[Libs-Or] Tech-Talk: 4 Ways to Protect Your Computer and Files (Scams, part 2)

HANNING Darci C * SLO Darci.HANNING at slo.oregon.gov
Thu Sep 9 10:42:51 PDT 2021


Welcome to the latest issue of Tech-Talk!

Having trouble reading this email?
You can view the tech tip<https://www.tech-talk.com/part-2-email-scams-4-ways-to-protect-your-computer-and-files.html>, the communication tip<https://www.tech-talk.com/dump-the-literal-approach-to-images.html>, and the leadership tip<https://www.tech-talk.com/success-is-a-process.html> online instead!
When prompted for a username and password, use the ones listed below..
What You Can Do Proactively

[https://files.constantcontact.com/ee1208b4001/470df2da-b8fb-4b32-95fb-8f6331e9910d.png]



This Week's Topic: PROTECT AGAINST DISASTERS

1. ARTICLE & VIDEO ... 4 Ways to Protect Your Computer and Files (Scams Part 2)
2. COMMUNICATING ... Choosing better images to communicate
3. LEADERSHIP ... Success ... an end point or a process?
4. WEBINARS ...
·     Sep 15: [COMM.] Write Professionally to Convince and Be Understood
·     Sep 29: [WEBSITES] HotJar, a Free Tool to Analyze Website Traffic
·     Oct 13: [GOOGLE] How to Maximize Your Calendar Experience
·     Oct 27: [YOUTUBE] Why, When and How to Use Info Cards & End Screens

Register for Webinars<https://r20.rs6.net/tn.jsp?f=001dq6hW5kVJHTVDmqrQBuSDELEyd9644fCR4aPBnT8e9NS2NGCUKRES1oRWili--8HuCYSgX7pLN1nNGpsdTeEPDkD35PeKsnrwTRgh22-sTfEl3svqQxOusDQDeXM4imWwV38Ac9tWznr5qmmX0koSgdjjyoB1oIr&c=ZpUgqmsO4c5R7Z_s4WxRMXOYXOP4iWdaEJEIsM_6X3yILZNBkSaPbA==&ch=X9uor502XhMLPON687rGjT9SHlv1JIa3q24M7mA2486FgDtxHo88bA==>



[woman using computer outside]<https://r20.rs6.net/tn.jsp?f=001dq6hW5kVJHTVDmqrQBuSDELEyd9644fCR4aPBnT8e9NS2NGCUKRES-L9w_HrMJChTeFg78WAOhDPnLhxA63CKSRJ9OTxnWUuK8Q4NChVDvURQhmra2XYhhgHVK9mL3CwtsStM78JaR76NXgq04AWbRuJV7BaAv8cIEUCn8hnFYrja9KkGzkzt-yDWrMxxTApHF4voroCEhqGZjaUy0xp2km4tNTTH-FpBLb2asXqpro=&c=ZpUgqmsO4c5R7Z_s4WxRMXOYXOP4iWdaEJEIsM_6X3yILZNBkSaPbA==&ch=X9uor502XhMLPON687rGjT9SHlv1JIa3q24M7mA2486FgDtxHo88bA==>



