UAH | Office of Information Technology (OIT) | News | 糖心原创出品 /oit/news 2025-07-19T19:50:39-05:00 UAH webmaster@uah.edu Joomla! - Open Source Content Management Outstanding UAH faculty, staff celebrated at 2025 University Awards for Excellence event 2025-06-06T08:08:21-05:00 2025-06-06T08:08:21-05:00 /oit/news/19520-outstanding-uah-faculty-staff-celebrated-at-2025-university-awards-for-excellence-event Ann Marie Martin <p><img src="/" alt="糖心原创出品 (UAH) presented 15 plaques to 14 faculty and staff members during the 2025 University Awards for Excellence ceremony on May 1, 2025."></p><!-- BEGIN Intro Text --> <p>糖心原创出品 (UAH) celebrated 14 faculty and staff members for their outstanding achievements during the 2024-25 academic year at the 2025 University Awards for Excellence ceremony on May 1.</p> <!--// END Intro Text --> <p><img src="/" alt="糖心原创出品 (UAH) presented 15 plaques to 14 faculty and staff members during the 2025 University Awards for Excellence ceremony on May 1, 2025."></p><!-- BEGIN Intro Text --> <p>糖心原创出品 (UAH) celebrated 14 faculty and staff members for their outstanding achievements during the 2024-25 academic year at the 2025 University Awards for Excellence ceremony on May 1.</p> <!--// END Intro Text --> UAH welcomes Tang as Chief Information Officer 2025-02-03T10:17:28-06:00 2025-02-03T10:17:28-06:00 /oit/news/19235-uah-welcomes-tang-as-chief-information-officer Julie Jansen <p><img src="/" alt="Danny Tang Chief Information Officer"></p><!-- BEGIN Intro Text --> <p>糖心原创出品 (UAH), part of The University of Alabama System, has named Danny Tang as its chief information officer, effective February 17, 2025.</p> <!-- // END Intro Text --> <p><img src="/" alt="Danny Tang Chief Information Officer"></p><!-- BEGIN Intro Text --> <p>糖心原创出品 (UAH), part of The University of Alabama System, has named Danny Tang as its chief information officer, effective February 17, 2025.</p> <!-- // END Intro Text --> Cybersecurity Week Four: Incident Response 2024-10-25T11:16:05-05:00 2024-10-25T11:16:05-05:00 /oit/news/19055-cyber-security-week-four Staci Radden, OIT Cyber Analyst <p style="text-align: center;"><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXdSd-c96uDAWZoMnCKhaBxESB-fFHBJi97q0ank2hBt5xBhkB_ByX07aM8wYJUK1O7gbDa1SSC_rS-TCRBDXlE2DAFaZ88sROlgZPlNhE1V6tX5ck0PQX8n9pTlMCvQmowY2yXblxMJpzRouWixFg9asRI?key=O4SkGUr0UxBNf2-rQtt-Ag" width="624" height="187" alt="Cyberspace Awareness Month"></p> <h2>What to Do When You See Something</h2> <p><strong>by Staci Radden, OIT Cyber Analyst</strong></p> <p>This last cybersecurity awareness month article is all about incident response, and what to do when you see something suspicious.&nbsp; Reporting any questionable cyber activity is a way to protect UAH鈥檚 data and systems. Therefore, it is critical that we remain diligent in recognizing and reporting suspected cybersecurity threats.</p> <h3>What to Report</h3> <p>As discussed in our previous articles this month, cybersecurity risks can present in a multitude of ways, including phishing emails, malware, ransomware, social engineering (e.g., job scams &amp; tech support scams) and much more! Such threats can jeopardize personal data and put UAH processes into disarray. A few examples of suspicious activity are included below.</p> <h4>Ransomware</h4> <p><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXc4UPcg1dEmHA7hxNnm_FgDkiKc8H2xmge2Mb4WQ3V7Xk4KjdNEHnBKF3Dt2Npy48QVFdjXwOTOtX02f_yt4CJjvhmNdAzJLHElv_UC3VRJKOBtMhxAlbItIKQ8ZI2ncmFhsjYdcsQbZxBUGJwYqztVAi5O?key=O4SkGUr0UxBNf2-rQtt-Ag" width="432" height="307" style="display: block; margin-left: auto; margin-right: auto;" alt="ransomeware example graphic"></p> <p style="text-align: center;">(<a href="https://www.dynamicquest.com/new-os-new-malware-windows-10-ransomware-scam/">View Source</a>)</p> <h4>Phishing Email</h4> <p><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXeuspHUb9EYXrRTG1q1VWGKsea7NlCU3KP1nqkuWfe8_GBTmrobt48qkG9QEj4YmFIz7pNymwpZXGQCki2_R1gG6O1DtOChtakLdisRIRE5FM-NvPWdtai_avdWWQvnJa5WQxHIsJZZODjDp4Sc3izQa38?key=O4SkGUr0UxBNf2-rQtt-Ag" width="433" height="343" style="display: block; margin-left: auto; margin-right: auto;" alt="phishing email example graphic"></p> <p style="text-align: center;">(<a href="https://www.quostar.com/wp-content/uploads/2015/08/Fake-emails.png">View Source</a>)</p> <h4>Fake Pop-Up</h4> <p><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXcs486KMRQQ9ZcuBBiAZFr3-OjeivtRo2adg_La0o-JB2B7y3awQsOFWp62uaJ2WhZsVgUcr91kzt4uMTtobWIZxZ2_-MVli_V_t_UF_fgkKNzbq2lxloEICapR7PF6SM3M56NdSzbVLSkFmge0CKINWxwB?key=O4SkGUr0UxBNf2-rQtt-Ag" width="433" height="339" style="display: block; margin-left: auto; margin-right: auto;" alt="Fake Pop-up example graphic"></p> <p style="text-align: center;">(<a href="https://answers.microsoft.com/en-us/microsoftedge/forum/all/i-am-getting-hijacked-web-pages/e000d23a-032f-4b9a-9313-cdf574b1c1a8">View Source</a>)</p> <p>These are not the only examples of cybersecurity risks and these risks can take on a number of forms.&nbsp; Regardless of their appearance, any potential cybersecurity risk should be taken very seriously.</p> <h3>Why to Report</h3> <p>Have you ever tried to rationalize why you shouldn鈥檛 report a possible threat?</p> <ul> <li>鈥淚t鈥檚 probably nothing.鈥</li> <li>鈥淚鈥檓 just being paranoid.鈥</li> <li>鈥淚鈥檓 sure someone else will report this issue.鈥</li> </ul> <p>We may feel embarrassed about clicking a link in error or worried that we caused a problem. We may be afraid that we are making a big deal about nothing and creating unnecessary alarm. However, by communicating a potential security issue, you are helping the Office of Information Technology (OIT) do its job. Your prompt reporting allows UAH鈥檚 cybersecurity team to quickly react, often preventing the incident from becoming bigger and impacting more people. The valuable information you provide can assist OIT in improving security measures, such as user education, anti-phishing tools, stronger password policies, and software updates.</p> <h3>How to Report</h3> <p>To report suspicious cyber activity, contact the OIT Help Desk at <a href="mailto:helpdesk@uah.edu">helpdesk@uah.edu</a> or 256-824-3333. Provide them with as much information as possible, including date, time, description of the issue, and any screenshots available, as well as forwarding phishing emails.</p> <p>Remember, we all play a crucial role in keeping UAH <strong>#ChargerSecure!</strong></p> <p style="text-align: center;"><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXdSd-c96uDAWZoMnCKhaBxESB-fFHBJi97q0ank2hBt5xBhkB_ByX07aM8wYJUK1O7gbDa1SSC_rS-TCRBDXlE2DAFaZ88sROlgZPlNhE1V6tX5ck0PQX8n9pTlMCvQmowY2yXblxMJpzRouWixFg9asRI?key=O4SkGUr0UxBNf2-rQtt-Ag" width="624" height="187" alt="Cyberspace Awareness Month"></p> <h2>What to Do When You See Something</h2> <p><strong>by Staci Radden, OIT Cyber Analyst</strong></p> <p>This last cybersecurity awareness month article is all about incident response, and what to do when you see something suspicious.&nbsp; Reporting any questionable cyber activity is a way to protect UAH鈥檚 data and systems. Therefore, it is critical that we remain diligent in recognizing and reporting suspected cybersecurity threats.</p> <h3>What to Report</h3> <p>As discussed in our previous articles this month, cybersecurity risks can present in a multitude of ways, including phishing emails, malware, ransomware, social engineering (e.g., job scams &amp; tech support scams) and much more! Such threats can jeopardize personal data and put UAH processes into disarray. A few examples of suspicious activity are included below.