Working Remotely

/Working Remotely

Transferring Data Using VMWare Horizon

USING THE HTML (WEB BROWSER) HORIZON CLIENT TO CONNECT:

*Note: USB redirection is not supported in the HTML (WEB BROWSER) version.

  • Expand the menu on the left-hand pane
  • Select Transfer Files
  • Drag and Drop or Upload desired data.

 

USING THE VMWARE HORIZON (SOFTWARE) CLIENT:

*Note: This will allow you mount a USB through redirection.

  • Select “Connect USB Device”

 

2020-05-21T14:54:28-04:00April 9th, 2020|Working Remotely|

Zoom Resources

As of Tuesday, March 31, 2020 all NEIT faculty have been assigned a Pro Zoom Account.

Please check your email for an invitation from Zoom to complete the process, please use your NEIT email password for the Zoom account.

However, DOTS is in the process of adding our Zoom Account into our Single Sign-on system.  There may be interruptions in service until that process is complete.  This process will be completed before the start of the term on May 4th.  If you have any problems completing your account, please contact the Help Desk to resolve your problem.

Also, in light of our upcoming widespread use of Zoom for remote learning and recent issues that have arisen from the use of the platform (mainly zoom bombing), we have implemented the following settings in Zoom and locked them from being changed.

  • Local recording is now disabled.  Hosts can still perform cloud based recordings of meetings.  Participants will not be able to records meetings.
  • Participants are muted by default.  Hosts can control the ability of participants to unmute.
  • Participant’s names will no longer be shown in recordings.
  • Allow host to temporarily remove an attendee from the meeting.
  • Other users cannot take control of another user’s camera during a meeting.

From Danny Mariscal, Zoom

I wanted to send a quick note with some updated resources for students, teachers, faculty, and staff, as we know many of our Education customers are continuing to leverage Zoom in a virtual learning environment.

We offer several Zoom Education Webinar sessions each week with a live host to answer your questions, and focus on the following topics:

  • How to download Zoom applications and join a Zoom meeting
  • How to schedule a meeting and send out invitations
  • In-meeting controls and differentiation tools (including the waiting room, share screen, breakout rooms)

We also have the following short videos to help teachers get up and running with Zoom:

Best,
Danny Mariscal

Here also is the link to a YouTube channel a faculty member sent to us:

Teacher Training – Zoom meetings

2020-05-21T13:24:50-04:00April 1st, 2020|Working Remotely|

Configuring Your Mobile Phone with Jabber

Cisco Jabber is an app for your mobile phone which allows you to place and receive phone calls on your NEIT phone extension from anywhere. You do not have to be near your desk phone to use Jabber. Once you have performed the steps below, use Jabber to place and receive calls as if you were sitting at your desk.

  1. If you already have Jabber installed on your mobile device, you will have to uninstall it before performing the remaining steps.
  2. Go to the App Store (iPhone) or Play Store (Android) to install Cisco Jabber.
    • After you install it, DO NOT OPEN IT OR ATTEMPT TO LOGON!
  3. Click on the link below from your mobile phone.

https://cbts-ehcs-media-dist.s3.amazonaws.com/Customer25/index.html?AWSAccessKeyId=AKIAIV3OBN5RPQGI3ROQ&Expires=1741638407&Signature=O1T0LrMEioJt2RcP7T%2F5cu2Bmcs%3D

  1. Click on the appropriate Jabber Provisioning on the page that comes up.
  2. ACCEPT any popups. Jabber should launch and point to the NEIT phone service.

Login credentials:

  • Username : <username>@neit.cbts-ehcs.com

THIS IS THE SAME USERNAME YOU USE TO LOGON TO YOUR COMPUTER AT WORK. USUALLY THIS IS <first initial><last name>. Example: [email protected]

  • Password : Your NEIT EMAIL/Windows
  1. Once you are logged on, use the Contacts icon to search for a NEIT user with a phone. Type in the person’s name and when it appears, tap the name. If the person has Jabber enabled, Jabber will display Available. If not, it will display Either way, you can tap the phone on the top right and dial the person’s 4-digit extension. The phone will ring at their desk and if they have configured Jabber, it will also ring on their mobile phone.
  2. You can also chat with anyone who is Available using the Chats icon.

 

Calls made from within Jabber will display your name to the recipient, but no phone number will be displayed. To make an outgoing call to the public, tap the phone icon and then select Keypad. Your call will show to the recipient like this:

2020-05-21T13:59:54-04:00March 31st, 2020|Working Remotely|

Top 5 Steps to Work Securely from Home

TOP 5 STEPS TO SECURELY WORK FROM HOME

We know that working from home can be new to some of you, perhaps overwhelming as you adjust to your new environment. One of our goals is to enable you to work as securely as possible from home. Below are five simple steps to working securely. The best part is all of these steps not only help secure your work, but they will make you and your family far more safe as you create a cybersecure home.

