|
|
|
|
By // by Mblox IT
|
|
|
|
By // by Mblox IT
In this Weeks Tech Tuesday we’ll take the time to focus on the Forms we use regularly. The Movement Sheet, The Incident Report, and The Search Log. These Forms all are used almost daily and make up a large piece of what we do.
TABLE OF CONTENTS
Movement sheets are an integral part of so many background processes at City of Faith. As such a Movement sheet should be the first thing we do when a new resident arrives, transfers to Home Confinement or Leaves the Facility. Lets look at the form and figure out how to use it.
These Fields are for individuals who are placed out and should be filled out again on a return.
The Incident Report is used to record negative actions committed by a resident that violate the rules and regulations set by us and the Bureau of Prisons.
The Search form is an integral part of the City of Faith job. This form is used to log and keep track of items found and present those findings to the BOP as needed.
Next week we’ll focus on the Breathalyzer Testing Log, The Emergency Drill, and the Dietary Request Forms.
By // by Mblox IT
1. The Help Desk Has been Made more accessible by integrating with cofess
2. The Next Teams Training will be on 1-17-24 at 12 pm. Please feel free to be there if you need any additional assistance.
The forms bureau was created with a two-fold purpose in mind. First to reduce paper and reduce the amount of lost paperwork. Second We have a lot of forms, and because of this, we needed a way to ensure we were all doing them the same way for the same reasons.
Every form has 4 attributes that are present in Every Form.
1. A form Title- A form Title is defined by the Form name 2. A Form Code- A form code allows us to view form versions and ensure that the forms we’re using are identical 3. Content – Content makes up the different form field types and controls the data that is passed into a workflow. Content is made up of fields, text, calculations, and uploaded information.
a. Required Fields- these are marked with a red asterisk *
b. Other Fields-these are everything else4. Workflows- These define how the form is processed and who it goes to, and this varies based on the form you are sending. For example, a purchase order request will go to payables and accounting, however, if you select IT for the department it’ll come to me first.
It’s important to us that you have the tools available to do your job. That’s why the Forms Bureau exists naturally we want to help make sure you know how to access it!
Step 1: Go to cofess.cityoffaith.org(this can be found in the CityOfFaith Bookmarks tab at the top of every employee's web browser)
The first step to accessing the Forms Bureau is to go to cofess.cityoffaith.org. This is the official website of City of Faith and the portal through which you can access all our company resources.( if you have never been to Cofess or logged into your COF email you should really see your supervisor)
Step 2: Login using your assigned login info
Once you have accessed the website, you will need to log in using your assigned login information. This will give you access to all the services and resources available on the website.
Step 3: Hover your cursor over Policies & Forms
After logging in, hover your cursor over the Policies & Forms tab. This will reveal a dropdown menu with different categories of forms.
Step 4: Click the Group your job description falls under
Click on the group that your job description falls under. This will give you access to the forms that are relevant to your job.
It is important to note that everyone has access to HR & Accounting forms. Through the HR & Accounting forms, you will be able to make purchase requests, complete HR forms, and submit receipts for purchases.
Step 6: Accessing the forms
Once you are within the page assigned to your job description, you will see forms listed. Each form has a title, description, Form ID, and date of the latest update. Click on the title to access each form.
Step 7: Completing the forms
Most forms are digitally embedded forms that will ordinarily submit to your supervisor. These forms are similar to the End of Shift report (Security) and the File Accountability form (Case Mgmt). Once the page loads, complete all the required blanks and click submit or update depending on the requirements of the form.
Some Forms may even require you save a URL for later to update information as needed.
If you have any questions or encounter any issues while accessing or completing the forms, reach out to the IT Department by submitting a ticket at cityoffaithit.freshdesk.com. From there, you will use your COF email via google or Cofess Info info to log in and submit a ticket.
Alternatively Just go to Cofess and Hit the help icon in the bottom right of the screen.
Next week I’ll review some specific forms that affect us on the daily and make sure we all understand how those should be filled out!
—
By // by Mblox IT
Announcements:
1. Tomorrow will be our second refresher over Microsoft Teams at 9 AM.
2. Per our movement toward NIST compliance going forward no device,, should have resident information stored on it. When I conduct visits all computers, tablets and other COF-owned devices will be evaluated for compliance. If you have questions about this see me.