</p> <h4>Ransomware</h4> <p><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXc4UPcg1dEmHA7hxNnm_FgDkiKc8H2xmge2Mb4WQ3V7Xk4KjdNEHnBKF3Dt2Npy48QVFdjXwOTOtX02f_yt4CJjvhmNdAzJLHElv_UC3VRJKOBtMhxAlbItIKQ8ZI2ncmFhsjYdcsQbZxBUGJwYqztVAi5O?key=O4SkGUr0UxBNf2-rQtt-Ag" width="432" height="307" style="display: block; margin-left: auto; margin-right: auto;" alt="ransomeware example graphic"></p> <p style="text-align: center;">(<a href="https://www.dynamicquest.com/new-os-new-malware-windows-10-ransomware-scam/">View Source</a>)</p> <h4>Phishing Email</h4> <p><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXeuspHUb9EYXrRTG1q1VWGKsea7NlCU3KP1nqkuWfe8_GBTmrobt48qkG9QEj4YmFIz7pNymwpZXGQCki2_R1gG6O1DtOChtakLdisRIRE5FM-NvPWdtai_avdWWQvnJa5WQxHIsJZZODjDp4Sc3izQa38?key=O4SkGUr0UxBNf2-rQtt-Ag" width="433" height="343" style="display: block; margin-left: auto; margin-right: auto;" alt="phishing email example graphic"></p> <p style="text-align: center;">(<a href="https://www.quostar.com/wp-content/uploads/2015/08/Fake-emails.png">View Source</a>)</p> <h4>Fake Pop-Up</h4> <p><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXcs486KMRQQ9ZcuBBiAZFr3-OjeivtRo2adg_La0o-JB2B7y3awQsOFWp62uaJ2WhZsVgUcr91kzt4uMTtobWIZxZ2_-MVli_V_t_UF_fgkKNzbq2lxloEICapR7PF6SM3M56NdSzbVLSkFmge0CKINWxwB?key=O4SkGUr0UxBNf2-rQtt-Ag" width="433" height="339" style="display: block; margin-left: auto; margin-right: auto;" alt="Fake Pop-up example graphic"></p> <p style="text-align: center;">(<a href="https://answers.microsoft.com/en-us/microsoftedge/forum/all/i-am-getting-hijacked-web-pages/e000d23a-032f-4b9a-9313-cdf574b1c1a8">View Source</a>)</p> <p>These are not the only examples of cybersecurity risks and these risks can take on a number of forms.&nbsp; Regardless of their appearance, any potential cybersecurity risk should be taken very seriously.</p> <h3>Why to Report</h3> <p>Have you ever tried to rationalize why you shouldn鈥檛 report a possible threat?</p> <ul> <li>鈥淚t鈥檚 probably nothing.鈥</li> <li>鈥淚鈥檓 just being paranoid.鈥</li> <li>鈥淚鈥檓 sure someone else will report this issue.鈥</li> </ul> <p>We may feel embarrassed about clicking a link in error or worried that we caused a problem. We may be afraid that we are making a big deal about nothing and creating unnecessary alarm. However, by communicating a potential security issue, you are helping the Office of Information Technology (OIT) do its job. Your prompt reporting allows UAH鈥檚 cybersecurity team to quickly react, often preventing the incident from becoming bigger and impacting more people. The valuable information you provide can assist OIT in improving security measures, such as user education, anti-phishing tools, stronger password policies, and software updates.</p> <h3>How to Report</h3> <p>To report suspicious cyber activity, contact the OIT Help Desk at <a href="mailto:helpdesk@uah.edu">helpdesk@uah.edu</a> or 256-824-3333. Provide them with as much information as possible, including date, time, description of the issue, and any screenshots available, as well as forwarding phishing emails.</p> <p>Remember, we all play a crucial role in keeping UAH <strong>#ChargerSecure!</strong></p> Cyber Security Week Three: Remote Work 2024-10-03T13:25:42-05:00 2024-10-03T13:25:42-05:00 /oit/news/18974-cyber-security-week-three <p><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXc4Nzu7xpsPS-Cbzd-AY-NocGipLEKL9yQ0qELoQi93eqFn_QCdGZAbsjdA5wdnxiWm_Vch7rM-498eR1DMjQtazCRkA2wcjxGVBtF0mVVoMAGwc61Zd2hr7ON49mGGrOmNQF43m_2WiNfS194nZqjsO15T?key=hIbywnjTDvXFuYx_cRzI_w" width="624" height="187" style="display: block; margin-left: auto; margin-right: auto;"></p> <h2>Protecting Yourself While Working Remotely</h2> <p>This week is all about protecting ourselves while we are working remotely; whether you have a position that is approved for telecommuting or travel frequently for the university. The ability to work from anywhere has revolutionized how we support our students and has given us the flexibility that many of us enjoy. However, that flexibility also brings with it unique cybersecurity challenges.&nbsp;</p> <p>Below are some tips to protect yourself, your family, and UAH while you work away from the main campus.</p> <h3>Keep Your Device Secure</h3> <p>Whether you are using a tablet, laptop, or other mobile device, the university is only as secure as the devices that connect to it. It is crucial that you keep your device as secure as possible. It is best practice that you:</p> <ol> <li>Keep your operating system and applications on the latest supported versions. Your system should be configured to automatically update when new versions are released. If you are unsure if this is the case, contact your UAH support personnel.</li> <li>Do not allow non-UAH personnel (even family members) to use your device. UAH devices are provided to you to fulfill UAH鈥檚 mission. You never know what others will do on your computer when you give it to them to use. There have been instances where an employee鈥檚 child has downloaded a pirated version of software to their UAH device and it became infected with malware.</li> <li>When you have your UAH device away from the campus, store it in a secure location.&nbsp;</li> <li>Never attempt to bypass security software on your device or 鈥渏ailbreak鈥, 鈥渃rack鈥, or 鈥渞oot鈥 the device. Doing so bypasses a number of security protections in place and makes it more likely that your device will be compromised.</li> </ol> <h3>Keep Your Logon Secure</h3> <p>The combination of your password and your Duo Multifactor Authentication (MFA) solution is sufficient protection for a majority of UAH use cases. However, there are some caveats to this statement:</p> <ol> <li>You should use Duo any time it鈥檚 technically feasible. Duo MFA provides additional layers of protection for your account above and beyond what you get with just a password alone, making accounts protected by Duo more difficult to compromise.</li> <li>Never share your Duo code with anyone. UAH IT will not ask for the code that appears on your Duo app or other authentication device. Sharing that number with an unknown individual is one of the only ways your account can be compromised while using Duo. Any text message or phone call you receive claiming to be from OIT and asking for that number is an attempt to compromise your account and should be reported to the OIT Help Desk.</li> <li>Do not use your UAH password as a password for any other non-UAH website or computer system. Computer systems and websites of all kinds are being compromised all the time. Many times when a website or system is compromised one of the first things they do is download a copy of stored user passwords whether they鈥檙e encrypted or not. If you used the same password for your UAH account as you did on a commercial website and that website gets compromised, then the password they have from the commercial website could be used to gain access to your UAH account.</li> <li>Never share your UAH password with anyone. Per UAH policy you are responsible for all actions taken by your user account.&nbsp;</li> </ol> <h3>Keep Your Location Secure</h3> <p>Even with a secure device and a secure login, you need to be aware of your surroundings while working on a UAH device.