Training: Are We Getting Any Better at Organizational and ...
Security Awareness Training: Are We Getting Any Better at Organizational and ...
 
Internet Publication
Internet PublicationInternet Publication
Internet Publication
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness Training
 
Itsa end user 2013
Itsa end user 2013Itsa end user 2013
Itsa end user 2013
 

Andere mochten auch

Presentación Executive MBA
Presentación Executive MBAPresentación Executive MBA
Presentación Executive MBAUFV-ADEN BS
 
Definición y gestión de modelos de negocio en Internet. Conversion Thursday Z...
Definición y gestión de modelos de negocio en Internet. Conversion Thursday Z...Definición y gestión de modelos de negocio en Internet. Conversion Thursday Z...
Definición y gestión de modelos de negocio en Internet. Conversion Thursday Z...Sandra Navarro Lecina
 
Sr email-awards-2013
Sr email-awards-2013Sr email-awards-2013
Sr email-awards-2013BillMo
 
Evaluación diagnóstica del iems 2011
Evaluación diagnóstica del iems 2011Evaluación diagnóstica del iems 2011
Evaluación diagnóstica del iems 2011consultoreslengua2011
 
Diapositivas "Inteligencia artificial" - Grupo Colaborativo 90169-33 UNAD
Diapositivas "Inteligencia artificial" - Grupo Colaborativo 90169-33 UNADDiapositivas "Inteligencia artificial" - Grupo Colaborativo 90169-33 UNAD
Diapositivas "Inteligencia artificial" - Grupo Colaborativo 90169-33 UNADCACG1974
 
El Equipo Directivo
El Equipo DirectivoEl Equipo Directivo
El Equipo Directivoguestf7310b
 

Andere mochten auch (7)

Estadistica david
Estadistica davidEstadistica david
Estadistica david
 
Presentación Executive MBA
Presentación Executive MBAPresentación Executive MBA
Presentación Executive MBA
 
Definición y gestión de modelos de negocio en Internet. Conversion Thursday Z...
Definición y gestión de modelos de negocio en Internet. Conversion Thursday Z...Definición y gestión de modelos de negocio en Internet. Conversion Thursday Z...
Definición y gestión de modelos de negocio en Internet. Conversion Thursday Z...
 
Sr email-awards-2013
Sr email-awards-2013Sr email-awards-2013
Sr email-awards-2013
 
Evaluación diagnóstica del iems 2011
Evaluación diagnóstica del iems 2011Evaluación diagnóstica del iems 2011
Evaluación diagnóstica del iems 2011
 
Diapositivas "Inteligencia artificial" - Grupo Colaborativo 90169-33 UNAD
Diapositivas "Inteligencia artificial" - Grupo Colaborativo 90169-33 UNADDiapositivas "Inteligencia artificial" - Grupo Colaborativo 90169-33 UNAD
Diapositivas "Inteligencia artificial" - Grupo Colaborativo 90169-33 UNAD
 
El Equipo Directivo
El Equipo DirectivoEl Equipo Directivo
El Equipo Directivo
 

Ähnlich wie Help Desk Signage

TheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptxTheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptxHAYDEECAYDA
 
Securing, Buying, and buying computers 4-H
Securing, Buying, and buying computers 4-HSecuring, Buying, and buying computers 4-H
Securing, Buying, and buying computers 4-Hjmoore55
 
10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.Khalil Jubran
 
Cyber Security Seminar
Cyber Security SeminarCyber Security Seminar
Cyber Security SeminarJeremy Quadri
 
Disaster Planning What Organizations Need To Know To Protect Their Tech
Disaster Planning What Organizations Need To Know To Protect Their TechDisaster Planning What Organizations Need To Know To Protect Their Tech
Disaster Planning What Organizations Need To Know To Protect Their TechTechSoup
 
Slicksheet best practicesforkeepingyourhomenetworksecure
Slicksheet best practicesforkeepingyourhomenetworksecureSlicksheet best practicesforkeepingyourhomenetworksecure
Slicksheet best practicesforkeepingyourhomenetworksecureMargus Meigo
 
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A  ....Salwan public schoolDev Abhijet Gagan Chaitanya VII-A  ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public schoolDevku45
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02amiinaaa
 
