Information Technology A to Z Index IT Service Support Request

Employee Support

Lync Client: Presence

Adjusting the Presence in Lync client.

iOS: Screenshot

Take a screenshot on your iphone.

Lync Client: Conference Calls

This video discusses how to conference call using the Lync client on a computer.

Lync Client: Contacts

The contact feature on Lync Client.

Lync Client: Contacts (advanced options)

Advanced features in the contacts list on Lync client.

Workplace Answers eLearning Email (ISSUE)

Issue: Received an email from training @ workplaceanswers.com 

Cause: You have training to complete from the Office of Equity and Inclusion at EKU.  This training is conducted online by Workplace Answers.  This is required for all EKU students.

Resolution:  Click the link in the email and finish the training.  Will probably begin with https://  slate.workplaceanswers.com/ ... etc.

More from the Office of Equity and Inclusion

How to report a bogus email or phishing scam

Issue: You receive a bogus email or phishing scam

Cause: Spam is an unfortunate side-effect of email accounts.  Phishing is a social engineering problem. 

Resolution

  1. Forward message to:  spam@eku.edu
  2. Ignore and delete the message.
  3. NEVER click links in these email.  If you do, run an antivirus scan immediately.

 

How to back up your email

Issue: You want to back up your email locally (in addition to keeping them on the email server)

Environment: Outlook 2016, Outlook 2013

Resolution:

Use a Secure Internet Connection

Use secure networks, such as your cellular carrier network, EKU_SECURE, or a wire connection.

On Campus

Use a wired connection when practical.  Wired connections to the internet from on-campus computers, including lab computers, use the university's secure network.  These are always recommended on-campus for Blackboard (e.g., taking tests and quizzes) and confidential university work (e.g., financial information).

Wireless Network: Chromebooks

How to connect your Chromebook or other ChromeOS device to EKU's Wi-Fi.

Workplace Security

Workstations in the workplace are sometimes easy targets for criminal activity.  Whenever a laptop or mobile device is lost or stolen, the data on that device has also been stolen and if proprietary EKU data is lost or compromised, the resulting damage can be much greater than the cost of replacing the equipment.  Some tips:

Office Mac Update - High Sierra Update 16.12 for Outlook 2016

ISSUE: A recent software update for Microsoft Office on Mac computers can prevent Outlook from working properly.  If your Mac is running macOS High Sierra and you install update 16.12 for Outlook 2016, then Outlook will repeatedly (every 30 seconds or so) prompt for your email password.

RESOLUTION:

Mobile Device Security Tips

Like most people, you've probably accumulated a lot of personal information on your mobile device.  The valuable data makes these devices a target for thieves and cybercriminals.  These tips are especially important if university data is on the mobile device:

Microsoft Account Recovery Tool

Beginning Wednesday, May 29, 2019 employees and students will have the ability to setup self-password resets on their @mymail.eku.edu accounts (e.g., Blackboard, myMail).  Once this is enabled after you enter your login information (username/password) you will be prompted with a 'More information required' box on both a PC

Check Mac OS Version

ISSUE: Find what version of Mac OS currently using

RESOLUTION:

  1. Click the Apple icon in the top left screen.  Click About This Mac:
    About This Mac
  2. Your version number is located at the top of the windows that opens:
    iOS Version

 

Disable Automatic Updates in Mac Office

ISSUE: Want to disable automatic updates in Mac Office

RESOLUTION:

VPN

This article is a placeholder

NOTICE:  If you have never used the VPN before, you must contact the IT Service Desk and provide a phone number to be used for two-factor authentication which is a requirement for VPN access as of spring 2019.

Phishing and Suspicious Email

Criminals use malicious email and websites to try to trick you into revealing your password or other sensitive information or to infect your computer with malware.  Phishing emails often use urgent language, asks for personal information, and has grammatical, typographical, or other obvious errors. 

Learn to Spot Phishes

Quick Tip: Check Links Before Clicking

Check the full URL to see if it goes where you expect.

Copyright Compliance

EKU encourages all students, faculty, and staff to engage in safe and legally compliant sharing of copyrighted materials. Downloading or sharing copyrighted materials (such as music and videos) can be illegal if done without the permission of the copyright owner whether you profit from it or not.

Password Security Checklist

Change Your Password if it is at Risk

If your password is at risk, you may need to change it more often.  Ask yourself the questions below to see if you need to change your password now.  Balance your answers with the need to have a password that you can remember without having to write it down.  If you have a strong, secure password that is easy for you to remember and you can use it with care, you may not need to change it as often as someone whose password is more vulnerable. 

Pages