Skip to content

Other ways to search: Events Calendar | UTHSC News

Issue 36

Issue 36, March 22, 2022

This communication is generated by UTHSC Information Technology Services to educate and inform our campus community about available technology tools, training opportunities, news, and events to help you and the university achieve excellence in patient care, education, research, and community service.
In this edition
  1. The Importance of Synching OneDrive
  2. Benefits of Upgrading to Windows 11
  3. Benefits of Upgrading to macOS Monterey
  4. Services from A to Z!
  5. Did You Know That All UTHSC Employees and Students Now Have a Zoom Pro Account?
  6. Online Qualtrics Training this Thursday from 9 am - 11 am
  7. Free Online Training Sessions
  8. How to Use OneNote Effectively
  9. Standard-InfoSec-RA-001 – Risk Assessment
  10. What to Report
  11. ITS Spotlight: Parya Zareie

The Importance of Synching OneDrive

As the conflict between Russia and Ukraine continues, one of the biggest security threats to UTHSC users is the loss of data. To protect yourself from threats like wiper malware (which erases your hard drive), make sure you sync your files and folders in OneDrive.

Both Windows and Mac users can find Synching OneDrive Files and Folders instructions in TechConnect.

If you still have questions or need assistance, please contact the Service Desk at 901.448.2222.

Benefits of Upgrading to Windows 11

Why upgrade to Windows 11? Windows 11 offers much more security than Windows 10. By some estimates, installing Windows 11 can reduce your chances of getting malware by up to 60%!

Okay, but are there other reasons? Yes!

You don’t have Windows 11 installed yet? Follow these easy instructions to upgrade today! (For security reasons, this weekend, ITS has begun automatically upgrading qualified UTHSC-owned computers, so please leave your Windows devices turned on.)
Benefits of Upgrading to macOS Monterey

We have asked you to hold off long enough - now you can upgrade your Mac devices to the Monterey operating system.

What are some of the awesome benefits?

Don’t have Monterey yet? We have easy instructions to help you upgrade today!

Services from A to Z!

We aren't exactly Amazon, but we have a listing of all our services from A to Z in TechConnect.

Do you need:

Need a service you don't see listed? Contact the Service Desk at 901.448.2222 or fill out our generic service request form.

Did You Know That All UTHSC Employees and Students Now Have a Zoom Pro Account?

Did you know that all UTHSC employees and students now have a Zoom Pro Account? When you signed up for the Zoom HIPAA account in January 2021, your account was upgraded to a Zoom Pro Account! That means you now can host meetings over 40 minutes long and with over 300 people! Plus, you have the added protection of the HIPAA sub-group.

Here’s how you can verify that you are in the Zoom HIPAA sub-group:

  1. From within Zoom, click on the gear in the upper right corner under your initials.
  2. Click on Profile.
  3. Click on Edit My Profile. This will open a browser tab and ask you to authenticate with your NetID and password. You may need to go through Duo two-factor authentication as well.
  4. This will bring you to your Zoom Profile. Halfway down the page, under Meeting, you will see Personal Meeting ID.
  5. If it shows you are in the Zoom HIPAA sub-group!

If you don’t see HIPAA in the URL, please submit a UTHSC TechConnect request to have your account transferred.

Online Qualtrics Training this Thursday from 9 am - 11 am

On March 24, from 9 am - 11 am, there will be an introductory workshop where you will learn how to create and deploy a web-based survey using Qualtrics. Basic question construction (single and multiple response questions, grid/matrix tables for Likert questions, text questions) will be covered, as well as how to add Display and Skip Logic, which allows the respondent to skip questions that do not pertain to them, thereby shortening their response time. An overview of the reporting tools, how to export data as an SPSS dataset, and an overview of best practices for collecting online data will also be presented.

Visit K@TE to register for this March 24, 2022, Qualtrics training from 9 am - 11 am!

Just a reminder, QuestionPro is retiring on May 31, 2022. This training is a great opportunity to start your transition from QuestionPro to Qualtrics!

