Information Technology A to Z Index

Inside Look

IT--Top 10 Things To Know!

 

 

Welcome to IT @ EKU...What to know as you start the new semester!

Handling sensitive university data

Your Responsibility 

6 Ways to Combat Phishing

What is phishing?  It is the use of email spam (unsolicited email) to trick people into disclosing financial or identity information like credit card information, usernames and passwords, etc.  Most come via email, but can come over the phone (Vishing) or as a text message (SMiShing).

W: Drive

 

 

W: drive audit and employee and student changes

Can't Find IT Info?

What are you looking for?

What are you looking for? 
Use the Keyword Search and locate the IT Knowledgebase Article you need now.

BitLocker

BitLocker Graphic

Also visit the BitLocker Recovery article.
 

What is BitLocker?

New Student Authentication Requirements

Starting Friday, March 17, 2017

 

 

 

 

Pages

Subscribe to Inside Look

Article Archive