&nbsp;</p> <ol> <li>Be wary of anyone trying to look at your screen. It is potentially a breach of confidentiality if someone sitting behind you in the coffee shop reads the FERPA data on your screen. If you have to work in a public place, choose either (a) not displaying any information that would be protected by federal, state, or local laws or statutes or (b) sitting in a location where no one can be behind you without your knowledge.</li> <li>Whenever you are remote, especially on public wi-fi, use the UAH Virtual Private Network (VPN). OIT provides the Ivanti VPN client that is pre-configured to connect to the UAH VPN. This software is available for download from Chargerware. It is not difficult to use. All you have to do is run the Ivanti Client and then log in with your UAH credentials and it provides a secure, encrypted connection back to the UAH network.</li> <li>Contact the Office of Research Security (ORS) before traveling internationally with UAH devices. ORS maintains an updated list of embargoed countries and can help ensure you do not run afoul of any Export or International Travel regulations.&nbsp;</li> </ol> <p>By taking a little care and following a few simple steps you can help UAH stay #ChargerSecure</p> <p><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXc4Nzu7xpsPS-Cbzd-AY-NocGipLEKL9yQ0qELoQi93eqFn_QCdGZAbsjdA5wdnxiWm_Vch7rM-498eR1DMjQtazCRkA2wcjxGVBtF0mVVoMAGwc61Zd2hr7ON49mGGrOmNQF43m_2WiNfS194nZqjsO15T?key=hIbywnjTDvXFuYx_cRzI_w" width="624" height="187" style="display: block; margin-left: auto; margin-right: auto;"></p> <h2>Protecting Yourself While Working Remotely</h2> <p>This week is all about protecting ourselves while we are working remotely; whether you have a position that is approved for telecommuting or travel frequently for the university. The ability to work from anywhere has revolutionized how we support our students and has given us the flexibility that many of us enjoy. However, that flexibility also brings with it unique cybersecurity challenges.&nbsp;</p> <p>Below are some tips to protect yourself, your family, and UAH while you work away from the main campus.</p> <h3>Keep Your Device Secure</h3> <p>Whether you are using a tablet, laptop, or other mobile device, the university is only as secure as the devices that connect to it. It is crucial that you keep your device as secure as possible. It is best practice that you:</p> <ol> <li>Keep your operating system and applications on the latest supported versions. Your system should be configured to automatically update when new versions are released. If you are unsure if this is the case, contact your UAH support personnel.</li> <li>Do not allow non-UAH personnel (even family members) to use your device. UAH devices are provided to you to fulfill UAH鈥檚 mission. You never know what others will do on your computer when you give it to them to use. There have been instances where an employee鈥檚 child has downloaded a pirated version of software to their UAH device and it became infected with malware.</li> <li>When you have your UAH device away from the campus, store it in a secure location.&nbsp;</li> <li>Never attempt to bypass security software on your device or 鈥渏ailbreak鈥, 鈥渃rack鈥, or 鈥渞oot鈥 the device. Doing so bypasses a number of security protections in place and makes it more likely that your device will be compromised.</li> </ol> <h3>Keep Your Logon Secure</h3> <p>The combination of your password and your Duo Multifactor Authentication (MFA) solution is sufficient protection for a majority of UAH use cases. However, there are some caveats to this statement:</p> <ol> <li>You should use Duo any time it鈥檚 technically feasible. Duo MFA provides additional layers of protection for your account above and beyond what you get with just a password alone, making accounts protected by Duo more difficult to compromise.</li> <li>Never share your Duo code with anyone. UAH IT will not ask for the code that appears on your Duo app or other authentication device. Sharing that number with an unknown individual is one of the only ways your account can be compromised while using Duo. Any text message or phone call you receive claiming to be from OIT and asking for that number is an attempt to compromise your account and should be reported to the OIT Help Desk.</li> <li>Do not use your UAH password as a password for any other non-UAH website or computer system. Computer systems and websites of all kinds are being compromised all the time. Many times when a website or system is compromised one of the first things they do is download a copy of stored user passwords whether they鈥檙e encrypted or not. If you used the same password for your UAH account as you did on a commercial website and that website gets compromised, then the password they have from the commercial website could be used to gain access to your UAH account.</li> <li>Never share your UAH password with anyone. Per UAH policy you are responsible for all actions taken by your user account.&nbsp;</li> </ol> <h3>Keep Your Location Secure</h3> <p>Even with a secure device and a secure login, you need to be aware of your surroundings while working on a UAH device.&nbsp;</p> <ol> <li>Be wary of anyone trying to look at your screen. It is potentially a breach of confidentiality if someone sitting behind you in the coffee shop reads the FERPA data on your screen. If you have to work in a public place, choose either (a) not displaying any information that would be protected by federal, state, or local laws or statutes or (b) sitting in a location where no one can be behind you without your knowledge.</li> <li>Whenever you are remote, especially on public wi-fi, use the UAH Virtual Private Network (VPN). OIT provides the Ivanti VPN client that is pre-configured to connect to the UAH VPN. This software is available for download from Chargerware. It is not difficult to use. All you have to do is run the Ivanti Client and then log in with your UAH credentials and it provides a secure, encrypted connection back to the UAH network.</li> <li>Contact the Office of Research Security (ORS) before traveling internationally with UAH devices. ORS maintains an updated list of embargoed countries and can help ensure you do not run afoul of any Export or International Travel regulations.&nbsp;</li> </ol> <p>By taking a little care and following a few simple steps you can help UAH stay #ChargerSecure</p> Cyber Security Week Two: Cyber Threats 2024-10-03T13:10:05-05:00 2024-10-03T13:10:05-05:00 /oit/news/18973-cyber-security-week-two <p><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXfREpQ9IbDM3V6r3SYipihl89epCeOuCBv8Jw-9WquHhgInKQxrzLJOzyJcfmeczK1e63N3WebBJcBI57NJkI49hlsNt6qRZys4ZwMZaK7X1oPD32RmwWsEH8j0r_EwOJ84Rzm6ZZzPerYOSh8A_4lqrdkX?key=71wpzje_8VnLk5-nTrlm_Q" width="1162" height="346" alt="Cyberspace Awareness Month Graphic"></p> <h2>Cyber Threats</h2> <p>Higher education is a prime target of cybercriminals. Vast amounts of valuable data, including personal information, intellectual property, and financial details, make universities vulnerable to cybercrime. According to 鈥淐yber Attack Trends:&nbsp; 2022 Mid-Year Report鈥, attacks against higher education increased 114% between 2020 and 2022. Therefore, it is critical for all of us to integrate cybersecurity awareness into our daily routine. Below are some guidelines to follow in an effort to keep UAH and your information cyber secure.