Photo by Nathan Dumlao<https://r20.rs6.net/tn.jsp?f=001dq6hW5kVJHTVDmqrQBuSDELEyd9644fCR4aPBnT8e9NS2NGCUKRES-L9w_HrMJChxZDfaGkYMdlFkBTWCOWoo809a6BRE7OgjAE8k3umBWmlZJNtxPr5ZkvEjDg70YUPLYdEylJpy_FyzKKxqz6xpv0QZOHUehSAo_yQASwgSOlWBcRilXHHNttXp6zvrE3RlMKPPakvtHL4cZSd2SObCzqTc96i-ZCF6x3i8isFTmRl7-LSzx47OHT25jh8tr2dO3Yu7U0bewI=&c=ZpUgqmsO4c5R7Z_s4WxRMXOYXOP4iWdaEJEIsM_6X3yILZNBkSaPbA==&ch=X9uor502XhMLPON687rGjT9SHlv1JIa3q24M7mA2486FgDtxHo88bA==> on Unsplash<https://r20.rs6.net/tn.jsp?f=001dq6hW5kVJHTVDmqrQBuSDELEyd9644fCR4aPBnT8e9NS2NGCUKRES-L9w_HrMJChEj-1CQx2mumhMqMZqTSAMacuamIpNQoDe9Hsn3XQ0OvG1jAoAXq_imPO90_-9vL_qiERpQxX-V0PZRi0Cy_Qh0eJyQR3Rt-5l1YQvShqAcbPQNy9ObuB88abkVLcSGSHshWFJ3xmD8Phyl-z5OL9yB3NKThgFBcXIjAwF7JyduJRnSFir9DrUm0KS0iT3oSPhEKqTHUyGANDSoX39m6K3jIrVqAH14_8&c=ZpUgqmsO4c5R7Z_s4WxRMXOYXOP4iWdaEJEIsM_6X3yILZNBkSaPbA==&ch=X9uor502XhMLPON687rGjT9SHlv1JIa3q24M7mA2486FgDtxHo88bA==>



[https://files.constantcontact.com/ee1208b4001/e25f6bcf-26a8-4e59-91f2-cc248962042d.png]<https://r20.rs6.net/tn.jsp?f=001dq6hW5kVJHTVDmqrQBuSDELEyd9644fCR4aPBnT8e9NS2NGCUKRESyuzwAwg2kNG1kakT7Um6a-fh4SetnPNgVVJn8c6NNnzNwrxbfgOWwYMiONkUY07twvEhpPHV8WVxJ_P46F4uRx4n-7VaBTsQzpTldG_TLj1&c=ZpUgqmsO4c5R7Z_s4WxRMXOYXOP4iWdaEJEIsM_6X3yILZNBkSaPbA==&ch=X9uor502XhMLPON687rGjT9SHlv1JIa3q24M7mA2486FgDtxHo88bA==>



PART 2 Email Scams: 4+ Ways to Protect Your Computer & Files
Intermediate


[email hacking]


Okay, you know what to look for to detect email (or phone) scams (See Part 1 of this article here, 6 Ways to Detect Email Scams<https://r20.rs6.net/tn.jsp?f=001dq6hW5kVJHTVDmqrQBuSDELEyd9644fCR4aPBnT8e9NS2NGCUKRES_IwZiVFQGlHBdtbb38QQ8VUWOKxZE4PabeFafWTKGZRdkq7Cij4aFpsbjpwlQSEA7KjwNJ7J9Up5UqNTQu4L0rbIdYvKB3YgXEFopJ23K3c5knq4Gy9XwXJHrJ0nIdEGb1T5DXUtdfk&c=ZpUgqmsO4c5R7Z_s4WxRMXOYXOP4iWdaEJEIsM_6X3yILZNBkSaPbA==&ch=X9uor502XhMLPON687rGjT9SHlv1JIa3q24M7mA2486FgDtxHo88bA==>). However, there are things that you can do RIGHT AWAY to set yourself up in the event that your computer becomes compromised.

Now, you may be thinking that you work in a larger organization and your IT department handles all of your security. But read on as this information is still relevant as you most likely have a computer in your home environment, or if you work with patrons or students, it's valuable information to share.

Let's look at the four areas that need attention ahead of time just in case mischievous malware makes its way into your computer.



4 Ways to Protect Your Computer and Files

1. Keep Your Computer, Browsers and Software Updated

Hackers find holes in platforms like Microsoft Windows, Internet browsers (like Chrome or Firefox), or in software programs… and they can sneak malicious files in through these gaps. So when there's a software/app update, be sure to apply it right away as it may be fixing bugs, patching holes or upgrading security precautions.