Check-Computer-Networks-to-Ensure-Safe-Operation-Johua-2nd.pptx
Check-Computer-Networks-to-Ensure-Safe-Operation-Johua-2nd.pptxCheck-Computer-Networks-to-Ensure-Safe-Operation-Johua-2nd.pptx
Check-Computer-Networks-to-Ensure-Safe-Operation-Johua-2nd.pptxkris harden
 
NCSC_A5_Small_Business_Guide_v4_OCT20.pdf
NCSC_A5_Small_Business_Guide_v4_OCT20.pdfNCSC_A5_Small_Business_Guide_v4_OCT20.pdf
NCSC_A5_Small_Business_Guide_v4_OCT20.pdfPolicypros.co.uk
 
Dairy Womens Network DDs 11/12
Dairy Womens Network DDs 11/12Dairy Womens Network DDs 11/12
Dairy Womens Network DDs 11/12Sue West
 
Cyber pledge infoMagnum
Cyber pledge infoMagnumCyber pledge infoMagnum
Cyber pledge infoMagnumARUN REDDY M
 
An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)Cyber Security Infotech
 
Computer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and StaffComputer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and StaffNicholas Davis
 
Lenovo Presentation for Sys Logic Lunch and Learn
Lenovo Presentation for Sys Logic Lunch and LearnLenovo Presentation for Sys Logic Lunch and Learn
Lenovo Presentation for Sys Logic Lunch and LearnTony DeGonia (LION)
 
Information security for health practitioners
Information security for health practitionersInformation security for health practitioners
Information security for health practitionersDanny Doobay
 
FCC Guidelines on Cyber Security
FCC Guidelines on Cyber SecurityFCC Guidelines on Cyber Security
FCC Guidelines on Cyber SecurityMeg Weber
 
Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Jay Nagar
 
Computrace Laptop Security Solutions
Computrace Laptop Security SolutionsComputrace Laptop Security Solutions
Computrace Laptop Security Solutionsabe8512000
 

Ähnlich wie Help Desk Signage (20)

TheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptxTheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptx
 
Securing, Buying, and buying computers 4-H
Securing, Buying, and buying computers 4-HSecuring, Buying, and buying computers 4-H
Securing, Buying, and buying computers 4-H
 
10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.
 
Cyber Security Seminar
Cyber Security SeminarCyber Security Seminar
Cyber Security Seminar
 
Disaster Planning What Organizations Need To Know To Protect Their Tech
Disaster Planning What Organizations Need To Know To Protect Their TechDisaster Planning What Organizations Need To Know To Protect Their Tech
Disaster Planning What Organizations Need To Know To Protect Their Tech
 
Slicksheet best practicesforkeepingyourhomenetworksecure
Slicksheet best practicesforkeepingyourhomenetworksecureSlicksheet best practicesforkeepingyourhomenetworksecure
Slicksheet best practicesforkeepingyourhomenetworksecure
 
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A  ....Salwan public schoolDev Abhijet Gagan Chaitanya VII-A  ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public school
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
 
Check-Computer-Networks-to-Ensure-Safe-Operation-Johua-2nd.pptx
Check-Computer-Networks-to-Ensure-Safe-Operation-Johua-2nd.pptxCheck-Computer-Networks-to-Ensure-Safe-Operation-Johua-2nd.pptx
Check-Computer-Networks-to-Ensure-Safe-Operation-Johua-2nd.pptx
 
NCSC_A5_Small_Business_Guide_v4_OCT20.pdf
NCSC_A5_Small_Business_Guide_v4_OCT20.pdfNCSC_A5_Small_Business_Guide_v4_OCT20.pdf
NCSC_A5_Small_Business_Guide_v4_OCT20.pdf
 
Dairy Womens Network DDs 11/12
Dairy Womens Network DDs 11/12Dairy Womens Network DDs 11/12
Dairy Womens Network DDs 11/12
 
Cyber pledge infoMagnum
Cyber pledge infoMagnumCyber pledge infoMagnum
Cyber pledge infoMagnum
 
An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)
 
Computer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and StaffComputer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and Staff
 