</p> <h3>Keep Your Phish Hooks Sharp</h3> <p>Phishing is one of the most pervasive and detrimental cyber threats impacting universities. Phishing emails may appear to come from university IT departments, faculty members, or even classmates. Links to fake websites are often included which, when clicked, install malware or steal users鈥 information.</p> <p><strong>Ways to recognize phishing attempts:</strong></p> <ul> <li>Sense of urgency or threat</li> <li>Sender is not legitimate. Pay close attention if [External] is at the beginning of the subject line.</li> <li>Spoofed links directing you to an invalid URL. Hover over the URL without clicking to see where a link may take you.</li> <li>Grammar and spelling errors</li> <li>Requests for sensitive information</li> <li>Unrealistic discounts, exclusive offers, or prizes</li> </ul> <p><strong>What to do after receiving a suspicious email:</strong></p> <ul> <li>Do NOT click on any links!</li> <li>Do NOT respond to the email.</li> <li>In Gmail, you can click the 鈥淩eport phishing鈥 button.</li> <li>For additional help, you may forward the email to the OIT Help Desk at <a href="mailto:helpdesk@uah.edu"></a><a href="mailto:helpdesk@uah.edu">helpdesk@uah.edu</a></li> <li>Delete the email to prevent accidentally clicking links within it at a later date.</li> </ul> <h3>Take a 鈥楤yte鈥 Out of Malware</h3> <p>Malware (鈥渕alicious software鈥) is any software created to disrupt, damage, or gain unauthorized access to a computer system. Recent studies have shown a 50% increase in malware attacks within universities in the last year. Such strikes often involve phishing emails, ransomware, and strategies to steal user credentials.</p> <p><strong>Tips to avoid malware:</strong></p> <ul> <li>Practice safe browsing habits by avoiding suspicious links and pop ups.</li> <li>Use good email hygiene! As mentioned previously, do not open attachments or click links in suspicious emails.</li> <li>Use strong, unique passwords.</li> <li>Consider using multi-factor authentication.</li> <li>Keep operating systems and applications updated.</li> <li>Use antivirus and anti-malware software.</li> </ul> <h3>Social Engineering (NOT a UAH Degree!)</h3> <p>Social engineering, within information security, is the manipulation and deception of individuals into divulging confidential or personal information that may be used for fraudulent purposes. Social engineers often exploit trust and urgency to achieve their mission.</p> <p><strong>Common examples targeting universities:</strong></p> <ul> <li><strong>Fake Job Scams -</strong> This scam often targets students and recent graduates. Scammers advertise for fake jobs in emails, on job sites, and on social media. They might even mail you a check to deposit and then tell you to send money to another account. Do NOT deposit the check. It is FAKE. Do NOT send the money they requested.</li> <li><strong>Tech Support Scams -</strong> A scammer pretends to be an IT support technician, with the goal of tricking the victim into revealing sensitive information and/or giving the scammer access to their computer. OIT will never ask for your password or your Duo MFA from your app.</li> <li><strong>Pay-for-Training Schemes -</strong> This scam requires payment for training before being hired. Legitimate employers usually cover training costs.</li> <li><strong>Fake Recruiters -</strong> Scammers impersonate recruiters from known companies and ask for sensitive information or request payment for a background check.</li> </ul> <p><strong>RED FLAGS to watch for:</strong></p> <ul> <li>As applies to all phishing emails, notice unprofessional communication. Poor grammar, spelling errors, or unprofessional email addresses can be indicators of a scam.</li> <li>Take note of vague job descriptions. Valid job postings usually define a clear role.</li> <li>Be suspicious if there are offers that are just too good to be true.</li> <li>Be cautious if sensitive information is requested.</li> </ul> <p>In today鈥檚 interconnected world, cyber awareness is critical and a shared responsibility. Understanding the strategies used by cybercriminals and recognizing the signs of potential threats is essential in protecting our digital landscape and keeping UAH <strong>#ChargerSecure</strong>.</p> <p><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXfREpQ9IbDM3V6r3SYipihl89epCeOuCBv8Jw-9WquHhgInKQxrzLJOzyJcfmeczK1e63N3WebBJcBI57NJkI49hlsNt6qRZys4ZwMZaK7X1oPD32RmwWsEH8j0r_EwOJ84Rzm6ZZzPerYOSh8A_4lqrdkX?key=71wpzje_8VnLk5-nTrlm_Q" width="1162" height="346" alt="Cyberspace Awareness Month Graphic"></p> <h2>Cyber Threats</h2> <p>Higher education is a prime target of cybercriminals. Vast amounts of valuable data, including personal information, intellectual property, and financial details, make universities vulnerable to cybercrime. According to 鈥淐yber Attack Trends:&nbsp; 2022 Mid-Year Report鈥, attacks against higher education increased 114% between 2020 and 2022. Therefore, it is critical for all of us to integrate cybersecurity awareness into our daily routine. Below are some guidelines to follow in an effort to keep UAH and your information cyber secure.</p> <h3>Keep Your Phish Hooks Sharp</h3> <p>Phishing is one of the most pervasive and detrimental cyber threats impacting universities. Phishing emails may appear to come from university IT departments, faculty members, or even classmates. Links to fake websites are often included which, when clicked, install malware or steal users鈥 information.</p> <p><strong>Ways to recognize phishing attempts:</strong></p> <ul> <li>Sense of urgency or threat</li> <li>Sender is not legitimate. Pay close attention if [External] is at the beginning of the subject line.</li> <li>Spoofed links directing you to an invalid URL. Hover over the URL without clicking to see where a link may take you.</li> <li>Grammar and spelling errors</li> <li>Requests for sensitive information</li> <li>Unrealistic discounts, exclusive offers, or prizes</li> </ul> <p><strong>What to do after receiving a suspicious email:</strong></p> <ul> <li>Do NOT click on any links!</li> <li>Do NOT respond to the email.</li> <li>In Gmail, you can click the 鈥淩eport phishing鈥 button.</li> <li>For additional help, you may forward the email to the OIT Help Desk at <a href="mailto:helpdesk@uah.edu"></a><a href="mailto:helpdesk@uah.edu">helpdesk@uah.edu</a></li> <li>Delete the email to prevent accidentally clicking links within it at a later date.</li> </ul> <h3>Take a 鈥楤yte鈥 Out of Malware</h3> <p>Malware (鈥渕alicious software鈥) is any software created to disrupt, damage, or gain unauthorized access to a computer system. Recent studies have shown a 50% increase in malware attacks within universities in the last year. Such strikes often involve phishing emails, ransomware, and strategies to steal user credentials.</p> <p><strong>Tips to avoid malware:</strong></p> <ul> <li>Practice safe browsing habits by avoiding suspicious links and pop ups.</li> <li>Use good email hygiene! As mentioned previously, do not open attachments or click links in suspicious emails.</li> <li>Use strong, unique passwords.</li> <li>Consider using multi-factor authentication.</li> <li>Keep operating systems and applications updated.</li> <li>Use antivirus and anti-malware software.</li> </ul> <h3>Social Engineering (NOT a UAH Degree!)