Windows Updates
To view your Windows Update Settings so you can see if you are up-to-date ... or to change when they are applied, see this article<https://r20.rs6.net/tn.jsp?f=001dq6hW5kVJHTVDmqrQBuSDELEyd9644fCR4aPBnT8e9NS2NGCUKRES8ZAfsMVWIvxnJPWblTFb_0XljdwzLn6sKmXHgGT9ZS3vLXljDt6T9Cv97PMlec6XZUXHdsnXGhyv-JK_srMsK__HKYVyXvgJLg4eqi9wBQlggSFfodEQ2ZVt-5R-Q2i7pHYQXKHqvxhhuFyxPJwKotsyalI4SUSGw==&c=ZpUgqmsO4c5R7Z_s4WxRMXOYXOP4iWdaEJEIsM_6X3yILZNBkSaPbA==&ch=X9uor502XhMLPON687rGjT9SHlv1JIa3q24M7mA2486FgDtxHo88bA==>.

Internet Browser Updates
Here's how to make sure your Internet browser(s) are current:


[Chrome]


·     Google Chrome -- With the browser open, click the settings icon (3 vertical dots) in the upper-right corner of the screen. Go to Help, then About Google Chrome. A new window will open that automatically checks and updates if needed. Follow the prompt to Relaunch.


[Firefox]


·     Mozilla Firefox -- With the browser open, go to the settings button (3 horizontal lines) in the upper-right corner. Choose Help from the menu, and then About Firefox. Firefox will check for updates and display the current version. Click the Restart option if prompted.

·     Microsoft Edge -- This browser will update automatically as new releases are made public.

Software Updates
Many types of software are updated automatically. However, with others, you will be prompted to download, or click a link to upgrade to the most recent version. Don't delay in applying these updates as they usually contain feature upgrades AND also security patches.

If you're hesitant about a strange pop-up window that prompts you to update a program, don't click on it. Instead, follow the directions in this article<https://r20.rs6.net/tn.jsp?f=001dq6hW5kVJHTVDmqrQBuSDELEyd9644fCR4aPBnT8e9NS2NGCUKRES-L9w_HrMJChsKEufAyWxJuHFLqTFpTIZKlf09qljGhhIOYwXq01qc-8Og5XDGyg7TiySdwXCFuT5nRKO45zTmPd3LpnTgMMUphybKarYU4m4ftY62wFM1YrAy87MobvhgratvYY__ULuCUqltWkV5qbkQUGvU876Q==&c=ZpUgqmsO4c5R7Z_s4WxRMXOYXOP4iWdaEJEIsM_6X3yILZNBkSaPbA==&ch=X9uor502XhMLPON687rGjT9SHlv1JIa3q24M7mA2486FgDtxHo88bA==>.



2. Make Sure You Have an Active Antivirus Program

This should go without saying… but take a few minutes to make sure you have good protection.

Windows 10 Defender
If you are using Windows 10, it comes with a Windows Security antivirus program called Microsoft Defender Antivirus. (In previous versions, it was called Windows Defender Security Center).

And, if you have an additional antivirus program installed on your computer and turned on, this Windows 10 program may be disabled automatically to eliminate potential conflicts.

Later, if you uninstall the other program, the Microsoft Defender Antivirus will typically turn back on automatically.

To see your Windows program settings, go to the Start menu and click Settings. Then choose Update and Security and select Windows Security from the list on the left. Here you can choose Virus & threat protection to see the status.

[windows 10 protection]

Other Types of Antivirus Software
There are many types of software on the market available that are designed to run regular (and manual) scans to identify malware threats and block them from instantly being downloaded to your computer. Popular choices include Bitdefender, Norton, and McAfee. At Tech-Talk, we have been using Vipre for years. Read about this program here.<https://r20.rs6.net/tn.jsp?f=001dq6hW5kVJHTVDmqrQBuSDELEyd9644fCR4aPBnT8e9NS2NGCUKRES-L9w_HrMJChLkmQTTgLUR2cqPxeRKc2CBH650upR-GT_EMzFAL2VJHg_zhko6eh09R-BOeIYbpwRR1REXaM1tcq7aod-dDgEkuljePxARJ1qdlZ7oyb0jEMBvB6RZTwA-V6AMoQ-CEDY6Gdmz-WtBQQ1boOKPKyse_77s2pJ9tO&c=ZpUgqmsO4c5R7Z_s4WxRMXOYXOP4iWdaEJEIsM_6X3yILZNBkSaPbA==&ch=X9uor502XhMLPON687rGjT9SHlv1JIa3q24M7mA2486FgDtxHo88bA==>




