
Issue 19, July 20, 2021This communication was generated by UTHSC Information Technology Services to educate
and inform our campus community about available technology tools, training opportunities,
news, and events that will help you and the university achieve excellence in patient
care, education, research, and community service.
|
|
Just a Few More Days until UTHSC TechConnect Goes Live! On July 26, UTHSC TechConnect, the new IT service site, will be available to you to
report issues, request services, find technical information, and so much more. Once
live, UTHSC TechConnect will replace the ability to send an email to helpdesk@uthsc.edu so that ITS can provide you with easier and quicker service.
On Friday, we will start our transition from Footprints by transferring all open tickets
to UTHSC TechConnect. As this occurs, you may start getting ticket updates from the
new system via the email address techconnect@uthsc.edu. You also will notice that the updates originate from uthsc.teamdynamix.com. This
is correct, as Team Dynamix is the tool that powers UTHSC TechConnect.
We hope you are as excited as we are! Visit our TechConnect introduction page to meet our friend Veronica, get a sneak peek, and learn more.
|
|
|
Walk-ins Welcome Again!
The Service Desk is now open once again for in-person assistance 8 am - 5 pm CT on
the 6th floor of the Lamar Alexander building.
But you can still call us 7:30 am - 5:30 pm CT at 901.448.2222.
|
|
Subscription Renewal Scams There have been widespread phishing scams reported regarding subscription services
that have auto-renewed. Most prolific are Norton Anti-virus and PayPal. These are
scams that provide a phone number to call to dispute the charge. Be prepared to spot
these phishing attempts and respond by deleting them from your inbox. If you engage
the scammers by calling, they will either want banking or credit card information
to research the charge or even ask for permission to remote into your device to “check
settings.” Do not give anyone not affiliated with UTHSC ITS remote access to your
device. Once they have control, they potentially have access to our entire network.
To protect the university, use your UTHSC email account only for university business.
Your UTHSC email should not be used when signing up for an account on a personal app,
i.e., restaurant or gaming apps. Free email accounts are readily obtainable with Google,
Yahoo, iCloud, etc.
|
|
|
Too Many Zoom Meetings? ‘Core Hours’ Keep Some Remote Workers Productive and SaneEven if you are back on campus, you may be conducting meetings via Zoom. Some companies
are setting defined daily meeting schedules for employees to prevent burnout. That
means Zoom meetings only during core hours, say 10 am to 2 pm. Learn more about this
innovative approach to promote a better work-life balance for both in-office and remote
workers in this Wall Street Journal article titled Too Many Zoom Meetings? ‘Core Hours’ Keep Some Remote Workers Productive and Sane.
|
|
Mplus by Muthén & Muthén Mplus analyzes Structural Equations Models (SEM) that can include both continuous
and categorical latent constructs. As their website states, it can also analyze "both
cross-sectional and longitudinal data, single-level and multi-level data, and data
that come from different populations with either observed or unobserved heterogeneity.
Analyses can be carried out for observed variables that are continuous, censored,
binary, ordered categorical (ordinal), unordered categorical (nominal), counts, or
combinations of these variable types."
Learn more about Mplus on OIT's Research Software website. Learn when to use it, where to run it, how to learn, and where to get help.
|
|
Microsoft has some excellent training courses we recommend:
|
|
Word: Insert or Remove Page Numbers Inserting or removing page numbers in Microsoft Word can be tricky! Learn the easy
way to do it with this one-minute video.

|
|
Email How to Add a Blind Carbon Copy (Bcc) Recipient in Outlook
Bcc is useful when sending an email to undisclosed recipients in Outlook.
Windows and Mac Users:
- Create a new email or reply to an existing email.
- Click Options on the ribbon, then click the Bcc icon.
- Add recipient(s) to the Bcc: field.
Web Users:
- Create a new email or reply to an existing email.
- Click the Bcc icon on the far right of the screen.
- Add recipient(s) to the Bcc: field.
Lean 6 Sigma Free Online 2021 NCCI Annual Conference July 21 & 22
This is your last chance to register for the 2021 NCCI Conference - it starts tomorrow! UTHSC attendees can go for free (it normally costs $345 value for non-members).
