Skip to content

Other ways to search: Events Calendar | UTHSC News

Issue 43

newsletter header

Issue 43, June 28, 2022

UTHSC Information Technology Services generates this communication to educate and inform our campus community about available technology tools, training opportunities, news, and events to help you and the university achieve excellence in patient care, education, research, and community service.
In this edition
  1. Updates to Your UTK Single Sign-On Experience
  2. UTHSC Alert - Did You Get the Test?
  3. Checking Your Requests and What a Ticket Status Means
  4. Use OnBase While Off Campus
  5. ITS Standard Grant Language
  6. Free Online Training Sessions
  7. Copy Cell Formatting in Microsoft Excel
  8. Windows 11: Move Your Icons Back to the Left
  9. iPhone: Clearing the Safari Cache
  10. Cyber-Safe Travel
  11. ITS Spotlight: Angie Brooks
Updates to Your UTK Single Sign-On Experience

OIT at UTK is upgrading its single sign-on applications (CAS and Shibboleth) on June 29, 2022.

What does this mean to you as a UTHSC user?

You won't notice much of a change. When you use Zoom, IRIS (or any other web-based system that uses, you may notice your Duo prompt no longer has the branded UT login page but appears in a window of its own. Otherwise, the look and functionality will not change.

UTHSC Alert - Did You Get the Test?

To ensure your continued safety on the UTHSC campus and the ability to receive emergency messages and alerts, UTHSC Campus Police occasionally conduct a system-wide test of the UTHSC Alert system. These messages come as an email, phone call, text, and desktop pop-up.

Did you get the test Campus Police sent out on June 15?

If not, be sure you sign up for the RAVE Guardian app to receive important emergency notifications.

Visit the UTHSC Alert webpage for links for more information, including checking your phone number and links to download the app.

Checking Your Requests and What a Ticket Status Means

In the last newsletter, we told you how to check your Service requests by clicking on the My Requests button on the TechConnect home page.

Your ticket will go through several stages, so keep an eye on My Requests to find out how things stand.

These are the available statuses.

New The ticket has been received but not yet assigned to an ITS technician.
Open The ticket has been assigned, but work has not yet started.
In Process The assigned ITS technician or technician group is actively working to diagnose and resolve the ticket.
Closed Work to resolve the ticket is complete.

  1. This can be done as soon as the work is complete, although the technician may wait for the requestor's response before closing.
  2. A requestor can re-activate a closed ticket by going to My Requests, searching your Completed tickets, and adding an update to the ticket.
Cancelled The requestor has withdrawn the ticket, and no further action will be taken.

  1. A requestor can cancel a ticket by going to My Requests, selecting the ticket, and choosing Withdraw Request.
  2. ITS technicians do not use this status. Instead, they will mark tickets as Closed.
Awaiting Customer Response The assigned ITS technician has contacted the requestor to obtain more information needed to finish the work. NOTE: Requestors can check the ticket update sent to their email or the Feed section at the bottom of the ticket in My Requests for more information.
Awaiting Parts/Equipment The assigned ITS technician has ordered parts or equipment and will resume work upon arrival.

NOTE: Requestors can check the ticket update sent to their email or the Feed section at the bottom of the ticket in My Requests for more information.
On Hold Work is pending for a reason other than awaiting customer response or awaiting parts/equipment.

NOTE: Requestors can check the ticket update sent to their email or the Feed section at the bottom of the ticket in My Requests for more information.

You can always look up statuses and meanings in our TechConnect: Checking Your Requests and What a Ticket Status Means article.

Use OnBase While Off Campus

Did you know you can use OnBase when not connected to the UTHSC network? Take a look at our OnBase: Off Campus Usage FAQs TechConnect article.

This article contains instructions for how to download/connect with the VPN client and best practices for scanning documents at home.

While more people are coming into the office, you can still utilize the OnBase features, whether on campus or remote.

If you are an OnBase user, visit the OnBase category for more helpful hints!

ITS Standard Grant Language

Don't reinvent the wheel by trying to write your own technology information for a grant!
ITS has created an IT Resources and Facilities statement for researchers to use in grants.

