Secure Telework Essentials
This PDF has great guidance on secure remote work for executives, IT professionals and other teleworkers:
This PDF has great guidance on secure remote work for executives, IT professionals and other teleworkers:
USING THE HTML (WEB BROWSER) HORIZON CLIENT TO CONNECT:
*Note: USB redirection is not supported in the HTML (WEB BROWSER) version.
USING THE VMWARE HORIZON (SOFTWARE) CLIENT:
*Note: This will allow you mount a USB through redirection.
As of Tuesday, March 31, 2020 all NEIT faculty have been assigned a Pro Zoom Account.
Please check your email for an invitation from Zoom to complete the process, please use your NEIT email password for the Zoom account.
However, DOTS is in the process of adding our Zoom Account into our Single Sign-on system. There may be interruptions in service until that process is complete. This process will be completed before the start of the term on May 4th. If you have any problems completing your account, please contact the Help Desk to resolve your problem.
Also, in light of our upcoming widespread use of Zoom for remote learning and recent issues that have arisen from the use of the platform (mainly zoom bombing), we have implemented the following settings in Zoom and locked them from being changed.
From Danny Mariscal, Zoom
I wanted to send a quick note with some updated resources for students, teachers, faculty, and staff, as we know many of our Education customers are continuing to leverage Zoom in a virtual learning environment.
We offer several Zoom Education Webinar sessions each week with a live host to answer your questions, and focus on the following topics:
We also have the following short videos to help teachers get up and running with Zoom:
Best,
Danny Mariscal
Here also is the link to a YouTube channel a faculty member sent to us:
Cisco Jabber is an app for your mobile phone which allows you to place and receive phone calls on your NEIT phone extension from anywhere. You do not have to be near your desk phone to use Jabber. Once you have performed the steps below, use Jabber to place and receive calls as if you were sitting at your desk.
Login credentials:
THIS IS THE SAME USERNAME YOU USE TO LOGON TO YOUR COMPUTER AT WORK. USUALLY THIS IS <first initial><last name>. Example: [email protected]
Calls made from within Jabber will display your name to the recipient, but no phone number will be displayed. To make an outgoing call to the public, tap the phone icon and then select Keypad. Your call will show to the recipient like this:
We know that working from home can be new to some of you, perhaps overwhelming as you adjust to your new environment. One of our goals is to enable you to work as securely as possible from home. Below are five simple steps to working securely. The best part is all of these steps not only help secure your work, but they will make you and your family far more safe as you create a cybersecure home.
1) YOU
First and foremost, technology alone cannot fully protect you – you are the best defense. Attackers have learned that the easiest way to get what they want is to target you, rather than your computer or other devices. If they want your password, work data or control of your computer, they’ll attempt to trick you into giving it to them, often by creating a sense of urgency. For example, they can call you pretending to be Microsoft technical support and claim that your computer is infected. Or perhaps they send you an email warning that a package could not be delivered, fooling you into clicking on a malicious link. The most common indicators of a social engineering attack include:
ULTIMATELY, THE BEST DEFENSE AGAINST THESE ATTACKS IS YOU.
2) HOME NETWORK
Almost every home network starts with a wireless (often called Wi-Fi) network. This is what enables all of your devices to connect to the Internet. Most home wireless networks are controlled by your Internet router or a separate, dedicated wireless access point. Both work in the same way: by broadcasting wireless signals to which home devices connect. This means securing your wireless network is a key part of protecting your home. We recommend the following steps to secure it:
NOT SURE HOW TO DO THESE STEPS?
Ask your Internet Service Provider, check their website, check the documentation that came with your wireless access point, or refer to the vendor’s website.
3) PASSWORDS
unique passphrase means using a different one for each device or online account. This way if one passphrase is compromised, all of your other accounts and devices are still safe.
CAN’T REMEMBER ALL THOSE PASSPHRASES?
Use a password manager, which is a specialized program that securely stores all your passphrases in an encrypted format (and has lots of other great features, too!). Finally, enable two-step verification (also called two-factor or multi-factor authentication) whenever possible. It uses your password, but also adds a second step, such as a code sent to your smartphone or an app that generates the code for you. Two-step verification is probably the most important step you can take to protect your online accounts and it’s much easier than you may think.
4) UPDATES
Cyber attackers are constantly looking for new vulnerabilities in the software your devices use. When they discover vulnerabilities, they use special programs to exploit them and hack into the devices you are using. Meanwhile, the companies that created the software for these devices are hard at work fixing them by releasing updates. By ensuring your computers and mobile devices install these updates promptly, you make it much harder for someone to hack you. To stay current, simply enable automatic updating whenever possible. This rule applies to almost any technology connected to a network, including not only your work devices but Internet-connected TV’s, baby monitors, security cameras, home routers, gaming consoles or even your car.
