Departments: This is a last call for an easy way to securely dispose of your paper records. Shred Day is 8:30–11 a.m., Wednesday, Oct. 23. Call iTAC by Friday, Oct. 18 to schedule a pickup: 785-532-4918.
For details, see Fall 2019 Shred Day is October 23 article.
CRM Introduction Training has been scheduled for Oct. 31, Nov. 12, and Dec. 2. All training sessions will be in Calvin Hall 306, and training will last for 1.5 hours. Training sessions are limited to 20 people per session. You must be enrolled in the session to attend.
To sign up for training, sign in to HRIS.
- Under Self Service, choose Learning and Development, then KSU Training Enrollment.
- On the Request Training Enrollment page, look for CRM Introduction WIT310.
- Select View Available Sessions.
- Select the Session you would like to attend.
- Select Continue.
Continue reading “CRM introduction training Oct. 31, Nov. 12, and Dec. 2”
Today’s technology allows us to connect around the world, to bank and shop online, and to control our televisions, homes, and cars from our smartphones. With this added convenience comes an increased risk of identity theft and Internet scams. #BeCyberSmart on the Internet—at home, at school, at work, on mobile devices, and on the go.
DID YOU KNOW?
- The total number of data breaches reported in 2018 decreased 23% from the total number of breaches reported in 2017, but the reported number of consumer records containing sensitive personally identifiable information (PII) exposed increased 126%.
- Credit card fraud tops the list of identity theft reports in 2018. The Federal Trade Commission (FTC) received more than 167,000 reports from people who said their information was misused on an existing account or to open a new credit card account.
- Consumers reported $905 million in total fraud losses in 2017, a 21.6% increase over 2016.
Continue reading “Cybersecurity: Identity theft and internet scams”
During the fall semester, Information Technology Services is hosting a webinar training series focusing on Mediasite at K-State.
This webinar series highlights many of the power features offered through Mediasite. Faculty will learn the difference between Mediasite channels and shared folders, with the final session demonstrating how to leverage in-video quizzes to foster active learning in the online classroom.
Each 30-minute program is scheduled on a Monday at 10 a.m. and offered through Zoom.
The 2019 fall semester schedule includes:
Continue reading “Reminder: Mediasite webinar on Channels and Shared Folders Oct. 21”
In a world where we are constantly connected, cybersecurity cannot be limited to the home or office. When you’re traveling— whether domestic or international—it is always important to practice safe online behavior and take proactive steps to secure Internet-enabled devices. The more we travel, the more we are at risk for cyberattacks. #BeCyberSmart and use these tips to connect with confidence while on the go.
SIMPLE TIPS TO OWN IT.
Before You Go
- If you connect, you must protect. Whether it’s your computer, smartphone, game device, or other network devices, the best defense against viruses and malware is to update to the latest security software, web browser, and operating systems. Sign up for automatic updates, if you can, and protect your devices with anti-virus software.
- Back up your information. Back up your contacts, financial data, photos, videos, and other mobile device data to another device or cloud service in case your device is compromised and you have to reset it to factory settings.
- Be up-to-date. Keep your software updated to the latest version available. Maintain your security settings to keeping your information safe by turning on automatic updates so you don’t have to think about it, and set your security software to run regular scans.
- Keep it locked. Lock your device when you are not using it. Even if you only step away for a few minutes, that is enough time for someone to steal or misuse your information. Set your devices to lock after a short time and use strong PINs and passwords.
- Double your login protection. Enable multi-factor authentication (MFA) to ensure that the only person who has access to your account is you. Use it for email, banking, social media, and any other service that requires logging in. If MFA is an option, enable it by using a trusted mobile device, such as your smartphone, an authenticator app, or a secure token—a small physical device that can hook onto your key ring.
Continue reading “Cybersecurity: While traveling”
Information Technology Services is hosting a cybersecurity trivia contest each Thursday throughout the rest of October. The contest will be conducted on Twitter starting on Thursday, Oct. 10. Participate in our weekly questions to earn a chance to win!
