
Issue 36, March 22, 2022
This communication is generated by UTHSC Information Technology Services to educate
and inform our campus community about available technology tools, training opportunities,
news, and events to help you and the university achieve excellence in patient care,
education, research, and community service.
|
|
The Importance of Synching OneDrive
As the conflict between Russia and Ukraine continues, one of the biggest security
threats to UTHSC users is the loss of data. To protect yourself from threats like
wiper malware (which erases your hard drive), make sure you sync your files and folders
in OneDrive.
Both Windows and Mac users can find Synching OneDrive Files and Folders instructions in TechConnect.
If you still have questions or need assistance, please contact the Service Desk at
901.448.2222.
|
|
|
Benefits of Upgrading to Windows 11 Why upgrade to Windows 11? Windows 11 offers much more security than Windows 10. By
some estimates, installing Windows 11 can reduce your chances of getting malware by up to 60%!
Okay, but are there other reasons? Yes!
You don’t have Windows 11 installed yet? Follow these easy instructions to upgrade today! (For security reasons, this weekend, ITS has begun automatically upgrading qualified UTHSC-owned computers, so please leave
your Windows devices turned on.) |
|
|
Benefits of Upgrading to macOS Monterey We have asked you to hold off long enough - now you can upgrade your Mac devices to
the Monterey operating system.
What are some of the awesome benefits?
Don’t have Monterey yet? We have easy instructions to help you upgrade today!
|
|
|
Services from A to Z! We aren't exactly Amazon, but we have a listing of all our services from A to Z in TechConnect.
Do you need:
Need a service you don't see listed? Contact the Service Desk at 901.448.2222 or fill
out our generic service request form.
|
|
Did You Know That All UTHSC Employees and Students Now Have a Zoom Pro Account? Did you know that all UTHSC employees and students now have a Zoom Pro Account? When you signed up for the Zoom HIPAA account in January 2021, your account was
upgraded to a Zoom Pro Account! That means you now can host meetings over 40 minutes
long and with over 300 people! Plus, you have the added protection of the HIPAA sub-group.
Here’s how you can verify that you are in the Zoom HIPAA sub-group:
- From within Zoom, click on the gear in the upper right corner under your initials.
- Click on Profile.
- Click on Edit My Profile. This will open a browser tab and ask you to authenticate with your NetID and password.
You may need to go through Duo two-factor authentication as well.
- This will bring you to your Zoom Profile. Halfway down the page, under Meeting, you will see Personal Meeting ID.
- If it shows https://tennesseehipaa.zoom.us/ you are in the Zoom HIPAA sub-group!
If you don’t see HIPAA in the URL, please submit a UTHSC TechConnect request to have your account transferred. |
|
Online Qualtrics Training this Thursday from 9 am - 11 am On March 24, from 9 am - 11 am, there will be an introductory workshop where you will
learn how to create and deploy a web-based survey using Qualtrics. Basic question
construction (single and multiple response questions, grid/matrix tables for Likert
questions, text questions) will be covered, as well as how to add Display and Skip
Logic, which allows the respondent to skip questions that do not pertain to them,
thereby shortening their response time. An overview of the reporting tools, how to
export data as an SPSS dataset, and an overview of best practices for collecting online
data will also be presented.
Visit K@TE to register for this March 24, 2022, Qualtrics training from 9 am - 11 am!
Just a reminder, QuestionPro is retiring on May 31, 2022. This training is a great
opportunity to start your transition from QuestionPro to Qualtrics!
|
|
Microsoft has some excellent FREE training courses we recommend. As UTHSC faculty
or staff, you can access all Microsoft 365 apps listed. Students may not have access
to all these apps.