[https://files.constantcontact.com/ee1208b4001/d5298764-4fb3-4906-b17e-b8473418ecb5.png]


3. Protect Your Data by Backing It Up

Even if you're super careful, there could be a situation where your computer becomes inoperable… either it gets infected, damaged or completely crashes. In this case, your files can be recovered if you have backed them up. This can be set up in few ways:

Cloud Servers
You can save files to a cloud hosting company like OneDrive, Dropbox<https://r20.rs6.net/tn.jsp?f=001dq6hW5kVJHTVDmqrQBuSDELEyd9644fCR4aPBnT8e9NS2NGCUKRES980Dwq6guKkpLUs0ol28e_Dj_Nvpaps7fzEg9_YxR0wLXZjJ_O_HeXgrd7t_T2kc6cF4vMup4zHtg8CL_BiC8I1MfUqVsu_SXsbaAREv6mqKmCJG6ewTdOMvOrmE5jTpeNP1gqUqD3uWO3jcBw0_Pg=&c=ZpUgqmsO4c5R7Z_s4WxRMXOYXOP4iWdaEJEIsM_6X3yILZNBkSaPbA==&ch=X9uor502XhMLPON687rGjT9SHlv1JIa3q24M7mA2486FgDtxHo88bA==>, Google Drive or your company's file server. Read about cloud storage options<https://r20.rs6.net/tn.jsp?f=001dq6hW5kVJHTVDmqrQBuSDELEyd9644fCR4aPBnT8e9NS2NGCUKRES2vEG-SkdeC4vHrRAJMrKN3mTGEIPBnnptYpjAfJBX3lGclSi1Yg-Qm24LQ5zGKeNwLtBcEqPljZTNKINEeYMgcy8zXilMnjV6MsmOswV_7NhPnaFh0BZbRYps6vpxOjnmWbeGl8rs-vD29155r7e5bDg-_TPE8C4g==&c=ZpUgqmsO4c5R7Z_s4WxRMXOYXOP4iWdaEJEIsM_6X3yILZNBkSaPbA==&ch=X9uor502XhMLPON687rGjT9SHlv1JIa3q24M7mA2486FgDtxHo88bA==> here.

Backup Software
Computer backup software copies the files from your computer to their redundant servers. Should you lose the files, either through disaster or simply by deleting them, you can instantly restore them from the online saved copies. Popular choices are Carbonite, Acronis, or EaseUs. See an article on Carbonite<https://r20.rs6.net/tn.jsp?f=001dq6hW5kVJHTVDmqrQBuSDELEyd9644fCR4aPBnT8e9NS2NGCUKRESy4KendYIKBB-gjI8j8W7tI9eAxS0LXh9E_25RgVUqJIiv6wzsvp38D7wJyG8h6GETw0ffplVoWmy10QhStLytB29NEGQBMpAzqhEThePEqjm4n0HplRNeW4p4BwKHbKPU0iDygLY1udGU6WcGhMAnY=&c=ZpUgqmsO4c5R7Z_s4WxRMXOYXOP4iWdaEJEIsM_6X3yILZNBkSaPbA==&ch=X9uor502XhMLPON687rGjT9SHlv1JIa3q24M7mA2486FgDtxHo88bA==> here (what we use at Tech-Talk).

STORY: I personally had a laptop crash completely a few years ago (I spilled water on the keypad… eeks!). Luckily, I was using the backup program, Carbonite. While I was waiting for a new laptop be delivered, I used an older computer and was able to access individual files I needed from my Carbonite account online. Then when my new laptop was set up, I easily downloaded all of my backed-up files and restored them to the new laptop.



