Skip Ribbon Commands
Skip to main content

IT Weekly

:

OIT Homepage > IT Weekly
The IT Weekly Archive for the Office of Information Technology at the University of Tennessee, Knoxville.
December 10
[ITWEEKLY] IT Weekly, December 10, 2018

 

Title: OIT Weekly at The University of Tennessee, Knoxville - Description: Office of Information Technology's weekly newsletter

December 10, 2018

 

Google Drive

Want a place to store your files that you can get to from multiple devices? Have you considered possibly adopting Google Drive?   Would you like a refresher on what Google Drive has to offer?  Check out OIT”s Google Drive File Stream User Guide to learn more.


Away from your email over the holidays?

Are you planning to head home for the holidays, or perhaps to some faraway place to do research? Out of Office replies will respond on your behalf and inform the sender that you are away from your email.  For security purposes, OIT recommends that you limit the information available in your response.

 

When constructing your message, you may want to consider the following.

  • Set a different message for external responses or only respond to internal email.  Office 365 will allow you to customize your internal and external responses.  
  • Be vague about your whereabouts.  Simply state that you are unavailable and will respond as soon as possible. 
  • If you don’t want a stranger to know about your vacation plans, don’t put them in your Out of Office reply.

 

The OIT Knowledge Base has instructions for configuring Out of Office replies.

Outlook for Windows

Outlook for Mac

Office 365/Outlook Web App

Gmail


Faculty and Staff: Access to OIT Services After Leaving UT

Are you retiring from UT? Have you accepted a position at another university?  While you will always be part of the Volunteer family, access to OIT services will vary once you leave UT.   Below are some basic guidelines for faculty and staff who leave the university in good standing.   Additional information about the account retention policies for other OIT services is available online.  If you have questions about a specific service not addressed, please contact the OIT HelpDesk online or at 865-974-9900.

 

  • Office 365 Email*/OneDrive and Google Apps: Our current standard practice is to provide you access for one calendar year after you leave the university.  At the end of the year, your email account and forwarding will be deleted, and files stored in OneDrive and Google Drive will be removed.
  • Microsoft Office:  Once you have left the University, your Microsoft Office ProPlus subscription will end, and access to the desktop suite will be unavailable. Your license for the Home Use Program will no longer be valid.  After this time, you will need to enroll in other available consumer or commercial offers from Microsoft or other third-party retailers.

 

* Retirees with at least ten years of service are eligible to retain an email account by contacting Benefits and Retirement.


ArcGIS from Esri

ArcGIS is an integrated suite of software products used for mapping/visualizing data, collecting geographic data, and spatial reasoning. Spatial analytics and 3D modeling features are also integrated into ESRI products. The ArcGIS platform includes desktop software, Software as a Service (Saas), and ESRI plug-ins and mobile apps.

 

Learn more about ArcGIS on OIT’s Research Software website.  Learn when to use it, where to run it, how to learn, and where to get help.


Upcoming OIT Workshops

OIT Workshops will return in January!  The schedule is online at workshops.utk.edu

 

Can't make it to class or want to learn about another topic? Check out our online training sessions.


The Best Gift For Cyber Criminals? –Your Data!!

Many people mistakenly believe they are not a target for cyber attackers: that they, their systems, or accounts do not have any value. This could not be further from the truth. If you use technology in any way, at work or home, trust us - you have value to the bad guys.

There are lots of different cyber attackers on the Internet today, and they all have different motivations. So why would any of them want to attack you? Because by hacking you they help achieve their goal. Here are two common examples of cyber attackers and why they would target you.

 

Cyber Criminals: These guys are out to make as much money as possible. What makes the Internet so valuable to them is they can now easily target everyone in the world with just the push of a button. And there are A LOT of ways they can make money from you. Examples include stealing money from your bank or retirement accounts, creating a credit card in your name and sending you the bill, using your computer to hack other people, or hacking your social media or gaming accounts and selling them to other criminals.

 

Targeted Attackers: These are highly trained cyber attackers, often working for governments, criminal syndicates, or competitors targeting you at work. You may feel your job would not attract much attention, but you would be very surprised.

 

The information you handle at work has tremendous value to different companies or governments.

 

Targeted attackers may target you at work not because they want to hack you, but to use you to hack one of your co-workers or other systems.

 

These types of attackers may target you at work because of what other companies you work or partner with.

 

Fortunately, being secure is not that hard; ultimately common sense and some basic behaviors are your best defense. If you get an email, message, or phone call that is extremely urgent, odd, or suspicious, it may be an attack. To ensure your computers and devices are secure, keep them current and enable automatic updating. Finally, use a strong, unique passphrase for each of your accounts. Staying cyber-aware is ultimately your best defense.

 

*Article Reference-https://www.sans.org/security-awareness-training/resources/yes-you-are-target


Have questions or need assistance? Contact the HelpDesk.

help.utk.edu   |   865-974-9900   |   online chat

...

Follow @UT_OIT on Twitter for up-to-date announcements regarding OIT events and outages.


 

Join/Leave the IT Weekly

Archive now available

 

December 03
[ITWEEKLY] IT Weekly, December 3, 2018

 

Title: OIT Weekly at The University of Tennessee, Knoxville - Description: Office of Information Technology's weekly newsletter

December 3, 2018

 

How to get your tech toys online after the holidays

Do you plan on picking up a new phone over the holidays?  A new laptop? Gaming System? Streaming device?  Kindle?  Have you wondered how easy it would be to get your new gadgets online at UT?

 

For your laptops, phones, tablets, or any device with a web browser, the first step is to connect to UT’s guest wireless network, ut-open, and open a web browser.  Once there, new devices are automatically directed to support.utk.edu.  Follow the instructions to get registered. Once your device is registered, we recommend students, faculty and staff then use the eduroam wireless network for secure access.

 

For anything without a web browser, go to netreg.utk.edu/games and follow the instructions. To register your device, you will need to know the MAC address. Instructions for finding the MAC address for many popular devices, such as an Xbox, PlayStation, Kindle, or Apple TV are available in the Knowledge Base.


Students: Access to OIT Services After Leaving UT

Are you graduating or taking a semester off?  While you will always be a Vol for Life, access to OIT services will vary once you leave UT.   Below are some basic guidelines for students who leave the university in good standing.   Additional information about the account retention policies for other OIT services is available online.  If you have questions about a specific service not addressed, please contact the OIT HelpDesk online or at 865-974-9900.

 

  • Volmail Email: you will retain access to your Office 365 or Gmail netid@vols.utk.edu email account and email address indefinitely. One year after you leave the University your @utk.edu, @tennessee.edu, and other email addresses will no longer receive email.
  • Office 365 OneDrive and other online apps: you will retain access for one calendar year after your LeftUT date in the UT Directory. At the end of this year, access to the files stored in your UTK OneDrive for Business will be unavailable, and Microsoft will delete the files. OIT recommends backing up and transferring your files to another third-party service or your UTK Google Drive.
  • Google Drive and other online apps: Access to the G-Suite Apps, including Google Drive, will remain available after you leave the university via netid@vols.utk.edu.
  • Microsoft Office: Once you have left the University, your Microsoft Office ProPlus subscription will end, and access to the full Office desktop suite will be unavailable.  For the one year, you have access to Microsoft OneDrive, and you can get to your files with the online version of Office.

