
Issue 43, June 28, 2022
UTHSC Information Technology Services generates this communication to educate and
inform our campus community about available technology tools, training opportunities,
news, and events to help you and the university achieve excellence in patient care,
education, research, and community service.
|
|
Updates to Your UTK Single Sign-On Experience OIT at UTK is upgrading its single sign-on applications (CAS and Shibboleth) on June
29, 2022.
What does this mean to you as a UTHSC user?
You won't notice much of a change. When you use Zoom, IRIS (or any other web-based
system that uses utk.edu/tennessee.edu), you may notice your Duo prompt no longer
has the branded UT login page but appears in a window of its own. Otherwise, the look
and functionality will not change.
|
|
UTHSC Alert - Did You Get the Test? To ensure your continued safety on the UTHSC campus and the ability to receive emergency
messages and alerts, UTHSC Campus Police occasionally conduct a system-wide test of
the UTHSC Alert system. These messages come as an email, phone call, text, and desktop
pop-up.
Did you get the test Campus Police sent out on June 15?
If not, be sure you sign up for the RAVE Guardian app to receive important emergency
notifications.
Visit the UTHSC Alert webpage for links for more information, including checking your phone number and links to
download the app.
|
|
Checking Your Requests and What a Ticket Status Means In the last newsletter, we told you how to check your Service requests by clicking on the My Requests button on the TechConnect home page.
Your ticket will go through several stages, so keep an eye on My Requests to find
out how things stand.
These are the available statuses.
STATUS |
DESCRIPTION |
New |
The ticket has been received but not yet assigned to an ITS technician. |
Open |
The ticket has been assigned, but work has not yet started. |
In Process |
The assigned ITS technician or technician group is actively working to diagnose and
resolve the ticket. |
Closed |
Work to resolve the ticket is complete.
NOTES:
- This can be done as soon as the work is complete, although the technician may wait
for the requestor's response before closing.
- A requestor can re-activate a closed ticket by going to My Requests, searching your Completed tickets, and adding an update to the ticket.
|
Cancelled |
The requestor has withdrawn the ticket, and no further action will be taken.
NOTES:
- A requestor can cancel a ticket by going to My Requests, selecting the ticket, and choosing Withdraw Request.
- ITS technicians do not use this status. Instead, they will mark tickets as Closed.
|
Awaiting Customer Response |
The assigned ITS technician has contacted the requestor to obtain more information
needed to finish the work. NOTE: Requestors can check the ticket update sent to their
email or the Feed section at the bottom of the ticket in My Requests for more information. |
Awaiting Parts/Equipment |
The assigned ITS technician has ordered parts or equipment and will resume work upon
arrival.
NOTE: Requestors can check the ticket update sent to their email or the Feed section at the bottom of the ticket in My Requests for more information. |
On Hold |
Work is pending for a reason other than awaiting customer response or awaiting parts/equipment.
NOTE: Requestors can check the ticket update sent to their email or the Feed section at the bottom of the ticket in My Requests for more information. |
You can always look up statuses and meanings in our TechConnect: Checking Your Requests and What a Ticket Status Means article.
|
|
Use OnBase While Off Campus Did you know you can use OnBase when not connected to the UTHSC network? Take a look
at our OnBase: Off Campus Usage FAQs TechConnect article.
This article contains instructions for how to download/connect with the VPN client
and best practices for scanning documents at home.
While more people are coming into the office, you can still utilize the OnBase features,
whether on campus or remote.
If you are an OnBase user, visit the OnBase category for more helpful hints!
|
|
|
ITS Standard Grant Language
Don't reinvent the wheel by trying to write your own technology information for a
grant! ITS has created an IT Resources and Facilities statement for researchers to use in
grants.
Areas covered include:
- Data Center
- Networking
- Globus
- High-Performance Scientific Computing
- REDCap
- Cerner Health Facts
- Truven Health MarketScan® Research Databases
- Nielson Data
- rEDW
- TriNetX
- GIC PIC-SURE
- Surveys
- Web and Video Conferencing
- Productivity Software
- Research Informatics Core
This ITS Standardized Grant Language statement TechConnect article is always available and reviewed every six months for accuracy. |
|
Microsoft has some excellent FREE training courses we recommend. As UTHSC faculty
or staff, you can access all Microsoft 365 apps listed. Students may not have access
to all these apps.
