Kansas State University

search

IT News

Cybersecurity: 5 steps to protecting your digital home

More and more of our home devices— including thermostats, door locks, coffee machines, and smoke alarms—are now connected to the Internet. This enables us to control our devices on our smartphones, no matter our location, which in turn can save us time and money while providing convenience and even safety. These advances in technology are innovative and intriguing, however they also pose a new set of security risks. #BeCyberSmart to connect with confidence and protect your digital home.

SIMPLE TIPS TO PROTECT IT.

  • Secure your Wi-Fi network. Your home’s wireless router is the primary entrance for cybercriminals to access all of your connected devices. Secure your Wi-Fi network and your digital devices by changing the factory-set default password and username. For more information about protecting your home network, check out the National Security Agency’s Cybersecurity Information page.
  • Double your login protection. Enable multi-factor authentication (MFA) to ensure that the only person who has access to your account is you. Use it for email, banking, social media, and any other service that requires logging in. If MFA is an option, enable it by using a trusted mobile device such as your smartphone, an authenticator app, or a secure token—a small physical device that can hook onto your key ring.
  • If you connect, you must protect. Whether it’s your computer, smartphone, game device, or other network devices, the best defense is to stay on top of things by updating to the latest security software, web browser, and operating systems. If you have the option to enable automatic updates to defend against the latest risks, turn it on. And, if you’re putting something into your device, such as a USB for an external hard drive, make sure your device’s security software scans for viruses and malware. Finally, protect your devices with antivirus software and be sure to periodically back up any data that cannot be recreated such as photos or personal documents.
  • Keep tabs on your apps. Most connected appliances, toys, and devices are supported by a mobile application. Your mobile device could be filled with suspicious apps running in the background or using default permissions you never realized you approved—gathering your personal information without your knowledge while also putting your identity and privacy at risk. Check your app permissions and use the “rule of least privilege” to delete what you don’t need or no longer use. Learn to just say “no” to privilege requests that don’t make sense. Only download apps from trusted vendors and sources.
  • Never click and tell. Limit what information you post on social media—from personal addresses to where you like to grab coffee. What many people don’t realize is that these seemingly random details are all that criminals need to know to target you, your loved ones, and your physical belongings—online and in the real world. Keep Social Security numbers, account numbers, and passwords private, as well as specific information about yourself, such as your full name, address, birthday, and even vacation plans. Disable location services that allow anyone to see where you are— and where you aren’t —at any given time.

Download the 5 steps to protecing your digital home guide.

Continue reading “Cybersecurity: 5 steps to protecting your digital home”

Oct. 25: Tapping Social Media with NCapture and NVivo 12 Plus

“Tapping Social Media Data with NCapture and NVivo 12 Plus” will be offered 1:30-3:30 p.m. Friday, Oct. 25, in 306 Calvin Hall (a computer lab). This presentation provides an overview of the NCapture browser add-on (to Google Chrome and Microsoft IE) as a tool for extracting information from social media platforms and will explore how the extracted data is analyzed using NVivo 12 Plus, a qualitative and mixed methods data analysis tool. (The NVivo for Mac now enables this functionality as well.)

Continue reading “Oct. 25: Tapping Social Media with NCapture and NVivo 12 Plus”

CRM introduction training Oct. 31, Nov. 12, and Dec. 2

CRM Introduction Training has been scheduled for Oct. 31, Nov. 12, and Dec. 2. All training sessions will be in Calvin Hall 306, and training will last for 1.5 hours. Training sessions are limited to 20 people per session. You must be enrolled in the session to attend.

To sign up for training, sign in to HRIS.

  1. Under Self Service, choose Learning and Development, then KSU Training Enrollment.
  2. On the Request Training Enrollment page, look for CRM Introduction WIT310.
  3. Select View Available Sessions.
  4. Select the Session you would like to attend.
  5. Select Continue.

Continue reading “CRM introduction training Oct. 31, Nov. 12, and Dec. 2”

Cybersecurity: Identity theft and internet scams

Today’s technology allows us to connect around the world, to bank and shop online, and to control our televisions, homes, and cars from our smartphones. With this added convenience comes an increased risk of identity theft and Internet scams. #BeCyberSmart on the Internet—at home, at school, at work, on mobile devices, and on the go.

DID YOU KNOW?

  • The total number of data breaches reported in 2018 decreased 23% from the total number of breaches reported in 2017, but the reported number of consumer records containing sensitive personally identifiable information (PII) exposed increased 126%.
  • Credit card fraud tops the list of identity theft reports in 2018. The Federal Trade Commission (FTC) received more than 167,000 reports from people who said their information was misused on an existing account or to open a new credit card account.
  • Consumers reported $905 million in total fraud losses in 2017, a 21.6% increase over 2016.