OIT Suggestion Box

Here is a round-up of the most popular and recent editions to the OIT Suggestion Box.  If you have suggestions for OIT or would like to vote on any of the current suggestions, visit the OIT Suggestion Box.

 

Most Popular

Gmail for faculty and staff

Multifactor security

Cloud-based project management solution

 

Recent Additions

Update FERPA training

Allow 11x17 printing on VolPrint printers on the 2nd floor Hodges Library.

Update NetReg, the network registration application.


ArcGIS from Esri

ArcGIS is an integrated suite of software products used for mapping/visualizing data, collecting geographic data, and spatial reasoning. Spatial analytics and 3D modeling features are also integrated into ESRI products. The ArcGIS platform includes desktop software, Software as a Service (Saas), and ESRI plug-ins and mobile apps.

 

Learn more about ArcGIS on OIT’s Research Software website.  Learn when to use it, where to run it, how to learn, and where to get help.


Upcoming OIT Workshops

Here's a selection of topics that will be covered in workshops this week:

 

·         Canvas:

o   Foundations: Getting Started

o   Assignments/Assessments/Grades

o   Tips & Tricks

o   New Gradebook

·         Photoshop: Compositing Images

 

View our calendar for upcoming workshops and register to attend.

 

Can't make it to class or want to learn about another topic? Check out our online training sessions.


Holiday Scams

The season of Santa, reindeer, gifts, and eggnog is upon us, which means we must be cautious of common holiday ploys to steal credit card and personal information. With the mass amount of online gift buying during the holiday season, cyber security criminals believe this presents a prime opportunity to steal your information. Be aware of e-mails or any online advertising that seems too good to be true. False advertisements and phishing e-mails are two ways in which cyber security criminals will try to lure you in to steal your information. Remember, if the deal looks too good to be true, it probably is.  

 

Here are some additional tips you can use to avoid being a victim of cyber fraud: 

·               Check your credit card statement routinely.

·               Protect your credit card numbers from “wandering eyes.”

·               Do not respond to unsolicited (spam) e-mail.

·               Do not click on links contained within an unsolicited e-mail.

·               Be cautious of e-mail claiming to contain pictures in attached files, as the files may contain viruses. Only open attachments from known senders. Scan the attachments for viruses if possible.

·               Avoid filling out forms contained in e-mail messages that ask for personal information.

·               Always compare the link in the e-mail to the link you are actually directed to and determine if they match and lead you to a legitimate site.

·               Log on directly to the official website for the business identified in the e-mail, instead of “clicking” to it from an unsolicited e-mail.

·               If you are requested to act quickly, or there is an emergency, it may be a scam. Fraudsters create a sense of urgency to get you to act quickly.

·               Verify any request for personal information from any business or financial institution by contacting them using the main contact information for their official website. Remember if it looks too good to be true, it probably is.

·               Be cautious when using public ATM's; paying attention to prying eyes or equipment that just doesn't look right. Contact the owners of the business or your financial institution and report it.

 

As a reminder, OIT will post email scams to the Recent Email Scams tab within the OIT System Status Center.  You can check this site to see if a suspicious email has already been reported.  If you have concerns about a specific email, you may report the email to OIT via abuse@utk.edu or contact the OIT HelpDesk.


Have questions or need assistance? Contact the HelpDesk.

help.utk.edu   |   865-974-9900   |   online chat

...

Follow @UT_OIT on Twitter for up-to-date announcements regarding OIT events and outages.


 

Join/Leave the IT Weekly

Archive now available

 

November 26
[ITWEEKLY] IT Weekly, November 26, 2018

 

Title: OIT Weekly at The University of Tennessee, Knoxville - Description: Office of Information Technology's weekly newsletter

November 26, 2018

 

Instructors: Build Your Canvas Skills Nov 30 to Dec 6

Whether you're just getting started in Canvas, or ready to expand into more advanced features, you'll find what you need at our upcoming workshops. Jump in now, before winter break, to build your skills and get ready for the new semester!

 

  • Canvas Analytics for Student Success: Fri, 11/30, 9-11 am
  • Canvas Foundations: Mon, 12/3, 8:30-10 am
  • Canvas Assignments/Assessments/Grades: Tues, 12/4, 1-2 pm
  • Canvas Tips & Tricks: Wed, 12/5, 9-10 am
  • Canvas New Gradebook: Thur, 12/6, 11:15 am-12:15 pm

 

All workshops take place Communications Building, Classroom C. Register at tiny.utk.edu/learn-canvas.


Safety First: Getting Online during the Holidays

With the upcoming holidays, we thought it would be a good time to remind you about some best practices regarding your online access over the holidays.  While we may be taking a break from school (and work), the bad guys are hard at work. We’ve posted a few tips help you stay safe online.


OIT Faculty First Grant 2019

Proposals are due Monday, January 7, 2019, at 5 pm.

 

Do you have a vision for your course on how to improve student learning and need assistance with the development of course materials? Through the Faculty First Grant, the Office of Information Technology (OIT) will build a long-term partnership with you to redesign your course and develop instructional materials.  To apply, download the Call for Proposals instructions.


As a Faculty First grant recipient, you serve as a subject matter expert, and OIT provides its professional expertise, including instructional designers, graphic and web designers, multimedia developers, Universal Design for Learning specialist, and instructional technology specialists.

Learn more about the Faculty First Program.

Remember, if you have a small project, you do not need to apply for this grant. We are here to help you anytime. 
Contact the OIT HelpDesk online or at 865-974-9900 and request faculty assistance with one of our instructional designers.


Reminder: Faculty Untethered Teaching Reward (FUTR) due 11/30/18

Eligible faculty may apply for the Faculty Untethered Teaching Reward (FUTR) which will supply a Microsoft Surface to select applicants. 

 

Learn more about the program and apply online today. Deadline for application is November 30, 2018.


Amos for Windows by SPSS, an IBM company

Amos (Analysis of Moment Structures) analyzes Structural Equation Models (SEM) by either drawing a path diagram or via a command language. These models are also known as LISREL models, confirmatory factor analysis, analysis of covariance structures, path analysis, or causal modeling.

 

Learn more about Amos on OIT’s Research Software website.  Learn when to use it, where to run it, how to learn, and where to get help.


Upcoming OIT Workshops

Here's a selection of topics that will be covered in workshops this week:

 

·         Canvas Analytics for Student Success

·         Google Forms

·         Google Sites

·         Microsoft Excel: Advanced Features

 

View our calendar for upcoming workshops and register to attend.

 

Can't make it to class or want to learn about another topic? Check out our online training sessions.


Staying Secure While Shopping Online

It is that time of year where so many people prepare to purchase gifts for friends, family, and loved ones. Though it can be convenient to avoid the lines and rush for that latest Black Friday deal by shopping online, this also carries some risk. Cybercriminals are always working to steal your personal and payment information. The holiday shopping season is the perfect opportunity for this to happen. By following a few key practices, you can greatly lower your chances of becoming a victim of identity theft or fraud.

