Follow these six National Cyber Security Alliance recommendations to better protect yourself online and make the Internet more secure for everyone:
- Strengthen each online account or device. Enable the strongest authentication tools available. A strong password is the first step to protecting yourself. Other strategies might include biometrics, security keys, or unique one-time codes sent to your mobile device.
- Keep a clean machine. Make sure all software on Internet-connected devices — including PCs, laptops, smartphones, and tablets — are updated regularly to reduce the risk of malware infection.
- Personal information is like money. Value it. Protect it. Information about you, such as purchase history or location, has value — just like money. Be thoughtful about who receives that information and how it’s collected by apps or websites.
- When in doubt, throw it out. Cybercriminals often use links to try to steal your personal information. Even if you know the source, if something looks suspicious, delete it.
- Share with care. Think before posting about yourself and others online. Consider what a post reveals, who might see it, and how it could be perceived now and in the future.
- Own your online presence. Set the privacy and security settings on websites to your comfort level for information sharing. It’s okay to limit how and with whom you share information.
Source: Educause Campus Security Awareness Campaign
If you have any questions about your online safety, contact the IT Help Desk, firstname.lastname@example.org, 532-7722.
URL is blocked at the border, submitted to Trend, Web Host has been notified.
From: ******* ******** <********@ksu.edu>
Subject: Account Shutdown
Date: Fri, 12 May 2017 18:43:18 +0000
This is to notify all Students, Staffs of Kansas University that we are validating active accounts.Kindly confirm that your account is still in use by clicking the validation link below:
Validate Email Account [http://completepcsolutionsservices.com/membeter/office/index.html]
IT Help Desk
Office of Information Technology
Kansas State University
by Information Technology Services
In K-State Online, instructors communicate to students via the Inbox. Based on instructor feedback, Information Technology Services has made an improvement to the Inbox for K-State.
Continue reading “Inbox change in K-State Online”
The Dec. 22 email that appeared to be from President Myers is one more example of the need to be vigilant before responding to an email, clicking a link, or opening an attachment. The email appeared to be legitimate. A point of clarification though is communications from President Myers would more than likely be posted in K-State Today. Also when verifying the “reply to” email address, there was an additional “from” email address not associated with K-State (see the highlighted email below).
U.S. CERT (U.S. Computer Emergency Readiness Team) reminds us to remain on the alert and when in doubt, delete the email, avoid clicking on a link and do not open suspicious attachments. When in doubt, DELETE.
In response to the latest phishing scam, Information Technology Services and Communications and Marketing have:
- Blocked the URL for the email on the K-State network
- Sent the attachment to Trend Micro for analysis. The attachment was deemed malicious and Trend Micro is preventing the attachment from being downloaded.
- Posted notices about the scam throughout campus.
Networking & Telecommunications Services needs to replace cable that was
damaged last year when the steam tunnels were flooded. While a fix has
been in place, the work occurring next weekend will permanently repair the cable. Repairs will occur outside of normal working hours and will only affect telephone lines and not data connections.
Work begins on Thursday, August 11 at 5 p.m. The first building to be repaired will be Anderson Hall. Service work will be completed during the evening and telephones in Anderson Hall will be back in operation by 8 a.m. Friday morning. Phone cable replacement will continue after 5 p.m. on Friday, August 12 and run through the weekend.
All phones should be operational by 8 a.m. Monday morning, August 15. If
users experience any outages after these repairs, please call the repair line at 532-7111. Updates will be posted on the www.ksu.edu/its/status page.
Buildings where phone cable will be repaired include:
Marianna Kistler Beach Museum of Art
by Information Technology Services
Whether you are an experienced K-State Online Canvas user or new to teaching with the LMS, we have compiled some tips and tricks to help you through the semester in the Getting started with Canvas course for instructors. Continue reading “Getting started with Canvas”
by Information Technology Services
Mediasite services and content will migrate from the current cloud-hosted provider to on-campus servers during the month of June. In the last year alone, Mediasite has experienced a 360 percent growth in presentations, now totaling more than 17 thousand. With the continued growth of Mediasite, it has become fiscally advantageous to migrate to an on-campus installation. Continue reading “Mediasite June migration”
Kathleen Adams will present “Phishing – not just for days at the lake” at 3 p.m., May 11, via Zoom. Join this session to learn about what happens when a phishing scam hits K-State. So far this year there have been 471 phishing scams reported and 175 compromised eIDs. Phishing is a very serious problem, join the discussion to learn what you can do to protect yourself. Topics include:
- Identifying types of phishing scams
- Sending phishing scams to K-State’s abuse email team with precision
- Learning what we do to take down a phishing scam
- Discovering what happens if an account gets compromised
- Protecting your account from being compromised
Join the session at ksu.zoom.us/j/738417925. Visit the Tech Tips Live! website for information about the series and to view videos of previous sessions.
Yammer is a private social network that connects you to people at K-State and beyond. Yammer makes it easy to share, collaborate, and build a body of knowledge that’s instantly accessible at any time and from any device.
K-State has been using the free version of Yammer for many years. On April 1, Microsoft will begin rolling out Yammer and it will be available from the Office 365 App Launcher in the coming weeks. Join this session to learn all about it.
Cathy Rodriguez, iTAC, will present Yammer Time!, 3 p.m. Wednesday, Mar. 23, via Zoom. Topics include:
- Editing your Yammer profile
- Modifying notifications
- Creating groups and networks
- Joining groups and networks
- Navigating between groups and networks
- Exploring Yammer use cases
Visit the Tech Tips Live! website for information about the series and to view videos of previous sessions. Ideas on future Tech Tips Live! session topics can be sent to email@example.com.
OneDrive is available as part of K-State’s Office 365 package and can be used to store, share, and collaborate on files. You can use it to store class assignments, departmental and committee documents, public research data, and other project information. You can also securely share and collaborate on files with specific individuals.
A few things to keep in mind:
- Create a new folder when you need to store groups of files.
- Never store confidential data, including but not limited to Personally Identifiable Information (information about an individual that contains a unique identifier).
- Do not store non-university files on OneDrive because these could be obtained by others through a subpoena or other legal process.
- Only share files with specific individuals.
- Remove individuals’ access when they no longer require access to files or folder.
OneDrive is available from the Office 365 app launcher, desktop client, and mobile devices. See the following articles on how to configure the OneDrive app on your mobile devices: