• Menu
  • Skip to primary navigation
  • Skip to main content
  • Skip to footer

COFESS

City of Faith Employee Self Service

  • Company Info
    • Core Values
    • Employee News
    • Benefits
    • Company Awards
  • Training
    • Annual Training
  • Forms Bureau
    • General
    • HR & Accounting
    • Maintenance
    • Security
  • Policies, Process, IR Archives
    • FaithWorks: Processes
    • IR Archives
    • Policy & Procedures
  • My Profile
  • Company Info
    • Core Values
    • Employee News
    • Benefits
    • Company Awards
  • Training
    • Annual Training
  • Forms Bureau
    • General
    • HR & Accounting
    • Maintenance
    • Security
  • Policies, Process, IR Archives
    • FaithWorks: Processes
    • IR Archives
    • Policy & Procedures
  • My Profile

Mblox IT

Tech Tuesday Series 3 Part 4: There’s Always a Bigger Form

January 30, 2024 By //  by Mblox IT

Announcements

1. City of Faith Went to Sheriff Con
Carrie Williams and I went to Sheriff Con yesterday as part of our Electronic Monitoring initiative.
2. Cofess Login for Help Desk Restored
Cofess login is fully functional. Due to a token error with freshdesk however, the google login now requires refresh before login.

3. First users have been set up on EM

Traveling Next Week

I’ll be traveling to Baton Rouge and Monroe Next week.
What that means is I’ll be holding trainings while in your locations.
Baton Rouge 2/6
will be hosted from 8 AM to 11 AM on Tuesday and Again at 2 to 4:30 PM
If you are one of the people who need help with Teams or Last Pass Please come then.
Monroe 2/7 and 2/8
The first time slot will be at 1:30 to 2:30 PM and then again immediately following your CPR training from 3 PM to 5 PM.
The final Time slot will be Prior to departure on 2/8 from 9-10 am.
If you are one of the people who need help with Teams or Last Pass Please come then.
Click here to Schedule a 1 on 1

Confiscation Form

Sometimes we have to confiscate items from a resident and that can cause a struggle with determining a chain of custody and where an object ended up and who took it. This form aims to fix that!
Click the Picture above to Learn More.

Cell Phone Registration

Cellular Technology is a huge part of our day to day lives and an even bigger part if your a resident at City of Faith. This guide walks you through how to register the phone. Click Toby Maguires face for more.

How To Do a UA Walk in 

The amount of UA disruptions we encountered due to Weather in January showed us that we needed to go over how to do this. In phamatech a person who walks in to complete a UA must be completed using the On Demand Function. To make sure your doing it correctly please review the guide Here.

4m4mnlyh5frk

Filed Under: Employee News, Tech Tuesday

Tech Tuesday: Forms of All Kinds Series 3 Part 3

January 16, 2024 By //  by Mblox IT

 

Today We’re trying a new format! Let me know what you think of it!
Announcements
1. Tomorrow is the last Teams Training. This serves as an opportunity for people to come ask Questions. 
2. Allen and I will be in Both Louisianna questions. If you’d like to meet with me 1 on 1 for Teams please let me know. 
3. Cofess login for the helpdesk has been temporarily suspended until I can figure out the cause of the current issue. For now Login using google or submit a ticket right from Cofess. 

cofess help icon.png

Submitting a Help Desk Ticket from Cofess

 
You can Now submit a Help Desk Ticket Right from Cofess. It is one of our goals to start streamlining everything to make it less complicated for you!
Click the Picture above or here to get a step by Step Tutorial.
 
Read on the Blog
alco_sensor_3_alcohol_testing_instruments_model.png
Alcohol Testing

Alchohol Testing is an important part of any RRC’s Operating procedures.Click Here or the image above for Instructions

The SOW says:

E. Alcohol Testing – The contractor will maintain a surveillance program in order to deter and detect introduction or use of alcohol in the facility. All residents will be tested when they return to the facility from an unsupervised activity.

The contractor will maintain a log documenting:

  • resident tested;
  • staff performing the test;
  • date, time and type of test administered;
  • test result; and
  • a column to indicate if the resident refused to cooperate.

City of Faith has designed a form to track and record these results as they occur that way the data never gets lost. If someone’s over the limit it provides a link to the IR form and automatically sends the logs to the residents Case Manager.

4208848f64440889db12dd3dee2e507a09b83312cb3da8b07206c2103c87686f_1.jpg

fire drill meme.webp
Emergency Drills
Emergency Drills are an important part of our day to day jobs.

Click Herefor a How To Guide for Emergency Drills.

The SOW says :

FIRE EVACUATION AND EMERGENCY PLANS – The contractor will maintain current written emergency plans. The contractor will train all staff in emergency procedures within one week of their initial employment. In addition, the contractor will include emergency training in annual refresher training for all staff. The contractor will document all training in the staff member’s personnel file.

