Nurse Emoji: Seal with our own emoticon

Let's Get Technical and Cyber Security Savvy: 

Cyber SCAM Alert

Commitment to spreading awareness and education about cybersecurity and hacking prevention.

How to Avoid Getting Hacked: Best Practices for Online Security

1. Use strong, unique passwords: Avoid using easily guessable information like names, birthdays, or common words.

 2. Enable two-factor authentication (2FA): Add an extra layer of security to your accounts by requiring a second form of verification.

 3. Keep software up-to-date: Regularly update your operating system, browser, and other software to ensure you have the latest security patches.

4. Be cautious with links and attachments: Avoid clicking on suspicious links or opening attachments from unknown sources.

5. Use a reputable antivirus program: Install and regularly update antivirus software to protect against malware.

6. Use a VPN: Consider using a virtual private network (VPN) to encrypt your internet connection.

7. Monitor your accounts: Regularly check your financial and online accounts for suspicious activity.

8. Use a password manager: Consider using a password manager to securely store and generate strong passwords.

9. Log out of public computers: Always log out of public computers and devices to prevent unauthorized access.

10. Stay informed: Stay up-to-date with the latest online security threats and best practices.

Best Practices for Online Security:

1. Use a secure browser: Use a reputable and up-to-date web browser that has built-in security features.

 2. Use encryption: Use encryption to protect sensitive data, such as financial information or personal identifiable information.

 3. Use a firewall: Enable the firewall on your computer and network to block unauthorized access. 4. Regularly back up data: Regularly back up your important data to prevent loss in case of a security breach.

5. Use a secure search engine: Use a search engine that doesn't track your personal information.

6. Be cautious with public Wi-Fi: Avoid using public Wi-Fi for sensitive activities, such as online banking or shopping.

7. Use a reputable cloud storage: Use a reputable cloud storage service that has robust security features.

8. Dispose of sensitive information properly: Properly dispose of sensitive information, such as shredding documents or wiping devices.

9. Use a secure messaging app: Use a secure messaging app that has end-to-end encryption.

10. Stay vigilant: Stay vigilant and monitor your online activities to detect potential security threats.

 

Cyber CounterAttack (CCA):How to terminate your hackers

Dealing with hackers can be stressful. If someone you love or you get hacked, here's a step-by-step guide to help you navigate the situation:

1. Stay calm: It's essential to remain calm and think clearly to handle the situation effectively.

2. Contain the damage: Immediately change passwords for all accounts that may be compromised. Use strong, unique passwords and enable two-factor authentication (2FA) if available.

3. Assess the situation: Determine the extent of the hack and gather information about the compromised accounts or data.

4. Report the incident: Inform your email or social media platform's support team and file a complaint with the Federal Trade Commission (FTC) or your local authorities.

5. Run a virus scan: Perform a thorough scan of your device with an anti-virus program to detect and remove any malware.

6. Monitor accounts: Keep a close eye on your financial and online accounts for suspicious activity.

7. Consider a password manager: Use a reputable password manager to securely store and generate strong passwords.

8. Stay informed: Keep your operating system, browser, and software up-to-date to ensure you have the latest security patches.

9. Seek support: Reach out to a trusted friend, family member, or professional for emotional support and guidance.

10. Learn and grow: Take this opportunity to educate yourself and others about online security best practices to prevent future hacking attempts. Remember, being proactive and swift in responding to a hack can minimize potential harm. If you need further assistance or guidance, feel free to ask!

 

Myrna D Santos,

With AI Support

Fear not the Internet. Conquer it!

Things to know:

  • Play with the mouse.
  • You will never mess up the internet.
  • Be safe, read before you click.

 Learn how to hold your mouse. It is a pointer of whatever is available for display to you by the particular website. The pointer will display like a hand with the pointer/index finger. Wherever you see this hand, you may then click on it to see the message.

 

Tips for friendly viewing of our website

  • For proper viewing and display of our graphics and contents you must have Internet Explorer Version 7.
  • Click on either the Menu above (Home, About Us.......) or the Sitemap below on the left bottom part of this page for easy location of the page you want to see.

On links and linkages:

  • Make sure you turn off the link page when done and/or click on the back arrow on the left uppermost side of the screen to go back to The Nursing Office.

BEYOND EMAILS

 

Integrating Outlook and SharePoint: The Dynamic Duo
Your total work center solution

These two paragons of productivity in the Microsoft® Office® solution suite offer amazing workflow benefits by themselves. Together, Outlook and SharePoint (2010 and 2013) can be a total work center solution.

Whether your challenge is calendar management across teams… editing shared documents offline… or making sure the team stays informed of important communications (no matter who gets the original email), this dynamic duo is your answer.