4. Protect Your Online Accounts with 2-Factor Authentication

[2-Factor Authentication]



Another way scammers try to gain access to your files is through online accounts (like using your Facebook or bank's username and password).

If you have 2-Factor (or Multi-Factor) Authentication, you put a big hurdle in place making it much more difficult for the hackers.

Many online platforms are now adding this extra level of authentication protection which uses additional credentials to be able to log in. These typically fall into two categories:

·     Something you set up -- a passcode you get via an authentication app, an email or text to a mobile device, or a security key.

·     Personal data -- like a scan of your face, fingerprint, or your retina.

Read more about why you should turn on 2<https://r20.rs6.net/tn.jsp?f=001dq6hW5kVJHTVDmqrQBuSDELEyd9644fCR4aPBnT8e9NS2NGCUKRESzLlPeV-zKuOOYpXgteVdjtnVTRMF579BwZbvh4DlIHFkfOdmWV_Hei8PvbuNOLvCpKbn9iQt0zjoB7wiu1_T6mJXxzxLZU9g9nMH7db6ImQ74xqM5qkZlLqQhB4kRvtacjZtJlTH0EE5mouV-I2OSdki3IrNNzdfsiTFAdka2qd5Kzj9qnUK3OlF14n8gDEOg==&c=ZpUgqmsO4c5R7Z_s4WxRMXOYXOP4iWdaEJEIsM_6X3yILZNBkSaPbA==&ch=X9uor502XhMLPON687rGjT9SHlv1JIa3q24M7mA2486FgDtxHo88bA==>-Factor Authentication here<https://r20.rs6.net/tn.jsp?f=001dq6hW5kVJHTVDmqrQBuSDELEyd9644fCR4aPBnT8e9NS2NGCUKRESzLlPeV-zKuOOYpXgteVdjtnVTRMF579BwZbvh4DlIHFkfOdmWV_Hei8PvbuNOLvCpKbn9iQt0zjoB7wiu1_T6mJXxzxLZU9g9nMH7db6ImQ74xqM5qkZlLqQhB4kRvtacjZtJlTH0EE5mouV-I2OSdki3IrNNzdfsiTFAdka2qd5Kzj9qnUK3OlF14n8gDEOg==&c=ZpUgqmsO4c5R7Z_s4WxRMXOYXOP4iWdaEJEIsM_6X3yILZNBkSaPbA==&ch=X9uor502XhMLPON687rGjT9SHlv1JIa3q24M7mA2486FgDtxHo88bA==>.



[https://files.constantcontact.com/ee1208b4001/41d9a61c-7e5a-4de3-b0a4-4021dd05cea3.png]



Communication: Images
Dump the literal approach

We all know that images help communicate our messages, right?

If you want to step-up the effectiveness of your presentations, try this "revolutionary" idea when selecting the pictures you want to use.

Instead of looking for something that is literal (e.g. training class, finance report, etc.), find something that conveys the feeling, the emotion, the end result that you want to associate with your message.

For example, don't look for graphics that show courses, profits, budgets ... search for success, happiness, growth. Not only will you be able to capture more of your audience's attention, you'll subtly convey the purpose, the desired result.

NOTE: The image we choose to represent the Communication section in Tech-Talk above conveys peacefulness, organization, forward movement. It's just an image of rocks in water ... nothing to do with "communication." But it conveys a feeling that you might get when you use the techniques we're presenting.

[https://files.constantcontact.com/ee1208b4001/eea01187-60d6-4639-b386-88c69bd8d4db.png]

Which image above would you choose ... to show an online class for creative design?

You could be more literal and select the picture on the RIGHT with the laptop OR you could use the one on the LEFT to convey reaching for the stars with your artistry because of the class.

Which do you think will be more likely to get noticed and generate some feelings?