1) YOU

First and foremost, technology alone cannot fully protect you – you are the best defense. Attackers have learned that the easiest way to get what they want is to target you, rather than your computer or other devices. If they want your password, work data or control of your computer, they’ll attempt to trick you into giving it to them, often by creating a sense of urgency. For example, they can call you pretending to be Microsoft technical support and claim that your computer is infected. Or perhaps they send you an email warning that a package could not be delivered, fooling you into clicking on a malicious link. The most common indicators of a social engineering attack include:

  • Someone creating a tremendous sense of urgency, often through fear, intimidation, a crisis or an important deadline.
  • Pressure to bypass or ignore security policies or procedures, or an offer too good to be true (no, you did not win the lottery!).
  • A message from a friend or co-worker in which the signature, tone of voice or wording does not sound like them.

ULTIMATELY, THE BEST DEFENSE AGAINST THESE ATTACKS IS YOU.

2) HOME NETWORK

Almost every home network starts with a wireless (often called Wi-Fi) network. This is what enables all of your devices to connect to the Internet. Most home wireless networks are controlled by your Internet router or a separate, dedicated wireless access point. Both work in the same way: by broadcasting wireless signals to which home devices connect. This means securing your wireless network is a key part of protecting your home. We recommend the following steps to secure it:

  • Change the default administrator password: The administrator account is what allows you to configure the settings for your wireless network. An attacker can easily discover the default password that the manufacturer has provided.
  • Allow only people that you trust: Do this by enabling strong security so that only people you trust can connect to your wireless network. Strong security will require a password for anyone to connect to your wireless network. It will encrypt their activity once they are connected.
  • Make passwords strong: The passwords people use to connect to your wireless network must be strong and different from the administrator password. Remember, you only need to enter the password once for each of your devices, as they store and remember the password.

NOT SURE HOW TO DO THESE STEPS? 

Ask your Internet Service Provider, check their website, check the documentation that came with your wireless access point, or refer to the vendor’s website.

3) PASSWORDS

unique passphrase means using a different one for each device or online account. This way if one passphrase is compromised, all of your other accounts and devices are still safe.

CAN’T REMEMBER ALL THOSE PASSPHRASES?

Use a password manager, which is a specialized program that securely stores all your passphrases in an encrypted format (and has lots of other great features, too!). Finally, enable two-step verification (also called two-factor or multi-factor authentication) whenever possible. It uses your password, but also adds a second step, such as a code sent to your smartphone or an app that generates the code for you. Two-step verification is probably the most important step you can take to protect your online accounts and it’s much easier than you may think.

4) UPDATES

Cyber attackers are constantly looking for new vulnerabilities in the software your devices use. When they discover vulnerabilities, they use special programs to exploit them and hack into the devices you are using. Meanwhile, the companies that created the software for these devices are hard at work fixing them by releasing updates. By ensuring your computers and mobile devices install these updates promptly, you make it much harder for someone to hack you. To stay current, simply enable automatic updating whenever possible. This rule applies to almost any technology connected to a network, including not only your work devices but Internet-connected TV’s, baby monitors, security cameras, home routers, gaming consoles or even your car.

MAKE SURE EACH OF YOUR COMPUTERS, MOBILE DEVICES, PROGRAMS AND APPS ARE RUNNING THE LATEST VERSION OF ITS SOFTWARE.

5) KIDS & GUESTS

Something you most likely don’t have to worry about at the office is children, guests or other family members using your work laptop or other work devices.

MAKE SURE FAMILY AND FRIENDS UNDERSTAND THEY CANNOT USE YOUR WORK DEVICES.

They can accidentally erase or modify information, or, perhaps even worse, accidentally infect the device.

ALSO REMEMBER

  • Voice control devices including Google Home, Amazon, Apple, etc should be disabled/removed from the home work area for privacy reasons.  Staff should remove them if you are having Call/Video meetings. Faculty should remove them when teaching over collaborative technologies.
  • Any hard copies of documents should be secured from family and friends just like work devices.  If using a shared, family computer then no documents/logins/passwords should not be saved at all.
  • If using a camera, ensure you are in a private area where no personal/private items are in view or where family/friends will not normally enter into view of the camera.  When possible/available, blur the background.
2020-05-21T15:03:49-04:00March 30th, 2020|Cybersecurity Tips, Working Remotely|

Using Microsoft Teams for Conferences and Meetings

Using a mobile device
1. Download and install the app on your mobile device. When you receive prompts to allow access to your microphone and camera, select Allow.
2. Sign on with your NEIT email address and password.
3. Click the New Meeting button at the bottom of your screen to create a meeting.

4. Enter a title and select participants, as well as a start and end time.

5. Tap Done to send the invitation.
6. All participants will receive an email invitation.
7. They can tap Open to access the meeting.

Using a Computer
1) Go to https://portal.office.com Logon with your NEIT email address and password.
2) Click the icon for Teams.

3) Click Calendar in the left navigation bar.

