Information Technology A to Z Index IT Service Support Request

IT Support

Blackboard Collaborate Support

Support from Blackboard Help

Blackboard Collaborate Etiquette

Best Practices for a Good Session

Network Security

Most devices today need an internet connection to be useful but anyone can set up a free Wi-Fi network and fool you into handing over your personal data.

Best Practices

Know or verify who owns Wi-Fi or wired networks before you connect

Checking Email Rules - Outlook/OWA

Issue: I need to check my email rules to see if someone had hacked me or I need to edit/delete those I have set.

Product: EKU faculty Outlook/OWA system

Resolution:

Rules allow you to move, flag, and respond to email messages automatically. You can also use rules to play sounds, move messages to folders, or display new item alerts.

Blackboard Course Tile Images

ISSUE: Blackboard course tile image and course banner image resizing issues

RESOLUTION:

Apps and Software Security

Apps and software are what run on our PCs, phones, and other mobile devices.  They allow us to do our work, complete school assignments, access entertainment and connect with the world.  They are also easy ways for criminals to gain access to your devices and the information stored on them.

Employees Leaving the University

Employees Leaving University for another job

NOTE: Students must have taken a credit course.

Comparison Chart - Microsoft Office 365 and G Suite for Education

Feature G Suite for Education Microsoft Office 365 for Education
Browser Chrome Internet Explorer / Edge
Word Processing Docs Word
Spreadsheets Sheets Excel
Presentations Slides PowerPoint / Sway
Email Gmail (not available at EKU) Exchange/Outlook 
Pages Sites (not available at EKU) SharePoint

Social Engineering

Social engineering is the art of manipulating people into giving up confidential information or access to restricted areas. Their attacks can come through emails, text messages, over the phone, via social media, in person, and more.  Someone launching a social engineering attack won’t ask one person for the entire information they need.  Instead, they will gather a lot of seemingly harmless information from many sources and use it to look legitimate.

Blackboard Ally Score Indicators

Accessibility Scores

The score indicators are only shown to the instructor as a way to help them improve their accessibility score for their course documents.

Ally checks accessibility for your new and existing course content.  To measure accessibility, Ally assigns your content an accessibility score.  Each score is composed of both a numerical number and a colored gauge that reflects the number.

Cyberbullying

We have all seen bullying in real life.  But bullying can happen online too.  Electronic or cyberbullying is when harm is inflicted through electronic media (e.g., text messages, cell phone pictures & videos, email, chat rooms, etc.) to threaten, harass, embarrass, socially exclude, or damage reputations and friendships.

G Suite Course Kit Assignment Tool: Initial Setup

Google Course Kit integration with Blackboard allows instructors to take up assignments into their Google Drive and send grades to the LMS.   The initial setup steps below would need to be completed in each course to create the Google Drive folders.

Microsoft Authenticator App - Basics

The Microsoft Authenticator app helps you sign-in to your accounts if you use two-factor authentication (2FA).  Two-factor verification helps you access your accounts more securely.  

Blackboard App Crashes on iOS 12 when Viewing Discussion Boards

ISSUE: Blackboard App Crashes on iOS 12 When Viewing Discussion Board Threads 

RESOLUTION: None, other than not updating iOS to 12.  If you upgrade and it crashes, you will need to use a PC to view discussion boards on Blackboard.

ETA on Fix: None as of Monday, September 24, 2018

Office 365 Account and Login Information

Your Account Credentials

You will authenticate your Office 365 account like you do your G Suite for Education account, with your full EKU email address and password:

Signin

Social Media Security

Social media is here to stay—we connect with family and friends, brands, industry leaders, politicians, and even celebrities.  But social networks make it easy for criminals to find out information about you and even infect your computer with viruses and malware.

Protect Your Privacy

Your personal information is as valuable as money.  As such, you should value and protect it.  Your PCs and other devices connect to the world but are loaded with personal information about you—contact, photos, videos, locations, financial data, etc.

Checking Email Rules - myMail

Issue: I need to check my email rules to see if someone had hacked me or I need to edit/delete those I have set.

Product: EKU Student myMail system

Resolution:

Rules allow you to move, flag, and respond to email messages automatically. You can also use rules to play sounds, move messages to folders, or display new item alerts.

G Suite Course Kit Assignment Tool: Student Submitting Assignments

  1. Login to Blackboard.
  2. Go to the class where you have an assignment.
  3. If the assignment is using Google Course Kit, you will also need to sign into your EKU Google account.  NOTE: You should log into the EKU Google Account first.  When you click on the assignment in Blackboard, you'll be prompted to log in.  Click the 'Sign in' button.

Physical Security

Ensure the physical security of your electronics will keep your private information and sensitive data out of danger.

Pages