*******
An after-thought: OK, now that I look at this example, I might use both ... because the Design Ideas<https://r20.rs6.net/tn.jsp?f=001dq6hW5kVJHTVDmqrQBuSDELEyd9644fCR4aPBnT8e9NS2NGCUKRES5TnL61WpNHMvH0bCHbQcaq9ztH2PVO1q-aw8_OFlbJV3nZoqQc_5Ui70WP-Dwot0sU6IaRjBjIJ20YT2iPIAKiziKbaN_XnwcK19H9il4vJD2T8neF6nQjfNf0eJWSL8JYQj4f7NpbW8j8mrv79FpY=&c=ZpUgqmsO4c5R7Z_s4WxRMXOYXOP4iWdaEJEIsM_6X3yILZNBkSaPbA==&ch=X9uor502XhMLPON687rGjT9SHlv1JIa3q24M7mA2486FgDtxHo88bA==> feature in PowerPoint 2016 and later, offered an attractive way of presenting them together. But you get the idea, right?



[https://files.constantcontact.com/ee1208b4001/da1c6ee9-ba35-4af5-9c80-8e1b5781189e.png]



Leadership
Success ... an end point or a process?

I read a blog post that was talking about "success" ... and what it really meant.

The author was trying to help people realize that you don't have to get derailed by frustrations, setbacks, unrealized results on the road to achieving a goal.

His point was that just because these things happen, doesn't mean you're not being successful. His contention is that success is the process ... not the end goal. And that as long as you're working that process, you experience success every day.

What a great perspective. This way you know what you ultimately want to achieve ... and you feel good about the ride to get there with all the hills and valleys ... because "success is a process."

Does that resonate with you? Tell us how <https://r20.rs6.net/tn.jsp?f=001dq6hW5kVJHTVDmqrQBuSDELEyd9644fCR4aPBnT8e9NS2NGCUKRES-L9w_HrMJChVjEqC4w2b-O2tQCST_IV_cS5iVemgxbCbEPbM_yLH1BNmTvwRicYqV6j14T_i8oPxiz5osjpc69hRXYjZM8IIqudtFjShmysWioD-Ke0_P765QgovNRx3A==&c=ZpUgqmsO4c5R7Z_s4WxRMXOYXOP4iWdaEJEIsM_6X3yILZNBkSaPbA==&ch=X9uor502XhMLPON687rGjT9SHlv1JIa3q24M7mA2486FgDtxHo88bA==> you <https://r20.rs6.net/tn.jsp?f=001dq6hW5kVJHTVDmqrQBuSDELEyd9644fCR4aPBnT8e9NS2NGCUKRES-L9w_HrMJChVjEqC4w2b-O2tQCST_IV_cS5iVemgxbCbEPbM_yLH1BNmTvwRicYqV6j14T_i8oPxiz5osjpc69hRXYjZM8IIqudtFjShmysWioD-Ke0_P765QgovNRx3A==&c=ZpUgqmsO4c5R7Z_s4WxRMXOYXOP4iWdaEJEIsM_6X3yILZNBkSaPbA==&ch=X9uor502XhMLPON687rGjT9SHlv1JIa3q24M7mA2486FgDtxHo88bA==> feel about this idea.<https://r20.rs6.net/tn.jsp?f=001dq6hW5kVJHTVDmqrQBuSDELEyd9644fCR4aPBnT8e9NS2NGCUKRES-L9w_HrMJChVjEqC4w2b-O2tQCST_IV_cS5iVemgxbCbEPbM_yLH1BNmTvwRicYqV6j14T_i8oPxiz5osjpc69hRXYjZM8IIqudtFjShmysWioD-Ke0_P765QgovNRx3A==&c=ZpUgqmsO4c5R7Z_s4WxRMXOYXOP4iWdaEJEIsM_6X3yILZNBkSaPbA==&ch=X9uor502XhMLPON687rGjT9SHlv1JIa3q24M7mA2486FgDtxHo88bA==>