</h3> <p>Social engineering, within information security, is the manipulation and deception of individuals into divulging confidential or personal information that may be used for fraudulent purposes. Social engineers often exploit trust and urgency to achieve their mission.</p> <p><strong>Common examples targeting universities:</strong></p> <ul> <li><strong>Fake Job Scams -</strong> This scam often targets students and recent graduates. Scammers advertise for fake jobs in emails, on job sites, and on social media. They might even mail you a check to deposit and then tell you to send money to another account. Do NOT deposit the check. It is FAKE. Do NOT send the money they requested.</li> <li><strong>Tech Support Scams -</strong> A scammer pretends to be an IT support technician, with the goal of tricking the victim into revealing sensitive information and/or giving the scammer access to their computer. OIT will never ask for your password or your Duo MFA from your app.</li> <li><strong>Pay-for-Training Schemes -</strong> This scam requires payment for training before being hired. Legitimate employers usually cover training costs.</li> <li><strong>Fake Recruiters -</strong> Scammers impersonate recruiters from known companies and ask for sensitive information or request payment for a background check.</li> </ul> <p><strong>RED FLAGS to watch for:</strong></p> <ul> <li>As applies to all phishing emails, notice unprofessional communication. Poor grammar, spelling errors, or unprofessional email addresses can be indicators of a scam.</li> <li>Take note of vague job descriptions. Valid job postings usually define a clear role.</li> <li>Be suspicious if there are offers that are just too good to be true.</li> <li>Be cautious if sensitive information is requested.</li> </ul> <p>In today鈥檚 interconnected world, cyber awareness is critical and a shared responsibility. Understanding the strategies used by cybercriminals and recognizing the signs of potential threats is essential in protecting our digital landscape and keeping UAH <strong>#ChargerSecure</strong>.</p> Cyber Security Week One: Phishing 2024-10-03T12:54:20-05:00 2024-10-03T12:54:20-05:00 /oit/news/18972-cyber-security-week-one <p><img src="/" alt=""></p><p><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXe-YPhWii_ygGA0KAa3Sdp76Nh9w2vuG3LfetbmU6vMk5GGE6g-BnbmM9JGZpd6nodgyQp8VGjOriyzsZmu26Q3GAL50FePPcoFnuEuC4Rz4uGnHhIwyVPY_SZDxCtfTQnIqGJsI7lmL5deDqblNkohcqvV?key=9k6dzsWOzaKbURgLL39dAQ" width="1162" height="346" alt="Cyberspace Awareness Month Graphic"></p> <h2>Phishing - A Pervasive Threat</h2> <p>October is Cybersecurity Awareness Month, highlighting the importance of cybersecurity and the steps you can take to help protect yourself, your family, and UAH. This year we will have a different theme for each week:</p> <ul> <li>Week 1 - Phishing</li> <li>Week 2 - Cyber Threats</li> <li>Week 3 - Protecting Yourself While Working Remotely</li> <li>Week 4 - Incident Response - What to Do When You See Something</li> </ul> <p>If you鈥檝e read previous cybersecurity newsletters or previous years鈥 Cybersecurity Awareness Month articles you will recognize the phishing topic as being one that I have mentioned before. So if I鈥檝e mentioned it before, why should I write about it again? It鈥檚 because phishing is the most common type of attack that is used to target UAH faculty, staff, and students. UAH receives thousands of potential phishing emails every day and more than 99% of them are caught and either prevented from reaching your inbox or are removed automatically when the Google anti-phishing and anti-spam analysis is completed.</p> <p>However, no solution is perfect and chances are that you will eventually receive a phishing email in your inbox. It is critical that you keep a wary eye out for signs that an email is not legitimate. To assist you, here are some signs that can indicate that an email is actually a phishing threat.</p> <h3>Look for the [External] tag at the beginning of the subject line.</h3> <p>Any email that does not originate from a uah.edu email address will have [External] at the beginning of the subject line. Many safe and legitimate email messages come from external email systems. The [External] tag does not automatically mean the message is a scam, but it does provide additional information about the message source. The [External] tag means you need to carefully examine this email before you respond or take action.</p> <p>Phishing emails are getting more sophisticated and harder to detect but the [External] tag confirms that this email did not come from a UAH email address. Emails that offer jobs, internships, or requesting sensitive information, should never have an 鈥淸External]鈥 tag in the subject line.</p> <p>For example, if your subject line says 鈥淩equest for Information鈥 then it originates from a UAH email address and has a high chance of being legitimate but if that same email鈥檚 subject line is 鈥淸External] Request for information鈥 then this email has a higher chance of being a phishing email.</p> <p>The [External] tag is implemented to help protect your account from possibly being compromised as well as protect the University.</p> <h3>Look at the 鈥淔rom:鈥 address</h3> <p>By policy, all official UAH communication will originate from a UAH email account. The information after the 鈥淍鈥 symbol in an email address indicates the domain and anything not 鈥渦ah.edu鈥 after the 鈥淍鈥 symbol should be a cause for additional scrutiny. Chances are these emails will have the [External] label at the beginning of the subject line but it鈥檚 better to be safe than sorry.</p> <p>How do you know it is a UAH account? The from address will look like <a href="mailto:">abc123@uah.edu</a> or <a href="mailto:">mailto:first.last@uah.edu</a>. Official UAH email won鈥檛 come from <a href="mailto:">DrJohnSmith@gmail.com</a> or <a href="mailto:">JaneCharger.uah@att.net</a>. Not even Google employees use the Gmail domain for official correspondence.</p> <p>If the domain does not match the apparent sender of the email, the email is almost certainly not legitimate. For example, if the sender is Floyd.Carter@.optonline.net but the email is signed, "Dr. Lori Charger," it is almost certainly a scam.</p> <h3>Look for these indicators that an email may not be genuine</h3> <p>Although there are many different types of phishing emails, most of them rely on a common set of characteristics to trick users into replying or responding. Remember to stop, think, and verify information before you click.</p> <ol> <li>Some phishing scams use a sense of urgency such as claiming you need to take immediate action to keep your account or the person is requesting sensitive information and needs it right away.</li> <li>Some phishing scams play on fear. The email could contain threats or fear-mongering such as warnings that your account will be closed or that you have been referred to law enforcement. One scam we鈥檝e seen recently was trying to state that the recipient had a past-due wireless bill of $3,138.</li> <li>Some phishing scams will play on greed by offering limited-time offers for exclusive deals, or discounts and prices that are too good to be true. A recent phishing scam we saw was offering iPads for sale for $15.</li> <li>Some phishing scams use personal details to try to make them seem more legitimate. The list of UAH faculty and staff is available on public websites and newer AI-based phishing techniques can even use information published on social media sites such as Instagram, LinkedIn, Reddit, and other sites as part of a targeted phishing campaign.