 

Choose Trusted Online Retailers and Apps

Always shop only with trusted online retailers. That means using a retailer you already know or one that is verified through another trusted entity. If you find a new possible shop to do business with, but are unsure about its reputation, try to find reviews from trusted sources such as the Better Business Bureau. It is important to stick to trusted review sources because there are several ways to fake online reviews, and there are places where cybercriminals can pay other criminals to post positive reviews. Even though an untrusted site might have the best prices, it is worth it to use a trusted online shop that is known to safeguard your information and purchases.

 

Secure your Device, Connectivity, and Accounts

Keep your devices up-to-date, especially those you shop and bank with Simply updating the device that you use for conducting your online shopping is a key cybersecurity practice

Never use a public computer when shopping or banking Using a public computer, like those found at libraries, can expose you to greater risk. It is best to use a trusted home device and network for anything involving financial transactions.

Look for the lock icon on your browser - When a site has a lock icon on the browser window, or in the URL bar, it indicates that your communications with the site are encrypted. If you do not see a lock, look for “https” at the beginning of the URL, as this is the same thing as the lock.

Check out as a guest – By checking out as a guest, you prevent the online retailer from storing your personal account and financial information. This minimizes the amount of information that could be lost if the retailer is compromised. If you have or need an account with a retail website:

  • Use a strong password – Be sure to use a strong, unique password. Always use more than ten characters, with numbers, special characters, and upper and lower case letters.
  • Don’t save your payment information with retailers – If you have an established account with a retailer, do not store your payment information with them. In the case of an account compromise, stored payment information may allow a criminal to make purchases using your financial information.

 


Have questions or need assistance? Contact the HelpDesk.

help.utk.edu   |   865-974-9900   |   online chat

...

Follow @UT_OIT on Twitter for up-to-date announcements regarding OIT events and outages.


 

Join/Leave the IT Weekly

Archive now available

 

November 12
[ITWEEKLY] IT Weekly, November 12, 2018

 

Title: OIT Weekly at The University of Tennessee, Knoxville - Description: Office of Information Technology's weekly newsletter

November 12, 2018

 

Security Awareness, Title IX, and FERPA training

Over the last several weeks, we have included information about the three mandatory online training classes for university faculty and staff.  The deadline to complete the training is quickly approaching!  To see who on your staff has completed their training, follow the instructions on the OIT website.

 

At the end of the year, the Office of Information Technology, the Office of Title IX, and the Registrar’s Office will report to the Board of Trustees the completion rates for the Knoxville campus.  Based on numbers reported from IRIS, completion rates for UTK employees assigned to the training are below. Please encourage your team to complete the training as soon as possible.

 

  • IT Security Awareness Training – Regular Employee, IT Staff, Executive (due 11/30/2018)
    All regular, UTK employees are required to complete this training
    As of November 7, 43% of the required employees have satisfied the requirement.  

  • Title IX Training (due 12/3/2018)
    All 100% employment, regular faculty and staff are required to complete this training.
    As of November 7, 81% of the required employees have satisfied the requirement.

  • FERPA Training (due 11/30/2018)
    All regular, UTK employees are required to complete this training.
    As of November 7, 35% of the required employees have satisfied the requirement.

 

To verify that you have completed the mandatory training, log into K@TE and review your transcript.

 

If you or your team need assistance logging into or accessing the training, contact the OIT HelpDesk.


Can you hear me now?

Enhanced Cellular Coverage on Campus

 

During the summer and early fall, OIT oversaw the installation of enhanced cellular coverage in several areas on campus, including Ayres Hall, Circle Park, Hesler Biology Builidng, Stokely Management Center, and Taylor College of Law.  These sites have been added to the campus Distributed Antenna System (DAS); Verizon Wireless is currenlty the only participating carrier for these locations.

 

Neyland Stadium, Thompson Boling Arena and the Veterinary Medical Center were already on the campus DAS; carriers for these areas include Verizon, AT&T, and US Cellular.

 

We realize access to all forms of wireless communications continues to grow and we are making it a priority to ensure the Knoxville campus has adequate coverage.  We are partnering with our vendors and wireless carriers to provide these services in additional campus buildings and outdoor spaces.


Customize your Canvas homepage

Spring 2019 Canvas course shells are now available to faculty and it might be time to give some thought to the basic structure of your course.

 

Research has shown that the design of online course sites is an important factor for student learning and success. Consistent course design may be one of the most vital factors. Students have reported difficulty navigating course sites across the curriculum. Course sites that are designed to a standard allow students to concentrate on the content, not on hunting for information.

 

The course Homepage is a great place to start, and it’s actually quite easy to create a Homepage that is engaging, informative, and easy to navigate. We’ve developed an online tutorial to assist you.

 

Just need help getting started? Want to rethink your entire course site structure? Interested in a review of your course site compared to research-based standards? Thinking about a total redesign of your course? OIT Instructional Support staff are ready to assist you. Contact the OIT HelpDesk online to get started.


Windows Server 2008 Retirement

Microsoft Windows Server 2008 reaches end-of-life on January 14, 2020.  After that date Microsoft will no longer provide security patches, bug fixes, or performance enhancements for that operating system.  Running unsupported software exposes the university to additional risk, and is against the Acceptable Use Policy, IT0110 – section 2h:  Use only supported and patched applications and operating systems on university-owned devices. Exceptions must be documented and approved by the Campus Authority or their designee.

 

OIT is in the process of working with the campus to retire all Windows Server 2008 servers, both physical and virtual, before January 2020. 

 

If you know you are running Windows Server 2008 machines and are ready to begin the replacement / retirement process, contact the OIT HelpDesk online to get on the schedule!


Instructional Technology Community of Practice (ITCoP)

Explore Technology in the Library

UTK faculty and GTAs are invited to join the ITCoP's roving meetings as we explore teaching and learning with technology across campus. The November meeting will be held in The Studio in Hodges Library, Room 235, on Wednesday, November 28th, from 12:20-1:10 pm. Come see and experience learning like never before through video production, a digital anatomy table, the Virtual Reality Room and more!

 

Visit the ITCoP website for more information.


WordStat by Provalis Research, Inc.

WordStat is software that performs high-speed content analysis on text data. This process is also known as text mining. You may create your own categorization dictionaries within WordStat or import pre-existing subject dictionaries. It can also extract topics automatically using either cluster analysis or latent semantic analysis.

 

Learn more about WordStat on OIT’s Research Software website.  Learn when to use it, where to run it, how to learn, and where to get help.


Upcoming OIT Workshops

Here's a selection of topics that will be covered in workshops this week:

 

·       Getting Started with Arc

·       Text Analysis Using JMP

·       Microsoft Excel 2 (Forms, Charts, and Macros)

 

View our calendar of upcoming workshops and register to attend.

 

Can't make it to class or want to learn about another topic? Check out our online training sessions.


National Fraud Day

Yesterday, November 11th, was Veterans Day. We want to take a moment to thank all Veterans for their service.