Microsoft Excel Part 1
Microsoft Excel, the spreadsheet app, lets you create, view, edit, and share files
quickly and easily. Get started by learning to navigate excel, organize data, and
use basic formulas. Register
- Mar 24 - 12:00 pm - 1:00 pm
Get Started with Windows 11
Microsoft Windows 11 has easy-to-use tools that can help you optimize your screen
space and maximize your productivity. In this training, learn how to get instantly
productive in the new Windows 11—designed for hybrid work, with collaboration and
security top of mind. Register
- Mar 25 - 3:00 pm - 4:00 pm
- Apr 05 - 2:00 pm - 3:00 pm
Introduction to Microsoft Planner
This course introduces how to use Planner to allow teams to work together effortlessly
by organizing projects visually in an easy-to-use application that works seamlessly
across all your devices. Register
- Mar 25 - 2:00 pm - 3:00 pm
- Mar 30 - 10:00 am - 11:00 am
- Apr 08 - 8:00 am - 9:00 am
Introduction to Microsoft Planner
This course introduces how to use Planner to allow teams to work together effortlessly
by organizing projects visually in an easy-to-use application that works seamlessly
across all your devices. Register
- Mar 25 - 2:00 pm - 3:00 pm
- Mar 30 - 10:00 am - 11:00 am
|
|
How to Use OneNote Effectively The rest of this title in this video by Leila Gharani is, "(Stay organized with little
effort!)." Wouldn't that be a dream? If you want to learn how to effectively use OneNote
(which you have access to as part of Microsoft 365) to keep yourself organized, check out this video. It packs a lot of learning into 14 minutes.
 |
|
Policy Highlight Standard-InfoSec-RA-001 – Risk Assessment
People sometimes think that a risk assessment is a complicated process. We conduct
risk assessments daily. In general terms, a risk is the impact an event would have
multiplied by the likelihood of that event happening. Think about every time you drive.
If you speed, you are conducting a risk assessment using factors only you can answer
– can I afford a speeding ticket? What would be the impact if I hit another car at
a high rate of speed? How late am I for this meeting or appointment? etc. This Standard
explains how to conduct a risk assessment, along with Practice-InfoSec-RA-001.01-Risk Assessment Process that explains the process we use at UTHSC.
|
|
What to Report With cyberattacks making international headlines and on the rise, you might ask yourself,
“should I report what just happened?" If you even think those words, the answer is
a resounding YES! Whether it is an email in your inbox, something you saw on campus,
or an observation that your device is not operating properly, the answer is REPORT
IT. For some clarification, here are some examples of what you might see:
Insider Threats
Insider Threat is a security risk that comes from within an organization. While it
can be, it doesn’t necessarily mean the threat is a disgruntled employee. It could
be someone socially engineered to do a bad thing or someone who has access to information
they shouldn’t and doesn’t know how to protect it. What to look out for regarding Insider Threats include:
- Personality and behavioral changes
- Disagreements with coworkers/campus policies
- Accessing large amounts of data if that is not normal work processes
- Odd working hours
- Attempts to move data offsite
- Staff and/or Students permanently leaving campus
- Unauthorized attempts to access servers and data
- Authorized but unusual access to servers and data
- Financial distress/unexplained financial gain
If you see something suspicious or questionable, contact the Office of Cybersecurity
at 901.448.1880 or itsecurity@uthsc.edu.
Incidents and Intrusions
An example of an information security incident or intrusion includes:
- You can't connect to the Internet, or your computer runs slowly.
- A large number of pop-ups
- Unfamiliar and peculiar error messages
- Computer freezes or crashes randomly
- Internet homepage changes unexpectedly
- Google search results are redirected to random websites
- You can't access security-related websites
- Desktop background changes unexpectedly
- You can't open programs or applications
- Security protection has been disabled
- Missing files
- Your computer is performing actions on its own.
If you think your computer or device is compromised in any way, contact the ITS Service
Desk at 901.448.2222.
