Kansas State University

search

IT News

Author: Cathy Rodriguez

Important update on antivirus software for K-State devices

At K-State, the security of our devices and data remains a top priority. As technology evolves, so do the measures we take to ensure the safety of our digital environment.

For University-owned devices, we are pleased to inform you that K-State provides Microsoft Defender as the primary antivirus solution. Microsoft Defender is a comprehensive security solution that offers real-time protection against a wide range of threats, ensuring that our university devices remain secure and up to date. Windows machines joined to K-State’s network should already have this software installed. If you are using a macOS device, you may need to install the software manually if your department is not deploying it via a device management tool. If you are unsure whether Defender is installed, look for this icon in your menu bar. Continue reading “Important update on antivirus software for K-State devices”

IT Training resources

""Visit The Division of IT training page to see various training opportunities. The following is a glimpse of what you can find there:

Visit the IT training site to see more resources.

 

Create a workflow in Qualtrics to send a survey completion email

Qualtrics logoQualtrics is a powerful survey platform with many features. One of those features is Workflows. Workflows allow you to automate tasks such as sending a survey completion email to participants.

Create workflow

You must have a survey question that captures the participant’s email for this process to work. The easiest way to do this is through a text entry question.

  1. Open the survey where you want to create the workflow.
  2. On the top navigation, click Workflows.
  3. Click the Create a Workflow button.
  4. Click Started when an event is received.
  5. Click Survey Response.
  6. Click Finish.
  7. Click the Plus sign and then click Add a Task.
  8. Click Email.
  9. In the To box, click the down arrow.
  10. Select Survey Question, and then click the name of the question where you captured the email address.
  11. In the Subject box, type a subject for your email.
  12. In the Message box, type your message.Note: You can also load a message from your message library if you have one created.
  13. Click Save.
  14. Close the Workflow window.

Continue reading “Create a workflow in Qualtrics to send a survey completion email”

Tips for increasing productivity and collaboration in Microsoft Teams

""Microsoft Teams offers a diverse array of features designed to supercharge your productivity and foster seamless collaboration

  • Use shortcuts for faster navigation.
    • Control or Command + E – jumps to the search bar.
    • Control or Command + / – displays  a list of all of commands
    • Control or Command + [number] – opens items on the left navigation bar.
      Example: Control or Command +1 opens activity, Control or Command + 2 opens chat, etc.
    • Clean up lengthy links – Control-KL
    • See the Shortcuts for Microsoft Teams article to learn more.
  • Filter messages, people, files – type your keyword or phrase in the search bar. You can then filter by message, people, or files. See the New and improved search results experience on Microsoft Teams article to learn more.
  • Share to Outlook – Hover over the message, click the 3 dots and then click Share to Outlook.
  • Use tags to group people in a team – Team administrators can create tags that allow you to quickly reach a group of people by using the tag instead of having to reach them individually. Click the 3 dots next to the channel name and then click Manage Tags. See the Using Tags in Teams to learn all about it.
  • Pop out chats or apps – in the upper-right corner of the window click the pop out button (arrow).
  • Chat with yourself – this may seem odd, but it it is really helpful to send yourself reminders, save a website address, and more. You can also add Loop components. It’s also an easy way to quickly create a task list.
  • Schedule chats – Right-click the send button to schedule a chat..
  • History – Hover over the back arrow and you’ll see recent sites you have visited.
  • Reorder teams – drag and drop Teams into any orde

If you have any questions about Microsoft Teams, join the KSU Teams Support channel.

Free multimedia checkout for faculty, staff, and students

K-State students, faculty, and staff can check out multimedia equipment such as laptops, digital camcorders, digital cameras, projectors, and more for academic purposes.

Equipment reservations can be made by calling 785-532-4918 or emailing
itcheckout@k-state.edu. Equipment can be picked up at the Sunderland Foundation Innovation Lab, Hale Library, Room 235.

Please bring the following with you when you come to checkout equipment:

  • Your eID
  • Your WID
  • Your K-State ID card
  • A direct phone number where you can be reached

See the Equipment Checkout website for details on policies, procedures, and available equipment. Office hours: M-F, 8 a.m. to 5 p.m.

Don’t take the bait: Tips to avoid social engineering attacks

In today’s interconnected world, where technology plays an ever-expanding role in our lives, safeguarding your digital presence is of primary importance. Social engineering attacks have emerged as a pervasive threat, relying on the manipulation of human psychology to gain unauthorized access to sensitive information.

""

Continue reading “Don’t take the bait: Tips to avoid social engineering attacks”

Sept. 19: A new look for Single Sign-On (SSO) and Duo Two-Factor Authentication

On Sept. 19, a day after the fall semester Census day, The Division of Information Technology (IT) will release a sleeker version of Single Sign-On (SSO) and the newest iteration of Duo’s two-factor authentication, known as Duo Universal Prompt. You can expect a refreshed look and feel for both applications.

  • Single Sign On (SSO)

Duo Universal Prompt

The update to Duo Universal Prompt is required to safeguard your information further while providing a simplified, streamlined user experience.

The first time you use Duo Universal Prompt, Duo will choose the most secure method from those you have set up. You can use that method, or choose a different method through the new prompt’s Other Options link. After that first authentication with the new prompt, Duo will by default use the method you used most recently.