 

Yesterday was also National Fraud Day. Unfortunately, fraud is a worsening problem. According to Javelin Strategy & Research, there were 16.7 million victims of identity fraud in 2017, beating the previous year’s record high. The total cost of that identity theft was a staggering $16.8 billion, and nearly a third of US consumers had to be notified of some sort of breach (remember the Equifax breach? There’s a good chance that you were one of the 143 million people affected by it). Account takeovers also tripled in 2017, causing a total of $5.1 billion in damages. On an individual level, each victim paid an average of $290 out-of-pocket and spent 15 hours trying to resolve the fraud. Not the way I’d like to spend my spare time or money!

 

So how can we as consumers protect ourselves? Passwords are a great place to start. Of those that participated in the Consumer Fraud Awareness survey by Shred-It, half felt that their security practices made them vulnerable (49%) and admitted to reusing passwords and PINs (51%). Clearly, consumers understand that bad password habits make them vulnerable, but they don’t change these habits. Perhaps the thought of having a strong password for each online account is too daunting. If you feel that way, maybe a password manager is an option to consider. At the very least, make sure that your financial accounts have strong passwords, even if it requires a little extra effort to remember them. Another option is good old-fashioned pen and paper. While you don’t want to leave Post-it notes with your most sensitive passwords on every surface of your cubicle or office, writing down an important password and keeping it a fireproof lockbox is never a bad idea when the alternative is creating a weak password or reusing a password.

 

Finally, keep an eye on your accounts. You won’t be able to respond to an incident if you don’t know that it’s happened. Check your bank statements frequently and don’t forget that you’re entitled to one free credit check a year from each of the Big Three credit reporting agencies. If you spread these checks out throughout the year, you can check your credit at annualcreditreport.com for free every few months to make sure that someone hasn’t stolen your identity and is opening up lines of credit in your name.

 

Article: https://threatpost.com/threatlist-despite-fraud-awareness-password-reuse-persists-for-half-of-u-s-consumers/138846/


Have questions or need assistance? Contact the HelpDesk.

help.utk.edu   |   865-974-9900   |   online chat

...

Follow @UT_OIT on Twitter for up-to-date announcements regarding OIT events and outages.


 

Join/Leave the IT Weekly

Archive now available

 

November 05
[ITWEEKLY] IT Weekly, November 5, 2018

 

Title: OIT Weekly at The University of Tennessee, Knoxville - Description: Office of Information Technology's weekly newsletter

November 5, 2018

 

Time’s Running Out…

If you have not completed your 2018 Security Awareness training, you have until November 30, 2018, to receive credit.

 

Training is required for full-time faculty and staff. The three training tracks, standard, IT professional, and executive, are assigned based on your title.  Training can usually be completed in 45-60 minutes.

 

Visit the 2018 Security Awareness Training to sign in.

 

This training is required annually through UT Policy IT0123 - Security Awareness, Training, and Education.   If you have completed cybersecurity training through your partnership with another institution, you can request this training fulfill the Mandatory Training Requirement for 2018.  To submit this request, log in to K@Te and select ‘Home’ from the left menu.  Choose ‘Universal Profile’ and select the ‘Transcripts’ tab.  Choose the three dots (…) on the right and select ‘Add External Training’ and follow the instructions.

 

Attention Deans, Directors, and Department Heads: If you would like to confirm who on your staff has completed their training, we have provided instructions on the OIT website.


Printing PDFs

Have you or your students experienced problems when printing PDF documents, especially from within Canvas?  PDFs are often problematic depending on how they were created and uploaded.    In general, if you download and save your PDF first, before attempting to print, you should have better results.  Saving it first will clear hidden tags in the document that may be preventing it from printing correctly.   First, open your document, do a ‘Save As’ to save it to the local drive on your computer or to your H: drive. Close the original document from wherever you accessed it.  Then open your saved document to print.

Stata MP by Stata Corp

Stata MP is a general purpose package for statistics, data management, and graphics. You can control it using its programming language or its graphical user interface. Stata is designed to be easily extendable and there are many hundreds of free add-ons available for it in Internet repositories. Stata is particularly strong in time series, panel data, and the analysis of complex, non-random samples. Its data must fit into your computer’s main memory, limiting the amount of data it can handle.

 

Learn more about Stata MP on OIT’s Research Software website.  Learn when to use it, where to run it, how to learn, and where to get help.


Upcoming OIT Workshops

Here's a selection of topics that will be covered in workshops this week:

 

·       Apple iMovie

·       Best Practices for Presentations

·       Cloud Storage Options at UTK

·       Microsoft Excel

·       Post Hoc Tests for Main Effects

·       R: Complex Mixed Models

 

View our calendar of upcoming workshops at workshops.utk.edu and register to attend.

 

Can't make it to class or want to learn about another topic? Check out our online training sessions.


Mobile Phishing

Hopefully you’re aware of the dangers of phishing and know how to spot the danger in an email. When it comes to mobile devices, there are several avenues that attackers can use in addition to email. It is common for criminals to send text messages or make phone calls claiming to be from a trusted organization, asking for your information. In some cases, they may even claim your account is already compromised and you need to act quickly or else the account will be deactivated. Urgency or ultimatums (“give us your credentials or something bad will happen”) are a huge red flag. No legitimate service should ask for your personal information in this manner. If you’re concerned about your account, hang up and do not reply, find the legitimate contact information for the organization in question, and call them to ask about their account breach and recovery process. Be sure to inform them about the suspicious call/SMS that you received.

 

Popular mobile phishing attempts include pretending to be your bank, pretending to be the IRS, claiming that charges will be filed against you if you do not pay a fine, claims of fake prizes and windfalls, and pretending to be a popular service and sending malicious links in the hopes of getting people to click on them. Sophisticated criminals may even know your place of employment and pretend to be from your business.

 

What to do if you believe you have received a phishing call/text:

 

  • Remember: No government agency, bank, or legitimate business will ask for personal information via text.
  • Don’t panic. Scammers often try to create a false sense of urgency. If you’re worried about an account, take your time to find the correct contact information for that organization.
  • Never click on links or return phone calls to any numbers in unsolicited texts or emails.
  • Never give information over the phone to an unsolicited call. Scammers can spoof phone numbers to pose as, for example, your local bank branch. Hang up, find the correct contact info, and initiate the call yourself.
  • Don’t respond to unsolicited messages. Any response at all will let the scammer know that your number is active and incentivizes them to keep trying.
  • Report the message or phone call to your carrier’s spam or scam reporting service (See Reporting below).
  • After reporting the text to your carrier, delete the message.

 

REPORTING:

To report spam texts to Verizon, AT&T, T-Mobile, or Sprint, forward* the text to 7726 (SPAM). You should get an immediate reply thanking you for reporting the spam and asking for the spammer’s number. Reply with the phone number that sent the spam text. You should then get another reply thanking you for helping and possibly carrier specific tips for blocking that sender.

 

You can also file a complaint with the FTC for unwanted telemarketing, text, or spam.

 

*To forward a text message on iPhone, navigate to the text that you want to forward, tap and hold on that bubble until “copy” and “more” pop up (Be careful not to click on any links while doing this!). Click on “more” and a forward arrow will show up at the bottom of the screen.


Have questions or need assistance? Contact the HelpDesk.

help.utk.edu   |   865-974-9900   |   online chat

...

Follow @UT_OIT on Twitter for up-to-date announcements regarding OIT events and outages.


