Leaving EKU? Whether you're about to graduate, retire, or take another job, take these steps to make your transition as smooth as possible.
Effective Wednesday, October 1, 2018, EKU IT--to remain in legal compliance with both Microsoft, Google, and our software vendors-- must remove access to Office 365, Google app services, and university licensed software as listed below.
Phishing is when a hacker tricks you into handing over your personal information like credit card numbers, usernames and passwords, social security numbers, etc. Commonly they use “spoofed” emails, fraudulent websites, phone service calls, or phony text messages to full you. Phishing is a type of
Apps and software are what run on our PCs, phones, and other mobile devices. They allow us to do our work, complete school assignments, access entertainment and connect with the world. They are also easy ways for criminals to gain access to your devices and the information stored on them.
We have all seen bullying in real life. But bullying can happen online too. Electronic or cyberbullying is when harm is inflicted through electronic media (e.g., text messages, cell phone pictures & videos, email, chat rooms, etc.) to threaten, harass, embarrass, socially exclude, or damage reputations and friendships.
Google Course Kit integration with Blackboard allows instructors to take up assignments into their Google Drive and send grades to the LMS. The initial setup steps below would need to be completed in each course to create the Google Drive folders.
Social media is here to stay—we connect with family and friends, brands, industry leaders, politicians, and even celebrities. But social networks make it easy for criminals to find out information about you and even infect your computer with viruses and malware.
The score indicators are only shown to the instructor as a way to help them improve their accessibility score for their course documents.
Ally checks accessibility for your new and existing course content. To measure accessibility, Ally assigns your content an accessibility score. Each score is composed of both a numerical number and a colored gauge that reflects the number.
Social engineering is the art of manipulating people into giving up confidential information or access to restricted areas. Their attacks can come through emails, text messages, over the phone, via social media, in person, and more. Someone launching a social engineering attack won’t ask one person for the entire information they need. Instead, they will gather a lot of seemingly harmless information from many sources and use it to look legitimate.
Your personal information is as valuable as money. As such, you should value and protect it. Your PCs and other devices connect to the world but are loaded with personal information about you—contact, photos, videos, locations, financial data, etc.
When you receive a grade on an assignment in Google Course Kit, you will receive an email and you will see it on your Blackboard Stream. If you click the gray 'View my grade' button you will see your grade.