CSC86RNewsletter

CSC 86(R) Newsletter

Informat ion, T ips , & Suppor t

      J anuary 2019 Getting the Most Out of CapCentral CapCentral , the go-to application for managing daily legislative activities from a desktop or mobile device, just got better.

With the enhanced Bill Search feature, you can find bills by chamber, type, author/sponsor, subject, actions, committee, and calendars in addition to searching by bill text or number. CapCentral’s LMS Searches and Bill Lists feature allows you to access and edit the comments on your LMS bill lists on the go. The new Resources tab links to several useful sites, including the Legislative Directory, the Texas Constitution, and Capweb. For member offices, the Member Activity Digest tracks and summarizes the member’s legislative activities for the past three days. The digest provides several important pieces of timely information, including the bills filed or signed onto by a member and when a member’s bill is referred to committee or scheduled for a hearing. To access CapCentral , make sure you’re connected to the Capitol network from your computer or enrolled iPad or iPhone, then type CapCentral/ into your browser’s address bar. For assistance using CapCentral, access the online help , watch this short video , or contact your office consultant . --- NewFeatures for the86(R) Session--- CapCentral lets you access key information at a glance in real time. You can view meetings, calendars, and videos, and follow along while bills and amendments are read in the chamber. Use it to search andmanage information about legislation, such as bill details and history, additional documents, and your office’s LMS and CMS information. New features for the 86(R) session include an enhanced search, better interactivity with LMS, and additional resources, including an activity digest for member offices.

We’ve Been Busy Improving Your Legislative Apps!

The Computer Support Center (CSC) is here to assist you in readying your office’s IT systems for session. Visit CSCWeb for more information.

1

CSC 86(R) Newsletter

Review Office Security and Permissions CALLING ALL OFFICE ADMINISTRATORS!!

Sign Up for Computer Training Classes

Need assistance? Contact the IT Support Center

Start the session off right—review the security settings in the legislative applications that your office will use during 86(R). Below are some examples of what to review in three popular applications: Legislative Draft Request (LDR) In order to remove security access to your office’s LDR information, administrators can delete a staff member from the Staff Name (user ID) list. You can find the Staff list located on the Security tab. Simply click on the staff member’s name in the list and click Remove . Legislative Management System (LMS) If you are an LMS Administrator or have the Change Office Security right, you can assign and update security rights for LMS users in your office. You can access Office Security from the Tools menu in the Main Navigation window. The Office Security window displays the names of LMS users in your office along with their levels of access. All LMS security can be managed from this window, including removal of users. Correspondence Management System (CMS) In CMS, staff members with administrator privileges can use the Office Security window to designate levels of access for other staff members. The Office Security window is located in the File menu. You can also remove users from CMS in this window. CMS QUICK TIP! To quickly identify casework and correspondence linked to a staff member who has been removed from the Office Security window, run a search for pending correspondence/casework using the option in the Staff Assigned search criteria. To update the staff assignment for selected correspondence or casework records in your search results, click the Mass Update button. In the drop-down menu, select Update Staff Assigned and follow the instructions. Keeping your office IDs up-to-date helps ensure the safety and security of your office’s information. In the weeks before the opening gavel of the new session, run a search using your office code in Who Is (located inTLCNetwork Applications). If IDs of former employees or other staff are still active, they need to be deleted. Your office consultant can help. First, confirm that no important information is still on the Y: drives of old IDs. Then let your office consultant know which IDs to delete. Maintain Office User IDs

Do you have new staff members? Do you need to refresh your knowledge of LDR, LMS, CMS, or TLIS? Sign up for classes today!

Office Hours ! Trainers from Media & Education will begin holding Office Hours in February. Feel free to drop in and ask any questions you have about the legislative applications. View the class schedule fortimesandlocation. Get Online Training Visit the TLC Online Training Center to view training videos about legislative applications and other IT topics at your convenience.

