Information Technology A to Z Index IT Service Support Request

Student Support

Recovering From Phishing-Students

Students, if you fall victim to a phishing email here are the next steps to recovery of your EKU email address/password.

Reset your password immediately.  You have several options.

Use a Secure Internet Connection

Use secure networks, such as your cellular carrier network, EKU_SECURE, or a wire connection.

On Campus

Use a wired connection when practical.  Wired connections to the internet from on-campus computers, including lab computers, use the university's secure network.  These are always recommended on-campus for Blackboard (e.g., taking tests and quizzes) and confidential university work (e.g., financial information).

Update/Change Verification Phone Number and Email - Student Password Self-Service

  1. Login to https://myapps.microsoft.com/.
  2. Click your profile image/badge in the top right of your screen, then choose Profile
    Click your profile image/badge in the top right of your screen, then choose Profile

     

Two-Factor Authentication (2FA) Setup

  1. Open a browser on your computer and go to https://mymail.eku.edu then login
  2. You will see the screen below then click Set it up now
    You will see the screen below then click Set it up now

External Email Tags

To identify potential phishing emails from outside senders, IT will begin using external email tags on Wednesday, April 22, 2020.

Wireless Network: Chromebooks

How to connect your Chromebook or other ChromeOS device to EKU's Wi-Fi.

Troubleshooting a Network Connection

Issue: Network speed or connection issues (Residence Halls and around campus)

Fixes:

Adobe Product Login

During the summer 2019, the campus lab image will give students access to the new Adobe products. Students will need to log in to the products to use them.

Once you click on an Adobe CC Product, the application will launch and they’ll be prompted to login. They will need to sign in with their EKU student email password.

Once you enter your email in (first_last1@mymail.eku.edu), you'll be taken to the Azure login page.

No longer receiving emails in your EKU myMail account (Issue)

Issue: You stop receiving emails in your myMail account.

Cause: Your account may be compromised.  

Resolution:

How to report a bogus email or phishing scam

Issue: You receive a bogus email or phishing scam

Cause: Spam is an unfortunate side-effect of email accounts.  Phishing is a social engineering problem. 

Resolution

  1. Forward message to:  spam@eku.edu
  2. Ignore and delete the message.
  3. NEVER click links in these email.  If you do, run an antivirus scan immediately.

 

Mac: MAC Address

Instructions on how to find the MAC address for ethernet or wireless networking card on a Mac computer.

Check Mac OS Version

ISSUE: Find what version of Mac OS currently using

RESOLUTION:

  1. Click the Apple icon in the top left screen.  Click About This Mac:
    About This Mac
  2. Your version number is located at the top of the windows that opens:
    iOS Version

 

I can log into Blackboard, but I can’t see my course listed. What should I do?

  • First, be sure you click on the 'Courses' link on the left-hand menu when you log into Blackboard.

Phishing and Suspicious Email

Criminals use malicious email and websites to try to trick you into revealing your password or other sensitive information or to infect your computer with malware.  Phishing emails often use urgent language, asks for personal information, and has grammatical, typographical, or other obvious errors. 

Learn to Spot Phishes

Quick Tip: Check Links Before Clicking

Check the full URL to see if it goes where you expect.

Wired: Linux PC

Connecting a Linux PC to wired/ethernet in residence halls.

Password Security Checklist

Change Your Password if it is at Risk

If your password is at risk, you may need to change it more often.  Ask yourself the questions below to see if you need to change your password now.  Balance your answers with the need to have a password that you can remember without having to write it down.  If you have a strong, secure password that is easy for you to remember and you can use it with care, you may not need to change it as often as someone whose password is more vulnerable. 

Require two-factor verification (2FA) again on a device you've marked as trusted

ISSUE: You want to restore two-factor authentication on all your devices because your device is lost or you think your account is compromised

Google Vault

1. Install Google Drive App on a computer
2. Log in to Google Drive with personal account
3. Tell app to  sync data to a folder on your computer; this might take a while
4. Disconnect personal account from Google Drive
5. Relaunch Google Drive and log in with EKU account
6. Tell app to sync data with same folder as in Step 3; this might take a while

So basic flow is  (down and up) is personal cloud storage ---> local computer drive ----> EKU cloud storage:

Student Computing Fee Information

Original Proposal
Submitted by the Director of Academic Computing & Telecommunications Services
to the Student Government Association
Spring, 1998

STUDENT COMPUTING FEE PROPOSAL

PURPOSE

            The purpose of the student computing fee is to produce funding in order to provide EKU students with accessible, reliable, and appropriate computing resources that will enhance their educational experience.

ADMINISTRATION

Copyright Compliance

EKU encourages all students, faculty, and staff to engage in safe and legally compliant sharing of copyrighted materials. Downloading or sharing copyrighted materials (such as music and videos) can be illegal if done without the permission of the copyright owner whether you profit from it or not.

Pages