November 5, 2018
If you have
not completed your 2018 Security Awareness training, you have until November 30, 2018, to receive credit.
Training is required
for full-time faculty and staff. The three training tracks, standard, IT professional, and executive, are assigned based on your title. Training can usually be completed in 45-60 minutes.
the 2018 Security Awareness Training to sign in.
is required annually through UT
Policy IT0123 - Security Awareness, Training, and Education.
If you have completed cybersecurity training through your partnership with another institution, you can request this training fulfill the Mandatory Training Requirement for 2018. To submit this request,
in to K@Te
and select ‘Home’ from the left menu. Choose ‘Universal Profile’ and select the ‘Transcripts’ tab. Choose the three dots (…) on the right and select ‘Add External Training’ and follow the instructions.
Deans, Directors, and Department Heads:
If you would like to confirm who on your staff has completed their training, we have provided
on the OIT website.
Have you or your
students experienced problems when printing PDF documents, especially from within Canvas? PDFs are often problematic depending on how they were created and uploaded. In general, if you download and save your PDF first,
before attempting to print, you should have better results. Saving it first will clear hidden tags in the document that may be preventing it from printing correctly. First, open your document, do a ‘Save As’ to save it to the local drive on your computer
or to your H: drive. Close the original document from wherever you accessed it. Then open your saved document to print.
Stata MP by Stata Corp
Stata MP is a general purpose package for statistics, data management, and graphics. You can control
it using its programming language or its graphical user interface. Stata is designed to be easily extendable and there are many hundreds of free add-ons available for it in Internet repositories. Stata is particularly strong in time series, panel data, and
the analysis of complex, non-random samples. Its data must fit into your computer’s main memory, limiting the amount of data it can handle.
more about Stata MP on OIT’s Research Software website.
Learn when to use it, where to run it, how to learn, and where to get help.
Upcoming OIT Workshops
Here's a selection of topics that will be covered in workshops this week:
Best Practices for Presentations
Cloud Storage Options at UTK
Post Hoc Tests for Main Effects
R: Complex Mixed Models
our calendar of upcoming workshops at workshops.utk.edu and
register to attend.
Can't make it to class or want to learn about another topic?
Check out our online training sessions.
Hopefully you’re aware of the dangers of phishing and know
how to spot the danger
in an email. When it comes to mobile devices, there are several avenues that attackers can use in addition to email. It is common for criminals to send text messages or make phone calls claiming to be from a trusted organization, asking for your information.
In some cases, they may even claim your account is already compromised and you need to act quickly or else the account will be deactivated. Urgency or ultimatums (“give us your credentials or something bad will happen”) are a huge red flag. No legitimate service
should ask for your personal information in this manner. If you’re concerned about your account, hang up and do not reply, find the legitimate contact information for the organization in question, and call them to ask about their account breach and recovery
process. Be sure to inform them about the suspicious call/SMS that you received.
Popular mobile phishing attempts include pretending to be your bank, pretending to be the IRS,
claiming that charges will be filed against you if you do not pay a fine, claims of fake prizes and windfalls, and pretending to be a popular service and sending malicious links in the hopes of getting people to click on them. Sophisticated criminals may even
know your place of employment and pretend to be from your business.
What to do if you believe you have received a phishing call/text:
- Remember: No government agency, bank, or legitimate business will
ask for personal information via text.
- Don’t panic. Scammers often try to create a false sense of urgency.
If you’re worried about an account, take your time to find the correct contact information for that organization.
- Never click on links or return phone calls to any numbers in unsolicited
texts or emails.
- Never give information over the phone to an unsolicited call.
Scammers can spoof phone numbers to pose as, for example, your local bank branch. Hang up, find the correct contact info, and initiate the call yourself.
- Don’t respond to unsolicited messages. Any response at all will
let the scammer know that your number is active and incentivizes them to keep trying.
- Report the message or phone call to your carrier’s spam or scam
reporting service (See Reporting below).
- After reporting the text to your carrier, delete the message.
To report spam texts to Verizon, AT&T, T-Mobile, or Sprint, forward* the text to 7726 (SPAM). You
should get an immediate reply thanking you for reporting the spam and asking for the spammer’s number. Reply with the phone number that sent the spam text. You should then get another reply thanking you for helping and possibly carrier specific tips for blocking
You can also
file a complaint
with the FTC for unwanted telemarketing, text, or spam.
*To forward a text message on iPhone, navigate to the text that you want to forward, tap and hold
on that bubble until “copy” and “more” pop up (Be careful not to click on any links while doing this!). Click on “more” and a forward arrow will show up at the bottom of the screen.
Have questions or need assistance? Contact the HelpDesk.
865-974-9900 | online chat
Follow @UT_OIT on Twitter for up-to-date announcements regarding OIT events and outages.
the IT Weekly