PHONE: 512-463-1158 EMAIL: ITSupportCenter@tlc.texas.gov ITSC Contact Information Session Hours of Operation Information you may be asked for when you contact support personnel (i.e., your computer name, user ID, and IP address) can be found in the TLC Support Information window by pressing Ctrl+Alt+ I on your office PC. Session hours begin during the first week of January. Hours will be Monday through Friday, 7 a.m. to 6 p.m. If either the house or senate is still in session after 6 p.m., the IT Support Center will remain open until adjournment. After Hours Support PHONE: 512-463-1158 and Press 1 Calls received during nonbusiness hours are answered by the TLC Computer Control room and assigned to on-call support personnel. Office Consultants Office consultants provide consultation and support for hardware and software computer needs in members’ legislative offices. Your assigned office consultant displays on CSCweb . Learn more on CSCweb’s Support page . The IT Support Center is the first line of support when you have a question or concern regarding either computer hardware or software.

View the course catalog or go straight to the current Class Calendar to register. You can register for a class online, by email, or by phone.

• Register online by double-clicking the class name on the calendar. • Send an email to Classes that includes the class name, date, and time. • Call the scheduling line at 512-475-1111 and leave your name and office and the class name, date, and time.

Due to the increased need for legislative classes in January, Office 2016 classes (including Word, Outlook, and Excel) will not be offered until February.

Check Out Micro Lessons:

The New Video Resource to Help You Answer IT Questions

T o use Micro Lessons , the newest education resource on CSCWeb, browse by application or search by keyword to discover short lessons on skills and applications commonly used in the legislative environment.

Find video demonstrations and step-by-step instructions on timely topics, such as: CapCentral - Searching Bills Using Bill Lookup or LMS - Copy a Bill Track to the Current Legislature .

Do you have IT questions, need desktop support, or want to learn how to use an application? CSCweb Connects You to IT Support and Education Resources Visit CSCweb , the Computer Support Center website, and discover the computer support, education, and equipment resources and services available to you. * Contact your office consultant or the IT Support Center . * Learn about council-developed applications and other software in the classroom or online . * Read about the legislative applications created specifically for staff of the Texas Legislature. * View short, step-by-step micro lessons on commonly used legislative applications. * Browse our FAQs .

2

3

CSC 86(R) Newsletter

CSC 86(R) Newsletter

Understanding Computer Security

Understanding Computer Security

Help Protect the Capitol Network from Cyber Criminals

Phishing: Don’t Get Reeled In!

The following preventative strategies are intended to help users proactively recognize emails attempting to deceive users into “clicking the link” or opening attachments to seemingly real websites: • Never click on links in emails. If you do think the email is legitimate, whether from a third-party retailer, bank, or trusted sender, go to the site and log on directly. If it is actually valid, whatever notification or service offering was referenced in the email will be available via regular logon. • Be extremely careful when opening email attachments. Typically, retailers will not send emails with attachments. If there is any doubt, contact the retailer directly and ask whether the email with the attachment was sent from them. • Do not give out personal information over the phone or in an email unless you are completely sure it is safe to. Social engineering is a process of deceiving individuals into providing personal information to seemingly trusted agents who turn out to be malicious actors. If contacted over the phone by someone claiming to be a retailer or collection agency, do not give out your personal information. Ask them to provide you with their name and a call-back number. Just because they may have some of your information does not mean they are legitimate! Ask your IT Support Center if you have any doubts. They will refer your question to the Security Support Team. Other practical tips to protect yourself from cyberattacks: • Set secure passwords and don’t share them with anyone. Avoid using common words, phrases, or personal information and update regularly.

Phishing is when hackers send malicious emails in order to steal your personal details (e.g., your computer or banking passwords).

Watch out for these common email phishing red flags and don’t get caught!

• Forceful or faked urgency to get you to respond before you have time to think about it.

• Offer a prize or reward to tempt you to click on a link or attachment.

• Ask you to provide your password or other confidential data for security purposes.

• Request that you click on a link to change your password.

• Website addresses that are similar to, but not the same as the real thing (e.g., amazonn.com vs amazon.com OR twiter.com vs twitter.com).