 

Join/Leave the IT Weekly

Archive now available

 

October 29
[ITWEEKLY] IT Weekly, October 29, 2018

 

Title: OIT Weekly at The University of Tennessee, Knoxville - Description: Office of Information Technology's weekly newsletter 

October 29, 2018

 

Great News for Faculty Using Tablets in the Classroom

OIT is happy to announce a new reward program for full-time UTK faculty who prefer to be “untethered” from laptops and are already using tablets in their classroom.  Eligible faculty may apply for the Faculty Untethered Teaching Reward (FUTR) which will supply a Microsoft Surface to select applicants*.  To qualify, you must meet the following criteria:

 

  • Full-time faculty who use a tablet as their primary machine.
  • Faculty must be teaching during the 2018-2019 academic year.
  • Have not received a computer through the Computer Upgrade Program (CUP) since November 30, 2015.
  • Your current tablet must be three years old or older (purchased on or before 11/30/2015)

 

Learn more about the program and apply online today. Deadline for application is November 30, 2018.

*There is a limited amount of funding for this initiative.  Should demand exceed funding, requests will be honored on a first-come, first serve basis.


 

Upcoming Training Deadlines

The university has moved several mandatory online training to K@TE this year.  One of the benefits of using K@TE is our ability to track the assignment and completion of mandatory training in IRIS.  Below is a list of training assigned during 2018.  Please ensure that your department is both aware of the training and completes the training by the deadlines listed below. 

 

If you are not sure if your staff has completed their training, please have someone in your office with access to IRIS execute report ZHR_QUALCOMP_REP, using your organization unit, qualification, and completion date to get a clear picture of your unit’s status.

 

Security Awareness Training: due by 11/30/2018

  • Qualification: 50273441
  • Completion Date: 12/31/2018

 

Title IX Training: due by 12/3/2018

  • Qualification: 50275035
  • Completion Date: 12/3/2018

 

The FERPA Training completions in K@TE can be found in IRIS using the ‘Attendee List’ via PSV1.

 

FERPA Training: due by 11/30/2018

  • Qualification: 50336687
  • Completion Date: 11/30/2018

 

If you need assistance with K@TE, contact Human Resources at 6-8847.


 

Learn more about Cloud Storage

Are you looking for a place to save your files, documents, and school work that is accessible from anywhere?  Do you need to share and collaborate with your classmates and coworkers? OIT has contracts in place with Microsoft and Google to provide safe and reliable storage options for university faculty, staff, and students.  Microsoft OneDrive and Google Drive not only provide an incredible amount of file storage but also options for collaborative activities with collogues around the world.

 

Sign up online to learn about the different cloud storage options here at UT and the best practices for using them. The next scheduled class is on November 6 at 9:40 am in Communications, Room 43, Classroom C.

 

If you are unable to attend this class and want to learn more about Microsoft OneDrive and Google Drive, check out our Lynda.com.
*For easy access when subscribing to the playlist, log in to Lynda.com first from 
oit.utk.edu/lynda.

 


 

OIT Suggestion Box

Here is a round-up of the most popular and recent editions to the OIT Suggestion Box.  If you have suggestions for OIT or would like to vote on any of the current suggestions, visit the OIT Suggestion Box.

 

Most Popular

Gmail for faculty and staff

Multifactor security

Cloud-based project management solution

 

Recent Additions

Contactless student ID cards on Apple Wallet

Add Volprint printers in more locations on campus.


 

SPSS Statistics by SPSS, an IBM company

SPSS Statistics is the most widely used statistics package at UT. It does a broad range of statistics and graphics, and it is easy to learn and use. It is also easy to transfer data from SPSS into R or SAS to access any esoteric analyses. While most users prefer the SPSS easy-to-use GUI interface, more advanced users can take advantage of its programming language. The SPSS programming language can be used to automate repetitive tasks, to leave an audit trail of the steps you took, and to get the package to do something that it was not originally designed to do.

 

Learn more about SPSS Statistics on OIT’s Research Software website.  Learn when to use it, where to run it, how to learn, and where to get help.


 

Upcoming OIT Workshops

Here's a selection of topics that will be covered in workshops this week:

 

·         Conjoint Analysis in Question Pro

·         Creating Instruction with Camtasia

 

View our calendar of upcoming workshops at workshops.utk.edu and register to attend.

 

Can't make it to class or want to learn about another topic? Check out our online training sessions.


 

Online Holiday Shopping

With the holiday’s right around the corner, many of us will begin the task of holiday shopping.  As you do so, it is important to be aware that the retail industry is an increasingly attractive target for criminals looking to steal credit card data. 

 

Whether shopping online or in store, it is important that you protect your personal information so that you can avoid being a victim of identity theft. But first, you might ask, “How do I know if my identity has been stolen?”  With the increase in retailer data breaches, consumers must take it upon themselves to closely monitor their account activity. The following are some examples of changes that could indicate someone has accessed your information: 

 

·         Unusual or unexplainable charges on your bills

·         Phone calls or bills from accounts, products, or services that you do not have

·         Failure to receive regular bills or mail 

·         New, strange accounts appearing on your credit report

·         Unexpected denial of your credit card 

 

Several habits can help protect you from online identity theft:  

·         Guard your information online. Never provide your personal information to unsolicited emails and advertisements. Holiday deals may be tempting, but checking the retailer’s website first can better protect your information. 

·         Clear your logins and passwords. This is especially important if you are working on a public or shared computer.

·         Pay for online purchases with your credit card, which has better guarantees under federal law then your online payment services or your debit card. 

·         Always verify that you are on a familiar website with security controls before entering personal data.


 

Have questions or need assistance? Contact the HelpDesk.

help.utk.edu   |   865-974-9900   |   online chat

...

Follow @UT_OIT on Twitter for up-to-date announcements regarding OIT events and outages.


 

 

Join/Leave the IT Weekly

Archive now available

 

October 22
[ITWEEKLY] IT Weekly, October 22, 2018

 

Title: OIT Weekly at The University of Tennessee, Knoxville - Description: Office of Information Technology's weekly newsletter

October 22, 2018

 

2019 Computer Upgrade Program

The FY19 Computer Upgrade Program is now underway. 

 

The Computer Upgrade Program (CUP) is a centrally funded program designed to upgrade the computer equipment for UTK faculty and staff once every four years.  OIT works with Deans, Directors, and Department Heads to fulfill requests.  If you believe you are eligible, contact your departmental representative for assistance.

 

Approved faculty or staff members may choose to purchase one of the program recommended configurations or configure a custom machine on one of the University’s contract vendor websites. Reimbursement for CUP purchases is limited to the cost of the standard configurations.  This year’s standard configurations for both Windows and Apple machines are high-powered machines with solid-state drives, I7 processors, and include the 4-year warranties with accident care. 

 

Additional information about this program is available on the OIT website.


OIT Offers Website Assistance for Departments

Can I get help with our departmental website?

Yes. To get started, contact the OIT HelpDesk online or by phone at 865-974-9900.

 

What happens after I request website assistance?

Based on the type of help you request, we’ll begin with a consultation to determine the goals and scope of your request. We generally work with your department for up to 40 hours at no cost to your department. Anything beyond that may require fees.

 

Can you help with structuring the content and the overall design?  

