Skip to content

Other ways to search: Events Calendar | UTHSC News

Issue 46


newsletter header

Issue 46, August 9, 2022

UTHSC Information Technology Services generates this communication to educate and inform our campus community about available technology tools, training opportunities, news, and events to help you and the university achieve excellence in patient care, education, research, and community service.
 
In this edition
  1. Make Sure Your New Employee Gets Their NetID on Time
  2. Fight Back Against Spam!
  3. TechConnect Knowledge Base: It’s like Googling for ITS Information!
  4. SharePoint, OneDrive, Teams, OnBase - Which Should I Use?
  5. Check Your Zoom Security Settings!
  6. R & RStudio
  7. Free Online Training Sessions
  8. Change Line Spacing in Microsoft Word
  9. How Often Do I Have to Change My NetID Password?
  10. New Windows 11 Features
  11. Charity & Disaster Scams
Make Sure Your New Employee Gets Their NetID on Time

Help your new hires obtain timely access to IT resources by completing the IRIS Transaction: ZPHRRECORD000 – Record Pending Employee with your department's Pending Employee position. OIT recommends completing the IRIS transaction at least three business days before the employee starts work.

(thanks to UTK OIT for this helpful hint!)

Fight Back Against Spam!

Spam happens. But there are ways to combat it!

Spam in Outlook

Phishing is any email sent from a cybercriminal looking to steal your passwords, information, or data. Savvy cybercriminals will send very authentic-looking emails, looking to charm or alarm you into believing immediate action must be taken.

If you believe you have received a phishing email, do not click on any links or reply to the email, but forward it to abuse@uthsc.edu.

Spam in RingCentral

Like you get robocalls on your cellphone, RingCentral calls can be spam. It may seem that you’re getting more calls, but it’s because your phone is with you all the time. You have a few choices:

  1. Answer the phone, and then hang up if the call is not relevant.
  2. Block the number.
  3. If you don’t recognize the number, don't answer, let it go to voicemail, and then check your voicemail to see if it is a call you need to return.

Check out some of our Cybersecurity KB articles on combating spam:

TechConnect Knowledge Base: It’s like Googling for ITS Information!

We introduced you to TechConnect last summer, and since then, we’ve discussed our excellent knowledge base. But we are nerds, and we realized you might not even know what a knowledge base is or why you should use it!

The TechConnect Knowledge Base is a reservoir of information about UTHSC technology. We have articles about NetIDs, sending emails securely, and passwords. But there is so much more!

We have instructions for everything from how to get what you need if you are new to campus to how to purchase hardware and software.

Think of it as Google for UTSHC ITS. Just click in the search bar, enter a few keywords, and TechConnect finds the article for you!

Why do we need a knowledge base?

  • Sometimes users prefer to look information up for themselves
  • You have a new person come onboard, and they can learn more about UTHSC apps and instructions
  • You only do something once a year and need help remembering what to do
  • Our instructions give you a more personalized experience than generic software instructions do

So even if you aren’t a nerd, check out our knowledge base articles. Rate our articles so we know how we are doing. And if you notice something we are missing, please let us know at its@uthsc.edu.

SharePoint, OneDrive, Teams, OnBase - Which Should I Use?

Sometimes it isn't clear when to use SharePoint, OneDrive, Teams, or OnBase. The awesome part is that you can store and share documents with colleagues from all these platforms.

The hardest part is understanding what each of these does and which you should use.

Check out our Understanding the Difference between OneDrive, SharePoint, Teams, and OnBase knowledge base article. If you need more info, look under attachments for the document-management-overview-long.pdf file for more details about each storage option (don't worry, it's not that long).

Still now sure which is right for you? Send a storage service request through UTHSC TechConnect, and we will be glad to help you find the perfect storage solution!

Check Your Zoom Security Settings!

Due to the increase in cybersecurity attacks, ITS recommends that you review this TechConnect KB article on Zoom Security and check your settings to protect your meetings and webinars. Not sure how to require registration for a Zoom meeting? We have a TechConnect knowledge base article for that!

In addition, ITS recommends that you consider using Microsoft Teams for your meetings. Watch this brief video for more information on Teams.

R & RStudio

R is a free, open-source software environment for statistical computing, data management, and graphics. While it includes a simple code editor, it can be controlled through many other packages. The most popular way to run R is through RStudio, a free and open-source program that includes a code editor and debugging and visualization tools. R is very extensible and supports a wide range of analytic and visualization methods. However, its data usually must fit into your computer's main memory, limiting the size of data sets it can analyze.

Learn more about R and RStudio on OIT's Research Software website. Learn when to use it, where to run it, how to learn, and get help.

Microsoft has some excellent FREE training courses we recommend. As UTHSC faculty or staff, you can access all Microsoft 365 apps listed. Students may not have access to all these apps.