Increase Collaboration with Microsoft Teams Working together is easier with Microsoft Teams. Learn how to make the most of channels,
chat, and connected apps to improve communication and deepen collaboration across
teams of all sizes and help you connect naturally, stay organized, and bring ideas
to life. Register
- June 29 - 3:00 pm - 4:00 pm
- July 11 - 2:00 pm - 3:00 pm
Go Further Together with Meetings in Microsoft Teams •Create and manage Teams meetings of all sizes •Make the best use of collaboration
tools before, during, and after meetings •Leverage breakout rooms for interactivity
•Manage who can access meeting resources before, during, and after meetings •and organize
your work and simplify your workday. Register
- June 29 - 9:00 am - 10:00 am
- June 30 - 1:00 pm - 2:00 pm
Get Started with Windows 11 Microsoft Windows 11 has easy-to-use tools that can help you optimize your screen
space and maximize your productivity. In this training, learn how to get instantly
productive in the new Windows 11—designed for hybrid work, with collaboration and
security top of mind. Register
- July 13 - 1:00 pm - 2:00 pm
- July 19 - 11:00 am - 12:00 pm
Microsoft Modern Desktop for Windows 11 •Improve how work gets done by understanding new productivity tools across Windows,
Edge, and Microsoft 365 apps. •Find information with the intelligence of Microsoft
Search. •Understand the update experience for Windows and Office. •Work with new security
tools that better secure data and devices. •Experience enhanced teamwork and collaboration
using Microsoft 365 Cloud tools. Register
- July 01 - 12:00 pm - 1:00 pm
- July 11 - 3:00 pm - 4:00 pm
|
|
Copy Cell Formatting in Microsoft Excel Quickly learn how to use copy and paste options, Format Painter, and dragging techniques
to format your cells in Excel by viewing this 1:10 video.
 |
|
Windows 11: Move Your Icons Back to the Left If you upgraded to Windows 11, you might notice your status bar icons are now in the
middle of your taskbar at the bottom. For years, the icons were on the left and if
this slight change seems strange, fear not - you can change the icon position!
- Right-click the taskbar and open Taskbar Settings.
- Select the Taskbar behaviors drop-down and change Taskbar alignment to Left.
- This action moves all your taskbar icons to the left and puts the Start button back
where it was in Windows 10.
iPhone: Clearing the Safari Cache Sometimes you need to clean your Safari browser cache. Clean your cache with these
five easy steps:
- Open Settings.
- Scroll until you see Safari and tap on it.
- Scroll down and tap Advanced.
- Tap Website Data.
- You can remove saved data from one particular site or tap Remove All Website Data at the bottom.
|
|
Cyber-Safe Travel Summer is a popular time to travel whether it be for a relaxing overnight trip or
a week away exploring a new destination. You are likely taking along that smartphone
or other device to assist with getting directions, locating, or identifying points
of interest, and capturing that special photo. Practicing good cyber hygiene before,
during, and after your trip will help secure your devices and allow you to connect
with confidence when you’re away from home.
Quick note if you are traveling with business equipment: It’s best that you leave
your work devices behind; however, if you can’t leave home without them, ensure that
you are following UTHSC’s policies and procedures for protecting the devices and the
information they contain while traveling.
Before You Travel
Update your devices. Updating devices will fix security flaws and help keep you protected.
Whether it’s your computer, smartphone, or gaming device, be sure to update your operating
system, applications, antivirus and malware software, and the like. If you haven’t
already turned on automatic updates, now is a good time to consider doing so.
Back up your devices. Back up information such as contacts, financial data, photos,
videos, and other data in case a device is compromised during travel, and you have
to reset it to factory settings.
Lock your device. Make sure to lock your device when you are not using it. Set your
devices to lock after a period of time and use strong PINs and passwords.
Enable multi-factor authentication (MFA). Add an extra layer of protection so that
the only person who has access to your account is you.
