Departments: This is a last call for an easy way to securely dispose of your paper records. Shred Day is 8:30–11 a.m., Wednesday, Oct. 23. Call iTAC by Friday, Oct. 18 to schedule a pickup: 785-532-4918.
For details, see Fall 2019 Shred Day is October 23 article.
CRM Introduction Training has been scheduled for Oct. 31, Nov. 12, and Dec. 2. All training sessions will be in Calvin Hall 306, and training will last for 1.5 hours. Training sessions are limited to 20 people per session. You must be enrolled in the session to attend.
To sign up for training, sign in to HRIS.
- Under Self Service, choose Learning and Development, then KSU Training Enrollment.
- On the Request Training Enrollment page, look for CRM Introduction WIT310.
- Select View Available Sessions.
- Select the Session you would like to attend.
- Select Continue.
Continue reading “CRM introduction training Oct. 31, Nov. 12, and Dec. 2”
Today’s technology allows us to connect around the world, to bank and shop online, and to control our televisions, homes, and cars from our smartphones. With this added convenience comes an increased risk of identity theft and Internet scams. #BeCyberSmart on the Internet—at home, at school, at work, on mobile devices, and on the go.
DID YOU KNOW?
- The total number of data breaches reported in 2018 decreased 23% from the total number of breaches reported in 2017, but the reported number of consumer records containing sensitive personally identifiable information (PII) exposed increased 126%.
- Credit card fraud tops the list of identity theft reports in 2018. The Federal Trade Commission (FTC) received more than 167,000 reports from people who said their information was misused on an existing account or to open a new credit card account.
- Consumers reported $905 million in total fraud losses in 2017, a 21.6% increase over 2016.
Continue reading “Cybersecurity: Identity theft and internet scams”
During the fall semester, Information Technology Services is hosting a webinar training series focusing on Mediasite at K-State.
This webinar series highlights many of the power features offered through Mediasite. Faculty will learn the difference between Mediasite channels and shared folders, with the final session demonstrating how to leverage in-video quizzes to foster active learning in the online classroom.
Each 30-minute program is scheduled on a Monday at 10 a.m. and offered through Zoom.
The 2019 fall semester schedule includes:
Continue reading “Reminder: Mediasite webinar on Channels and Shared Folders Oct. 21”
In a world where we are constantly connected, cybersecurity cannot be limited to the home or office. When you’re traveling— whether domestic or international—it is always important to practice safe online behavior and take proactive steps to secure Internet-enabled devices. The more we travel, the more we are at risk for cyberattacks. #BeCyberSmart and use these tips to connect with confidence while on the go.
SIMPLE TIPS TO OWN IT.
Before You Go
- If you connect, you must protect. Whether it’s your computer, smartphone, game device, or other network devices, the best defense against viruses and malware is to update to the latest security software, web browser, and operating systems. Sign up for automatic updates, if you can, and protect your devices with anti-virus software.
- Back up your information. Back up your contacts, financial data, photos, videos, and other mobile device data to another device or cloud service in case your device is compromised and you have to reset it to factory settings.
- Be up-to-date. Keep your software updated to the latest version available. Maintain your security settings to keeping your information safe by turning on automatic updates so you don’t have to think about it, and set your security software to run regular scans.
- Keep it locked. Lock your device when you are not using it. Even if you only step away for a few minutes, that is enough time for someone to steal or misuse your information. Set your devices to lock after a short time and use strong PINs and passwords.
- Double your login protection. Enable multi-factor authentication (MFA) to ensure that the only person who has access to your account is you. Use it for email, banking, social media, and any other service that requires logging in. If MFA is an option, enable it by using a trusted mobile device, such as your smartphone, an authenticator app, or a secure token—a small physical device that can hook onto your key ring.
Continue reading “Cybersecurity: While traveling”
Internet of Things (IoT) or smart devices refers to any object or device that is connected to the Internet. This rapidly expanding set of “things,” which can send and receive data, includes cars, appliances, smart watches, lighting, home assistants, home security, and more. #BeCyberSmart to connect with confidence and protect your interconnected world.
WHY SHOULD WE CARE?
- Cars, appliances, wearables, lighting, healthcare, and home security all contain sensing devices that can talk to another machine and trigger other actions. Examples include devices that direct your car to an open spot in a parking lot; mechanisms that control energy use in your home; and tools that track eating, sleeping, and exercise habits.
- New Internet-connected devices provide a level of convenience in our lives, but they require that we share more information than ever.
- The security of this information, and the security of these devices, is not always guaranteed. Once your device connects to the Internet, you and your device could potentially be vulnerable to all sorts of risks.
- With more connected “things” entering our homes and our workplaces each day, it is important that everyone knows how to secure their digital lives.
Continue reading “Cybersecurity: Internet of Things (IoT)”
Training sessions for Master Extract Reporting in KSIS are now available. The sessions are only for staff who have been granted the Master Extract Reporting permission.
You must have permissions setup for Master Extract Reporting in KSIS before you can take this class.
All sessions are scheduled in 306 Calvin Hall:
- Wed., Oct. 30, 10:30 – 11:30 a.m.
- Mon., Nov 11, 2 – 3 p.m.
Registration through HRIS is required. See Using HRIS to register for classes.
If the offered sessions does not fit your schedule, please contact the KSIS training coordinator, Fred Darkow, at firstname.lastname@example.org to request additional classes. Attendees will be notified if a session is canceled and will be asked to register for an alternative training session.
The Internet touches almost all aspects of our daily lives. We are able to shop, bank, connect with family and friends, and handle our medical records all online. These activities require you to provide personally identifiable information (PII) such as your name, date of birth, account numbers, passwords, and location information. #BeCyberSmart when sharing personal information online to reduce the risk of becoming a cybercrimes victim.
DID YOU KNOW?
- 64% of U.S. adults have noticed or been notified of a major data breach affecting their sensitive accounts or personal data.
- Roughly half of Americans (49%) feel that their personal information is less secure than it was five years ago.
- 58% of Americans age 50 and older are more likely to feel that their personal information has become less safe in recent years: 58% of Americans in this age group express this opinion.
- 69% of consumers believe companies are vulnerable to hacks and cyberattacks.
Continue reading “Cybersecurity: Online privacy”
An “Intro to NVivo 12 Plus” training is scheduled from 1:30-3:30 p.m. Friday, Oct. 11, in 306 Calvin Hall for all faculty, graduate students, and staff who may be using this qualitative (and mixed methods) data analysis tool.
This presentation, which covers NVivo 12 Plus basics, will address the following:
- the basic parts of the NVivo 12 Plus interface
- how to start and structure a research project (including a team project)
- how to set up a project around a base language (Chinese/PRC, English/US, English/UK, French, German, Japanese, Portuguese/Brazil, and Spanish
- how to ingest various multimedia file types (and curate heterogeneous and semi-structured digital data and digitized contents)
- how to ingest some social media contents
- how to begin manual and / or automated coding various media file types
- how to run data queries in the tool and analyze resulting data visualizations (word clouds, word trees, matrices, geographical maps, bar charts, and others), and
- how to back up the .nvp / .nvpx project file
Continue reading “Oct. 11: Intro to NVivo 12 Plus”