CAO of WNY IT Resources

If you are in need of technical support, computer help, or a repair, you must first submit an IT Request

If you have an urgent technical issue, first submit the request and then contact us at techsupport@caowny.org. If you email us, we will ask you to submit a request form before we begin working on your request.

If you are unable to log in to the IT request form, or you otherwise do not know your email password, you must contact your supervisor and have them submit a request on your behalf to reset your password.

If you receive any suspicious emails, please forward them to techsupport@caowny.org so we can check and remove any phishing emails or scams.

    1. Confirm the Sender's Identity: Check the email address of the sender to ensure it matches the expected format or domain of your organization or the sender's organization. Be wary of slight variations that might indicate a spoofed address.

    2. Contact the Sender Directly: If possible, contact the sender directly using a phone number or email address you know to be genuine (not by replying to the suspicious email) to confirm that they intended to send the file.

    3. Ask Your Colleague: If you believe the email was meant for a colleague, check with them. They might be expecting the file or can confirm the sender’s authenticity.

    4. Scan the File: Before opening any files, use your organization's security software to scan the attachment for viruses or malware. Ensure your antivirus software is up to date.

    5. Check File Type and Size: Be cautious with file types that are commonly associated with malware (like .exe, .scr, .bat). Also, an unusually large file size for a supposedly simple document might be suspicious.

    6. Look for External Signs: Poor grammar, urgency, unexpected attachments, or unsolicited requests are often signs of phishing or malicious intent.

    7. Use Secure Channels: If you must send or receive sensitive information, ensure that the transmission is done through secure, encrypted channels.

    8. Educate Yourself on Current Threats: Stay informed about the latest phishing and malware campaigns that might target your organization.