Lenovo Presentation for Sys Logic Lunch and Learn
Lenovo Presentation for Sys Logic Lunch and LearnLenovo Presentation for Sys Logic Lunch and Learn
Lenovo Presentation for Sys Logic Lunch and Learn
 
Information security for health practitioners
Information security for health practitionersInformation security for health practitioners
Information security for health practitioners
 
FCC Guidelines on Cyber Security
FCC Guidelines on Cyber SecurityFCC Guidelines on Cyber Security
FCC Guidelines on Cyber Security
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual
 
Computrace Laptop Security Solutions
Computrace Laptop Security SolutionsComputrace Laptop Security Solutions
Computrace Laptop Security Solutions
 

Kürzlich hochgeladen

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 

Kürzlich hochgeladen (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 

Help Desk Signage

  • 1. Welcome to the OIT Help Desk! This sign is designed to give you information that is important to your Computing life!
  • 3.
  • 4. 1. Protect your personal information. It’s valuable. To miminize your risk of identity theft, don’t share your personal information unless you know how it will be used and protected. Don’t reply to or click on links in any email asking for your personal information.
  • 5. 2. Know who you’re dealing with. When shopping online, look for a seller’s physical address and a working telephone number. Before downloading free software, read the fine print – some downloads come with spyware.
  • 6. 3. Use anti-virus and anti-spyware sofware, as well as a firewall. Update them all regularly; many update automatically. Look for anti-virus software that removes or quarantines viruses, and for anti-spyware software that can undo changes spyware makes to your system. Make sure your firewall is on and set up properly.
  • 7. 4. Be sure to set up your operating system and Web browser software properly, and update them regularly. Select security settings high enough to reduce your risk of being hacked. Make sure to regularly update your system with the latest patches.
  • 8. 5. Protect your passwords. Keep your passwords in a secure place, and don’t share them on the Internet, over email, or on the phone.
  • 9. 6. Back up important files. If you have important files stored on your computer, copy them onto a removable disc, and store it in a safe place.
  • 10. 7. Learn who to contact if something goes wrong online. Visit OnGuardOnline.gov and click on “File a Complaint” to learn how to respond if problems occur when you’re online.
  • 11. To learn more, visit OnGuardOnline.gov STOP – THINK – CLICK
  • 12. Central Alert Emergency Notification for Central Michigan University is done through Central Alert Sign up at: https://myaccount.cmich.edu
  • 13.
  • 18. Blogs
  • 20. Wikis
  • 21.
  • 22. Click to chat: Located on My Bb Home under Tools
  • 23.
  • 24. Help Desk Hours Monday – Thursday 7:00 am to Midnight Midnight Friday 7:00 am to 7:00 pm 7:00 pm Saturday Noon to 6:00 pm Sunday Noon to Midnight 6:00 pm Midnight
  • 25. TheCMUMicrosoft Campus Agreement allows university employees, including student employees, to purchase media that will enable them to install specific Microsoft software for work at home purposes, such as Microsoft Office, Visio and other titles. See one of the Help Desk Consultants for more information!
  • 26.
  • 27. Find on: CMICHHELPDESK CMICH-OIT-Communications www.tinyurl.com/oitblog
  • 28.
  • 29. Beautiful 2.44-inch high resolution display
  • 30. 3.2MP Camera with image stabilization and flash
  • 31. A micro SD/SDHC card slot supporting up to 16GB of data
  • 32. A full QWERTY keyboard
  • 33. Stereo headset and bluetoothVisit the CMU OIT Telecom Office Lower Level, Woldt Near Woldt Computer Lab
  • 35. Media Services Hours Monday – Thursday 7:30 am to 9:00 pm Friday 7:30 am to 6:00 pm Saturday & Sunday Closed
  • 36.
  • 38. Exclusive SpecialsVisit us on facebook.com/connectcmu 989-774-3087 Lower Level Woldt connect.cmich.edu
  • 40. Maintenance Windows Wednesdays 6:00 pm to Thursday 7:00 am For Production Release Some central IT services May not be available… Wednesdays 3:00 am to 7:00 am For Weekly Maintenance
  • 42. Find on: CMICHHELPDESK CMICH-OIT-Communications www.tinyurl.com/oitblog
  • 43.