Information Technology A to Z Index IT Service Support Request

Student Support

Phishing and Suspicious Email

Criminals use malicious email and websites to try to trick you into revealing your password or other sensitive information or to infect your computer with malware.  Phishing emails often use urgent language, asks for personal information, and has grammatical, typographical, or other obvious errors. 

Learn to Spot Phishes

Quick Tip: Check Links Before Clicking

Check the full URL to see if it goes where you expect.

Mac: MAC Address

Instructions on how to find the MAC address for ethernet or wireless networking card on a Mac computer.

Google Vault

1. Install Google Drive App on a computer
2. Log in to Google Drive with personal account
3. Tell app to  sync data to a folder on your computer; this might take a while
4. Disconnect personal account from Google Drive
5. Relaunch Google Drive and log in with EKU account
6. Tell app to sync data with same folder as in Step 3; this might take a while

So basic flow is  (down and up) is personal cloud storage ---> local computer drive ----> EKU cloud storage:

Copyright Compliance

EKU encourages all students, faculty, and staff to engage in safe and legally compliant sharing of copyrighted materials. Downloading or sharing copyrighted materials (such as music and videos) can be illegal if done without the permission of the copyright owner whether you profit from it or not.

ISSUE: Your account information is not available

ISSUE: While trying to activate my EKU student email account, I receive the error 'Your account information is not available'

RESOLUTION:   This means you have been accepted by the university but your email account is still not created in our system.  Generally if you give IT 2-3 days (not including weekends/breaks) it will fix itself.

If, however, you still get the same error after waiting 2-3 days (not including weekends/breaks) then you should call the IT Service Desk: 859-622-3000

 

Mobile Device Security Tips

Like most people, you've probably accumulated a lot of personal information on your mobile device.  The valuable data makes these devices a target for thieves and cybercriminals.  These tips are especially important if university data is on the mobile device:

Workplace Security

Workstations in the workplace are sometimes easy targets for criminal activity.  Whenever a laptop or mobile device is lost or stolen, the data on that device has also been stolen and if proprietary EKU data is lost or compromised, the resulting damage can be much greater than the cost of replacing the equipment.  Some tips:

Checking Email Rules - myMail

Issue: I need to check my email rules to see if someone had hacked me or I need to edit/delete those I have set.

Product: EKU Student myMail system

Resolution:

Rules allow you to move, flag, and respond to email messages automatically. You can also use rules to play sounds, move messages to folders, or display new item alerts.

How to turn off focused inbox

ISSUE: Student missing emails in inbox

RESOLUTION: Turn 'Focused Inbox' off in myMail settings

New Blackboard Content Editor

Blackboard has rolled out a new Content Editor for their system that will dramatically update the way you write content on the system.  Please view the linked on this page for an explanation by one of the Blackboard designers.

CLICK HERE FOR VIDEO PREVIEW

Google Workspace for Education Storage Limits

Effective January 2023, Google has implemented a paid Google Workspace subscription package for universities and will no longer be free, unlimited storage.  

This storage space covers both Google Drive and Google Photos.

Clear Your Browser Cookies, Cache, and History

Firefox

  1. Click Library library icon , click History, then click Clear Recent History.
  2. In the Time range to clear dropdown, click Everything.

Copy Data to a Personal OneDrive Account

Students are eligible to copy their EKU data to a personal account.

Send automatic out of office replies from Outlook for Windows

Use automatic (Out of Office) replies from Outlook for Windows to tell people you won't be responding right away to their email messages.

New Outlook for Windows

  • On the View tab, select  View settings.

Manage email messages by using rules

Rules allow you to move, flag, and respond to email messages automatically. You can also use rules to play sounds, move messages to folders, or display new item alerts.

The easiest and most common rule to create is one that allows you to move an item from a certain sender or with certain words in the subject line to another folder. You can create this rule directly from a message you've already received.

Transfer OneDrive Data to Another Person or Group

The simplest method to copy your OneDrive data to one or many others is to create a team in Teams. Add each person who needs access as a member of the team  Then move the files to the new team.

OneDrive: Transfer To A Different Storage Service

If you want to move from OneDrive storage to another service (for example Google Drive) you will need to copy the data to the other service. Once you copy over the files, you can delete the content in OneDrive. 

Set up auto-reply in Outlook (out of office)

How to set up auto-reply (out of office)

  1. Select File > Automatic Replies.

Pronouns in Blackboard

You can select your pronoun values on the pronoun page.  The Pronouns field is empty by default, and you can change that by clicking the Add Pronouns.  You can choose from the most commonly used list via our research on inclusive and LGBTQI+ resource pages.

 

Pages