Integrating Outlook and SharePoint: The Dynamic Duo and discover how much more useful SharePoint can be by integrating it with Outlook.
You’ll learn how to:

  • Manage team calendars from either SharePoint or Outlook
  • Set up a team site mailbox to make sure everyone stays informed
  • Have a workflow in SharePoint create a task that shows up in Outlook
  • Manage offline editing by connecting SharePoint lists and libraries
  • Work with team-shared contacts where you need them, while maintaining them where everyone can access them

 

HOW TO FORWARD E-MAIL PROPERLY
Do you really know how to forward e-mails?

50% of us do; 50% DO NOT.


Do you wonder why you get viruses or junk mail? Do you hate it?

Every time you forward an e-mail there is information left over from the people who got the message before you, namely their e-mail addresses & names.  As the messages get forwarded along, the list of addresses builds, and builds, and builds, and all it takes is for some poor person to get a virus, and his or her computer can send that virus to every e-mail address that has come across his or her computer.  Or, someone can take all of those addresses and sell them or send junk mail to them in the hopes that you will go to the site and he will make five cents for each hit.  That's right, all of that inconvenience over a nickel!

How do you stop it?  7 easy steps:

(1) When you forward an e-mail, DELETE all of the other addresses that appear in the body of the message (at the top).  !  That's right, DELETE them.  Highlight them and delete them, backspace them, cut them, whatever it is you know how to do.  It only takes a second You MUST click the 'Forward' button first and then you will have full editing capabilities against the body and headers of the message.  
! If you don't click on 'Forward' first, you won't be able to edit the message at all.

(2) Whenever you send an e-mail to more than one person, do NOT use the To: or Cc: fields for adding e-mail addresses. Always use the BCC: (blind carbon copy) field for listing the e-mail addresses.  This is the way the people you send to will only see their own e-mail address.  If you don't see your BCC: option click on where it says To: and your address list will appear.  Highlight the address and choose BCC: and! that's it, it's that easy.
 When you send to BCC: your message will automatically say 'Undisclosed Recipients' in the 'TO:' field of the people who receive it.

(3) Remove any ‘FW:' in the subject line. You can rename the subject if you wish or even fix spelling.


(4)
ALWAYS hit your Forward button from the actual e-mail you are reading.  Ever get those e-mails that you have to open 10 pages to read the one page with the information on it?  By Forwarding from the actual page you wish someone to view; you stop them from having to open many e-mails just to see what you sent.

(5) Have you ever gotten an e-mail that is a petition?  It states a position and asks you to add your name and address and to forward it to 10 or 15 people or your entire address book.  The e-mail can be forwarded on and on and can collect thousands of names and e-mail addresses.  A FACT: The completed petition is actually worth a couple of bucks to a professional spammer because of the wealth of valid names and e-mail addresses contained therein.  If you want to support the petition, send it as your own personal letter to the intended recipient.  Your position may carry more weight as a personal letter than a laundry list of names and e-mail address on a petition.  (Actually, if you think about it, who's supposed to send the petition in to whatever cause it supports?)
 


(6) One of the main ones I hate is the ones that say that something like, 'Send this e-mail to 10 people and you'll see something great run across your screen.'  Or, sometimes they'll just tease you by saying something really cute will happen. It's not going to happen.(Trust me, I'm still seeing some of the same ones that I waited on 10 years ago!) I don't let the bad luck ones scare me either, they get trashed.


(7) Before you forward an Amber Alert, or a Virus Alert, or some of the other ones floating around nowadays, check them out before you foward  them.  Most of them are junk mail that's been circling the net for YEARS! Just about everything you receive in an e-mail that is in question can be checked out at Snopes. Just go to
http://www.snopes.com/

It’s really easy to find out if it's real or not.  If it's not, please don't pass it on.


So please, in the future, let's stop the junk mail and the viruses.


 

Got junk mails?

 Check them up as well!

 

Nowadays, while we are thinking of internet safety, Spam blockers and tighter email filtering can cause important emails to go to waste. It is necessary to check your junk mail folder for emails coming even from people in your address book. Check the source and sender; you might recognize your safe contacts as well.

 

We need to look at the hidden treasure in junk mails, of course with all the precautions. They come in all forms. Know the signs of a junk mail.  Don’t let important emails go to waste! After then, you may empty your junk folder to erase them and start with a clean, empty file.

 

Computer Literacy Assistance Clinic

 

  • Introduction/Basic Computer Know-How
  • Outlook, Emails, Searches
  • Excel

E-Mail Etiquette

Email etiquette refers to the principles of behavior that one should use when writing or answering email messages. Because email is less personal than a phone or in-person conversation but quicker to send than a letter, it is possible for serious breaches of manners to take place.

What is the definition of email etiquette? | Reference.com

https://www.reference.com/technology/definition-email-etiquette-c9b0f917cb8bc8e