</li> </ol> <p>If you receive an email you believe to be phishing, do not respond to the message. In Google Mail, it is possible to mark the email as phishing or you can add a message to your spam filter for unwanted messages by clicking the 鈥淩eport Spam鈥 button.</p> <p>If you are at all unsure about the legitimacy of an email, you should err on the side of caution and do not provide any information. Instead, contact the purported individual who sent the email in person or over the phone to verify the email is legitimate. Also, you can forward the email to the OIT Help Desk at <a href="mailto:helpdesk@uah.edu">helpdesk@uah.edu</a> for more assistance.</p> <p>By remaining vigilant against phishing emails, you can help UAH stay <strong>#ChargerSecure</strong></p> <p><img src="/" alt=""></p><p><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXe-YPhWii_ygGA0KAa3Sdp76Nh9w2vuG3LfetbmU6vMk5GGE6g-BnbmM9JGZpd6nodgyQp8VGjOriyzsZmu26Q3GAL50FePPcoFnuEuC4Rz4uGnHhIwyVPY_SZDxCtfTQnIqGJsI7lmL5deDqblNkohcqvV?key=9k6dzsWOzaKbURgLL39dAQ" width="1162" height="346" alt="Cyberspace Awareness Month Graphic"></p> <h2>Phishing - A Pervasive Threat</h2> <p>October is Cybersecurity Awareness Month, highlighting the importance of cybersecurity and the steps you can take to help protect yourself, your family, and UAH. This year we will have a different theme for each week:</p> <ul> <li>Week 1 - Phishing</li> <li>Week 2 - Cyber Threats</li> <li>Week 3 - Protecting Yourself While Working Remotely</li> <li>Week 4 - Incident Response - What to Do When You See Something</li> </ul> <p>If you鈥檝e read previous cybersecurity newsletters or previous years鈥 Cybersecurity Awareness Month articles you will recognize the phishing topic as being one that I have mentioned before. So if I鈥檝e mentioned it before, why should I write about it again? It鈥檚 because phishing is the most common type of attack that is used to target UAH faculty, staff, and students. UAH receives thousands of potential phishing emails every day and more than 99% of them are caught and either prevented from reaching your inbox or are removed automatically when the Google anti-phishing and anti-spam analysis is completed.</p> <p>However, no solution is perfect and chances are that you will eventually receive a phishing email in your inbox. It is critical that you keep a wary eye out for signs that an email is not legitimate. To assist you, here are some signs that can indicate that an email is actually a phishing threat.</p> <h3>Look for the [External] tag at the beginning of the subject line.</h3> <p>Any email that does not originate from a uah.edu email address will have [External] at the beginning of the subject line. Many safe and legitimate email messages come from external email systems. The [External] tag does not automatically mean the message is a scam, but it does provide additional information about the message source. The [External] tag means you need to carefully examine this email before you respond or take action.</p> <p>Phishing emails are getting more sophisticated and harder to detect but the [External] tag confirms that this email did not come from a UAH email address. Emails that offer jobs, internships, or requesting sensitive information, should never have an 鈥淸External]鈥 tag in the subject line.</p> <p>For example, if your subject line says 鈥淩equest for Information鈥 then it originates from a UAH email address and has a high chance of being legitimate but if that same email鈥檚 subject line is 鈥淸External] Request for information鈥 then this email has a higher chance of being a phishing email.</p> <p>The [External] tag is implemented to help protect your account from possibly being compromised as well as protect the University.</p> <h3>Look at the 鈥淔rom:鈥 address</h3> <p>By policy, all official UAH communication will originate from a UAH email account. The information after the 鈥淍鈥 symbol in an email address indicates the domain and anything not 鈥渦ah.edu鈥 after the 鈥淍鈥 symbol should be a cause for additional scrutiny. Chances are these emails will have the [External] label at the beginning of the subject line but it鈥檚 better to be safe than sorry.</p> <p>How do you know it is a UAH account? The from address will look like <a href="mailto:">abc123@uah.edu</a> or <a href="mailto:">mailto:first.last@uah.edu</a>. Official UAH email won鈥檛 come from <a href="mailto:">DrJohnSmith@gmail.com</a> or <a href="mailto:">JaneCharger.uah@att.net</a>. Not even Google employees use the Gmail domain for official correspondence.</p> <p>If the domain does not match the apparent sender of the email, the email is almost certainly not legitimate. For example, if the sender is Floyd.Carter@.optonline.net but the email is signed, "Dr. Lori Charger," it is almost certainly a scam.</p> <h3>Look for these indicators that an email may not be genuine</h3> <p>Although there are many different types of phishing emails, most of them rely on a common set of characteristics to trick users into replying or responding. Remember to stop, think, and verify information before you click.</p> <ol> <li>Some phishing scams use a sense of urgency such as claiming you need to take immediate action to keep your account or the person is requesting sensitive information and needs it right away.</li> <li>Some phishing scams play on fear. The email could contain threats or fear-mongering such as warnings that your account will be closed or that you have been referred to law enforcement. One scam we鈥檝e seen recently was trying to state that the recipient had a past-due wireless bill of $3,138.</li> <li>Some phishing scams will play on greed by offering limited-time offers for exclusive deals, or discounts and prices that are too good to be true. A recent phishing scam we saw was offering iPads for sale for $15.</li> <li>Some phishing scams use personal details to try to make them seem more legitimate. The list of UAH faculty and staff is available on public websites and newer AI-based phishing techniques can even use information published on social media sites such as Instagram, LinkedIn, Reddit, and other sites as part of a targeted phishing campaign.</li> </ol> <p>If you receive an email you believe to be phishing, do not respond to the message. In Google Mail, it is possible to mark the email as phishing or you can add a message to your spam filter for unwanted messages by clicking the 鈥淩eport Spam鈥 button.</p> <p>If you are at all unsure about the legitimacy of an email, you should err on the side of caution and do not provide any information. Instead, contact the purported individual who sent the email in person or over the phone to verify the email is legitimate. Also, you can forward the email to the OIT Help Desk at <a href="mailto:helpdesk@uah.edu">helpdesk@uah.edu</a> for more assistance.</p> <p>By remaining vigilant against phishing emails, you can help UAH stay <strong>#ChargerSecure</strong></p> Computer Hardware Assessment 2024-04-05T09:38:20-05:00 2024-04-05T09:38:20-05:00 /oit/news/18513-oit-news <p>The Office of Information Technology (OIT) previously announced that as of October 1, 2024, support will end for hardware that is 5 years old or older.