Areas covered include:

  • Data Center
  • Networking
  • Globus
  • High-Performance Scientific Computing
  • REDCap
  • Cerner Health Facts
  • Truven Health MarketScan® Research Databases
  • Nielson Data
  • rEDW
  • TriNetX
  • Surveys
  • Web and Video Conferencing
  • Productivity Software
  • Research Informatics Core
This ITS Standardized Grant Language statement TechConnect article is always available and reviewed every six months for accuracy.

Microsoft has some excellent FREE training courses we recommend. As UTHSC faculty or staff, you can access all Microsoft 365 apps listed. Students may not have access to all these apps.

Increase Collaboration with Microsoft Teams
Working together is easier with Microsoft Teams. Learn how to make the most of channels, chat, and connected apps to improve communication and deepen collaboration across teams of all sizes and help you connect naturally, stay organized, and bring ideas to life. Register

  • June 29 - 3:00 pm - 4:00 pm
  • July 11 - 2:00 pm - 3:00 pm

Go Further Together with Meetings in Microsoft Teams
•Create and manage Teams meetings of all sizes •Make the best use of collaboration tools before, during, and after meetings •Leverage breakout rooms for interactivity •Manage who can access meeting resources before, during, and after meetings •and organize your work and simplify your workday. Register

  • June 29 - 9:00 am - 10:00 am
  • June 30 - 1:00 pm - 2:00 pm

Get Started with Windows 11
Microsoft Windows 11 has easy-to-use tools that can help you optimize your screen space and maximize your productivity. In this training, learn how to get instantly productive in the new Windows 11—designed for hybrid work, with collaboration and security top of mind. ​Register

  • July 13 - 1:00 pm - 2:00 pm
  • July 19 - 11:00 am - 12:00 pm

Microsoft Modern Desktop for Windows 11
•Improve how work gets done by understanding new productivity tools across Windows, Edge, and Microsoft 365 apps. •Find information with the intelligence of Microsoft Search. •Understand the update experience for Windows and Office. •Work with new security tools that better secure data and devices. •Experience enhanced teamwork and collaboration using Microsoft 365 Cloud tools. Register

  • July 01 - 12:00 pm - 1:00 pm
  • July 11 - 3:00 pm - 4:00 pm
Copy Cell Formatting in Microsoft Excel

Quickly learn how to use copy and paste options, Format Painter, and dragging techniques to format your cells in Excel by viewing this 1:10 video.

Windows 11: Move Your Icons Back to the Left
If you upgraded to Windows 11, you might notice your status bar icons are now in the middle of your taskbar at the bottom. For years, the icons were on the left and if this slight change seems strange, fear not - you can change the icon position!
  1. Right-click the taskbar and open Taskbar Settings.
  2. Select the Taskbar behaviors drop-down and change Taskbar alignment to Left.
  3. This action moves all your taskbar icons to the left and puts the Start button back where it was in Windows 10.

iPhone: Clearing the Safari Cache
Sometimes you need to clean your Safari browser cache. Clean your cache with these five easy steps:

  1. Open Settings.
  2. Scroll until you see Safari and tap on it.
  3. Scroll down and tap Advanced.
  4. Tap Website Data.
  5. You can remove saved data from one particular site or tap Remove All Website Data at the bottom.
Cyber-Safe Travel

Summer is a popular time to travel whether it be for a relaxing overnight trip or a week away exploring a new destination. You are likely taking along that smartphone or other device to assist with getting directions, locating, or identifying points of interest, and capturing that special photo. Practicing good cyber hygiene before, during, and after your trip will help secure your devices and allow you to connect with confidence when you’re away from home.

Quick note if you are traveling with business equipment: It’s best that you leave your work devices behind; however, if you can’t leave home without them, ensure that you are following UTHSC’s policies and procedures for protecting the devices and the information they contain while traveling.

Before You Travel

Update your devices. Updating devices will fix security flaws and help keep you protected. Whether it’s your computer, smartphone, or gaming device, be sure to update your operating system, applications, antivirus and malware software, and the like. If you haven’t already turned on automatic updates, now is a good time to consider doing so.

Back up your devices. Back up information such as contacts, financial data, photos, videos, and other data in case a device is compromised during travel, and you have to reset it to factory settings.