MAKE SURE EACH OF YOUR COMPUTERS, MOBILE DEVICES, PROGRAMS AND APPS ARE RUNNING THE LATEST VERSION OF ITS SOFTWARE.
5) KIDS & GUESTS
Something you most likely don’t have to worry about at the office is children, guests or other family members using your work laptop or other work devices.
MAKE SURE FAMILY AND FRIENDS UNDERSTAND THEY CANNOT USE YOUR WORK DEVICES.
They can accidentally erase or modify information, or, perhaps even worse, accidentally infect the device.
![]()
ALSO REMEMBER
Using a mobile device
1. Download and install the app on your mobile device. When you receive prompts to allow access to your microphone and camera, select Allow.
2. Sign on with your NEIT email address and password.
3. Click the New Meeting button at the bottom of your screen to create a meeting.
4. Enter a title and select participants, as well as a start and end time.
5. Tap Done to send the invitation.
6. All participants will receive an email invitation.
7. They can tap Open to access the meeting.
Using a Computer
1) Go to https://portal.office.com Logon with your NEIT email address and password.
2) Click the icon for Teams.
3) Click Calendar in the left navigation bar.
4) Click New Meeting on the top right side of the screen.
5) Give your meeting a title and then tab down to Add Required Attendees. Start typing the names of the people you want to add to the meeting. As you type, names that match will pop up. Select the correct recipients.
6) Select a date and time for the meeting, and type in any details you would like to add. Then click Send on the top right side of the window.
7) All recipients will receive a meeting invitation with a link like the following:
8) To join the meeting, click the link to open your browser. If you see a prompt that says “Open Microsoft Teams?” click “Open Microsoft Teams”.
9) If you do not have Microsoft Teams already installed on your computer, you will then be prompted to either download the Windows app or join on the web. For fastest connection, click Join on the Web.
10) If you have a microphone and/or camera, you will be prompted to allow Teams to use them. Click Allow. If you do not have a microphone, you will not be able to participate in the conversation. (Most laptops have built-in microphones. Many desktops do not.)
11) You will be prompted to enter your name. Enter your name and click Join Now.
12) Once in the meeting, you can share your screen, chat with the other meeting attendees, and those with microphones can speak to each other.
13) When meeting is completed, click the phone icon to hang up.
You can forward your NEIT phone to a home or cell phone in two ways:
From the Phone
1. If you are physically in front of the phone, press the Fwd All button.
2. Enter the 11 digit phone number.
3. To remove forwarding, press Fwd Off.
Setting Call Forwarding Remotely
1. Connect remotely to the NEIT network using the instructions we have provided. Some of you will be on your NEIT desktop, others may be working from a laptop. The instructions are the same either way.
2. Once you are securely connected to NEIT, open a browser and go to https://ucm-pub.neit.cbts-ehcs.com/ucmuser/
3. Logon with your Windows username and password.
4. Select Call Forwarding on the left sidebar.
5. Check the box, select Add a New Number and enter the 11 digit phone number or you may forward to voicemail. Click Save.
6. To remove forwarding, uncheck the box and click Save.
Instructions for Blocking Caller ID
To block your number from being displayed temporarily for a specific call:
1. Enter *67.
2. Enter the number you wish to call (including area code).
3. Tap Call. The words “Private,” “Anonymous,” or some other indicator will appear on the recipient’s phone instead of your mobile number.
To hide your number on an iPhone
1. Go to Settings 2. Tap ‘Phone‘ 3. Press Show My Caller ID 4. Use the toggle switch to show or hide your number
Note: Verizon Wireless does not allow this feature.
To hide your number on an Android device
1. Open the Phone app
2. Open the Menu
3. Select Settings
4. Click on Call settings
5. Click on Additional settings
6. Click on Caller ID
7. Choose “Hide number” and your number will be hidden
8. Choose “Show number” or “Network default” to resume showing your number
Most NEIT services are available from off campus with an internet connection. These break down into two large categories:
Before implementing any of these remote measures:
You can access these public and private cloud services are available at https://technet.neit.edu
Other cloud services with direct links
The following Microsoft Services and Applications are available at https://portal.office.com
Services that reside on NEIT’s network require that you establish a secure connection to access them. If you have a laptop that you take home, Tech Services is available to assist. If you have a desktop computer on campus, we can provide you with a secure connection to your desktop from any web browser. https://dots.neit.edu/connecting-to-your-neit-desktop-from-home/
NEIT resources that require a secure connection to the campus network:
Please refrain from printing documents that contain sensitive information, if you have to, please save them in a secure location until you return to campus and are able to discard them appropriately – DO NOT PUT THEM IN YOUR RECYCLE BIN or household trash….and please refrain from saving sensitive information on your home computer’s hard drive – save to your OneDrive.