So naturally that means it’s pertinant for us to have a method and a way to easily find and access that information if we need it.Additionally this form has a built in workflow where when you select Facilities it automatically gets set on to everyone required to receive it.

Dietary Request Form

The Dietary Request form is an easy way for Residents to submit dietary requests to the Facility Director and provides a straight forward way for all Administrative parties to approve or deny them. It also prevents any Resident from submitting the request without the proper Documentation.
d26a84e6-1146-48cf-92dd-d2fc8532b756.jpg
How to Submit a Dietary Request Form for Approval - Step 5.png
diet meme.png

Filed Under: Employee News, Tech Tuesday

Tech Tuesday Series 3 Part 2: Forms Forms Everwhere Are Forms

January 3, 2024 By //  by Mblox IT

Announcements

  1. Final Teams Training will be next week a few of you have been instructed to meet with me when I travel next Month
  2.  If there is something you’d like covered for Tech Tuesday submit a request and we’ll add it to the list of future topics.
  3. Did you know that Computer Classes are available in your area at the local library? If any of the technology (Especially Word, Email, or Teams) is difficult I strongly recommend you sign up for assistance.  They are free and can be a big help.
    1. Monoe https://oplib.org/computer-classes
    2. Little Rock https://cals.org/tech-classes
    3. Baton Rouge https://www.ebrpl.com/libraryservices/programsclassesevents.html

In this Weeks Tech Tuesday we’ll take the time to focus on the Forms we use regularly. The Movement Sheet, The Incident Report, and The Search Log. These Forms all are used almost daily and make up a large piece of what we do.

TABLE OF CONTENTS

  • Movement Sheets
  • The Incident Report
  • The Search Form
  • Finally

 

Movement Sheets

Movement sheets are an integral part of so many background processes at City of Faith. As such a Movement sheet should be the first thing we do when a new resident arrives, transfers to Home Confinement or Leaves the Facility. Lets look at the form and figure out how to use it.

 

These Fields are for individuals who are placed out and should be filled out again on a return.

 

 

 

 

 

 

 

 

 

 

The Incident Report

The Incident Report is used to record negative actions committed by a resident that violate the rules and regulations set by us and the Bureau of Prisons.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

The Search Form

The Search form is an integral part of the City of Faith job. This form is used to log and keep track of items found and present those findings to the BOP as needed.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Finally

Next week we’ll focus on the Breathalyzer Testing Log, The Emergency Drill, and the Dietary Request Forms.

Filed Under: Employee News, Tech Tuesday

Tech Tuesday Series 3 Part 1: Tech Tuesday Series 3 Week 1: Good Forms For All and For All a Good Form

December 26, 2023 By //  by Mblox IT

Announcements

1. The Help Desk Has been Made more accessible by integrating with cofess

2. The Next Teams Training will be on 1-17-24 at 12 pm. Please feel free to be there if you need any additional assistance.

 

The Forms Bureau

Understanding the Forms Bureau

The forms bureau was created with a two-fold purpose in mind. First to reduce paper and reduce the amount of lost paperwork. Second  We have a lot of forms, and because of this, we needed a way to ensure we were all doing them the same way for the same reasons.

20+ Funny survey memes of all time - forms.app

Components of A Form

Every form has 4 attributes that are present in Every Form.
1. A form Title- A form Title is defined by the Form name 2. A Form Code- A form code allows us to view form versions and ensure that the forms we’re using are identical 3. Content – Content makes up the different form field types and controls the data that is passed into a workflow. Content is made up of fields, text, calculations, and uploaded information.

   a. Required Fields- these are marked with a red asterisk *
   b. Other Fields-these are everything else4. Workflows- These define how the form is processed and who it goes to, and this varies based on the form you are sending. For example, a purchase order request will go to payables and accounting, however, if you select IT for the department it’ll come to me first.

Accessing the Forms Bureau

It’s important to us that you have the tools available to do your job. That’s why the Forms Bureau exists naturally we want to help make sure you know how to access it!

 Step 1: Go to cofess.cityoffaith.org(this can be found in the CityOfFaith Bookmarks tab at the top of every employee's web browser)
The first step to accessing the Forms Bureau is to go to cofess.cityoffaith.org. This is the official website of City of Faith and the portal through which you can access all our company resources.( if you have never been to Cofess or logged into your COF email you should really see your supervisor)

CCG Memes | Page 73 | CubeCraft Games

Step 2: Login using your assigned login info
Once you have accessed the website, you will need to log in using your assigned login information. This will give you access to all the services and resources available on the website.

Login To All The Things - Imgflip

Step 3: Hover your cursor over Policies & Forms
After logging in, hover your cursor over the Policies & Forms tab. This will reveal a dropdown menu with different categories of forms.