Continue reading “Cybersecurity: Identity theft and internet scams”

Reminder: Mediasite webinar on Channels and Shared Folders Oct. 21

During the fall semester, Information Technology Services is hosting a webinar training series focusing on Mediasite at K-State.

This webinar series highlights many of the power features offered through Mediasite. Faculty will learn the difference between Mediasite channels and shared folders, with the final session demonstrating how to leverage in-video quizzes to foster active learning in the online classroom.

Each 30-minute program is scheduled on a Monday at 10 a.m. and offered through Zoom.

The 2019 fall semester schedule includes:

Continue reading “Reminder: Mediasite webinar on Channels and Shared Folders Oct. 21”

Cybersecurity: While traveling

In a world where we are constantly connected, cybersecurity cannot be limited to the home or office. When you’re traveling— whether domestic or international—it is always important to practice safe online behavior and take proactive steps to secure Internet-enabled devices. The more we travel, the more we are at risk for cyberattacks. #BeCyberSmart and use these tips to connect with confidence while on the go.

SIMPLE TIPS TO OWN IT.

Before You Go

  • If you connect, you must protect. Whether it’s your computer, smartphone, game device, or other network devices, the best defense against viruses and malware is to update to the latest security software, web browser, and operating systems. Sign up for automatic updates, if you can, and protect your devices with anti-virus software.
  • Back up your information. Back up your contacts, financial data, photos, videos, and other mobile device data to another device or cloud service in case your device is compromised and you have to reset it to factory settings.
  • Be up-to-date. Keep your software updated to the latest version available. Maintain your security settings to keeping your information safe by turning on automatic updates so you don’t have to think about it, and set your security software to run regular scans.
  • Keep it locked. Lock your device when you are not using it. Even if you only step away for a few minutes, that is enough time for someone to steal or misuse your information. Set your devices to lock after a short time and use strong PINs and passwords.
  • Double your login protection. Enable multi-factor authentication (MFA) to ensure that the only person who has access to your account is you. Use it for email, banking, social media, and any other service that requires logging in. If MFA is an option, enable it by using a trusted mobile device, such as your smartphone, an authenticator app, or a secure token—a small physical device that can hook onto your key ring.

Continue reading “Cybersecurity: While traveling”

Cybersecurity: Trivia Contest

Information Technology Services is hosting a cybersecurity trivia contest each Thursday throughout the rest of October. The contest will be conducted on Twitter starting on Thursday, Oct. 10. Participate in our weekly questions to earn a chance to win!

Trivia Contest

How does it work?

  1. Follow us on Twitter – https://twitter.com/kstateithelp
  2. Two new questions will be posted each Thursday throughout the rest of October. One in the morning and one in the afternoon. That gives you 8 chances to participate and test your cyber-intelligence.
  3. Answer each question in the comments and then retweet the post with the hashtag #BeCyberSmartKstate for a chance to win!
  4. You must answer the current week’s questions before the next questions are released the following week.

You must be a current K-State student, staff, or faculty to win. The winner will be notified on November 7 via direct message on Twitter. If you have any questions about the contest, contact Cathy Rodriguez@ksu.edu.

Visit the Cybersecurity Awareness Month website to stay up-to-date on activities throughout the month.

IT Update

Fall is a spooky time of year with cooler weather, hundreds of events across campus and IT staff cranking on projects. Duo, two factor authentication, is coming to the final three faculty/staff groups and the cloud first strategy continues with moves of priority systems to the cloud.

Staff

As part of the IT Reorganization process, Gary Pratt, CIO announced the combining of the Network Operations Center and the Information Security and Compliance Office to form the Security Intelligence and Operations Center.

Scott Finkeldei has accepted the role of Director for Academic and Student Technology. In this role, Scott will continue to lead the faculty support services provided by the Office of Mediated Education (OME). Additionally, Scott will provide a more focused effort in providing direct support for faculty in the teaching, learning and scholarship arenas as well as support the student success technology needs of campus.

IT continues to emphasize professional development for staff especially in the areas of ITIL and cloud strategies.

Continue reading “IT Update”

Oct. 16: Introduction to Qualtrics

Qualtrics surveys can be used for event registrations, satisfaction surveys, online forms, academic research, training, and more. Join us for an Introduction to Qualtrics training session from 2:30-4:30 p.m. Wednesday, October 16 in 306 Calvin Hall. All students, faculty, and staff who use this research suite are welcome to attend.

Topics to be covered:

  • Create and manage surveys
  • Customize the look and feel
  • Collaborate with others
  • Use block options and survey flow
  • Use display and skip logic
  • Distribute a survey
  • Run and analyze reports

Graduate and undergraduate students must work with an advisor/supervisor for access to Qualtrics using this request form.

Register through HRIS. See Using HRIS to register for classes.