We’re now in the fourth week of our cybersecurity series. Over the past weeks, we’ve learned about password managers, how to install LastPass, the dangers of phishing and other socially engineered online scams, secure password creation and sharing, and other tools we use to protect ourselves.
Good Cyber security is like onions there are multiple layers of safeguards and walls in place. Each one serves a purpose. The first line of defense is always using best practices and internet common sense.
One note do not use the same password for everything even slight variations make it harder for malicious people.
This week, we’re focusing on what to do if you suspect you’ve been a victim of a cyber threat or your computer is infected.
Step 1: Identify the Issue If you notice any suspicious activity such as unfamiliar emails in your sent folder, unexpected password reset emails, or unauthorized transactions, you may have been targeted.
Step 2: Report the Incident Immediately report the incident to our IT department at City of Faith IT email Include as much detail as possible about what you’ve observed. Screen Shots are always helpful. It’s best practice to tell IT what you clicked on and when the problem started Occurring.
Step 3: Change Your Passwords If an issue is identified IT will recommend all your passwords be changed. Change your passwords for all your accounts, starting with your email and financial accounts. Remember to use LastPass to generate and store strong, unique passwords. See Here for more information.
Step 4: Monitor Your Accounts Keep a close eye on your accounts for any further suspicious activity. If you notice anything unusual, report it immediately.
Step 5: Be Cautious of Scam Attempts Be wary of any emails or messages asking for personal information. Always verify the source before clicking on any links or providing information. Do not install anything on your device without first getting IT department approval. All programs must be evaluated for security compliance.
Step 6: Educate yourself on Malware Malware, short for malicious software, is any software intentionally designed to cause damage to a computer, server, client, or computer network. It’s a broad term that encompasses various harmful types of software, including viruses, ransomware, spyware, and trojans. Malware can steal, delete, or encrypt your data, alter or hijack core computing functions, and spy on your computer activity without your knowledge or permission. It often spreads via email attachments, software downloads from the internet, or operating system vulnerabilities. It’s important to use antivirus software and follow good security practices to protect against malware.
70% OF ALL MALWARE GOES UNDETECTED BY ALL ANTIVIRUS SOFTWARE BECAUSE USERS ALLOW IT IN
There are several common types of malware that you should be aware of:
1. Ransomware: This type of malware disables the victim’s access to data until a ransom is paid.
2. Fileless Malware: This malware makes changes to files that are native to the operating system.
3. Spyware: This collects user activity data without their knowledge.
4. Adware: This serves unwanted advertisements.
5. Trojans: This disguises itself as desirable code.
6. Worms: This spreads through a network by replicating itself.
7. Rootkits: This gives hackers remote control of a victim’s device.
8. Keyloggers: This monitors users’ keystrokes.
9. Bots: This launches a broad flood of attacks.
10. Mobile Malware: This infects mobile devices.
11. Wiper Malware: This erases user data beyond recoverability.
Each type of malware has its own characteristics and methods of operation. It’s important to have a good understanding of these types in order to protect your computer effectively. Let me know if you need more information on any of these types.
Physical Security should be monitored as well. Here are some tips for maintaining a safe and secure work environment:
2. Do not write your passwords on sticky notes and out in the open.
a. The best way to secure your passwords is by using last pass and MFA. One of the changes coming to City of Faith in the near future is to add MFA to all City of Faith Utilized Software.
Recent studies have actually indicated the most secure form of password protection is called Passwordless Passwordless security is a type of authentication that doesn’t use passwords or any other secret you need to remember to verify who you are. Instead, it uses something you have, like a device or a hardware token, or something you are, like a fingerprint or face scan. The main advantage of passwordless security is that it gets rid of the risks that come with using passwords. These risks include having your password stolen, using the same password for multiple accounts, and the constant need to manage and remember passwords. Passwordless authentication also makes signing in easier and quicker, which can make people more productive. It also increases security by getting rid of password-related risks. When setting up passwordless security, it’s important to choose methods that make sense for the people using them and the devices and networks they’re using. It’s also a good idea to use multi-factor authentication, which means you need to provide two or more forms of authentication before you can access an account. In summary, passwordless security is considered a best practice because it makes things more secure, easier for users, and reduces the need for managing passwords. However, like all security measures, it should be used as part of a wider security strategy that includes other protections like firewalls, antivirus software, and secure network protocols.
