Information Technology A to Z Index IT Service Support Request

Safe Computing Support

Setup self-service password reset

ISSUE: I need to set up self service password reset.

FIX

Using Software Center to Install Programs, Upgrades and Updates

How to install software safely using Software Center for EKU faculty and staff computers.

External Email Tags

To identify potential phishing emails from outside senders, IT will begin using external email tags on Wednesday, April 22, 2020.

Less Phishing & Spam with Office 365 Advanced Threat Protection (ATP)

EKU IT is pleased to announce that we will be enabling Office 365 Advanced Threat Protection (ATP) on our Microsoft systems soon.  In addition to other protections already in place, ATP helps protect the EKU community from malicious attacks by providing better spam and malware protection for email, SharePoint Online, OneDrive, and Microsoft Teams.

Phishing Basics

Phishing is when a hacker tricks you into handing over your personal information like credit card numbers, usernames and passwords, social security numbers, etc.  Commonly they use “spoofed” emails, fraudulent websites, phone service calls, or phony text messages to full you.  Phishing is a type of

Phishing and Suspicious Email

Criminals use malicious email and websites to try to trick you into revealing your password or other sensitive information or to infect your computer with malware.  Phishing emails often use urgent language, asks for personal information, and has grammatical, typographical, or other obvious errors. 

Learn to Spot Phishes

Quick Tip: Check Links Before Clicking

Check the full URL to see if it goes where you expect.

Identity Theft

Identity theft is a crime in which a criminal uses personally identifying information, such as a credit card number or Social Security number, to assume someone else’s identity to commit fraud or other crimes.  Often the victim is left with bills for items not purchased, poor credit records, and sometimes arrests for crimes committed by someone else.  It can take months of work and thousands of dollars to repair the damage caused

Copyright Compliance

EKU encourages all students, faculty, and staff to engage in safe and legally compliant sharing of copyrighted materials. Downloading or sharing copyrighted materials (such as music and videos) can be illegal if done without the permission of the copyright owner whether you profit from it or not.

Cyberbullying

We have all seen bullying in real life.  But bullying can happen online, too.  Electronic or cyberbullying is when harm is inflicted through electronic media (e.g., text messages, cell phone pictures & videos, email, chat rooms, etc.) to threaten, harass, embarrass, socially exclude, or damage reputations and friendships.

Mobile Device Security Tips

Like most people, you've probably accumulated a lot of personal information on your mobile device.  The valuable data makes these devices a target for thieves and cybercriminals.  These tips are especially important if university data is on the mobile device:

Workplace Security

Workstations in the workplace are sometimes easy targets for criminal activity.  Whenever a laptop or mobile device is lost or stolen, the data on that device has also been stolen and if proprietary EKU data is lost or compromised, the resulting damage can be much greater than the cost of replacing the equipment.  Some tips:

Technology Travel Tips

When traveling, electronics security is very important. Some tips:

Protect Your Privacy

Your personal information is as valuable as money.  As such, you should value and protect it.  Your PCs and other devices connect to the world but are loaded with personal information about you—contacts, photos, videos, locations, financial data, etc.

Social Engineering

Social engineering is the art of manipulating people into giving up confidential information or access to restricted areas. Their attacks can come through emails, text messages, over the phone, via social media, in person, and more.  Someone launching a social engineering attack won’t ask one person for the entire information they need.  Instead, they will gather a lot of seemingly harmless information from many sources and use it to look legitimate.

Secure Your Data

Everyone is responsible for sensitive data—from banking information to student grades.  We have our personal sensitive data and university sensitive data. Unlocked workstations, unencrypted data on mobile devices, and unsecured wireless networks make data vulnerable to loss, identity theft, and sensitive data breaches.

Compromised Accounts

A compromised EKU account is one accessed by a person not authorized to use the account.  Criminals and hackers target EKU users to gain:

Clear Your Browser Cookies, Cache, and History

Firefox

  1. Click Library library icon , click History, then click Clear Recent History.
  2. In the Time range to clear dropdown, click Everything.