Kindergarten IT Program

About Kindergarten IT Program

This author has not yet filled in any details.
So far Kindergarten IT Program has created 136 blog entries.

Phishing email attacks and socially engineered messages

Both individuals and organisations are regularly targeted by criminals attempting to collect confidential information and accounts. Phishing attacks are a common method used by online scammers to fool you into giving out private information or tricking you into entering your information or passwords into fake websites. Phishing emails and messages try to look genuine, and

Early Childhood Voices Conference 2020 (ECV2020)

Happening all through the week of 16th to 20th of November is an international online conference hosted by Charles Sturt University’s Early Childhood Research Group. It is FREE to register to view the live presentations and busy kindergarten staff can browse a large YouTube playlist of all presentations afterwards. “The Early Childhood Voices Conference (ECV2020)

Tip – First steps in response to ransomware

As a follow up to Tip – How to take precautions against ransomware, we explain what first actions you can take in response to ransomware  in the Tip – First steps in response to ransomware. Click here to view the tip.

First steps in response to ransomware

How do I know I have been attacked by ransomware? The first sign may be a “ransom letter” appearing in a new text file, your browser or desktop created by the ransomware alerting you to on-going damage with instructions and threats. Your work files may appear corrupted or unusable. How did I get attacked? Ransomware

Tip – How to take precautions against ransomware

Ransomware is a constantly growing threat for organisations and individuals. We explain what ransomware is and the precautions you should take with our new Tip – How to take precautions against ransomware. Click here to view the tip.

How to take precautions against ransomware

Ransomware is malicious software that encrypts files on a victim’s device or drives. The encrypted files are then unusable to anyone without the encryption key. Once the attack starts the ransomware warns the victim on how to pay a ransom in order to unlock their data. The cyber criminals may also threaten to expose or

Connection troubleshooting with the NL1901ACV modem

For broadband connection issues, first follow these troubleshooting steps. After each step test your internet connection. Please note: to restart the modem, use the round On/Off button in the side. A restart can 2 or 3 minutes. Are the Power and Broadband service lights green? Your service will be either DSL , WAN or LTE

Tip – How to set Chrome spell check to English (Australia)

When you are composing text directly into a web application such as Online TLDS, you will need to rely on the spell check built into your browser. To improve your experience, you can set the spell check to English (Australia) Click here to view the tip.