Duo sign in screen

 

 

 

 

 

 

 

 

 

Reduce the Number of Times You Need to Authenticate Continue reading “Sept. 19: A new look for Single Sign-On (SSO) and Duo Two-Factor Authentication”

Welcome to Fall 2023!

Welcome to the fall semester!Explore the free resources and services offered by the Division of Information Technology to kickstart your semester!

  • Get a free copy of Microsoft Office for personal use on up to 5 PCs or Macs, 5 tablets, and 5 phones. See the installation instructions for Mac, Windows, and mobile devices.
  • Use Microsoft 365 – an office collaboration suite that includes tools such as email, calendar, office applications, file storage space, and more. You can access the suite from your desktop, web browser, or phone.
  • Connect your mobile devices to K-State’s wireless network.
  • Get antivirus – K-Staters connecting their computers to the Kansas State University network can use the approved antivirus software of their choice or choose from the list of recommended software.
  • Use the Qualtrics survey system. Faculty/staff and authorized students can use the Qualtrics Survey System. Qualtrics is a comprehensive survey tool with more than 90 question types, simplified reporting tools, online training modules, a library of surveys to peruse, and more.
  • Use Zoom (video and audio conferencing) to meet virtually.
    Use Zoom to set up an online staff meeting, a training session, a class group meeting, beam in a speaker, and more. See the Using Zoom guide to get started.
  • Remote access to software – Remote access to software in the K-State computer labs allows students to use specialized software and avoid having to purchase themselves. Popular software includes SAS, SPSS, Mathematica, and Matlab. Unfortunately, Adobe Creative Cloud is not available for remote access. To see a list of all software available in the computing labs, visit the Software in the Computing Labs page. To learn how to access the software, visit the Remote Access page.
  • Get IT Help

More IT resources for K-Staters are on the Welcome to IT at K-State website.

Protect your online privacy

""The Internet touches almost all aspects of our daily lives. We can shop, bank, connect with family and friends, and handle our medical records all online. These activities require you to provide personally identifiable information (PII) such as your name, date of birth, account numbers, passwords, and location information. Be diligent when sharing personal information online to reduce the risk of becoming a victim of a cybercrime.

Tips to stay safe online

  • Double your login protection. Enable multi-factor authentication (MFA) to ensure that the only person who has access to your account is you. Use it for email, banking, social media, and any other service that requires logging in. If MFA is an option, enable it by using a trusted mobile device, such as your smartphone, an authenticator app, or a secure token—a small physical device that can hook onto your key ring.
  • Shake up your password protocol. Use the longest password or passphrase permissible. Get creative and customize your standard password for different sites, which can prevent cybercriminals from gaining access to these accounts and protect you in the event of a breach. Use password managers to generate and remember different, complex passwords for each account.
  • Keep up to date. Keep your software updated to the latest version available. Maintain your security settings to keep your information safe by turning on automatic updates so you don’t have to think about it, and set your security software to run regular scans.
  • Play hard to get with strangers. Cybercriminals use phishing tactics, hoping to trick their victims. If you’re unsure who an email is from—even if the details appear accurate— or if the email looks “phishy,” do not respond, and do not click on any links or attachments found in that email. When available, use the “junk” or “block” option to no longer receive messages from a particular sender.
  • Never click and tell. Limit what information you post on social media—from personal addresses to where you like to grab a coffee. Many people don’t realize that these seemingly random details are all criminals need to know to target you, your loved ones, and your physical belongings—online and in the real world. Keep Social Security numbers, account numbers, and passwords private, as well as specific information about yourself, such as your full name, address, birthday, and even vacation plans. Disable location services that allow anyone to see where you are—and where you aren’t—at any given time.
  • Keep tabs on your apps. Most connected appliances, toys, and devices are supported by a mobile application. Your mobile device could be filled with suspicious apps running in the background or using default permissions you never realized you approved—gathering your personal information without your knowledge while also putting your identity and privacy at risk. Check your app permissions and use the “rule of least privilege” to delete what you don’t need or no longer use. Learn to just say “no” to privilege requests that don’t make sense. Only download apps from trusted vendors and sources.
  • Stay protected while connected. Before you connect to any public wireless hotspot—such as at an airport, hotel, or café—be sure to confirm the name of the network and exact login procedures with the appropriate staff to ensure that the network is legitimate. If you use an unsecured public access point, practice good Internet hygiene by avoiding sensitive activities (e.g., banking) requiring passwords or credit cards. Your personal hotspot is often a safer alternative to free Wi-Fi. Only use sites that begin with “https://” when online shopping or banking.

If you receive a questionable email and prefer to play it safe, you can send it to abuse@ksu.edu. K-State’s IT Security Team will investigate the email and inform you if it is legitimate.

Cybersecurity: Stay safe while traveling

""It’s that time of year when many are going on vacation or planning to do so. It’s important to prioritize cybersecurity, even when you’re on vacation.

By taking a few simple precautions, you can enjoy your vacation without compromising your online security. Follow some simple practices to keep you safe from cybercriminals.

Continue reading “Cybersecurity: Stay safe while traveling”