Information Technology A to Z Index IT Service Support Request

IT Support

Checking Email Rules - Outlook/OWA

Issue: I need to check my email rules to see if someone had hacked me or I need to edit/delete those I have set.

Product: EKU faculty Outlook

Resolution:

Rules allow you to move, flag, and respond to email messages automatically. You can also use rules to play sounds, move messages to folders, or display new item alerts.

Google Vault

1. Install Google Drive App on a computer
2. Log in to Google Drive with personal account
3. Tell app to  sync data to a folder on your computer; this might take a while
4. Disconnect personal account from Google Drive
5. Relaunch Google Drive and log in with EKU account
6. Tell app to sync data with same folder as in Step 3; this might take a while

So basic flow is  (down and up) is personal cloud storage ---> local computer drive ----> EKU cloud storage:

Identity Theft

Identity theft is a crime in which a criminal uses personally identifying information, such as a credit card number or Social Security number, to assume someone else’s identity to commit fraud or other crimes.  Often the victim is left with bills for items not purchased, poor credit records, and sometimes arrests for crimes committed by someone else.  It can take months of work and thousands of dollars to repair the damage caused

Managing Blackboard Course Tile Images

ISSUE: Blackboard course tile image and course banner image resizing issues

RESOLUTION:

Blackboard Collaborate Etiquette

Best Practices for a Good Session

Copyright Compliance

EKU encourages all students, faculty, and staff to engage in safe and legally compliant sharing of copyrighted materials. Downloading or sharing copyrighted materials (such as music and videos) can be illegal if done without the permission of the copyright owner whether you profit from it or not.

Cyberbullying

We have all seen bullying in real life.  But bullying can happen online, too.  Electronic or cyberbullying is when harm is inflicted through electronic media (e.g., text messages, cell phone pictures & videos, email, chat rooms, etc.) to threaten, harass, embarrass, socially exclude, or damage reputations and friendships.

Mac: Screenshot

Learn how to take pictures of the screen (screenshots) on a Mac. These screenshots are saved as files on the desktop.

Office365 Email Migration - iOS Instructions for Native Mail App

This will show you how to set up your new Office365 email on the native iOS email app

ISSUE: Your account information is not available

ISSUE: While trying to activate my EKU student email account, I receive the error 'Your account information is not available'

RESOLUTION:   This means you have been accepted by the university but your email account is still not created in our system.  Generally if you give IT 2-3 days (not including weekends/breaks) it will fix itself.

If, however, you still get the same error after waiting 2-3 days (not including weekends/breaks) then you should call the IT Service Desk: 859-622-3000

 

Mobile Device Security Tips

Like most people, you've probably accumulated a lot of personal information on your mobile device.  The valuable data makes these devices a target for thieves and cybercriminals.  These tips are especially important if university data is on the mobile device:

Workplace Security

Workstations in the workplace are sometimes easy targets for criminal activity.  Whenever a laptop or mobile device is lost or stolen, the data on that device has also been stolen and if proprietary EKU data is lost or compromised, the resulting damage can be much greater than the cost of replacing the equipment.  Some tips:

Technology Travel Tips

When traveling, electronics security is very important. Some tips:

Protect Your Privacy

Your personal information is as valuable as money.  As such, you should value and protect it.  Your PCs and other devices connect to the world but are loaded with personal information about you—contacts, photos, videos, locations, financial data, etc.

Comparison Chart - Microsoft Office 365 and G Suite for Education

Feature Google for Education Microsoft Office 365 for Education
Browser Chrome Internet Explorer / Edge
Word Processing Docs Word
Spreadsheets Sheets Excel
Presentations Slides PowerPoint / Sway
Email Gmail (not available at EKU) Exchange/Outlook 
Pages Sites (not available at EKU) SharePoint

I am a new employee and require a computer

For all new employees, your supervisor will need to reach out to Amy Graham in IT to discuss computer needs.

We will need to know if you are full-time or part-time and if your department has a computer for you to use already that may need to be setup for the new employee.

At this time we can also discuss software requirements.

Checking Email Rules - myMail

Issue: I need to check my email rules to see if someone had hacked me or I need to edit/delete those I have set.

Product: EKU Student myMail system

Resolution:

Rules allow you to move, flag, and respond to email messages automatically. You can also use rules to play sounds, move messages to folders, or display new item alerts.

Copying Course Material in Blackboard

If you want to move content from one Blackboard course to a separate course:

Pages