October 8, 2018
find what you are looking for? Check out the new search for www.utk.edu!
This summer, OIT launched a new and improved search engine
for utk.edu websites. The new web search is faster, allows for more granular site searches, and provides a better overall search experience. To access the new search, visit search.utk.edu or use the search box in the footer of most UT websites. A university
system-wide search is also available at search.tennessee.edu.
a Better Online Lecture
Need a brief
recording to introduce yourself to your online class; cover new content and post it online for anytime access for your students; explain a challenging concept with visuals; or, annotate assignments? It’s very important to have high-quality audio – the better
the audio quality, the more accurate auto-captioning tools will work!
With that in
mind, OIT now offers Mic Kits for check out that include a high-quality microphone with a portable mini sound “booth.” You can also check out an iPad and a portable green screen (green screen allows for a digital background to be placed behind you).
Teaching Tools: Lecture Recording Equipment for more
information or to reserve a Mic Kit!
Due to decreasing demand, OIT has retired the iPad Loan Program which allowed for check out of up to 20 devices for student classroom use.
More Columns or Cramped Seating: OIT'S New Training Space
OIT has created
a new training space for workshop attendees. This training lab isn’t just a room with new computers; we’ve included all of the technologies you might find in a centrally-managed UT classroom, from WolfVision Cynap to a document camera to interactive projectors.
Enthusiastic OIT trainers will continue to lead your learning experience.
Our new lab is
conveniently located in the Communications Building and is the place where new ideas and new skills come to life for students, faculty, and staff.
for OIT face-2-face workshops,
make a note of the new location. If you don’t see anything posted at your desired day or time, simply request
group training from OIT or
request a one-on-one consultation.
We can’t wait
to see you!
to Spot an Email Scam: Tip 2
One way to spot an email scam is to check the sender's email address. Official UTK communications is sent from a utk.edu address. However,
be cautious; just because it is from a utk.edu address does not guarantee that it is legit. If the email has other suspicious criteria, contact the OIT HelpDesk about the legitimacy of the message.
Learn more about
how to spot an email scam on OIT’s website.
ePortfolios for Developing and Assessing Student Professional Competencies
Thursday, October 18 from 1 to 3 p.m. in Communications, Room 43, Classroom C
Learn how ePortfolios can be used to assess and showcase student work, demonstrate competencies, assist students in job searches, and aid cross-discipline and departmental collaborations.
Register for the workshop
and learn how to initiate an ePortfolio program for your students, course, department, project, or for yourself, and you'll have a chance to experiment with the Canvas ePortfolio tool and its features.
R & RStudio
R is a free, open -source software environment for statistical computing, data management, and
graphics. While it includes a simple code editor, it can be controlled through many other packages. The most popular way to run R is through RStudio, a free and open source program which includes a code editor, as well as debugging and visualization tools.
R is very extensible and supports a wide range of analytic and visualization methods. However, its data usually must fit into your computer’s main memory, limiting the size of data sets it can analyze.
more about R and RStudio on OIT’s Research Software website.
Learn when to use it, where to run it, how to learn, and where to get help.
Upcoming OIT Workshops
OIT does not have any workshops scheduled for this week.
Check out the Online Calendar for all of our
Can't make it to class or want to learn about another topic?
Check out our online training sessions.
Social Engineering is Spooky!
Social engineering is a psychological attack where an attacker tricks you into doing something
you should not do. The concept of social engineering is not new; it has existed for thousands of years. Think of scammers or con artists, it is the very same idea. What makes today’s technology so much more effective for cyber attackers is you cannot physically
see them; they can easily pretend to be anything or anyone they want and target millions of people around the world, including you. In addition, social engineering attacks can bypass many security technologies. The simplest way to understand how these attacks
work and protect yourself from them is to take a look at two real-world examples.
You receive a phone call from someone claiming to be from a computer support company, the OIT HelpDesk,
or even Microsoft Tech Support. The caller explains that your computer is actively scanning the Internet. They believe it is infected and have been tasked with helping you secure your computer. Once they have tricked you into believing your computer is infected,
they pressure you into buying their security software or giving them remote access to your computer so they can fix it. However, the software they are selling is actually a malicious program. If you purchase and install it, not only have they fooled you into
infecting your computer, but you just paid them to do it. If you give them remote access to your computer, they are going to take it over, steal your data, or use it for their bidding.
Keep in mind, social engineering attacks like these are not limited to phone calls or email; they
can happen in any form, including text messages on your phone, over social media, or even in person. The key is to know what to look out for--you are your own best defense.
Stopping Social Engineering Attacks
- Someone asking for information they should not have access to
or should already know, such as your account numbers.
- Someone asking for your password. No legitimate organization will
ever ask you for that.
- Someone pressuring you to bypass or ignore security processes
or procedures you are expected to follow at work.
- Something too good to be true. For example, you are notified you
won the lottery or an iPad, even though you never even entered the lottery.
- You receive an odd email from a friend or coworker containing
wording that does not sound like it is really them. A cyber attacker may have hacked into their account and is attempting to trick you. To protect yourself, verify such requests by reaching out to your friend using a different communications method, such as
in person or over the phone.
- If you suspect someone is trying to trick or fool you, do not
communicate with the person anymore. If the attack is work related, be sure to report it to your help desk or information security team right away. Remember, common sense is often your best defense.
Have questions or need assistance? Contact the HelpDesk.
865-974-9900 | online chat
Follow @UT_OIT on Twitter for up-to-date announcements regarding OIT events and outages.
the IT Weekly