Information Technology A to Z Index IT Service Support Request

IT Support

Workplace Security

Workstations in the workplace are sometimes easy targets for criminal activity.  Whenever a laptop or mobile device is lost or stolen, the data on that device has also been stolen and if proprietary EKU data is lost or compromised, the resulting damage can be much greater than the cost of replacing the equipment.  Some tips:

Lost or broken device used for 2FA

ISSUE: Lose or break device you use for 2FA

FIX: 

  1. Call the IT Service Desk to have them help: 1-859-622-3000 (EST)
  2. They will walk you through the procedure for disabling 2FA or setting up a new device

 

Technology Travel Tips

When traveling, electronics security is very important. Some tips:

Apps and Software Security

Apps and software are what run on our PCs, phones, and other mobile devices.  They allow us to do our work, complete school assignments, access entertainment and connect with the world.  They are also easy ways for criminals to gain access to your devices and the information stored on them.

Authentication FAQ (Microsoft Authenticator)

Question: Which version of the Authenticator app should I be using?
Answer: We're always working on new features, bug fixes, and performance improvements. Make sure you stay updated with the latest Android and iOS version for the best authentication experience.

Protect Your Privacy

Your personal information is as valuable as money.  As such, you should value and protect it.  Your PCs and other devices connect to the world but are loaded with personal information about you—contact, photos, videos, locations, financial data, etc.

Comparison Chart - Microsoft Office 365 and G Suite for Education

Feature G Suite for Education Microsoft Office 365 for Education
Browser Chrome Internet Explorer / Edge
Word Processing Docs Word
Spreadsheets Sheets Excel
Presentations Slides PowerPoint / Sway
Email Gmail (not available at EKU) Exchange/Outlook 
Pages Sites (not available at EKU) SharePoint

Viruses & Malware

Viruses and malware is software designed to gain access to your computer.  There are many forms including spyware that records your activity and sends to a hacker; viruses that damage and delete your files; and ransomware that locks your computer and files until you pay money (usually in the form of bitcoins) to recover the system—if you’re lucky.

I am a new employee and require a computer

For all new employees, your supervisor will need to reach out to Amy Graham in IT to discuss computer needs.

We will need to know if you are full-time or part-time and if your department has a computer for you to use already that may need to be setup for the new employee.

At this time we can also discuss software requirements.

How to turn off focused inbox

ISSUE: Student missing emails in inbox

RESOLUTION: Turn 'Focused Inbox' off in myMail settings

Checking Email Rules - myMail

Issue: I need to check my email rules to see if someone had hacked me or I need to edit/delete those I have set.

Product: EKU Student myMail system

Resolution:

Rules allow you to move, flag, and respond to email messages automatically. You can also use rules to play sounds, move messages to folders, or display new item alerts.

Network Security

Most devices today need an internet connection to be useful but anyone can set up a free Wi-Fi network and fool you into handing over your personal data.

Best Practices

Know or verify who owns Wi-Fi or wired networks before you connect

Types of Blackboard Content

Log into EKU Blackboard site using your EKU email username and password.

On the left-hand menu, click the Courses link then click the course you want to add content to:

Office 365 Account and Login Information

Your Account Credentials

You will authenticate your Office 365 account like you do your G Suite for Education account, with your full EKU email address and password:

Signin

Social Engineering

Social engineering is the art of manipulating people into giving up confidential information or access to restricted areas. Their attacks can come through emails, text messages, over the phone, via social media, in person, and more.  Someone launching a social engineering attack won’t ask one person for the entire information they need.  Instead, they will gather a lot of seemingly harmless information from many sources and use it to look legitimate.

Copying Course Material in Blackboard

If you want to move content from one Blackboard course to a separate course:

G Suite Course Kit Assignment Tool: Initial Setup

Google Course Kit integration with Blackboard allows instructors to take up assignments into their Google Drive and send grades to the LMS.   The initial setup steps below would need to be completed in each course to create the Google Drive folders.

Secure Your Data

Everyone is responsible for sensitive data—from banking information to student grades.  We have our personal sensitive data and university sensitive data. Unlocked workstations, unencrypted data on mobile devices, and unsecured wireless networks make data vulnerable to loss, identity theft, and sensitive data breaches.

G Suite Course Kit Assignment Tool: Student Submitting Assignments

  1. Login to Blackboard.
  2. Go to the class where you have an assignment.
  3. If the assignment is using Google Course Kit, you will also need to sign into your EKU Google account.  NOTE: You should log into the EKU Google Account first.  When you click on the assignment in Blackboard, you'll be prompted to log in.  Click the 'Sign in' button.

Pages