Microsoft has some excellent FREE training courses we recommend. As UTHSC faculty or staff, you can access all Microsoft 365 apps listed. Students may not have access to all these apps.

Microsoft Excel Part 1

Microsoft Excel, the spreadsheet app, lets you create, view, edit, and share files quickly and easily. Get started by learning to navigate excel, organize data, and use basic formulas. Register

  • Mar 24 - 12:00 pm - 1:00 pm

Get Started with Windows 11

Microsoft Windows 11 has easy-to-use tools that can help you optimize your screen space and maximize your productivity. In this training, learn how to get instantly productive in the new Windows 11—designed for hybrid work, with collaboration and security top of mind. Register

  • Mar 25 - 3:00 pm - 4:00 pm
  • Apr 05 - 2:00 pm - 3:00 pm

Introduction to Microsoft Planner

This course introduces how to use Planner to allow teams to work together effortlessly by organizing projects visually in an easy-to-use application that works seamlessly across all your devices. Register

  • Mar 25 - 2:00 pm - 3:00 pm
  • Mar 30 - 10:00 am - 11:00 am
  • Apr 08 - 8:00 am - 9:00 am

Introduction to Microsoft Planner

This course introduces how to use Planner to allow teams to work together effortlessly by organizing projects visually in an easy-to-use application that works seamlessly across all your devices. Register

  • Mar 25 - 2:00 pm - 3:00 pm
  • Mar 30 - 10:00 am - 11:00 am
How to Use OneNote Effectively

The rest of this title in this video by Leila Gharani is, "(Stay organized with little effort!)." Wouldn't that be a dream? If you want to learn how to effectively use OneNote (which you have access to as part of Microsoft 365) to keep yourself organized, check out this video. It packs a lot of learning into 14 minutes.

Policy Highlight
Standard-InfoSec-RA-001 – Risk Assessment

People sometimes think that a risk assessment is a complicated process. We conduct risk assessments daily. In general terms, a risk is the impact an event would have multiplied by the likelihood of that event happening. Think about every time you drive. If you speed, you are conducting a risk assessment using factors only you can answer – can I afford a speeding ticket? What would be the impact if I hit another car at a high rate of speed? How late am I for this meeting or appointment? etc. This Standard explains how to conduct a risk assessment, along with Practice-InfoSec-RA-001.01-Risk Assessment Process that explains the process we use at UTHSC.

What to Report

With cyberattacks making international headlines and on the rise, you might ask yourself, “should I report what just happened?" If you even think those words, the answer is a resounding YES! Whether it is an email in your inbox, something you saw on campus, or an observation that your device is not operating properly, the answer is REPORT IT. For some clarification, here are some examples of what you might see:

Insider Threats

Insider Threat is a security risk that comes from within an organization. While it can be, it doesn’t necessarily mean the threat is a disgruntled employee. It could be someone socially engineered to do a bad thing or someone who has access to information they shouldn’t and doesn’t know how to protect it.
What to look out for regarding Insider Threats include:
  • Personality and behavioral changes
  • Disagreements with coworkers/campus policies
  • Accessing large amounts of data if that is not normal work processes
  • Odd working hours
  • Attempts to move data offsite
  • Staff and/or Students permanently leaving campus
  • Unauthorized attempts to access servers and data
  • Authorized but unusual access to servers and data
  • Financial distress/unexplained financial gain
If you see something suspicious or questionable, contact the Office of Cybersecurity at 901.448.1880 or

Incidents and Intrusions

An example of an information security incident or intrusion includes:
  • You can't connect to the Internet, or your computer runs slowly.
  • A large number of pop-ups
  • Unfamiliar and peculiar error messages
  • Computer freezes or crashes randomly
  • Internet homepage changes unexpectedly
  • Google search results are redirected to random websites
  • You can't access security-related websites
  • Desktop background changes unexpectedly
  • You can't open programs or applications
  • Security protection has been disabled
  • Missing files
  • Your computer is performing actions on its own.
If you think your computer or device is compromised in any way, contact the ITS Service Desk at 901.448.2222.