4) Click New Meeting on the top right side of the screen.

5) Give your meeting a title and then tab down to Add Required Attendees. Start typing the names of the people you want to add to the meeting. As you type, names that match will pop up. Select the correct recipients.
6) Select a date and time for the meeting, and type in any details you would like to add. Then click Send on the top right side of the window.
7) All recipients will receive a meeting invitation with a link like the following:

8) To join the meeting, click the link to open your browser. If you see a prompt that says “Open Microsoft Teams?” click “Open Microsoft Teams”.
9) If you do not have Microsoft Teams already installed on your computer, you will then be prompted to either download the Windows app or join on the web. For fastest connection, click Join on the Web.
10) If you have a microphone and/or camera, you will be prompted to allow Teams to use them. Click Allow. If you do not have a microphone, you will not be able to participate in the conversation. (Most laptops have built-in microphones. Many desktops do not.)
11) You will be prompted to enter your name. Enter your name and click Join Now.

12) Once in the meeting, you can share your screen, chat with the other meeting attendees, and those with microphones can speak to each other.

13) When meeting is completed, click the phone icon to hang up.

2020-05-21T13:57:53-04:00March 18th, 2020|Working Remotely|

Forward Office Phone to Personal Phone

You can forward your NEIT phone to a home or cell phone in two ways:

From the Phone
1. If you are physically in front of the phone, press the Fwd All button.


2. Enter the 11 digit phone number.
3. To remove forwarding, press Fwd Off.

Setting Call Forwarding Remotely

1. Connect remotely to the NEIT network using the instructions we have provided. Some of you will be on your NEIT desktop, others may be working from a laptop. The instructions are the same either way.
2. Once you are securely connected to NEIT, open a browser and go to https://ucm-pub.neit.cbts-ehcs.com/ucmuser/
3. Logon with your Windows username and password.
4. Select Call Forwarding on the left sidebar.

5. Check the box, select Add a New Number and enter the 11 digit phone number or you may forward to voicemail. Click Save.
6. To remove forwarding, uncheck the box and click Save.

Instructions for Blocking Caller ID
To block your number from being displayed temporarily for a specific call:
1. Enter *67.
2. Enter the number you wish to call (including area code).
3. Tap Call. The words “Private,” “Anonymous,” or some other indicator will appear on the recipient’s phone instead of your mobile number.

To hide your number on an iPhone
1. Go to Settings 2. Tap ‘Phone‘ 3. Press Show My Caller ID 4. Use the toggle switch to show or hide your number
Note: Verizon Wireless does not allow this feature.

To hide your number on an Android device

1. Open the Phone app
2. Open the Menu
3. Select Settings
4. Click on Call settings
5. Click on Additional settings
6. Click on Caller ID
7. Choose “Hide number” and your number will be hidden
8. Choose “Show number” or “Network default” to resume showing your number

2020-05-21T14:01:28-04:00March 18th, 2020|Working Remotely|

Working Remotely

Most NEIT services are available from off campus with an internet connection. These break down into two large categories:

  • cloud-based services and
  • services that require a secure connection to the NEIT network.

Before implementing any of these remote measures:

  1. Please leave your computer / VDI client in your NEIT office POWERED ON
  2. Please read attached instructions in their entirety before initiating step 1
  3. If you have any questions, please contact the DOTS Helpdesk 
  • Main Campus Phone:  (401) 780-4111 OR Ext. 3511
  • Cell phone 401-369-2772
  • Email: [email protected]

NEIT Resources Available Remotely with an Internet Connection

You can access these public and private cloud services are available at https://technet.neit.edu

  • Canvas
  • Attendance
  • All library services including access to catalog and databases
  • CSC Paymaster
  • Adirondack THD (The Housing Director)
  • TouchNet for tuition and other payments

Other cloud services with direct links

The following Microsoft Services and Applications are available at https://portal.office.com

Secure Connections to NEIT

Services that reside on NEIT’s network require that you establish a secure connection to access them. If you have a laptop that you take home, Tech Services is available to assist. If you have a desktop computer on campus, we can provide you with a secure connection to your desktop from any web browser. https://dots.neit.edu/connecting-to-your-neit-desktop-from-home/

NEIT resources that require a secure connection to the campus network:

  • Xport Drive and other mapped drives on NEIT servers
  • Banner
  • Traverse
  • TabFusion
  • Documents on your hard drive (If you move these to OneDrive, you will not need access to the campus network.) If you need access to files stored on the hard drive of your work computer, moving them to OneDrive makes them accessible from any computer, anywhere.

Please refrain from printing documents that contain sensitive information, if you have to, please save them in a secure location until you return to campus and are able to discard them appropriately – DO NOT PUT THEM IN YOUR RECYCLE BIN or household trash….and please refrain from saving sensitive information on your home computer’s hard drive – save to your OneDrive.

2020-05-21T13:03:48-04:00March 18th, 2020|Working Remotely|