How does it work?
- Follow us on Twitter – https://twitter.com/kstateithelp
- Two new questions will be posted each Thursday throughout the rest of October. One in the morning and one in the afternoon. That gives you 8 chances to participate and test your cyber-intelligence.
- Answer each question in the comments and then retweet the post with the hashtag #BeCyberSmartKstate for a chance to win!
- You must answer the current week’s questions before the next questions are released the following week.
You must be a current K-State student, staff, or faculty to win. The winner will be notified on November 7 via direct message on Twitter. If you have any questions about the contest, contact Cathy Rodriguez@ksu.edu.
Fall is a spooky time of year with cooler weather, hundreds of events across campus and IT staff cranking on projects. Duo, two factor authentication, is coming to the final three faculty/staff groups and the cloud first strategy continues with moves of priority systems to the cloud.
As part of the IT Reorganization process, Gary Pratt, CIO announced the combining of the Network Operations Center and the Information Security and Compliance Office to form the Security Intelligence and Operations Center.
Scott Finkeldei has accepted the role of Director for Academic and Student Technology. In this role, Scott will continue to lead the faculty support services provided by the Office of Mediated Education (OME). Additionally, Scott will provide a more focused effort in providing direct support for faculty in the teaching, learning and scholarship arenas as well as support the student success technology needs of campus.
IT continues to emphasize professional development for staff especially in the areas of ITIL and cloud strategies.
Continue reading “IT Update”
Qualtrics surveys can be used for event registrations, satisfaction surveys, online forms, academic research, training, and more. Join us for an Introduction to Qualtrics training session from 2:30-4:30 p.m. Wednesday, October 16 in 306 Calvin Hall. All students, faculty, and staff who use this research suite are welcome to attend.
Topics to be covered:
- Create and manage surveys
- Customize the look and feel
- Collaborate with others
- Use block options and survey flow
- Use display and skip logic
- Distribute a survey
- Run and analyze reports
Graduate and undergraduate students must work with an advisor/supervisor for access to Qualtrics using this request form.
Register through HRIS. See Using HRIS to register for classes.
Internet of Things (IoT) or smart devices refers to any object or device that is connected to the Internet. This rapidly expanding set of “things,” which can send and receive data, includes cars, appliances, smart watches, lighting, home assistants, home security, and more. #BeCyberSmart to connect with confidence and protect your interconnected world.
WHY SHOULD WE CARE?
- Cars, appliances, wearables, lighting, healthcare, and home security all contain sensing devices that can talk to another machine and trigger other actions. Examples include devices that direct your car to an open spot in a parking lot; mechanisms that control energy use in your home; and tools that track eating, sleeping, and exercise habits.
- New Internet-connected devices provide a level of convenience in our lives, but they require that we share more information than ever.
- The security of this information, and the security of these devices, is not always guaranteed. Once your device connects to the Internet, you and your device could potentially be vulnerable to all sorts of risks.
- With more connected “things” entering our homes and our workplaces each day, it is important that everyone knows how to secure their digital lives.
Continue reading “Cybersecurity: Internet of Things (IoT)”
Training sessions for Master Extract Reporting in KSIS are now available. The sessions are only for staff who have been granted the Master Extract Reporting permission.
You must have permissions setup for Master Extract Reporting in KSIS before you can take this class.
All sessions are scheduled in 306 Calvin Hall:
- Wed., Oct. 30, 10:30 – 11:30 a.m.
- Mon., Nov 11, 2 – 3 p.m.
Registration through HRIS is required. See Using HRIS to register for classes.
If the offered sessions does not fit your schedule, please contact the KSIS training coordinator, Fred Darkow, at firstname.lastname@example.org to request additional classes. Attendees will be notified if a session is canceled and will be asked to register for an alternative training session.