From defining your goals and designing the website to creating custom images and applying the official UT branding, we’ll help you create an approach to address your audiences’ needs effectively. Most of our web design work is built with WordPress.org, but we can work with plain HTML/CSS coding. Before turning your site over to you, we’ll train you on how to maintain your website.

 

What are my hosting options?

OIT’s VolWeb service is available for website hosting. Volweb is a Linux-based LAMP server and can be used to build websites, compile programs, edit files, and more. Additionally, you can request a MySQL database for database-driven websites and applications.

 

Can you create custom features for my site?

OIT’s Application Development staff supports PHP and .NET platforms. The costs for custom development requests are determined on a case-by-case basis. 

 

Can I control who has access to my department’s site content? 

Yes, you can use the Central Authentication Service (CAS) or Shibboleth for authentication.

 

How do I track whether the website is successful?

OIT offers consultation services for the integration of Google Analytics on your website.


SigmaPlot by Systat Software, Inc.

SigmaPlot is a scientific graphing and visualization software package with advanced curve fitting, a vector-based programming language, and macro capability. The software is controlled through the graphical user interface that is modeled after Microsoft Office. SigmaPlot contains over 100 graph types, and the user interface allows detailed manipulation of every graph object. SigmaPlot also includes access to 50 statistical tests which can be used for basic data analysis.

 

Learn more about SAS on OIT’s Research Software website0.

.  Learn when to use it, where to run it, how to learn, and where to get help.


Upcoming OIT Workshops

Here's a selection of topics that will be covered in workshops this week:

 

·         Adobe Lightroom

·         Microsoft Access 2

 

View our calendar of upcoming workshops at workshops.utk.edu and register to attend.

 

Can't make it to class or want to learn about another topic? Check out our online training sessions.


Pumpkin Patching? … No Just Patching...

Scary cyber criminals are constantly looking for a way into your accounts. This often happens one of two ways: phishing, or an attacker exploiting an existing vulnerability in some program running on your computer. While we continue to warn about the danger of phishing and how you can spot the danger, there are other ways to make sure your device does not become compromised. Luckily, you don’t have to put in nearly as much effort to stay safe as cyber criminals need to put in in order to compromise you. Protecting yourself by updating software installed on your computer is one of the easiest ways to keep your device safe.

 

Every program you run on your machine can add potential vulnerabilities. Unpatched vulnerabilities are akin to leaving your door ajar in a spooky neighborhood: it’s an inviting target that can make a criminal’s job much simpler. Updating your software regularly, besides adding new features, will often patch existing vulnerabilities, shutting and locking the door to attackers. This makes staying up to date on software patches a priority.

 

If your application has an option to check for updates automatically, you should always select this option. Your program will check for updates regularly without you having to remember to check. For other applications, you’ll have to check yourself, typically in the program’s settings. If you are unsure about how to update one or more of your applications, how to configure a program to update automatically if the option exists, or how to check if you are up to date, contact the OIT HelpDesk.

 

While staying up to date is critical, don’t be tricked into downloading malware disguised as a bogus update to a commonly used application. NEVER click on an unsolicited link in an email or while browsing the web that claims to be an update (i.e. Adobe Flash or Microsoft Office). If you believe you need to update, navigate that application’s update interface or go to the company’s official website.


Have questions or need assistance? Contact the HelpDesk.

help.utk.edu   |   865-974-9900   |   online chat

...

Follow @UT_OIT on Twitter for up-to-date announcements regarding OIT events and outages.


 

Join/Leave the IT Weekly

Archive now available

 

October 15
[ITWEEKLY] IT Weekly October 15, 2018

Title: OIT Weekly at The University of Tennessee, Knoxville - Description: Office of Information Technology's weekly newsletter

 

October 15, 2018

 

macOS Mojave, version 10.14, now available

Here we go again!  Apple has just released its latest operating system, macOS Mojave.   As tempted as you might be to upgrade, be cautious and upgrade your operating system only after you have verified that all of your favorite applications will work with the newer OS.   But, BEWARE!  Depending on your hardware and current OS, Apple may roll the upgrade to Mojave into their normal operating system updates.  If you are not careful and you just select ‘Update All’, you may get the Mojave upgrade along with all of the standard updates.  To uncouple the standard updates from the Mojave OS upgrade, click on the ‘More’ button to expand your choices.   You can then click the desired Update buttons and leave the Mojave upgrade for another time, allowing you to get your operating system updates without being forced to upgrade to Mojave.

 

OIT’s recommendation is to always wait a few months until Apple releases the first, or even the second patch, and vendors have an opportunity to correct incompatibilities between their products and Mojave.  Some vendors have cautioned against upgrading due to incompatibilities with their software, such as with some Adobe Creative Cloud applications, Google Drive, etc.     If you do decide to proceed, please be sure to back up your data and locate any media and/or license codes for your applications prior to initiating any upgrade. 

 

If you have any questions or need assistance, please contact the OIT HelpDesk online or call (865) 974-9900.


How to Spot an Email Scam: Tip 3

One way to spot an email scam is to check the aesthetics.  Phishing emails often contain convincing logos, links to actual company websites, legitimate phone numbers, and e-mail signatures of actual employees.  If the email meets some of the other email scam criteria, you should be wary.  Contact the organization directly with a known phone number to verify the request. Do not call the number provided in the email.

 

As always, you can contact the OIT HelpDesk to verify the legitimacy of the message.

 

Learn more about how to spot an email scam on OIT’s website.


Learn to Design Conjoint Surveys in Question Pro

Do you need to apply conjoint analysis in your study? Attend OIT’s face-to-face workshop! Conjoint analysis is based on a main effects analysis-of-variance model, and is one method that survey researchers and statisticians use assess the importance of multiple factors used in making decisions. For example, marketing researchers may use conjoint analysis to determine what price consumers are willing to pay for specific features or products, whereas health program coordinators may use conjoint analysis to predict patient adherence to various treatment regimens.

 

Using QuestionPro, participants will gain hands on experience designing conjoint survey questions and analyzing data. Examples of conjoint studies within different fields will be presented to encourage a discussion of methodology, survey design, and analytical techniques.

 

Register Online


SAS

SAS is a suite for statistical analysis, data management, and graphics. There are two recommended ways to run SAS: SAS itself, using its original program editor; SAS Studio, a more modern interface for both programming and menu-based analysis. Other products included in the Education Analytical Suite are Enterprise Miner, used for data mining, and Text Miner, which can extract concepts or sentiment from large volumes of text. A comprehensive list of SAS software included is shown on the vendor’s Education Analytical Suite web page.

 

Learn more about SAS on OIT’s Research Software website.  Learn when to use it, where to run it, how to learn, and where to get help.


Upcoming OIT Workshops

Here's a selection of topics that will be covered in workshops this week:

 

·         Automated Coding and Insights in Nvivo12

·         Creating a Student Portfolio with WordPress.com

·         ePortfolios for Developing and Assessing Student Professional Competencies

·         Microsoft Access 1 (Basic)

·         QuestionPro Introduction

·         QuestionPro for Qualtrics Users

 

View our calendar of upcoming workshops at workshops.utk.edu and register to attend.

 

Can't make it to class or want to learn about another topic? Check out our online training sessions.