NCCI (Network for Change and Continuous Innovation) focuses on continuous improvement,
organizational development, planning, quality, institutional effectiveness, and related
areas. Some of the awesome sessions planned include:
- A Picture Is Worth More Than 1000 Words: Visualization Revisited
- High Conflict People in the Workplace- Oh My! Tools & Tips to Manage
- Virtual Collaboration: From Flipcharts to Zoom
- Using Lean Processes and Continuous Improvement Across a Division, Our Story
- An Introduction to Design Thinking for Strategic Challenges
- Intuitive Project Management Training for Everybody
View a complete listing of all the sessions.
Be sure to register today (did we mention it was free?). If you don’t have an existing NCCI account, you will
need to create one, but it is super easy (be sure to use your official UTHSC email
when you register so you won’t be charged).
And, most of all – be sure to share this link with coworkers who may be interested in attending!
|
|
Security Your Mobile Devices From Jeroen Beckers, SANS Guest EditorMobile devices are an amazing and easy way to communicate with friends, shop or bank
online, watch movies, play games, and perform a myriad of other activities. Since
these devices are such an important part of your life, keeping you and your devices
safe and secure is essential.
Securing Your Devices It may surprise you to know that the biggest risk to your mobile device is most likely
not cyber criminals but you. You are far more likely to lose or forget a mobile device
than have someone hack into it. The number one thing you should do to protect your
device is enable automatic screen locking when the device is idle. This means that
you have to unlock the screen with a strong passcode, your face, or your fingerprint
to use your device. This helps ensure that it is much harder for anyone else to access
your information if your device is lost or stolen. As a bonus, for most mobile devices,
enabling the screen lock also enables encryption, helping protect the data stored
on the device.
Here are several more tips to help protect your devices:
- Updating: Enable automatic updating on your devices, so they are always running the latest
version of the operating system and apps. Attackers are always looking for new weaknesses
in software, and vendors are constantly releasing updates and patches to fix them.
Keeping your devices up to date makes them much harder to hack. When choosing a new
Android device, look at the vendor’s commitment to keeping the device updated. Apple
iOS devices are updated by the company itself, while Android mobile devices are updated
by the vendor that sold you the device, and not all vendors actively update their
devices. If you are using an old device that is no longer supported or cannot be updated,
consider purchasing a new device that is fully supported.
- Tracking: Install or enable trusted software to remotely track your mobile device over the
Internet. This way, you can connect to it over the Internet and find its location
if your device is lost or stolen or remotely wipe all of your information in a worst-case
situation.
- Trusted Mobile Apps: Only install apps you need and stick to trusted sources. For Apple iOS devices such
as iPads or iPhones, that means Apple’s App Store. For Android devices, use Google
Play; for Amazon tablets, utilize the Amazon App Store. While you may be able to install
apps from other sites, these are not vetted and are far more likely to be infected
or outright malicious, either of which could compromise your privacy. Also, check
to make sure the app has lots of positive reviews and is actively updated by the vendor
before downloading it. Stay away from brand new apps, apps with few reviews, or apps
that are rarely updated.
- Privacy Options: Mobile devices collect extensive information about you, especially since you take
them everywhere you go. Thoroughly review your device’s privacy settings, including
location tracking, and make sure sensitive notifications (such as verification codes)
don’t appear on-screen when the device is locked.
- Work: Be sure any mobile device you use for work is authorized for work use. When at work,
be extra careful and never take any pictures or videos that may accidentally include
sensitive information, such as pictures of whiteboards or computer screens.
Your mobile devices are a powerful tool – one that we want you to enjoy and use. Just
following these few simple steps can go a long way to keeping you and your devices
secure.
|
|
Jerrico Elion
In each issue, we feature one of our amazing ITS team members. We learn more about
Jerrico Elion with our Networking team in this segment.
What is your role and how long have you been in ITS at UTHSC? I am part of the Network Infrastructure team and have been in ITS at UTHSC for 4 years.
What is a day in the life of Jerrico like? My day is typically figuring out networking problems both wired and wireless across
campus. When I’m not thinking about the OSI Model at work, I entertain myself by annoying
my girlfriend with amazing dad jokes and try to learn more about video game programming.
What is your favorite thing about working at UTHSC? Getting a chance to work with new technologies and assisting with the network upgrades
on campus. *I like solving hard problems while working with people who are friendly
and much smarter than me. *Joke answer tee hee
What’s something most people don’t know about you? I currently own 180 cookbooks based on different forms of ethnic cuisines e.g. Moroccan,
Indian, Filipino, etc. I also own 50 homebrewing/cocktail books as well for when
I find the motivation to homebrew (beer/wine/mead) or make a fancy drink.
|
|
|
|
|