Phishing Emails
Phishing is any email sent from a cybercriminal, looking to steal your passwords,
information, or data. Especially savvy cybercriminals will send very authentic-looking
emails. They are looking to charm or alarm you into believing immediate action must
be taken. Spear phishing is a highly specialized attack against a specific target or small group
of targets to collect information or gain access to systems.
Examples
You might receive an email that appears to be from the Helpdesk, asking you to update
your password by clicking on the provided link - don't do it! By clicking on the email or on a link within the email, your computer can be infected
with malware and/or viruses that can put both you and the university at risk. Phishing can occur not only in your UTHSC email but your personal email as well. It
may be from PayPal, mentioning a purchase you know you didn't make. You get scared
and you want to click on the link provided in the email - don't do it! Your financial institution may contact you about a problem through email and may ask
you to log into your account but will never ask you to click on a link within the
email.Visit the Office of Cybersecurity's Phishing page for more information.
If you believe you have received a phishing email, do not click on any links or reply to the email, but forward it to abuse@uthsc.edu.
Malware
Malware is software (a computer program) used to perform malicious actions. Cybercriminals
install malware on computers or devices to gain control over them or gain access to
what they contain. Once installed, these attackers can use malware to spy on a user’s
online activities, steal passwords and files, or use the system to attack others.
Malware can even deny access to a user’s own files, demanding that they pay the attacker
a ransom to regain control over them. This is called ransomware.
If you think your computer or device has been compromised in any way, contact the
ITS Service Desk at 901.448.2222.
Spam
Unlike phishing emails, spam isn't dangerous - just annoying. Spam is the electronic
equivalent of junk mail - unsolicited, bulk, and often unwanted – email.
How to Reduce Spam
- Enable filters on your email programs: Most ISPs (Internet Service Providers) and
email providers offer spam filters. However, depending on the level you set, you may
wind up blocking emails you want. It's a good idea to occasionally check your junk
folder to ensure the filters are working properly.
- Report spam: Most email clients offer ways to mark an email as spam or report instances
of spam. Reporting spam to abuse@uthsc.edu will also help to prevent the messages from being directly delivered to your inbox.
- Own your online presence: Consider hiding your email address from online profiles
and social networking sites or only allowing certain people to view your personal
information.
Help us reduce widespread spam by reporting it to abuse@uthsc.edu. |
|
Parya Zareie In each issue, we feature one of our amazing ITS team members. We learn more about
Parya Zareie with our Research IT team in this segment.
What is your role and how long have you been in ITS at UTHSC? I’ve been at UTHSC for almost 5 years. Early in 2017, I began working as a Data Manager
at the Center for Biomedical Informatics, and in November 2021, I joined ITS. Here
at the IT Research division, I'm an Informatics Architect, providing research-related
services to the UT community including data extraction from a number of databases,
collaboration with PIs on their publications, and creating and revising publication
scripts as well as performing ETL technics for data transformation. I'm the UT REDCap
administrator and train end-user to utilize REDCap as a data collection tool. I’m
also a third-year PhD student in the Health Informatics track at UTHSC. My research
interest is in Adverse Childhood Experiences where I published a couple of papers
in this area.
What is a day in the life of Parya like? My typical day would be working on research service requests. Sometimes it’s extracting
data from databases, and other times it's working on paper manuscripts to get things
rolling! In general, having many meetings in a day. Last but not least, supporting
REDCap end-users and providing project design direction. If my laptop's CPU gets busy
extracting or analyzing data, I get some time to work on school courses and assignments.
What is your favorite thing about working at UTHSC? Work-life balance is undoubtedly one of UTHSC's best benefits, which I believe leads
to the community's strength and success. Also, everyone I met and worked with has
been incredible, and some of them have become friends.
What’s something most people don’t know about you? I started cooking once I immigrated to the US 9 years ago. I watched a good number
of videos on YouTube to train and educate myself not only in cooking but also in designing
dishes. I would call myself a culinarian ;) and honestly, cooking is a kind of meditation
to me.
|
|
|
|
|