3. Devices when not in use should be kept behind locked doors(don’t leave your office unlocked)
4. Inspect your system for external devices not placed by you regularly. As a general rule we should not have unauthorized devices plugged into our computers you don’t want to be responsible for accidentally uploading a virus to COF.
5. Only use City of Faith Authorized equipment. Don’t use a home device without prior authorization and written approval.
Remember, your security is our top priority. If you have any questions or concerns, please don’t hesitate to reach out to our IT department.
Our next Series will be targeted toward the New Forms Bureau and the Different things available to everyone there. As always if you are having issues please submit a ticket. This article can always be reviewed on the Help Desk Knowledge Base and Cofess.
By // by Mblox IT
Announcements
Last Pass Password Sharing
City of faith deploys two ways to do password sharing. The first is through https://1ty.me/ as pictured below. You can find all of this here
The other method which is more secure is by using Last Pass. Last Pass has a built-in password-sharing feature that can be found by going to your vault.
Tools we use to protect ourselves.
The greatest tool against getting scammed is first and foremost your brain and critical thinking skills. But outside of that COF has some great tools we use to minimize the threat.
More about Scams
Instead of going over these 1 by one I’m going to provide you with a list of scams I’m familiar with and if you see something say something. The majority of scams that will be up to you to watch out for are called social engineering scams. These are scams where the perpetrators have created a scenario that will lure you the user into a situation that is favorable to the scammer.
Certainly, there are various scams on the internet that people should be aware of to protect themselves. Here are some common examples:
1. Phishing Scams:
– Email Phishing: Fraudulent emails that mimic legitimate sources to trick users into providing personal information, such as login credentials or financial details.
– Website Phishing: Fake websites designed to look like legitimate ones to steal login information or financial data.
2. Online Shopping Scams:
– Fake online stores that offer products at extremely low prices to lure customers but never deliver the goods.
3. Tech Support Scams:
– Unsolicited calls or pop-ups claiming to be from tech support, stating that your computer has a virus and offering to fix it for a fee. Legitimate tech support companies don’t contact users this way.
4. Lottery or Prize Scams:
– Emails or messages claiming you’ve won a lottery or prize, but to claim it, you need to provide personal information or pay upfront fees.
5. Romance Scams:
– Scammers build a romantic relationship with someone online and then request money for various reasons, such as a medical emergency or travel expenses.
6. Investment Scams:
– Fake investment opportunities promising high returns with little or no risk. Always be cautious and research thoroughly before investing.
7. Social Media Impersonation:
– Fake social media profiles impersonating someone you know or trust, aiming to extract personal information or money.
8. Job and Employment Scams:
– Fake job offers that require payment for training or materials, or requests for personal information that can be used for identity theft.
9. Cryptocurrency Scams:
– Fake ICOs (Initial Coin Offerings), fraudulent exchanges, or Ponzi schemes in the cryptocurrency space.
10. Ransomware Attacks:
– Malicious software that encrypts your files and demands payment for their release. Regularly back up your data and be cautious with email attachments.
11. Freelance Scams:
– Fake job listings that require payment for access to opportunities or promise payment for work that is never actually completed.
Always exercise caution when dealing with unfamiliar websites, emails, or messages. Be skeptical of unsolicited communications and verify the legitimacy of sources before providing personal or financial information. Keep your software and antivirus programs up to date to protect against malware and other online threats.
As always this can be reviewed on the City of Faith Help Desk or on Cofess.
1511 Jackson Street
Monroe, Louisiana 71202
Phone: (318) 325-6231
Fax: (318) 325-6196
1400 S. Garfield Dr.
Little Rock, Arkansas 72204
Phone: (501) 615-1090
Fax: (501) 615-1099
6749 Cezanne Ave.
Baton Rouge, LA 70806
Phone: (225) 924-5757
Fax: (225) 924-5822
Terry Williams
(501) 615-1090
[email protected]
Allen Winkler
(501) 615-1090
[email protected]
Troy Adams
(318) 325-6231
[email protected]