Skip Ribbon Commands
Skip to main content

IT Weekly

:

Quick Launch

OIT Homepage > IT Weekly > Posts > [ITWEEKLY] IT Weekly, December 10, 2018
December 10
[ITWEEKLY] IT Weekly, December 10, 2018

 

Title: OIT Weekly at The University of Tennessee, Knoxville - Description: Office of Information Technology's weekly newsletter

December 10, 2018

 

Google Drive

Want a place to store your files that you can get to from multiple devices? Have you considered possibly adopting Google Drive?   Would you like a refresher on what Google Drive has to offer?  Check out OIT”s Google Drive File Stream User Guide to learn more.


Away from your email over the holidays?

Are you planning to head home for the holidays, or perhaps to some faraway place to do research? Out of Office replies will respond on your behalf and inform the sender that you are away from your email.  For security purposes, OIT recommends that you limit the information available in your response.

 

When constructing your message, you may want to consider the following.

  • Set a different message for external responses or only respond to internal email.  Office 365 will allow you to customize your internal and external responses.  
  • Be vague about your whereabouts.  Simply state that you are unavailable and will respond as soon as possible. 
  • If you don’t want a stranger to know about your vacation plans, don’t put them in your Out of Office reply.

 

The OIT Knowledge Base has instructions for configuring Out of Office replies.

Outlook for Windows

Outlook for Mac

Office 365/Outlook Web App

Gmail


Faculty and Staff: Access to OIT Services After Leaving UT

Are you retiring from UT? Have you accepted a position at another university?  While you will always be part of the Volunteer family, access to OIT services will vary once you leave UT.   Below are some basic guidelines for faculty and staff who leave the university in good standing.   Additional information about the account retention policies for other OIT services is available online.  If you have questions about a specific service not addressed, please contact the OIT HelpDesk online or at 865-974-9900.

 

  • Office 365 Email*/OneDrive and Google Apps: Our current standard practice is to provide you access for one calendar year after you leave the university.  At the end of the year, your email account and forwarding will be deleted, and files stored in OneDrive and Google Drive will be removed.
  • Microsoft Office:  Once you have left the University, your Microsoft Office ProPlus subscription will end, and access to the desktop suite will be unavailable. Your license for the Home Use Program will no longer be valid.  After this time, you will need to enroll in other available consumer or commercial offers from Microsoft or other third-party retailers.

 

* Retirees with at least ten years of service are eligible to retain an email account by contacting Benefits and Retirement.


ArcGIS from Esri

ArcGIS is an integrated suite of software products used for mapping/visualizing data, collecting geographic data, and spatial reasoning. Spatial analytics and 3D modeling features are also integrated into ESRI products. The ArcGIS platform includes desktop software, Software as a Service (Saas), and ESRI plug-ins and mobile apps.

 

Learn more about ArcGIS on OIT’s Research Software website.  Learn when to use it, where to run it, how to learn, and where to get help.


Upcoming OIT Workshops

OIT Workshops will return in January!  The schedule is online at workshops.utk.edu

 

Can't make it to class or want to learn about another topic? Check out our online training sessions.


The Best Gift For Cyber Criminals? –Your Data!!

Many people mistakenly believe they are not a target for cyber attackers: that they, their systems, or accounts do not have any value. This could not be further from the truth. If you use technology in any way, at work or home, trust us - you have value to the bad guys.

There are lots of different cyber attackers on the Internet today, and they all have different motivations. So why would any of them want to attack you? Because by hacking you they help achieve their goal. Here are two common examples of cyber attackers and why they would target you.

 

Cyber Criminals: These guys are out to make as much money as possible. What makes the Internet so valuable to them is they can now easily target everyone in the world with just the push of a button. And there are A LOT of ways they can make money from you. Examples include stealing money from your bank or retirement accounts, creating a credit card in your name and sending you the bill, using your computer to hack other people, or hacking your social media or gaming accounts and selling them to other criminals.

 

Targeted Attackers: These are highly trained cyber attackers, often working for governments, criminal syndicates, or competitors targeting you at work. You may feel your job would not attract much attention, but you would be very surprised.

 

The information you handle at work has tremendous value to different companies or governments.

 

Targeted attackers may target you at work not because they want to hack you, but to use you to hack one of your co-workers or other systems.

 

These types of attackers may target you at work because of what other companies you work or partner with.

 

Fortunately, being secure is not that hard; ultimately common sense and some basic behaviors are your best defense. If you get an email, message, or phone call that is extremely urgent, odd, or suspicious, it may be an attack. To ensure your computers and devices are secure, keep them current and enable automatic updating. Finally, use a strong, unique passphrase for each of your accounts. Staying cyber-aware is ultimately your best defense.

 

*Article Reference-https://www.sans.org/security-awareness-training/resources/yes-you-are-target


Have questions or need assistance? Contact the HelpDesk.

help.utk.edu   |   865-974-9900   |   online chat

...

Follow @UT_OIT on Twitter for up-to-date announcements regarding OIT events and outages.


 

Join/Leave the IT Weekly

Archive now available

 

Comments

There are no comments for this post.