 

Step 4: Click the Group your job description falls under
Click on the group that your job description falls under. This will give you access to the forms that are relevant to your job.


It is important to note that everyone has access to HR & Accounting forms. Through the HR & Accounting forms, you will be able to make purchase requests, complete HR forms, and submit receipts for purchases.
Step 6: Accessing the forms
Once you are within the page assigned to your job description, you will see forms listed. Each form has a title, description, Form ID, and date of the latest update. Click on the title to access each form.
Step 7: Completing the forms
Most forms are digitally embedded forms that will ordinarily submit to your supervisor. These forms are similar to the End of Shift report (Security) and the File Accountability form (Case Mgmt). Once the page loads, complete all the required blanks and click submit or update depending on the requirements of the form.
Some Forms may even require you save a URL for later to update information as needed.


 

 If you have any questions or encounter any issues while accessing or completing the forms, reach out to the IT Department by submitting a ticket at cityoffaithit.freshdesk.com. From there, you will use your COF email via google or Cofess Info info to log in and submit a ticket.
Alternatively Just go to Cofess and Hit the help icon in the bottom right of the screen. Full Circle Massage by Julie - Here's friendly reminder to be sure to fill out the online intake form or arrive early and fill out a paper copy (which will be located

 Next week I’ll review some specific forms that affect us on the daily and make sure we all understand how those should be filled out!

—

Filed Under: Employee News, Tech Tuesday

Tech Tuesday Series 2 Week 4: Finale Security is like Onions

December 19, 2023 By //  by Mblox IT

Announcements:

1. Tomorrow will be our second refresher over Microsoft Teams at 9 AM. 

2. Per our movement toward NIST compliance going forward no device,, should have resident information stored on it. When I conduct visits all computers, tablets and other COF-owned devices will be evaluated for compliance.  If you have questions about this see me.  

 

We’re now in the fourth week of our cybersecurity series. Over the past weeks, we’ve learned about password managers, how to install LastPass, the dangers of phishing and other socially engineered online scams, secure password creation and sharing, and other tools we use to protect ourselves.

Good Cyber security is like onions there are multiple layers of safeguards and walls in place. Each one serves a purpose. The first line of defense is always using best practices and internet common sense.

 

 One note do not use the same password for everything even slight variations make it harder for malicious people.

 

SOLVED] Your best Internet Meme Security Awareness poster - IT Security

This week, we’re focusing on what to do if you suspect you’ve been a victim of a cyber threat or your computer is infected.

 

CybersecMemes

Step 1: Identify the Issue If you notice any suspicious activity such as unfamiliar emails in your sent folder, unexpected password reset emails, or unauthorized transactions, you may have been targeted.

  1. Check Your Accounts: Regularly review your online accounts for unauthorized activity or changes. This includes email, social media, bank accounts, and any other services you use.
  2. Monitor Your Emails: Be aware of unexpected password reset emails, emails about changes to your account settings, or emails from unknown senders.
  3. Look for Performance Changes: If your device is running slower than usual, crashing, or displaying frequent error messages, it could be a sign of malware.
  4. Watch for Unusual Network Traffic: An unexpected increase in data usage could indicate that a malicious program is using your network.
  5. Be Aware of New or Changed Files: If you notice new files on your system that you didn’t download, or if existing files were modified without your knowledge, it could be a sign of a security breach.
  6. Check Your Browser: Unexpected changes in your browser, such as new toolbars, extensions, or a changed homepage, could indicate a problem.
  7. Use Security Tools: Use the security tools available in your operating system to scan for issues. City of Faith Utilizes a program called Trend Micro for our security. If your system does not have this or you don’t know how to use it please see IT

Step 2: Report the Incident Immediately report the incident to our IT department at City of Faith IT email Include as much detail as possible about what you’ve observed. Screen Shots are always helpful. It’s best practice to tell IT what you clicked on and when the problem started  Occurring.

Top 10 Cybersecurity Memes

 

Step 3: Change Your Passwords If an issue is identified IT will recommend all your passwords be changed. Change your passwords for all your accounts, starting with your email and financial accounts. Remember to use LastPass to generate and store strong, unique passwords. See  Here for more information.

 

15 Cybersecurity Memes That Will Make You Laugh Then Cry

 

Step 4: Monitor Your Accounts Keep a close eye on your accounts for any further suspicious activity. If you notice anything unusual, report it immediately.

Step 5: Be Cautious of Scam Attempts Be wary of any emails or messages asking for personal information. Always verify the source before clicking on any links or providing information. Do not install anything on your device without first getting IT department approval. All programs must be evaluated for security compliance.