Cybersecurity and Research

Grant-funded research projects are exciting. Imagine being a campus researcher leading such a project: you've defined a problem, spent hours — including evenings and weekends — writing a grant, and you've been selected from a competitive field to receive the award. Now you have a limited amount of time to build your team, execute your plan, and reach your research goal.

 

One common factor among scientists, no matter which discipline they belong to or how complex the project may be, is the use of computing resources. Researchers use computers for simulations, data capture, storage, sharing, and analysis, as well as project management, collaboration, and more utilitarian tasks like e-mailing, scheduling, and maintaining websites. Using computing resources inevitably come cybersecurity concerns. Even if the use of computer resources is minimal, threats such as ransomware and usurpation of your computers for a BOTNET or SPAM can seriously impede your research. Some projects will have a clear challenge around regulated data (e.g., HIPAA for certain types of health information and defense regulations for certain types of classified data), but cybersecurity requirements may be less clear.

 

There are specific cybersecurity challenges for grant-funded science projects, and the Information Security community can help resolve those challenges.

 

Grant-funded science projects face a number of unique challenges related to cybersecurity:

·            Projects are rarely large enough to warrant hiring personnel dedicated to information security.

·            The limited lifetime of a project makes them laser-focused (sometimes literally!) on their scientific goals.

·            Research can require specialized computing infrastructure that is difficult to update and challenges common information security practices.

·            There is a common misunderstanding that an open research project that doesn't have confidentiality requirements has no cybersecurity concerns.

·            Scientists may be offered (often contradictory) information security advice, leaving them feeling anxious, overwhelmed, and uncertain about how to begin addressing cybersecurity issues with respect to their research projects and data.

 

Five lessons in how OIT can work with researchers:

 

1.          LISTEN - IT and research staff must strive to communicate and bridge the cultural gap between their communities. To effectively support research, IT staff must have a clear understanding of the concerns of the research staff about the integrity of their research project. Mapping those concerns to cybersecurity risks is the end goal.

2.         RECOGNIZE THE DIFFERENCE - IT controls (e.g., firewall policies) that make sense for administrative computing can hinder the collaboration required by a research project that spans multiple organizations. A research-centric approach such as a science DMZ may be one way to bridge the gap between administrative and research computing.

3.         PRIORITIZE - Research projects are typically time-sensitive. Clear communication between the IT practitioners and the research staff is important when identifying where cybersecurity is most critical. This promotes the prioritization of recommended actions that will deliver the most bang for the buck in a short amount of time.

4.         NEVER ASSUME - Research staff may assume that a level of cybersecurity protections (controls) exist. CAUTION! Never assume; ASK. You may assume a firewall exists and is actively protecting your data when the very opposite may be the case.

 

When your project depends on information technology resources at UTK, involve OIT as EARLY as possible; start the conversation with the Office of Research & Engagement early to ensure that your requirements are known, IT risks are identified and prioritized.

 

Engaging OIT starts with a call to HelpDesk at 865-974-9900.


Have questions or need assistance? Contact the HelpDesk.

help.utk.edu   |   865-974-9900   |   online chat

...

Follow @UT_OIT on Twitter for up-to-date announcements regarding OIT events and outages.


 

Join/Leave the IT Weekly

Archive now available

 

October 09
[ITWEEKLY] IT Weekly, October 9, 2018

 

Title: OIT Weekly at The University of Tennessee, Knoxville - Description: Office of Information Technology's weekly newsletter

October 8, 2018

 

Can’t find what you are looking for?  Check out the new search for www.utk.edu!

This summer, OIT launched a new and improved search engine for utk.edu websites. The new web search is faster, allows for more granular site searches, and provides a better overall search experience. To access the new search, visit search.utk.edu or use the search box in the footer of most UT websites. A university system-wide search is also available at search.tennessee.edu.


Record a Better Online Lecture 

Need a brief recording to introduce yourself to your online class; cover new content and post it online for anytime access for your students; explain a challenging concept with visuals; or, annotate assignments? It’s very important to have high-quality audio – the better the audio quality, the more accurate auto-captioning tools will work! 

 

With that in mind, OIT now offers Mic Kits for check out that include a high-quality microphone with a portable mini sound “booth.” You can also check out an iPad and a portable green screen (green screen allows for a digital background to be placed behind you). 

 

Visit Teaching Tools: Lecture Recording Equipment for more information or to reserve a Mic Kit! 

 

PLEASE NOTE:  Due to decreasing demand, OIT has retired the iPad Loan Program which allowed for check out of up to 20 devices for student classroom use.


No More Columns or Cramped Seating: OIT'S New Training Space

OIT has created a new training space for workshop attendees.  This training lab isn’t just a room with new computers; we’ve included all of the technologies you might find in a centrally-managed UT classroom, from WolfVision Cynap to a document camera to interactive projectors. Enthusiastic OIT trainers will continue to lead your learning experience. 

 

Our new lab is conveniently located in the Communications Building and is the place where new ideas and new skills come to life for students, faculty, and staff.  

 

When registering for OIT face-2-face workshops, make a note of the new location. If you don’t see anything posted at your desired day or time, simply request group training from OIT or request a one-on-one consultation. 

 

We can’t wait to see you!


How to Spot an Email Scam: Tip 2

One way to spot an email scam is to check the sender's email address.  Official UTK communications is sent from a utk.edu address. However, be cautious; just because it is from a utk.edu address does not guarantee that it is legit.  If the email has other suspicious criteria, contact the OIT HelpDesk about the legitimacy of the message.

 

Learn more about how to spot an email scam on OIT’s website.


ePortfolios for Developing and Assessing Student Professional Competencies 

When: Thursday, October 18 from 1 to 3 p.m. in Communications, Room 43, Classroom C

Learn how ePortfolios can be used to assess and showcase student work, demonstrate competencies, assist students in job searches, and aid cross-discipline and departmental collaborations.
Register for the workshop and learn how to initiate an ePortfolio program for your students, course, department, project, or for yourself, and you'll have a chance to experiment with the Canvas ePortfolio tool and its features.


R & RStudio

R is a free, open -source software environment for statistical computing, data management, and graphics. While it includes a simple code editor, it can be controlled through many other packages. The most popular way to run R is through RStudio, a free and open source program which includes a code editor, as well as debugging and visualization tools. R is very extensible and supports a wide range of analytic and visualization methods. However, its data usually must fit into your computer’s main memory, limiting the size of data sets it can analyze.

 

Learn more about R and RStudio on OIT’s Research Software website.  Learn when to use it, where to run it, how to learn, and where to get help.


Upcoming OIT Workshops

OIT does not have any workshops scheduled for this week.  Check out the Online Calendar for all of our upcoming workshops.

 

Can't make it to class or want to learn about another topic? Check out our online training sessions.


Social Engineering is Spooky!

Social engineering is a psychological attack where an attacker tricks you into doing something you should not do. The concept of social engineering is not new; it has existed for thousands of years. Think of scammers or con artists, it is the very same idea. What makes today’s technology so much more effective for cyber attackers is you cannot physically see them; they can easily pretend to be anything or anyone they want and target millions of people around the world, including you. In addition, social engineering attacks can bypass many security technologies. The simplest way to understand how these attacks work and protect yourself from them is to take a look at two real-world examples.