Phishing Emails

Phishing is any email sent from a cybercriminal, looking to steal your passwords, information, or data. Especially savvy cybercriminals will send very authentic-looking emails. They are looking to charm or alarm you into believing immediate action must be taken.
Spear phishing is a highly specialized attack against a specific target or small group of targets to collect information or gain access to systems.


You might receive an email that appears to be from the Helpdesk, asking you to update your password by clicking on the provided link - don't do it!
By clicking on the email or on a link within the email, your computer can be infected with malware and/or viruses that can put both you and the university at risk.
Phishing can occur not only in your UTHSC email but your personal email as well. It may be from PayPal, mentioning a purchase you know you didn't make. You get scared and you want to click on the link provided in the email - don't do it!
Your financial institution may contact you about a problem through email and may ask you to log into your account but will never ask you to click on a link within the email.

Visit the Office of Cybersecurity's Phishing page for more information.

If you believe you have received a phishing email, do not click on any links or reply to the email, but forward it to


Malware is software (a computer program) used to perform malicious actions. Cybercriminals install malware on computers or devices to gain control over them or gain access to what they contain. Once installed, these attackers can use malware to spy on a user’s online activities, steal passwords and files, or use the system to attack others. Malware can even deny access to a user’s own files, demanding that they pay the attacker a ransom to regain control over them. This is called ransomware.

If you think your computer or device has been compromised in any way, contact the ITS Service Desk at 901.448.2222.


Unlike phishing emails, spam isn't dangerous - just annoying. Spam is the electronic equivalent of junk mail - unsolicited, bulk, and often unwanted – email.

How to Reduce Spam

  • Enable filters on your email programs: Most ISPs (Internet Service Providers) and email providers offer spam filters. However, depending on the level you set, you may wind up blocking emails you want. It's a good idea to occasionally check your junk folder to ensure the filters are working properly.
  • Report spam: Most email clients offer ways to mark an email as spam or report instances of spam. Reporting spam to will also help to prevent the messages from being directly delivered to your inbox.
  • Own your online presence: Consider hiding your email address from online profiles and social networking sites or only allowing certain people to view your personal information.
Help us reduce widespread spam by reporting it to
Parya Zareie

In each issue, we feature one of our amazing ITS team members. We learn more about Parya Zareie with our Research IT team in this segment.

What is your role and how long have you been in ITS at UTHSC? I’ve been at UTHSC for almost 5 years. Early in 2017, I began working as a Data Manager at the Center for Biomedical Informatics, and in November 2021, I joined ITS. Here at the IT Research division, I'm an Informatics Architect, providing research-related services to the UT community including data extraction from a number of databases, collaboration with PIs on their publications, and creating and revising publication scripts as well as performing ETL technics for data transformation. I'm the UT REDCap administrator and train end-user to utilize REDCap as a data collection tool. I’m also a third-year PhD student in the Health Informatics track at UTHSC. My research interest is in Adverse Childhood Experiences where I published a couple of papers in this area.

What is a day in the life of Parya like? My typical day would be working on research service requests. Sometimes it’s extracting data from databases, and other times it's working on paper manuscripts to get things rolling! In general, having many meetings in a day. Last but not least, supporting REDCap end-users and providing project design direction. If my laptop's CPU gets busy extracting or analyzing data, I get some time to work on school courses and assignments.

What is your favorite thing about working at UTHSC? Work-life balance is undoubtedly one of UTHSC's best benefits, which I believe leads to the community's strength and success. Also, everyone I met and worked with has been incredible, and some of them have become friends.

What’s something most people don’t know about you? I started cooking once I immigrated to the US 9 years ago. I watched a good number of videos on YouTube to train and educate myself not only in cooking but also in designing dishes. I would call myself a culinarian ;) and honestly, cooking is a kind of meditation to me.

May 26, 2022