[http://files.constantcontact.com/ee1208b4001/b13a7a6a-7445-4d8e-b741-4b475385ef5b.png]<https://r20.rs6.net/tn.jsp?f=001dq6hW5kVJHTVDmqrQBuSDELEyd9644fCR4aPBnT8e9NS2NGCUKRES1aHfAIWBlBMvq_iCp77mtgmOhETVIs8i54NHM_XKEXFYqPB7DFUepyHpvpOJskDYJV0iNnjYlZqE0z_lwNPqjL9ENvCZM547FdpWo1x-YRw&c=ZpUgqmsO4c5R7Z_s4WxRMXOYXOP4iWdaEJEIsM_6X3yILZNBkSaPbA==&ch=X9uor502XhMLPON687rGjT9SHlv1JIa3q24M7mA2486FgDtxHo88bA==>
[Ask a question]<https://r20.rs6.net/tn.jsp?f=001dq6hW5kVJHTVDmqrQBuSDELEyd9644fCR4aPBnT8e9NS2NGCUKRES_xCaU4SWTJCXGC9Tx2hcMhhRYe4F6KCR7q9U4-GCeHh_8TQwvQHDZ8IeludcObNGMrU7Js_G2gl_cHajPNBIwWqrzVtaxNVVWEhFHqOIG6s4cKhRz2WZEg=&c=ZpUgqmsO4c5R7Z_s4WxRMXOYXOP4iWdaEJEIsM_6X3yILZNBkSaPbA==&ch=X9uor502XhMLPON687rGjT9SHlv1JIa3q24M7mA2486FgDtxHo88bA==>

Copyright 1996-2021 Shared Results International. Published weekly. Distribution is limited by license. For information on how to include additional recipients, contact support at tech-talk.com<mailto:support at tech-talk.com> 941-355-2092.

The Tech-Talk e-newsletter for Oregon library staff is distributed weekly via the Libs-OR and TechTalk mailing lists. Know someone who might be interested in receiving a copy but they’re not on TechTalk or Libs-OR mailing lists? Have them contact darci.hanning at slo.oregon.gov<mailto:darci.hanning at slo.oregon.gov> or visit http://listsmart.osl.state.or.us/mailman/listinfo/techtalk to subscribe to just the Tech-Talk newsletter!

Tech-Talk is a paid subscription service for staff of Oregon libraries and is supported in whole by the Institute of Museum and Library Services (IMLS) through the Library Services and Technology Act (LSTA), administered by the State Library of Oregon.

Cheers,
Darci Hanning, MLIS (she/her/hers)
Public Library Consultant / CE Coordinator
State Library of Oregon | Library Support and Development Services
971-375-3491 | darci.hanning at slo.oregon.gov<mailto:darci.hanning at slo.oregon.gov> | www.oregon.gov/library<http://www.oregon.gov/library>
Follow @StateLibraryOR: Facebook<http://fb.me/StateLibraryOR> | Twitter<https://twitter.com/StateLibraryOR> | Instagram<https://www.instagram.com/statelibraryor/> | Pinterest<https://pinterest.com/statelibraryor/> | YouTube<https://www.youtube.com/channel/UC0-kU8Gu0jS_YcnXg-b_TRA/featured>
Continuing Education Resources: https://libguides.osl.state.or.us/conted

[cid:image001.png at 01D7A567.4C685740]<https://www.northwestdigitalheritage.org/>      [cid:image002.png at 01D7A567.4C685740]


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://omls.oregon.gov/pipermail/libs-or/attachments/20210909/9d378860/attachment.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: image001.png
Type: image/png
Size: 6600 bytes
Desc: image001.png
URL: <https://omls.oregon.gov/pipermail/libs-or/attachments/20210909/9d378860/attachment.png>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: image002.png
Type: image/png
Size: 15548 bytes
Desc: image002.png
URL: <https://omls.oregon.gov/pipermail/libs-or/attachments/20210909/9d378860/attachment-0001.png>


More information about the Libs-Or mailing list