Birthlight, PO Box 148, Cambridge, Cambs CB4 2GB United Kingdom * Tel 01223 362288 * www.birthlight.com
1. Learn how to switch views from "Speaker View" to "Gallery View"
Speaker view just shows the speaker on the screen. Gallery view shows a number of (if not all) participants on the screen. You should know how to switch back and forth so you can see how many participants you have and access each participant (e.g. hover over their pic to get options if on a pc/mac). It is also so that you can show participants how to do this as they may not know and this will be needed during the meeting especially if the presentation is through translation (so you can see both translator and presentor).
2. Know how to set a co-host if you need one
The Birthlight wiki is an information portal about birthlight in the vein of wikipedia-like information portals. It contains general information about Birthlight and a ton of information especially about how to use the Birthlight G Suite system. You can access the Birthlight Wiki here (scroll down to the bottom to see the section on G Suite)
Then you can use the "Find" mechanism of your browser (for Chrome click on 3 gray dots in the upper righthand corner and then click "Find") to find any topic that you are looking for on the Wiki (e.g. "gmail")
Did you know that Google Drive is an app you can install on your mobile phone? It is and it opens up a number of possibilities for collaboration. Just go to the App Store on the iphone or Google Play on an Android phone to download the app. A green-gold-blue triangle is the app's icon.
Once you have installed it on your phone you can use it to send photos or any other type of files to collaborators (e.g. other tutors, Birthlight office personnell, etc). Here's how via screenshots from my iphone6:
1. double-click the drive icon to open it (circled in red below)
2a. Let's say you want to share a photo you've taken on your phone during a course with the BL office staff. Find the photo click the "share" button (circled in red below)
Our phones are becoming an ever more important part of our office life & technology and often contain emails as well as the normal contacts which we use everyday. They also often hold text messages, banking information and phone records as well as photos, music, and other things of a personal nature.
As a result, mobile phones can be a very tempting target for thieves, with the loss of a phone causing great inconvenience to the user.
Over 95% of all successful cyber attacks/malware attacks start with a phishing email in which you have to click a link or open an attachment. It is the #1 vector for successful cyber attacks. So be careful in the way you handle your email!! If you are skeptical then don't touch it!! Feel free to contact me as well if you have questions about a suspicious email. I can try to verify if it is on the scam list or not.
As you know, phishing is a technique that involves tricking the user, usually through a malicious link or attachment in an email, in order to steal confidential information , passwords, etc, . And summer is a notorious time for phishing emails, hacks and other malware. The other day we had an incident at the office when one of our workers took the appropriate measures when sent a phishing email. It seemed suspicious that the attachment file when clicked asked for an email and password even though they knew the sender. So, they called the sender to double-check the accuracy of the attachment and the email. So, a lot of times we can trust our instincts to identify phishing emails. Often phishing emails require you to do something that is not normally done or required. That is a good indication to double-check before clicking that attachment, or that suspicious link in the email which could unleash malware, ransomeware of something worse onto your computer.
Let's imagine a scenario where you just need to send a very large file (say over 25Mb) as a one-off to somebody else. As you may know, email has size limitations regarding the size of attachments. For example, gmail's limit is 25mb (megabytes). Any gmail with an attachment over 25mb will be rejected and will not send. The person you are sending to also uses an email carrier (e.g. microsoft, yahoo, btinternet, etc) who has their own limit too. Therefore, it can be difficult to know if your large graphic file will ever reach its recipient. But now there is a better and simpler way - WeTransfer. It is free, simple and can handle files up to 2GB.
So, for that class banner or poster which you created in Publisher that you want to send to the printers you can just send it through WeTransfer. You don't even need to sign-up or create an account - just go to their website and give your email, recipient's email and attach the file - that's it! Try it:
Previously, these privacy controls were hidden within the settings, but there is now a new central hub which makes controlling your data privacy a simpler process. However, due to the pop-up which many people sped through, it’s easy to have allowed access to your data and accepted face recognition - we take you through how you can amend this below.
It’s really important because the data collected by Facebook allows its advertising partners to ‘target’ ads to specific groups of people, which affects the ads you see on Facebook. In addition, allowing third parties access to your data - including your photos, political views and phone number – means they could spam you with all sorts.
Phishing emails are emails which usually pretend to be from a well-known company (e.g. Google, Apple, Microsoft) which ask the user to click and link in the email and supply personal information such as a password or account number of a bank. It is really an email from a hacker seeking to capture one's password or personal information in order to break into your account or steal your identity. In other words they are fishing for information. If we are click happy and click the link in the body of the email without thinking and provide the information then we give away a password or personal information which can be useful to the hacker. In order to protect yourself from these attacks then please see this article by imore which although is written for the mac apple computer has application to any computer/email account: