Information Technology A to Z Index IT Service Support Request

Safe Computing Support

Self-service Password Reset Option

The following instructions will illustrate how to set up the security verification (two-factor authentication) required to activate the self-service feature of Office365. Once activated, you will have the ability to change your password for all services including email, Blackboard, EKU Direct, etc. in one convenient location without the need to call or email for assistance.

Microsoft Account Recovery Tool

Beginning Wednesday, May 29, 2019 employees and students will have the ability to setup self-password resets on their @mymail.eku.edu accounts (e.g., Blackboard, myMail).  Once this is enabled after you enter your login information (username/password) you will be prompted with a 'More information required' box on both a PC

Use a Secure Internet Connection

Use secure networks, such as your cellular carrier network, EKU_SECURE, or a wire connection.

On Campus

Use a wired connection when practical.  Wired connections to the internet from on-campus computers, including lab computers, use the university's secure network.  These are always recommended on-campus for Blackboard (e.g., taking tests and quizzes) and confidential university work (e.g., financial information).

Malwarebytes Anti-Malware Workaround

Issue: On January 27, 2018 the Malwarewarebytes company released a bad update for their software we have loaded on EKU employee machines--Malwarebytes Anti-Malware.  This bad update caused massive resource usage of PCs and a loss of internet connectivity.  Every connection that gets blocked (not everyone was affected but many were), it will look like this:

MBAM workaround

Less Phishing & Spam with Office 365 Advanced Threat Protection (ATP)

EKU IT is pleased to announce that we will be enabling Office 365 Advanced Threat Protection (ATP) on our Microsoft systems soon.  In addition to other protections already in place, ATP helps protect the EKU community from malicious attacks by providing better spam and malware protection for email, SharePoint Online, OneDrive, and Microsoft Teams.

Browser Security

Web browser default settings are secure but you can do more to protect your privacy and enhance security. 

Identity Theft

Identity theft is a crime where the criminal uses personally identifying information such as a credit card number or Social Security number to assume someone else’s identity to commit fraud or other crimes.  Often the victim is left with bills for items not purchased, poor credit records, and sometimes arrests for crimes committed by someone else.  It can take months of work and thousands of dollars to repair the damage caused

Update/Change Verification Phone Number and Email - Student Password Self-Service

  1. Login to https://myapps.microsoft.com/.
  2. Click your profile image/badge in the top right of your screen, then choose Profile
    Click your profile image/badge in the top right of your screen, then choose Profile

     

Workplace Security

Workstations in the workplace are sometimes easy targets for criminal activity.  Whenever a laptop or mobile device is lost or stolen, the data on that device has also been stolen and if proprietary EKU data is lost or compromised, the resulting damage can be much greater than the cost of replacing the equipment.  Some tips:

Technology Travel Tips

When traveling, electronics security is very important. Some tips:

Mobile Device Security Tips

Like most people, you've probably accumulated a lot of personal information on your mobile device.  The valuable data makes these devices a target for thieves and cybercriminals.  These tips are especially important if university data is on the mobile device:

Reset EKU Password

ISSUE: I need to reset my EKU email password and it is still working

FIX

Phishing and Suspicious Email

Criminals use malicious email and websites to try to trick you into revealing your password or other sensitive information or to infect your computer with malware.  Phishing emails often use urgent language, asks for personal information, and has grammatical, typographical, or other obvious errors. 

Learn to Spot Phishes

Quick Tip: Check Links Before Clicking

Check the full URL to see if it goes where you expect.

Phishing Basics

Phishing is when a hacker tricks you into handing over your personal information like credit card numbers, usernames and passwords, social security numbers, etc.  Commonly they use “spoofed” emails, fraudulent websites, phone service calls, or phony text messages to full you.  Phishing is a type of

Password Security Checklist

Change Your Password if it is at Risk

If your password is at risk, you may need to change it more often.  Ask yourself the questions below to see if you need to change your password now.  Balance your answers with the need to have a password that you can remember without having to write it down.  If you have a strong, secure password that is easy for you to remember and you can use it with care, you may not need to change it as often as someone whose password is more vulnerable. 

Copyright Compliance

EKU encourages all students, faculty, and staff to engage in safe and legally compliant sharing of copyrighted materials. Downloading or sharing copyrighted materials (such as music and videos) can be illegal if done without the permission of the copyright owner whether you profit from it or not.

Reset EKU Password - Forgot Password

ISSUE: I need to reset my EKU email password myself but don't remember my password

FIX:  Be sure you have password self-service and two-factor authenticaion (2FA) enabled.

Viruses & Malware

Viruses and malware is software designed to gain access to your computer.  There are many forms including spyware that records your activity and sends to a hacker; viruses that damage and delete your files; and ransomware that locks your computer and files until you pay money (usually in the form of bitcoins) to recover the system—if you’re lucky.

Network Security

Most devices today need an internet connection to be useful but anyone can set up a free Wi-Fi network and fool you into handing over your personal data.

Best Practices

Know or verify who owns Wi-Fi or wired networks before you connect

Apps and Software Security

Apps and software are what run on our PCs, phones, and other mobile devices.  They allow us to do our work, complete school assignments, access entertainment and connect with the world.  They are also easy ways for criminals to gain access to your devices and the information stored on them.

Pages