</p> <p>During the month of March, OIT will:</p> <ul> <li>Provide instructions for steps that you can take to determine the age of the laptop or desktop that has been issued to you.</li> <li>Provide details regarding the process for requesting help with the procurement of a replacement computer.&nbsp;</li> </ul> <p>If the computer you use is (or will soon be) in need of replacement, you are encouraged to begin the process of ordering a new computer as soon as possible to allow for the purchase, delivery, and configuration of the new device by October 1, 2024. Each department is responsible for purchasing the necessary equipment; OIT is available to offer assistance throughout the process.</p> <p>If the computer is less than 5 years old, you are encouraged to set a reminder on your calendar to replace your computer before it exceeds the age of 5 years.</p> <p>For more information, please see&nbsp;<a href="/images/administrative/oit/oit-device-support-standards.pdf"></a><a href="/images/administrative/oit/oit-device-support-standards.pdf">/images/administrative/oit/oit-device-support-standards.pdf</a></p> <p>The Office of Information Technology (OIT) previously announced that as of October 1, 2024, support will end for hardware that is 5 years old or older.</p> <p>During the month of March, OIT will:</p> <ul> <li>Provide instructions for steps that you can take to determine the age of the laptop or desktop that has been issued to you.</li> <li>Provide details regarding the process for requesting help with the procurement of a replacement computer.&nbsp;</li> </ul> <p>If the computer you use is (or will soon be) in need of replacement, you are encouraged to begin the process of ordering a new computer as soon as possible to allow for the purchase, delivery, and configuration of the new device by October 1, 2024. Each department is responsible for purchasing the necessary equipment; OIT is available to offer assistance throughout the process.</p> <p>If the computer is less than 5 years old, you are encouraged to set a reminder on your calendar to replace your computer before it exceeds the age of 5 years.</p> <p>For more information, please see&nbsp;<a href="/images/administrative/oit/oit-device-support-standards.pdf"></a><a href="/images/administrative/oit/oit-device-support-standards.pdf">/images/administrative/oit/oit-device-support-standards.pdf</a></p> OIT Quarterly Newsletter - April 2024 2024-04-04T08:56:30-05:00 2024-04-04T08:56:30-05:00 /oit/news/18505-oit-quarterly-newsletter-april-2024 <table border="0" cellpadding="0" cellspacing="0" class="m_3752818937302764087row-1"> <tbody> <tr> <td> <table border="0" cellpadding="0" cellspacing="0" class="m_3752818937302764087row-content m_3752818937302764087stack"> <tbody> <tr> <td class="m_3752818937302764087column m_3752818937302764087column-1"> <table border="0" cellpadding="0" cellspacing="0" class="m_3752818937302764087image_block m_3752818937302764087block-1"> <tbody> <tr> <td class="m_3752818937302764087pad"> <p><img height="auto" src="https://ci3.googleusercontent.com/meips/ADKq_NanAJwKC_RZdR6MktncHab3upY90m-na9gWP3MBaTbRBESdj5PA_ARMhcO4JaDwSNqxS7BvevSXgqqb969emwOEm9NJdiqNhppT0CaYJcCFlxfpV_VnUXTp3p_fs7DD1GVmfBxmEaOx8J4wRLA=s0-d-e1-ft#https://d31hzlhk6di2h5.cloudfront.net/20240404/b7/e6/fa/67/2559f07e74534028325e30b6.png" width="175" class="CToWUd a6T" data-bit="iit" alt="UAH information technology logo"></p> </td> </tr> </tbody> </table> </td> <td class="m_3752818937302764087column"> <table border="0" cellpadding="0" cellspacing="0" class="m_3752818937302764087image_block m_3752818937302764087block-1"> <tbody> <tr> <td class="m_3752818937302764087pad"> <p><img height="auto" src="https://ci3.googleusercontent.com/meips/ADKq_NbfB35emm7pABYCDro_gznwI-7thLNma_DHfyRDVfAkJJMYjWDBwy9pOukCIKK_qSxKVlzIE3lVJlUn1EIOxsSKQCYExW31zfSNbvrHFxKmL6YXSTztP6KM9oDObsaaAXSpv2lmORrdPiuuBbg=s0-d-e1-ft#https://d31hzlhk6di2h5.cloudfront.net/20240404/f5/40/3e/45/083c579e813c84495587e6ae.jpg" width="175" class="CToWUd a6T" data-bit="iit" alt="UAH Charger Village exterior"></p> </td> </tr> </tbody> </table> </td> <td class="m_3752818937302764087column m_3752818937302764087column-3"> <table border="0" cellpadding="10" cellspacing="0" class="m_3752818937302764087heading_block m_3752818937302764087block-1"> <tbody> <tr> <td class="m_3752818937302764087pad"> <h1>Quarterly Newsletter April, 2024</h1> </td> </tr> </tbody> </table> </td> </tr> </tbody> </table> </td> </tr> </tbody> </table> <table border="0" cellpadding="0" cellspacing="0"> <tbody> <tr> <td> <table border="0" cellpadding="0" cellspacing="0" class="m_3752818937302764087row-content m_3752818937302764087stack"> <tbody> <tr> <td class="m_3752818937302764087column m_3752818937302764087column-1"> <table border="0" cellpadding="10" cellspacing="0" class="m_3752818937302764087mobile_hide m_3752818937302764087block-1"> <tbody> <tr> <td class="m_3752818937302764087pad"> <table border="0" cellpadding="0" cellspacing="0"> <tbody> <tr> <td>鈥</td> </tr> </tbody> </table> </td> </tr> </tbody> </table> </td> </tr> </tbody> </table> </td> </tr> </tbody> </table> <table border="0" cellpadding="0" cellspacing="0" class="m_3752818937302764087row-3"> <tbody> <tr> <td> <table border="0" cellpadding="0" cellspacing="0" class="m_3752818937302764087row-content m_3752818937302764087stack"> <tbody> <tr> <td class="m_3752818937302764087column m_3752818937302764087column-1"> <table border="0" cellpadding="0" cellspacing="0" class="m_3752818937302764087heading_block m_3752818937302764087block-1"> <tbody> <tr> <td class="m_3752818937302764087pad"> <h1><strong>From the CIO</strong></h1> </td> </tr> </tbody> </table> <table border="0" cellpadding="0" cellspacing="0"> <tbody> <tr> <td class="m_3752818937302764087pad"> <p><strong>Malcolm Rice</strong></p> </td> </tr> </tbody> </table> <table border="0" cellpadding="0" cellspacing="0"> <tbody> <tr> <td class="m_3752818937302764087pad"> <p>In our commitment to providing efficient support, the Office of Information Technology (OIT) offers various methods of assistance. Understanding the purpose of each can enhance your experience and ensure timely resolution of your queries.<strong>Communication Methods</strong></p> <p>&nbsp;</p> <p>1.&nbsp; Phone calls and direct emails to our Help Desk</p> <ul> <li aria-level="1">Effective for quick queries or direct communication with OIT.</li> <li aria-level="1">256-824-3333 /&nbsp;<a href="mailto:helpdesk@uah.edu"></a><a href="mailto:helpdesk@uah.edu">helpdesk@uah.edu</a></li> </ul> <p>2.&nbsp;<a href="https://t.e2ma.net/click/iqx99i/i6pexslc/uj04u3" data-saferedirecturl="https://www.google.com/url?q=https://t.e2ma.net/click/iqx99i/i6pexslc/uj04u3&amp;source=gmail&amp;ust=1712323541400000&amp;usg=AOvVaw21fTAY91VSl_oaea21Gxuk">OIT Client Portal</a>:</p> <ul> <li aria-level="1">For computer-related issues (repairs, software installations) or problems with OIT-supported applications like Banner.</li> <li aria-level="1">Access instructional articles and self-help solutions.</li> </ul> <p>3.&nbsp;<a href="https://ours.uah.edu/Login.html" data-saferedirecturl="https://www.google.com/url?q=https://ours.uah.edu/Login.html&amp;source=gmail&amp;ust=1712323541400000&amp;usg=AOvVaw2wb9ihH35kQB77_exppOgT">On-Line User Request System</a>&nbsp;(OURS)</p> <ul> <li aria-level="1">Ideal for requesting specific data (e.g., Excel spreadsheets).</li> <li aria-level="1">Users on campus can coordinate with data custodians to submit requests on THEIR behalf.