October 1, 2018
for information about OIT Services?
Check out the OIT website! The search box on our home page will search all of our services and
the OIT Knowledge Base. If you want to learn more about Canvas or our course design services, use the OIT search! Do you want to learn about OIT’s website hosting services or looking for training? Use the search to find what you’re looking for quickly.
We also provide quick links on the right in the “I Want To” section. These are our most popular
pages, including Setting Up Your Email, Downloading Software, and Resetting Your NetID Password.
Can’t find what you are looking for? Contact the OIT HelpDesk by phone at 865-974-9900, by
you traveling for Fall Break?
Do you have plans
to visit other universities during Fall Break? If so, check to see if that university provides an Eduroam wireless network. Eduroam, short for education roaming, allows students, staff, and faculty from participating institutions to obtain secure Internet
connectivity across campus and when visiting other participating institutions.
for more information, including a list of participating institutions.
If you are traveling
to a university that offers an Eduroam wireless network, you will need to make sure you have connected to the Eduroam wireless network at UT before connecting to the Eduroam network while traveling.
for getting connected with Eduroam are available in the OIT Knowledge Base,
or you may contact the OIT HelpDesk online or call 865-974-9900 for assistance.
Helps Teach Accounting
Hear from University of Tennessee lecturer, A. Norman,
on how she is using Lynda.com as supplemental content for her students as she shares personal tips and lessons learned.
on OIT’s YouTube channel or learn more about how you can use Lynda.com as part of your class on
R & RStudio
R is a free, open-source software environment for statistical computing, data management, and graphics.
While it includes a simple code editor, it can be controlled through many other packages. The most popular way to run R is through RStudio, a free and open source program which includes a code editor, as well as debugging and visualization tools. R is very
extensible and supports a wide range of analytic and visualization methods. However, its data usually must fit into your computer’s main memory, limiting the size of data sets it can analyze.
more about R and RStudio on OIT’s Research Software website.
Learn when to use it, where to run it, how to learn, and where to get help.
Upcoming OIT Workshops
Here's a selection of topics that will be covered in workshops this week:
Introduction to HTML/CSS
Screen Casting for Teaching and Learning
our calendar of upcoming workshops at workshops.utk.edu and
register to attend.
Can't make it to class or want to learn about another topic?
Check out our online training sessions.
Don't Let a Phishing Scam Reel You In
Cybercriminals use phishing—a type of social engineering—to manipulate people into doing what they
want. Social engineering is at the heart of all phishing attacks, especially those conducted via e-mail. Technology makes phishing easy. Setting up and operating a phishing attack is fast, inexpensive, and low risk: any cybercriminal with an e-mail address
can launch one.
According to Verizon's 2017
Data Breach Investigations Report,
the education sector saw a rise in social engineering–based attacks. Students, staff, and faculty all suffered losses when personal data and research were disclosed to unauthorized parties. Phishing played a part in more than 40% of these breaches. Knowing
what you're up against can help you be more secure.
Here are a few things you can do to guard against phishing attacks:
- Limit what you share online. The
less you share about yourself, the smaller the target you are for a phishing attack. Cybercriminals use information you post online to learn how to gain your trust.
- Protect your credentials. No
legitimate company or organization will ask for your username and password or other personal information via e-mail. Your school definitely won't. Still not sure if the e-mail is a phish? Contact the OIT HelpDesk at 865-974-9900.
- Beware of attachments. E-mail
attachments are the most common vector for malicious software. When you get a message with an attachment, delete it—unless you are expecting it and are absolutely certain it is legitimate.
- Confirm identities. Phishing
messages can look official. Cybercriminals steal organization and company identities, including logos and URLs that are close to the links they're trying to imitate. There's nothing to stop them from impersonating schools, financial institutions, retailers,
and a wide range of other service providers.
- Trust your instincts. If
you get a suspicious message that claims to be from an agency or service provider, use your browser to manually locate the organization online and contact them via their website, e-mail, or telephone number.
- Check the sender. Check
the sender's e-mail address. Any correspondence from an organization should come from an organizational e-mail address. A notice from your college or university is unlikely to come from “firstname.lastname@example.org” or “email@example.com”.
- Take your time. If
a message states that you must act immediately or lose access, do not comply. Phishing attempts frequently threaten a loss of service unless you do something. Cybercriminals want you to react without thinking; an urgent call to action makes you more likely
- Don't click links in suspicious messages. If
you don't trust the e-mail (or text message), don't trust the links in it either. Beware of links that are hidden by URL shorteners or text like "Click Here." They may link to a phishing site or a form designed to steal your username and password.
Have questions or need assistance? Contact the HelpDesk.
865-974-9900 | online chat
Follow @UT_OIT on Twitter for up-to-date announcements regarding OIT events and outages.
the IT Weekly