Information Technology A to Z Index

Faculty Support

Lync Client: Contacts

The contact feature on Lync Client.

Lync Client: Contacts (advanced options)

Advanced features in the contacts list on Lync client.

How to report a bogus email or phishing scam

Issue: You receive a bogus email or phishing scam

Cause: Spam is an unfortunate side-effect of email accounts.  Phishing is a social engineering problem. 

Resolution

  1. Forward message to:  spam@eku.edu
  2. Ignore and delete the message.
  3. NEVER click links in these email.  If you do, run an antivirus scan immediately.

 

How to back up your email

Issue: You want to back up your email locally (in addition to keeping them on the email server)

Environment: Outlook 2016, Outlook 2013

Resolution:

Google Vault

1. Install Google Drive App on a computer
2. Log in to Google Drive with personal account
3. Tell app to  sync data to a folder on your computer; this might take a while
4. Disconnect personal account from Google Drive
5. Relaunch Google Drive and log in with EKU account
6. Tell app to sync data with same folder as in Step 3; this might take a while

So basic flow is  (down and up) is personal cloud storage ---> local computer drive ----> EKU cloud storage:

Use Microsoft Stream to Host Video Content in Blackboard

In order to reduce load on the Blackboard servers, it is a good practice not to upload videos directly to Blackboard.  Instead, all EKU users have an account on stream.microsoft.com where they can upload and share videos to other EKU users.  This tutorial illustrates how to use this feature to embed video content in to your Blackboard course without hosting the videos on the Blackboard server.

First, go to stream.microsoft.com and click on the sign in button in the top right:

Blackboard Training Videos

Staff at EKU have put together a number of training and tutorial videos for a variety of topics in Blackboard.  These videos are often interactive, and work on both computers and mobile devices. 

Created by EKU Information Technology:

New Courses Page - This training goes over navigation, organization, and search options for the new Courses page redesign from May 4, 2018

Workplace Security

Workstations in the workplace are sometimes easy targets for criminal activity.  Whenever a laptop or mobile device is lost or stolen, the data on that device has also been stolen and if proprietary EKU data is lost or compromised, the resulting damage can be much greater than the cost of replacing the equipment.  Some tips:

Check Mac Office Version

ISSUE: Check what version of Mac Office on computer

RESOLUTION:

Mobile Device Security Tips

Like most people, you've probably accumulated a lot of personal information on your mobile device.  The valuable data makes these devices a target for thieves and cybercriminals.  These tips are especially important if university data is on the mobile device:

Pages