Lock your device. Make sure to lock your device when you are not using it. Set your devices to lock after a period of time and use strong PINs and passwords.

Enable multi-factor authentication (MFA). Add an extra layer of protection so that the only person who has access to your account is you.

During Your Travel

Guard your devices. Your devices are valuable, but your sensitive information is, as well. Always keep your devices close at hand and secure in taxis, security checkpoints, airplanes, rentals homes, and hotel rooms.

Securely recharge. Never plug your phone into a USB public charging station, such as those in the airport or in hotel room lamp and clock radio inputs, as these cannot be trusted. Malicious individuals can hijack your session or install malware on your device through those seemingly harmless means. Always connect using your own power adapter connected to a power outlet.

Delete data from your rental car. If you connect your phone to a rental car for navigation or other purpose, be sure to securely remove the device so that other individuals do not have access to your address book, device name, text messages (hands-free calling), or other sensitive information.

Avoid public Wi-Fi. While public networks are convenient, they are a security risk. Avoid connecting to public Wi-Fi unless absolutely necessary. Instead, consider using your phone carrier’s internet connection or use your phone as a personal hotspot if your plan allows.

If you do need to connect to public Wi-Fi, verify with the establishment the name of the network and use a virtual private network (VPN), software which will encrypt your internet traffic and prevent others from stealing your data. Verifying the network name is important. Oftentimes, malicious individuals create similar connection points with a slight misspelling, hoping you will instead connect to their network.

Turn off auto-connect. While auto-connect is enabled, devices will seek out and connect to available networks or Bluetooth devices. This could allow cyber criminals to access your device without you knowing it. Disable auto-connect, Bluetooth connectivity, and near-field communication (NFC) like airdrop so that you can select the network and control the connection.

Limit what you share. Limit the information you share on social media while on vacation and consider posting updates about your trip after you return. Revealing too much information while away can put you and others at risk. Criminals can gain useful information from such posts like knowing you are away from your home. Scammers may even attempt to contact your family and friends with a variety of scam tactics. Additionally, consider setting your social media accounts to only allow friends to view your posts.

Avoid the use of public computers. Public computers such as hotel business centers and internet cafes are often poorly managed and provide minimal security protection for users. If you must use a public computer, do not enter any username or password on the computer and do not connect or transfer data via thumb drive/USB.

When You Return Home

Shred your boarding pass and luggage tag. Scannable codes on boarding passes and luggage tags include full name, date of birth, and passenger name record. These can also contain sensitive data from your airline record like passport number, phone number, email address, and other information that you wouldn’t want to share publicly. For this same reason, never post boarding passes on social media.

Scan for virus and malware. It’s best to update your security software when you return home and scan for viruses and malware to be sure your device has not been compromised while you were away.

Conclusion and Resources

Knowing these helpful tips will aid in cyber-safe travel, allowing time to relax and enjoy your time away. For more information, see these additional resources:

Used with permission from the MS-ISAC / Center for Internet Security (CIS) newsletter

Angie Brooks

In each issue, we feature one of our amazing ITS team members. We learn more about Angie Brooks with ITS Admin team in this segment.

What is your role and how long have you been in ITS at UTHSC? I started at the University 15 years ago as a Senior Budget Clerk in the Department of Physiology. I’m now enjoying my new role as the Financial Coordinator in the Information Technology Services Department for the past year and 8 months.

What is a day in the life of Angie like? Multi-tasking is the main goal in my office. The IT Department services our campus in every aspect; therefore, it is my job to ensure all billing is procured in a timely manner.

What is your favorite thing about working at UTHSC? It’s the diversity for me. Since my tenure here at the University, I have acquired so many lasting friendships. I’ve learned so much over the years about other ethnic ways of life, however, in comparison, there is always one thing that all ethnic values the most. Family!

What’s something most people don’t know about you? I love to crack jokes whenever I can. Laughter makes the heart grow fonder. I have an Event Planning Business, and would you believe that I’m a Pastor’s Wife? Thirty years and counting. I couldn’t turn back now if I wanted to. Did that make you laugh? Oh, one more thing. My favorite word is, wait for it, “KIND.”

Jun 29, 2022