During Your Travel
Guard your devices. Your devices are valuable, but your sensitive information is,
as well. Always keep your devices close at hand and secure in taxis, security checkpoints,
airplanes, rentals homes, and hotel rooms.
Securely recharge. Never plug your phone into a USB public charging station, such
as those in the airport or in hotel room lamp and clock radio inputs, as these cannot
be trusted. Malicious individuals can hijack your session or install malware on your
device through those seemingly harmless means. Always connect using your own power
adapter connected to a power outlet.
Delete data from your rental car. If you connect your phone to a rental car for navigation
or other purpose, be sure to securely remove the device so that other individuals
do not have access to your address book, device name, text messages (hands-free calling),
or other sensitive information.
Avoid public Wi-Fi. While public networks are convenient, they are a security risk.
Avoid connecting to public Wi-Fi unless absolutely necessary. Instead, consider using
your phone carrier’s internet connection or use your phone as a personal hotspot if
your plan allows.
If you do need to connect to public Wi-Fi, verify with the establishment the name
of the network and use a virtual private network (VPN), software which will encrypt
your internet traffic and prevent others from stealing your data. Verifying the network
name is important. Oftentimes, malicious individuals create similar connection points
with a slight misspelling, hoping you will instead connect to their network.
Turn off auto-connect. While auto-connect is enabled, devices will seek out and connect
to available networks or Bluetooth devices. This could allow cyber criminals to access
your device without you knowing it. Disable auto-connect, Bluetooth connectivity,
and near-field communication (NFC) like airdrop so that you can select the network
and control the connection.
Limit what you share. Limit the information you share on social media while on vacation
and consider posting updates about your trip after you return. Revealing too much
information while away can put you and others at risk. Criminals can gain useful information
from such posts like knowing you are away from your home. Scammers may even attempt
to contact your family and friends with a variety of scam tactics. Additionally, consider
setting your social media accounts to only allow friends to view your posts.
Avoid the use of public computers. Public computers such as hotel business centers
and internet cafes are often poorly managed and provide minimal security protection
for users. If you must use a public computer, do not enter any username or password
on the computer and do not connect or transfer data via thumb drive/USB.
When You Return Home
Shred your boarding pass and luggage tag. Scannable codes on boarding passes and luggage
tags include full name, date of birth, and passenger name record. These can also contain
sensitive data from your airline record like passport number, phone number, email
address, and other information that you wouldn’t want to share publicly. For this
same reason, never post boarding passes on social media.
Scan for virus and malware. It’s best to update your security software when you return
home and scan for viruses and malware to be sure your device has not been compromised
while you were away.
Conclusion and Resources
Knowing these helpful tips will aid in cyber-safe travel, allowing time to relax and
enjoy your time away. For more information, see these additional resources:
Used with permission from the MS-ISAC / Center for Internet Security (CIS) newsletter |
|
Angie Brooks In each issue, we feature one of our amazing ITS team members. We learn more about
Angie Brooks with ITS Admin team in this segment.
What is your role and how long have you been in ITS at UTHSC? I started at the University 15 years ago as a Senior Budget Clerk in the Department
of Physiology. I’m now enjoying my new role as the Financial Coordinator in the Information
Technology Services Department for the past year and 8 months.
What is a day in the life of Angie like? Multi-tasking is the main goal in my office. The IT Department services our campus
in every aspect; therefore, it is my job to ensure all billing is procured in a timely
manner.
What is your favorite thing about working at UTHSC? It’s the diversity for me. Since my tenure here at the University, I have acquired
so many lasting friendships. I’ve learned so much over the years about other ethnic
ways of life, however, in comparison, there is always one thing that all ethnic values
the most. Family!
What’s something most people don’t know about you? I love to crack jokes whenever I can. Laughter makes the heart grow fonder. I have
an Event Planning Business, and would you believe that I’m a Pastor’s Wife? Thirty
years and counting. I couldn’t turn back now if I wanted to. Did that make you laugh?
Oh, one more thing. My favorite word is, wait for it, “KIND.”
|
|
|
|
|