Information Technology A to Z Index IT Service Support Request

IT Support

Office365 Email Migration - iOS Instructions for the Outlook App

Skip adding additional accounts if prompted.This will show you how to set up your new Office365 email on the Outlook email app

OneDrive: Transfer To A Different Storage Service

If you want to move from OneDrive storage to another service (for example Google Drive) you will need to copy the data to the other service. Once you copy over the files, you can delete the content in OneDrive. 

Page Rotation as New Version WebApp

How to rotate a page and save as a new version in WebApp.

Passwords & Accounts: Employee

This article discusses passwords and accounts for EKU employees.

Passwords & Accounts: Students

Username and password (myMail and Blackboard) information for EKU Students.

Passwords & Passphrases

This article discusses how to create better passwords and passphrases.

Phishing

Phishing is a way of attempting to acquire information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication.

Phishing and Suspicious Email

Criminals use malicious email and websites to try to trick you into revealing your password or other sensitive information or to infect your computer with malware.  Phishing emails often use urgent language, asks for personal information, and has grammatical, typographical, or other obvious errors. 

Learn to Spot Phishes

Quick Tip: Check Links Before Clicking

Check the full URL to see if it goes where you expect.

Phishing Basics

Phishing is when a hacker tricks you into handing over your personal information like credit card numbers, usernames and passwords, social security numbers, etc.  Commonly they use “spoofed” emails, fraudulent websites, phone service calls, or phony text messages to full you.  Phishing is a type of

Privilege Management for Windows (PMFW)

Installing Applications

A special malware protection mechanism has been installed on EKU laptops. That software, called Privilege Management for Windows (PMFW), provides the security of a limited-user account and the flexibility of elevating to an administrator account on demand.

Pronouns in Blackboard

You can select your pronoun values on the pronoun page.  The Pronouns field is empty by default, and you can change that by clicking the Add Pronouns.  You can choose from the most commonly used list via our research on inclusive and LGBTQI+ resource pages.

 

Protect Your Privacy

Your personal information is as valuable as money.  As such, you should value and protect it.  Your PCs and other devices connect to the world but are loaded with personal information about you—contacts, photos, videos, locations, financial data, etc.

Quick Tips: Updated Content Editor for Blackboard Learn Original Experience and Original Course View

There are lots of great reasons to like the updated Content Editor in Blackboard Learn. Adding content has been simplified, and it works better on both hand-held devices and larger screens. There are several improvements for accessibility and some new features, too. Besides some updated tool icons, there are also some changes in behavior to know about.

Recommended Computer Specifications

These are the minimum & preferred specifications that we recommend for student systems.  If you have already chosen your major, we recommend you contact your college or department to see if they have any additional recommendations. Please note that we do not recommend any specific brands and just give this information as helpful guidelines. 

Recovering From Phishing-Students

Students, if you fall victim to a phishing email here are the next steps to recovery of your EKU email address/password.

Reset your password immediately.  You have several options.

Registering for Classes

This article discusses the steps to register for classes in myEKU.

Remote Desktop Connection (Mac)

How to connect to another computer using Remote Desktop Connection.

Remote/VPN into a Computer

Directions for remoting into a computer.

Reordering Pages WebApp

 

How to reorder page(s) in a document by dragging the desired thumbnail to a new location in the thumbnails contact sheet in WebApp.

Require two-factor verification (2FA) again on a device you've marked as trusted

ISSUE: You want to restore two-factor authentication on all your devices because your device is lost or you think your account is compromised

Pages