December 10, 2018
Want a place to store your files that you can get to from
multiple devices? Have you considered possibly adopting Google Drive? Would you like a refresher on what Google Drive has to offer?
out OIT”s Google Drive File Stream User Guide
to learn more.
Away from your email over the
Are you planning to head home for the holidays, or perhaps
to some faraway place to do research? Out of Office replies will respond on your behalf and inform the sender that you are away from your email. For security purposes, OIT recommends that you limit the information available in your response.
When constructing your message, you may want to consider
- Set a different message
for external responses or only respond to internal email. Office 365 will allow you to customize your internal and external responses.
- Be vague about your whereabouts.
Simply state that you are unavailable and will respond as soon as possible.
- If you don’t want a stranger
to know about your vacation plans, don’t put them in your Out of Office reply.
The OIT Knowledge Base has instructions for configuring
Out of Office replies.
365/Outlook Web App
and Staff: Access to OIT Services After Leaving UT
Are you retiring
from UT? Have you accepted a position at another university? While you will always be part of the Volunteer family, access to OIT services will vary once you leave UT. Below are some basic guidelines for faculty and staff who leave the university in good
information about the account retention policies
for other OIT services is available online. If you have questions about a specific service not addressed, please
the OIT HelpDesk online
or at 865-974-9900.
365 Email*/OneDrive and Google Apps:
Our current standard practice is to provide you access for one calendar year after you leave the university. At the end of the year, your email account and forwarding will be deleted, and files stored in OneDrive and Google Drive will be removed.
Once you have left the University, your Microsoft Office ProPlus subscription will end, and access to the desktop suite will be unavailable. Your license for the Home Use Program will no longer be valid. After this time, you will need to enroll in other
or commercial offers from Microsoft or
other third-party retailers.
with at least ten years of service are eligible to retain an email account by contacting
ArcGIS from Esri
ArcGIS is an integrated suite of software products used for mapping/visualizing data, collecting
geographic data, and spatial reasoning. Spatial analytics and 3D modeling features are also integrated into ESRI products. The ArcGIS platform includes desktop software, Software as a Service (Saas), and ESRI plug-ins and mobile apps.
more about ArcGIS on OIT’s Research Software website.
Learn when to use it, where to run it, how to learn, and where to get help.
Upcoming OIT Workshops
OIT Workshops will return in January! The schedule is online at
Can't make it to class or want to learn about another topic?
Check out our online training sessions.
The Best Gift For Cyber Criminals? –Your Data!!
Many people mistakenly believe they are not a target for cyber attackers: that they, their systems,
or accounts do not have any value. This could not be further from the truth. If you use technology in any way, at work or home, trust us - you have value to the bad guys.
There are lots of different cyber attackers on the Internet today, and they all have different
motivations. So why would any of them want to attack you? Because by hacking you they help achieve their goal. Here are two common examples of cyber attackers and why they would target you.
These guys are out to make as much money as possible. What makes the Internet so valuable to them is they can now easily target everyone in the world with just the push of a button. And there are A LOT of ways they can make money from you. Examples include
stealing money from your bank or retirement accounts, creating a credit card in your name and sending you the bill, using your computer to hack other people, or hacking your social media or gaming accounts and selling them to other criminals.
These are highly trained cyber attackers, often working for governments, criminal syndicates, or competitors targeting you at work. You may feel your job would not attract much attention, but you would be very surprised.
The information you handle at work has tremendous value to different companies or governments.
Targeted attackers may target you at work not because they want to hack you, but to use you to
hack one of your co-workers or other systems.
These types of attackers may target you at work because of what other companies you work or partner
Fortunately, being secure is not that hard; ultimately common sense and some basic behaviors are
your best defense. If you get an email, message, or phone call that is extremely urgent, odd, or suspicious, it may be an attack. To ensure your computers and devices are secure, keep them current and enable automatic updating. Finally, use a strong, unique
passphrase for each of your accounts. Staying cyber-aware is ultimately your best defense.
Have questions or need assistance? Contact the HelpDesk.
865-974-9900 | online chat
Follow @UT_OIT on Twitter for up-to-date announcements regarding OIT events and outages.
the IT Weekly