 

Step 6: Educate yourself on Malware Malware, short for malicious software, is any software intentionally designed to cause damage to a computer, server, client, or computer network. It’s a broad term that encompasses various harmful types of software, including viruses, ransomware, spyware, and trojans. Malware can steal, delete, or encrypt your data, alter or hijack core computing functions, and spy on your computer activity without your knowledge or permission. It often spreads via email attachments, software downloads from the internet, or operating system vulnerabilities. It’s important to use antivirus software and follow good security practices to protect against malware.

 

70% OF ALL MALWARE GOES UNDETECTED BY ALL ANTIVIRUS SOFTWARE BECAUSE USERS ALLOW IT IN

 

There are several common types of malware that you should be aware of:

1.          Ransomware: This type of malware disables the victim’s access to data until a ransom is paid.

2.          Fileless Malware: This malware makes changes to files that are native to the operating system.

3.          Spyware: This collects user activity data without their knowledge.

4.          Adware: This serves unwanted advertisements.

5.          Trojans: This disguises itself as desirable code.

6.          Worms: This spreads through a network by replicating itself.

7.          Rootkits: This gives hackers remote control of a victim’s device.

8.          Keyloggers: This monitors users’ keystrokes.

9.          Bots: This launches a broad flood of attacks.

10.        Mobile Malware: This infects mobile devices.

11.        Wiper Malware: This erases user data beyond recoverability.

Each type of malware has its own characteristics and methods of operation. It’s important to have a good understanding of these types in order to protect your computer effectively. Let me know if you need more information on any of these types.

 

Physical Security

Physical Security should be monitored as well. Here are some tips for maintaining a safe and secure work environment:

  1. You should not leave your computer open with sensitive information at any given time.

Top 10 Cybersecurity Memes

        2. Do not write your passwords on sticky notes and out in the open.

Security Awareness Memes | CarmeloWalsh[.]com

a. The best way to secure your passwords is by using last pass and MFA.  One of the changes coming to City of Faith in the near future is to add MFA to all City of Faith Utilized Software.

 

Recent studies have actually indicated the most secure form of password protection is called Passwordless

Passwordless security is a type of authentication that doesn’t use passwords or any other secret you need to remember to verify who you are. Instead, it uses something you have, like a device or a hardware token, or something you are, like a fingerprint or face scan.

The main advantage of passwordless security is that it gets rid of the risks that come with using passwords. These risks include having your password stolen, using the same password for multiple accounts, and the constant need to manage and remember passwords.
Passwordless authentication also makes signing in easier and quicker, which can make people more productive. It also increases security by getting rid of password-related risks.

When setting up passwordless security, it’s important to choose methods that make sense for the people using them and the devices and networks they’re using. It’s also a good idea to use multi-factor authentication, which means you need to provide two or more forms of authentication before you can access an account.

In summary, passwordless security is considered a best practice because it makes things more secure, easier for users, and reduces the need for managing passwords. However, like all security measures, it should be used as part of a wider security strategy that includes other protections like firewalls, antivirus software, and secure network protocols.

A person wearing glasses Description automatically generated

3. Devices when not in use should be kept behind locked doors(don’t leave your office unlocked)

4. Inspect your system for external devices not placed by you regularly. As a general rule we should not have unauthorized devices plugged into our computers you don’t want to be responsible for accidentally uploading a virus to COF.

DNS Security in Six Star Wars Memes – BlueCat Networks

5. Only use City of Faith Authorized equipment. Don’t use a home device without prior authorization and written approval.

 

Remember, your security is our top priority. If you have any questions or concerns, please don’t hesitate to reach out to our IT department.

CybersecMemes

 

 

Our next Series will be targeted toward the New Forms Bureau and the Different things available to everyone there. As always if you are having issues please submit a ticket. This article can always be reviewed on the Help Desk Knowledge Base and Cofess.

Filed Under: Employee News, Tech Tuesday

  • « Go to Previous Page
  • Page 1
  • Page 2
  • Page 3
  • Page 4
  • Page 5
  • Page 6
  • Go to Next Page »

Footer

Corporate Office

1511 Jackson Street
Monroe, Louisiana 71202
Phone: (318) 325-6231
Fax: (318) 325-6196

Little Rock Admin

1400 S. Garfield Dr.
Little Rock, Arkansas 72204
Phone: (501) 615-1090
Fax: (501) 615-1099

COF-Baton Rouge

6749 Cezanne Ave.
Baton Rouge, LA 70806
Phone: (225) 924-5757
Fax: (225) 924-5822

Chief Executive Officer

Terry Williams
(501) 615-1090
[email protected]

Chief Operations Officer

Allen Winkler
(501) 615-1090
[email protected]

Chief Financial Officer

Troy Adams
(318) 325-6231
[email protected]

Navigation

  • Home
  • Core Values
  • Processes
  • Annual Training
  • My Profile

Copyright © 2025 · City of Faith