Information Technology A to Z Index IT Service Support Request

IT Support

How to report a bogus email or phishing scam

Issue: You receive a bogus email or phishing scam

Cause: Spam is an unfortunate side-effect of email accounts.  Phishing is a social engineering problem. 

Resolution

  1. Forward message to:  spam@eku.edu
  2. Ignore and delete the message.
  3. NEVER click links in these email.  If you do, run an antivirus scan immediately.

 

Check Mac OS Version

This page is to find out what MacOS you are running.

Mac: MAC Address

Instructions on how to find the MAC address for ethernet or wireless networking card on a Mac computer.

I can log into Blackboard, but I can’t see my course listed. What should I do?

  • First, be sure you click on the 'Courses' link on the left-hand menu when you log into Blackboard.

Phishing and Suspicious Email

Criminals use malicious email and websites to try to trick you into revealing your password or other sensitive information or to infect your computer with malware.  Phishing emails often use urgent language, asks for personal information, and has grammatical, typographical, or other obvious errors. 

Learn to Spot Phishes

Quick Tip: Check Links Before Clicking

Check the full URL to see if it goes where you expect.

Blackboard Ally Score Indicators

What is Ally?

Your class is full of diverse students with unique learning abilities.  Ally automatically scans your original content, and performs a series of steps to make them more accessible:

  • Generates alternative formats for students to download
  • Provides accessibility scores
  • Gives instructor feedback on how to improve your accessibility score

Accessibility Scores

The score indicators are only shown to the instructor as a way to help them improve their accessibility score for their course documents.

Checking Email Rules - Outlook/OWA

Issue: I need to check my email rules to see if someone had hacked me or I need to edit/delete those I have set.

Product: EKU faculty Outlook

Resolution:

Rules allow you to move, flag, and respond to email messages automatically. You can also use rules to play sounds, move messages to folders, or display new item alerts.

Identity Theft

Identity theft is a crime in which a criminal uses personally identifying information, such as a credit card number or Social Security number, to assume someone else’s identity to commit fraud or other crimes.  Often the victim is left with bills for items not purchased, poor credit records, and sometimes arrests for crimes committed by someone else.  It can take months of work and thousands of dollars to repair the damage caused

Blackboard Collaborate Etiquette

Best Practices for a Good Session

Managing Blackboard Course Tile Images

ISSUE: Blackboard course tile image and course banner image resizing issues

RESOLUTION:

Require two-factor verification (2FA) again on a device you've marked as trusted

ISSUE: You want to restore two-factor authentication on all your devices because your device is lost or you think your account is compromised

Google Vault

1. Install Google Drive App on a computer
2. Log in to Google Drive with personal account
3. Tell app to  sync data to a folder on your computer; this might take a while
4. Disconnect personal account from Google Drive
5. Relaunch Google Drive and log in with EKU account
6. Tell app to sync data with same folder as in Step 3; this might take a while

So basic flow is  (down and up) is personal cloud storage ---> local computer drive ----> EKU cloud storage:

Mac: Screenshot

Learn how to take pictures of the screen (screenshots) on a Mac. These screenshots are saved as files on the desktop.

Copyright Compliance

EKU encourages all students, faculty, and staff to engage in safe and legally compliant sharing of copyrighted materials. Downloading or sharing copyrighted materials (such as music and videos) can be illegal if done without the permission of the copyright owner whether you profit from it or not.

Cyberbullying

We have all seen bullying in real life.  But bullying can happen online, too.  Electronic or cyberbullying is when harm is inflicted through electronic media (e.g., text messages, cell phone pictures & videos, email, chat rooms, etc.) to threaten, harass, embarrass, socially exclude, or damage reputations and friendships.

ISSUE: Your account information is not available

ISSUE: While trying to activate my EKU student email account, I receive the error 'Your account information is not available'

RESOLUTION:   This means you have been accepted by the university but your email account is still not created in our system.  Generally if you give IT 2-3 days (not including weekends/breaks) it will fix itself.

If, however, you still get the same error after waiting 2-3 days (not including weekends/breaks) then you should call the IT Service Desk: 859-622-3000

 

Office365 Email Migration - iOS Instructions for Native Mail App

This will show you how to set up your new Office365 email on the native iOS email app

Mobile Device Security Tips

Like most people, you've probably accumulated a lot of personal information on your mobile device.  The valuable data makes these devices a target for thieves and cybercriminals.  These tips are especially important if university data is on the mobile device:

Workplace Security

Workstations in the workplace are sometimes easy targets for criminal activity.  Whenever a laptop or mobile device is lost or stolen, the data on that device has also been stolen and if proprietary EKU data is lost or compromised, the resulting damage can be much greater than the cost of replacing the equipment.  Some tips:

Lost or broken device used for 2FA

ISSUE: Lose or break device you use for 2FA

FIX: 

  1. Call the IT Service Desk to have them help: 1-859-622-3000 (EST)
  2. They will walk you through the procedure for disabling 2FA or setting up a new device

 

Pages