After a collective 90+ years of service, Beth and Jay Alloway will retire from Information Technology Services on December 31, 2017. A retirement celebration will be held in the Hemisphere Room of Hale Library on December 19 from 9-10:30 a.m., remarks will be at 9:30 a.m.
Beth has been employed at K-State for more than 46 1/2 years. Her position has evolved from key punch operator to overseeing access to administrative systems. She works with every individual who needs access to administrative systems. She monitors and resolves high-level security access requests and has been the go-to person for resolving eID issues.
Jay began his career in the Computing Center in 1969. He was appointed to the position by Elizabeth Unger. He earned his B.S. in Electrical Engineering in 1970 and has held numerous positions over the last 48 years from systems analyst to systems programmer to Assistant Director to Acting Associate Director.
The Information Technology Assistance Center is currently taking requests for software additions on the computers in the centrally supported technology classrooms, the K-State InfoCommons and the university computing labs (1 Dickens Hall, 001 Seaton Hall and the K-State Union Computing lab). The deadline for software requests is Dec. 1.
Software requested must be free to use, or the requesting department must provide the licensing. When a department provides the licensing, iTAC will work with the department to determine the number of licenses needed and monitor compliance. The list of software in the technology classrooms is available from http://www.k-state.edu/its/classrooms/software/index.html . The current list of software in the computer labs is at k-state.edu/its/labs/software.html.
If you have any software you would like added or have questions, contact Kevin Shippy, firstname.lastname@example.org, 785-532-3343.
Information Technology Services is addressing the vulnerability, referred to as KRACK (Key Reinstallation Attack). The vulnerability affects WiFi connectivity using the WPA2 encryption method. The hacker could use this vulnerability on an open, unencrypted network to retrieve confidential information including credit card information, social security numbers, bank account information, etc.
The K-State current Aruba infrastructure already has the protection in place for all of the vulnerabilities except for 802.11R, which is not enabled on our controllers at this time.
While protections are in place, K-Staters need to ensure that their devices (smartphones, laptops, etc.) have all the current patches and update as patches become available. This vulnerability also underscores the need for K-Staters to use the authenticated networks on campus including KSU Wireless, KSU Housing and Eduroam. When connecting from outside our network, K-Staters need to use the virtual private network (VPN).
The open KSU Guest wireless is unencrypted and should be avoided. The same is true when using open wireless networks at local restaurants, fast food operations, hotels, when shopping etc.
For assistance, contact the IT Help Desk at 785-532-7722.
The K-State Credit Union is hosting a free community shred day 9-11 a.m, Saturday, Oct. 7, at 601 McCall Rd (East Branch).
Take advantage of this free service and safely dispose of your sensitive paper documents. Stay one step ahead of criminals that try to obtain this information through various means. While you are there, you can also bring a food donation for the Flint Hills BreadBasket.
For more information, see the K-State Credit Union announcement.
Follow these six National Cyber Security Alliance recommendations to better protect yourself online and make the Internet more secure for everyone:
- Strengthen each online account or device. Enable the strongest authentication tools available. A strong password is the first step to protecting yourself. Other strategies might include biometrics, security keys, or unique one-time codes sent to your mobile device.
- Keep a clean machine. Make sure all software on Internet-connected devices — including PCs, laptops, smartphones, and tablets — are updated regularly to reduce the risk of malware infection.
- Personal information is like money. Value it. Protect it. Information about you, such as purchase history or location, has value — just like money. Be thoughtful about who receives that information and how it’s collected by apps or websites.
- When in doubt, throw it out. Cybercriminals often use links to try to steal your personal information. Even if you know the source, if something looks suspicious, delete it.
- Share with care. Think before posting about yourself and others online. Consider what a post reveals, who might see it, and how it could be perceived now and in the future.
- Own your online presence. Set the privacy and security settings on websites to your comfort level for information sharing. It’s okay to limit how and with whom you share information.
Source: Educause Campus Security Awareness Campaign
If you have any questions about your online safety, contact the IT Help Desk, email@example.com, 532-7722.
by Information Technology Services
In K-State Online, instructors communicate to students via the Inbox. Based on instructor feedback, Information Technology Services has made an improvement to the Inbox for K-State.
Continue reading “Inbox change in K-State Online”
The Dec. 22 email that appeared to be from President Myers is one more example of the need to be vigilant before responding to an email, clicking a link, or opening an attachment. The email appeared to be legitimate. A point of clarification though is communications from President Myers would more than likely be posted in K-State Today. Also when verifying the “reply to” email address, there was an additional “from” email address not associated with K-State (see the highlighted email below).
U.S. CERT (U.S. Computer Emergency Readiness Team) reminds us to remain on the alert and when in doubt, delete the email, avoid clicking on a link and do not open suspicious attachments. When in doubt, DELETE.
In response to the latest phishing scam, Information Technology Services and Communications and Marketing have:
- Blocked the URL for the email on the K-State network
- Sent the attachment to Trend Micro for analysis. The attachment was deemed malicious and Trend Micro is preventing the attachment from being downloaded.
- Posted notices about the scam throughout campus.
Networking & Telecommunications Services needs to replace cable that was
damaged last year when the steam tunnels were flooded. While a fix has
been in place, the work occurring next weekend will permanently repair the cable. Repairs will occur outside of normal working hours and will only affect telephone lines and not data connections.
Work begins on Thursday, August 11 at 5 p.m. The first building to be repaired will be Anderson Hall. Service work will be completed during the evening and telephones in Anderson Hall will be back in operation by 8 a.m. Friday morning. Phone cable replacement will continue after 5 p.m. on Friday, August 12 and run through the weekend.
All phones should be operational by 8 a.m. Monday morning, August 15. If
users experience any outages after these repairs, please call the repair line at 532-7111. Updates will be posted on the www.ksu.edu/its/status page.
Buildings where phone cable will be repaired include:
Marianna Kistler Beach Museum of Art
by Information Technology Services
Whether you are an experienced K-State Online Canvas user or new to teaching with the LMS, we have compiled some tips and tricks to help you through the semester in the Getting started with Canvas course for instructors. Continue reading “Getting started with Canvas”
by Information Technology Services
Mediasite services and content will migrate from the current cloud-hosted provider to on-campus servers during the month of June. In the last year alone, Mediasite has experienced a 360 percent growth in presentations, now totaling more than 17 thousand. With the continued growth of Mediasite, it has become fiscally advantageous to migrate to an on-campus installation. Continue reading “Mediasite June migration”