 

You receive a phone call from someone claiming to be from a computer support company, the OIT HelpDesk, or even Microsoft Tech Support. The caller explains that your computer is actively scanning the Internet. They believe it is infected and have been tasked with helping you secure your computer. Once they have tricked you into believing your computer is infected, they pressure you into buying their security software or giving them remote access to your computer so they can fix it. However, the software they are selling is actually a malicious program. If you purchase and install it, not only have they fooled you into infecting your computer, but you just paid them to do it. If you give them remote access to your computer, they are going to take it over, steal your data, or use it for their bidding.

 

Keep in mind, social engineering attacks like these are not limited to phone calls or email; they can happen in any form, including text messages on your phone, over social media, or even in person. The key is to know what to look out for--you are your own best defense.

 

Stopping Social Engineering Attacks

  • Someone asking for information they should not have access to or should already know, such as your account numbers.
  • Someone asking for your password. No legitimate organization will ever ask you for that.
  • Someone pressuring you to bypass or ignore security processes or procedures you are expected to follow at work.
  • Something too good to be true. For example, you are notified you won the lottery or an iPad, even though you never even entered the lottery.
  • You receive an odd email from a friend or coworker containing wording that does not sound like it is really them. A cyber attacker may have hacked into their account and is attempting to trick you. To protect yourself, verify such requests by reaching out to your friend using a different communications method, such as in person or over the phone.
  • If you suspect someone is trying to trick or fool you, do not communicate with the person anymore. If the attack is work related, be sure to report it to your help desk or information security team right away. Remember, common sense is often your best defense.

 


Have questions or need assistance? Contact the HelpDesk.

help.utk.edu   |   865-974-9900   |   online chat

...

Follow @UT_OIT on Twitter for up-to-date announcements regarding OIT events and outages.


 

Join/Leave the IT Weekly

Archive now available

 

October 01
[ITWEEKLY] IT Weekly, October 1, 2018

 

Title: OIT Weekly at The University of Tennessee, Knoxville - Description: Office of Information Technology's weekly newsletter

October 1, 2018

 

Looking for information about OIT Services?

Check out the OIT website!  The search box on our home page will search all of our services and the OIT Knowledge Base.  If you want to learn more about Canvas or our course design services, use the OIT search!  Do you want to learn about OIT’s website hosting services or looking for training? Use the search to find what you’re looking for quickly.

 

We also provide quick links on the right in the “I Want To” section.  These are our most popular pages, including Setting Up Your Email, Downloading Software, and Resetting Your NetID Password.

 

Can’t find what you are looking for?  Contact the OIT HelpDesk by phone at 865-974-9900, by chat, or online.


Are you traveling for Fall Break?

Do you have plans to visit other universities during Fall Break? If so, check to see if that university provides an Eduroam wireless network. Eduroam, short for education roaming, allows students, staff, and faculty from participating institutions to obtain secure Internet connectivity across campus and when visiting other participating institutions. Go to Eduroam for more information, including a list of participating institutions.

 

If you are traveling to a university that offers an Eduroam wireless network, you will need to make sure you have connected to the Eduroam wireless network at UT before connecting to the Eduroam network while traveling. Instructions for getting connected with Eduroam are available in the OIT Knowledge Base, or you may contact the OIT HelpDesk online or call 865-974-9900 for assistance.


Lynda.com Helps Teach Accounting

Hear from University of Tennessee lecturer, A. Norman, on how she is using Lynda.com as supplemental content for her students as she shares personal tips and lessons learned. 

 

Watch the video on OIT’s YouTube channel or learn more about how you can use Lynda.com as part of your class on OIT’s website.


R & RStudio

R is a free, open-source software environment for statistical computing, data management, and graphics. While it includes a simple code editor, it can be controlled through many other packages. The most popular way to run R is through RStudio, a free and open source program which includes a code editor, as well as debugging and visualization tools. R is very extensible and supports a wide range of analytic and visualization methods. However, its data usually must fit into your computer’s main memory, limiting the size of data sets it can analyze.

 

Learn more about R and RStudio on OIT’s Research Software website.  Learn when to use it, where to run it, how to learn, and where to get help.


Upcoming OIT Workshops

Here's a selection of topics that will be covered in workshops this week:

 

·         Apple GarageBand

·         Introduction to HTML/CSS

·         Screen Casting for Teaching and Learning

 

View our calendar of upcoming workshops at workshops.utk.edu and register to attend.

 

Can't make it to class or want to learn about another topic? Check out our online training sessions.


Don't Let a Phishing Scam Reel You In

Cybercriminals use phishing—a type of social engineering—to manipulate people into doing what they want. Social engineering is at the heart of all phishing attacks, especially those conducted via e-mail. Technology makes phishing easy. Setting up and operating a phishing attack is fast, inexpensive, and low risk: any cybercriminal with an e-mail address can launch one.

 

According to Verizon's 2017 Data Breach Investigations Report, the education sector saw a rise in social engineering–based attacks. Students, staff, and faculty all suffered losses when personal data and research were disclosed to unauthorized parties. Phishing played a part in more than 40% of these breaches. Knowing what you're up against can help you be more secure.

 

Here are a few things you can do to guard against phishing attacks:

  • Limit what you share online. The less you share about yourself, the smaller the target you are for a phishing attack. Cybercriminals use information you post online to learn how to gain your trust.
  • Protect your credentials. No legitimate company or organization will ask for your username and password or other personal information via e-mail. Your school definitely won't. Still not sure if the e-mail is a phish? Contact the OIT HelpDesk at 865-974-9900.
  • Beware of attachments. E-mail attachments are the most common vector for malicious software. When you get a message with an attachment, delete it—unless you are expecting it and are absolutely certain it is legitimate.
  • Confirm identities. Phishing messages can look official. Cybercriminals steal organization and company identities, including logos and URLs that are close to the links they're trying to imitate. There's nothing to stop them from impersonating schools, financial institutions, retailers, and a wide range of other service providers.
  • Trust your instincts. If you get a suspicious message that claims to be from an agency or service provider, use your browser to manually locate the organization online and contact them via their website, e-mail, or telephone number.
  • Check the sender. Check the sender's e-mail address. Any correspondence from an organization should come from an organizational e-mail address. A notice from your college or university is unlikely to come from “ut-helpdesk@yahoo.com” or “helpdesk@ut-helpdesk.edu”.
  • Take your time. If a message states that you must act immediately or lose access, do not comply. Phishing attempts frequently threaten a loss of service unless you do something. Cybercriminals want you to react without thinking; an urgent call to action makes you more likely to cooperate.
  • Don't click links in suspicious messages. If you don't trust the e-mail (or text message), don't trust the links in it either. Beware of links that are hidden by URL shorteners or text like "Click Here." They may link to a phishing site or a form designed to steal your username and password.

 


Have questions or need assistance? Contact the HelpDesk.

help.utk.edu   |   865-974-9900   |   online chat

...

Follow @UT_OIT on Twitter for up-to-date announcements regarding OIT events and outages.


 

Join/Leave the IT Weekly

Archive now available

 

1 - 10Next