Information Technology A to Z Index IT Service Support Request

IT Support

No longer receiving emails in your EKU myMail account (Issue)

Issue: You stop receiving emails in your myMail account.

Cause: Your account may be compromised.  

Resolution:

Office 365 Account and Login Information

Your Account Credentials

You will authenticate your Office 365 account like you do your G Suite for Education account, with your full EKU email address and password:

Signin

Office 365 for Education

File and Data Storage

OneDrive  (Install on PC)

Office 365 iPad Setup

How to set up MIcrosoft Office 365 on iPad.

Office365 Email Migration - Android Instructions for Native Mail App

This will show you how to set up your new Office365 email on the native Android email app
 

Office365 Email Migration - Android Instructions for the Outlook Mail App

This will show you how to set up your new Office365 email on the Outlook email app

Office365 Email Migration - iOS Instructions for Native Mail App

This will show you how to set up your new Office365 email on the native iOS email app

Office365 Email Migration - iOS Instructions for the Outlook App

Skip adding additional accounts if prompted.This will show you how to set up your new Office365 email on the Outlook email app

OneDrive: Transfer To A Different Storage Service

If you want to move from OneDrive storage to another service (for example Google Drive) you will need to copy the data to the other service. Once you copy over the files, you can delete the content in OneDrive. 

Passwords & Accounts: Employee

This article discusses passwords and accounts for EKU employees.

Passwords & Accounts: Students

Username and password (myMail and Blackboard) information for EKU Students.

Passwords & Passphrases

This article discusses how to create better passwords and passphrases.

Phishing

Phishing is a way of attempting to acquire information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication.

Phishing and Suspicious Email

Criminals use malicious email and websites to try to trick you into revealing your password or other sensitive information or to infect your computer with malware.  Phishing emails often use urgent language, asks for personal information, and has grammatical, typographical, or other obvious errors. 

Learn to Spot Phishes

Quick Tip: Check Links Before Clicking

Check the full URL to see if it goes where you expect.

Phishing Basics

Phishing is when a hacker tricks you into handing over your personal information like credit card numbers, usernames and passwords, social security numbers, etc.  Commonly they use “spoofed” emails, fraudulent websites, phone service calls, or phony text messages to full you.  Phishing is a type of

Privilege Management for Windows (PMFW)

Installing Applications

A special malware protection mechanism has been installed on EKU laptops. That software, called Privilege Management for Windows (PMFW), provides the security of a limited-user account and the flexibility of elevating to an administrator account on demand.

Pronouns in Blackboard

You can select your pronoun values on the pronoun page.  The Pronouns field is empty by default, and you can change that by clicking the Add Pronouns.  You can choose from the most commonly used list via our research on inclusive and LGBTQI+ resource pages.

 

Protect Your Privacy

Your personal information is as valuable as money.  As such, you should value and protect it.  Your PCs and other devices connect to the world but are loaded with personal information about you—contacts, photos, videos, locations, financial data, etc.

Quick Tips: Updated Content Editor for Blackboard Learn Original Experience and Original Course View

There are lots of great reasons to like the updated Content Editor in Blackboard Learn. Adding content has been simplified, and it works better on both hand-held devices and larger screens. There are several improvements for accessibility and some new features, too. Besides some updated tool icons, there are also some changes in behavior to know about.

Recommended Computer Specifications

These are the minimum & preferred specifications that we recommend for student systems.  If you have already chosen your major, we recommend you contact your college or department to see if they have any additional recommendations. Please note that we do not recommend any specific brands and just give this information as helpful guidelines. 

Pages