• Use masked links that look like a trusted website address but take you somewhere else when you click on them.

• Use a password manager, which will assist you in securing strong passwords in a safe place. KeePass is a free and open-source password manager ( https://keepass.info/ ). Their software has been audited and is safe to use.

TIP! Hovering your mouse cursor over the link should display the actual underlying address.

• Verify the authenticity of requests from companies or individuals by contacting them directly. If you are asked to provide personal information via email, you can independently contact the company directly to verify this request.

• Emails that appear to come from a management, accounting, or human resources employee at your organization.

• Pay close attention to the URLs of websites you visit. Malicious websites sometimes use a variation in common spelling or a different domain (e.g., .com instead of .net) to deceive unsuspecting computer users.

• Poor spelling or unusual grammar.

• Be suspicious of unknown links or requests sent through email or text message. Do not click on unknown links or answer strange questions sent to your mobile device, regardless of who the sender appears to be.

IMPORTANT: If you suspect you’ve been sent a phishing email, please preserve it and contact the IT Support Center immediately. They will forward it to the Security Support Group for analysis. Please do not hesitate to report these types of emails. They provide the Security Support Group with valuable information that assists them in defending the Capitol network from hackers.

• Most people use passwords that are based on personal information and are easy to remember. However, that also makes it easier for an attacker to guess or “crack” them.

Although intentionally misspelling a word (e.g., “daytt” instead of “date”) may offer some protection, an even better method is to rely on a series of words and memory techniques, or mnemonics, to help you decode it. EXAMPLE: Instead of the password “hoops,” use “IlTpbb” for “[I] [l]ike [T]o [p]lay [b]asket[b]all.” Using both lowercase and uppercase letters adds another layer of obscurity. Your best defense, though, is to use a combination of numbers, special characters, and both lowercase and upper case letters. Change the same example we used above to “Il!2pBb.” and see how much more complicated it has become just by adding numbers and special characters.

4

5

CSC 86(R) Newsletter

CSC 86(R) Newsletter

Enrolling Your Personal iPad or iPhone

Using Your Mobile Devices at the Capitol

A set number of Apple iPads are assigned to each house and senate office and are enrolled in order to connect to the Capitol wireless network and take advantage of TLC-developed iOS applications. Enrolled iOS devices also allow access to certain internal websites from external networks by using TLCAuto-VPN. Legislative staff are welcome to enroll their personal iOS devices to connect to the Capitol network and use enrolled features. For more information on enrolling your personal device, visit prep.tlc.texas.gov/ on your mobile device or contact your office consultant . If you have a council-issued iOS device you would like to have assigned to someone else, please contact your office consultant to reassign and re-enroll the device to ensure your personal information is no longer associated.

Connecting to Wireless Networks

There are two wireless networks ( Public-Capitol and Capitol ) that service the Capitol and its surrounding office complex.

The Public-Capitol network provides open wireless internet access to visiting members of the public. This network does not provide access to internal websites or applications. To access these internal resources, you must be connected to the Capitol network, which requires your iOS device to be enrolled. See the Enrolling Your Personal Mobile Device article on this page for more information. The Capitol network is a private network that is accessible to individuals with a Capitol user ID. When connected to this network, your mobile device has access to all of the internal websites, such as CapCentral and TLIS, and TLC-developed mobile applications. IMPORTANT: Personal wireless access points are not allowed in our environment. Personal access points (APs), hotspots, and wireless printers can adversely affect the Capitol wireless network and are considered unauthorized devices.

30-Day Retention Policy for Office Email Email on the Capitol network is not stored indefinitely. Outlook automatically deletes emails after 30 days. If you want to keep an email longer, you must move it to an archive folder. For archiving instructions, read the How to Archive article. All mail items are stored for 30 days, then moved to Recover Deleted Items From Server where they are available for two days before being permanently removed. Items the user deletes are moved to the Deleted Items folder for one-two days. Then they are moved to Recover Deleted Items From Server where they are available for two days before being permanently removed.

6

CSC 85(R) Newsletter

Made with FlippingBook flipbook maker