Tips, Shortcuts, and What’s New with Microsoft Teams
Learn tips and shortcuts for Microsoft Teams that will help you become a power user, able to expedite navigation, and efficiently use Teams for collaboration and workflow. Discover what’s new and find expert direction on the latest features. Register

  • Aug 17 - 12:00 pm - 1:00 pm
  • Aug 19 - 9:00 am -10:00 am
  • Aug 22 - 9:00 am -10:00 am
Explore Teams and Channels in Microsoft Teams
Do you regularly collaborate with your workgroup and need to access shared files, apps, and conversation threads? Microsoft Teams is a robust collaboration tool, providing you anywhere, anytime access to your group projects, daily operations, knowledgebase resources, and large scope initiatives. Register
  • Aug 18 - 12:00 pm - 1:00 pm
  • Aug 22 - 10:00 am -11:00 am
Get Started with Microsoft Lists
Navigate and understand core functionality of Microsoft Lists, Create, share, and track lists, customize with custom views, build lists from a template, understand SharePoint Online and Teams integrations, and understand column types. Register
  • Aug 18 - 11:00 am - 12:00 pm
  • Aug 23 - 10:00 am -11:00 am
Microsoft OneNote for Business
Learn about OneNote, a digital note-taking app that provides a single place for keeping all your notes, research, plans and information. Notes are easy to organize, print, and share, and you can search and find important information quickly.Register
  • Aug 17 - 2:00 pm - 3:00 pm
  • Aug 24 - 2:00 pm - 3:00 pm
Change Line Spacing in Microsoft Word

Take just a few minutes to watch this video and learn how to change the line spacing in your document to make it look how you want.

How Often Do I Have to Change My NetID Password?

Your NetID password expires every 180 days (6 months)

UNLESS

you set up your account to use two-factor authentication & the password is reset to a 12 or more-character password; then the password will NEVER expire as long as Duo is activated on your device.

(If your existing password is 12 or more characters when you set up two-factor authentication, you will need to reset your password one more time to have the non-expiring password policy added to your account.)

You can learn more about your NetID password, expiration periods, and how you can set up a password that never expires in our TechConnect How Often Do I Have to Change My Password? article.

New Windows 11 Features

Did you upgrade to Windows 11, but don't know how it's different from Windows 10? Linkedin Learning has a great 4-minutes video that covers the most exciting new features, and it is free to you!

Getting Started

You must go to the UTHSC LinkedIn Learning site to receive full university access to the site.
  1. Click the Windows 11 New Features video link.
  2. If you have linked your LinkedIn Learning account to your LinkedIn account, you will be asked to log into LinkedIn.
    If you have not linked your LinkedIn Learning account to your LinkedIn account, you will be taken to the LinkedIn Learning main page.
  3. Click Continue to University of Tennessee, Knoxville.
  4. Enter your NetID/password (Duo authentication may be required).
Charity & Disaster Scams

SANS Guest Editor, Dr. Jessica Barker has delivered a timely article regarding the risks of reacting to “notifications” or “requests for help” for charities and disasters.

Cyber criminals know that one of the best ways to rush people into making a mistake is by creating a heightened sense of urgency. And one of the easiest ways to create a sense of urgency is to take advantage of a crisis. This is why cyber criminals love it whenever there is a traumatic event with global impact. What most of us regard as a tragedy, cyber criminals view as an opportunity, such as the breakout of a war, a major natural disaster such as a volcanic explosion, and of course infectious disease breakouts like COVID- 19. When there is an immense amount of social media and news coverage about a certain event, cyber criminals know that it is the time to strike.

They use this opportunity to create timely phishing emails or scams about the event, and then send that phishing email or launch the scam to millions of people around the world. For example, during a natural disaster, they may pretend to be a charity asking for donations to save children in need. Cyber criminals can often act within hours of a crisis or disaster, as they have all the technical infrastructure prepared and are ready ahead of time. How can we protect ourselves the next time there is a big crisis or disaster, and cyber criminals seek to exploit it?

How to Detect and Defend Against These Scams

The key to avoiding these scams is to be suspicious of anyone who reaches out to you. For example, do not trust an urgent email claiming to be from a charity that desperately needs donations, even if the email appears to be from a brand that you know and trust. Do not trust a phone call claiming to be a local food bank pressuring you to donate. The greater the sense of urgency, the more likely the request is an attack. Here are some of the most common indicators of a charity scam:

  • Be very suspicious of any charity that requires that you donate via cryptocurrency, Western Union, wiring money, or gift cards.
  • Cyber criminals can change their caller ID phone number to make their phone call look like it’s from your local area code or from a trusted name. Caller ID cannot be relied upon these days.
  • Some cyber criminals will use names and logos that sound or look like a real charity. This is one reason it pays to do some research before giving.
  • Cyber criminals will often make lots of vague and sentimental claims about what they will do with your money but give no specifics about how your donation will be used.
  • Some cyber criminals may try to trick you into donating to them by thanking you for a donation you made in the past when, in reality, you never donated to them.
  • Do not assume pleas for help on crowdfunding sites such as GoFundMe or social media sites such as TikTok are legitimate, especially in the wake of a crisis or tragedy.
  • Do not give out personal or financial information in response to any unsolicited request.

How to Make a Difference Safely

To donate in times of need or to help those impacted by a disaster, donate only to well-known, trusted organizations. You initiate the connections and decide who to reach out to, such as what websites to visit or what organizations to call. When you consider giving to a charity, search its name plus words like “complaint,” “review,” “rating,” or “scam.” Not sure which charities to trust? Start by researching government websites you trust, or perhaps links provided by a well-known and highly trusted news organization. Donating in times of need is a fantastic way to make a difference, just be sure you are giving to legitimate organizations.

Aug 10, 2022