</li> <li aria-level="1">Data custodians, as subject matter experts, facilitate accurate information retrieval.</li> </ul> <p>4.&nbsp;<a href="https://t.e2ma.net/click/iqx99i/i6pexslc/q414u3" data-saferedirecturl="https://www.google.com/url?q=https://t.e2ma.net/click/iqx99i/i6pexslc/q414u3&amp;source=gmail&amp;ust=1712323541400000&amp;usg=AOvVaw29NbLuzNdVMRzmzAkQFIUb">OIT Project Site</a>:</p> <ul> <li aria-level="1">Use the Project Intake Form on this platform for project-related requests.</li> <li aria-level="1">Initiating a request in this location triggers a discovery meeting to understand your project details.</li> <li aria-level="1">Enables efficient scheduling and resource allocation.</li> </ul> <p><strong>Benefits</strong></p> <ul> <li aria-level="1">Efficiency: <ul> <li aria-level="2">Streamlined processes for specific needs result in faster response times.</li> </ul> </li> <li aria-level="1">Centralized Communication: <ul> <li aria-level="2">Prevents emails from getting lost in individual inboxes.</li> <li aria-level="2">All relevant information and communications are consolidated in one place.</li> </ul> </li> </ul> <p><strong>How to Choose?</strong></p> <ul> <li aria-level="1">Quick Queries<strong>:&nbsp;</strong>Traditional channels (Phone Calls, Direct Emails).</li> <li aria-level="1">Specific Data Requests: On-Line User Request System (OURS).</li> <li aria-level="1">Issues with Computer or OIT-Supported Applications: OIT Client Portal.</li> <li aria-level="1">Project-related Requests<strong>:</strong>&nbsp;<a href="https://t.e2ma.net/click/iqx99i/i6pexslc/6w24u3" data-saferedirecturl="https://www.google.com/url?q=https://t.e2ma.net/click/iqx99i/i6pexslc/6w24u3&amp;source=gmail&amp;ust=1712323541400000&amp;usg=AOvVaw0lS6TkULK3TLXm_aEWwecO">OIT Project Site</a>.</li> </ul> <p>By choosing the right method, you not only ensure your request is promptly addressed but also contribute to a more organized and efficient support process.</p> <p>&nbsp;</p> </td> </tr> </tbody> </table> <table border="0" cellpadding="5" cellspacing="0" class="m_3752818937302764087heading_block m_3752818937302764087block-4"> <tbody> <tr> <td class="m_3752818937302764087pad"> <h1>Projects</h1> </td> </tr> </tbody> </table> <table border="0" cellpadding="0" cellspacing="0"> <tbody> <tr> <td class="m_3752818937302764087pad"> <p>As we enter the new year, a priority will be on completing the transition from Self-Service Banner (SSB) 8 to the more modern and user-friendly Self-Service Banner 9. You might have already experienced the enhanced interface in applications such as Leave Balances (Employee), Budget Query (Finance), Personal Information (General), and Student Profile (Student).</p> <p>We are actively working with various departments to implement the remaining applications of SSB 9, including Timesheets, Requisitions, and Registration.&nbsp;</p> <p>Stay tuned for updates on additional SSB 9 applications, and thank you for your cooperation as we strive to enhance your user experience.</p> <p>You can visit the&nbsp;<a href="https://t.e2ma.net/click/iqx99i/i6pexslc/mp34u3" data-saferedirecturl="https://www.google.com/url?q=https://t.e2ma.net/click/iqx99i/i6pexslc/mp34u3&amp;source=gmail&amp;ust=1712323541400000&amp;usg=AOvVaw1-DkQDnCuY_fumeeKc6ogi">OIT Project Site</a>&nbsp;to view a list of the current open projects.&nbsp;</p> </td> </tr> </tbody> </table> <table border="0" cellpadding="10" cellspacing="0"> <tbody> <tr> <td class="m_3752818937302764087pad"> <table border="0" cellpadding="0" cellspacing="0"> <tbody> <tr> <td>鈥</td> </tr> </tbody> </table> </td> </tr> </tbody> </table> <table border="0" cellpadding="0" cellspacing="0" class="m_3752818937302764087heading_block m_3752818937302764087block-7"> <tbody> <tr> <td class="m_3752818937302764087pad"> <h1>Cybersecurity</h1> </td> </tr> </tbody> </table> <table border="0" cellpadding="0" cellspacing="0"> <tbody> <tr> <td class="m_3752818937302764087pad"> <p><strong>Jeremy Shelley, CISO</strong></p> </td> </tr> </tbody> </table> <table border="0" cellpadding="0" cellspacing="0"> <tbody> <tr> <td class="m_3752818937302764087pad"> <p><strong><a href="https://t.e2ma.net/click/iqx99i/i6pexslc/2h44u3" data-saferedirecturl="https://www.google.com/url?q=https://t.e2ma.net/click/iqx99i/i6pexslc/2h44u3&amp;source=gmail&amp;ust=1712323541400000&amp;usg=AOvVaw2mrxHk_yEmLfSX-Q1K-H24"><strong>2024 Annual Cybersecurity Awareness Training Course is Now Live!</strong></a></strong></p> <p>&nbsp;</p> <p>&nbsp;</p> <p>UAH faces more threats than ever before. From phishing scams to ransomware attacks, cyber threats are constantly evolving, putting UAH鈥檚 systems and data at risk.&nbsp;</p> <p><strong>&nbsp;</strong></p> <p>We're excited to announce the 2024 Cybersecurity Awareness Refresher Training Course is live and available at&nbsp;<a href="https://t.e2ma.net/click/iqx99i/i6pexslc/ia54u3" data-saferedirecturl="https://www.google.com/url?q=https://t.e2ma.net/click/iqx99i/i6pexslc/ia54u3&amp;source=gmail&amp;ust=1712323541400000&amp;usg=AOvVaw2J5seI4hXzzCwNqiYrhBRI"></a><a href="https://uah.instructure.com/courses/74623">https://uah.instructure.com/courses/74623</a>. All employees will receive a reminder email in the coming weeks to complete the course. The course consists of a short video and PowerPoint presentation.&nbsp; This training is required for all faculty and staff and must be completed by 12/15/2024.</p> <p><strong>&nbsp;</strong></p> <p><strong>Reminder:&nbsp; Your UAH Email is intended for UAH Business</strong></p> <p>&nbsp;</p> <p>This is your friendly reminder that UAH policy states that your UAH email account is intended ONLY for official university business. Please do not use your UAH email account for personal business such as your personal bank information or recovery email for access to personal sites. Using your UAH account in this way could lead to a compromise of your account, unauthorized access to UAH data, or loss of access to these other accounts should you no longer work for UAH.&nbsp;</p> <p><strong>&nbsp;</strong></p> <p><strong>Watch Out for Tax-Based Phishing Emails</strong></p> <p>&nbsp;</p> <p>A number of educational institutions in the US are reporting phishing attempts against faculty, staff, and students by individuals attempting to collect personal information and even steal money from you. These phishing attempts will say they are from some tax service, consumer advocacy group, taxpayer advocacy panel or even pose as the Internal Revenue Service.&nbsp; Many times these emails will contain false links to claim tax credits, collect a refund, or contest a bill you may have with the IRS. These emails may even contain personal information such as the last four digits of your social security number, relevant dollar amounts, or your home address.&nbsp;&nbsp;</p> <p><strong>&nbsp;</strong></p> <p>If you receive such a phishing email:</p> <ul> <li aria-level="1">Don鈥檛 reply to the email.</li> <li aria-level="1">Don鈥檛 open any attachments to the email.</li> <li aria-level="1">If the email claims to be from the IRS, contact the IRS to verify its legitimacy or go to&nbsp;<a href="https://t.e2ma.net/click/iqx99i/i6pexslc/y254u3" data-saferedirecturl="https://www.google.com/url?q=https://t.e2ma.net/click/iqx99i/i6pexslc/y254u3&amp;source=gmail&amp;ust=1712323541400000&amp;usg=AOvVaw3Yp__DZWzRmovU9bmhgb80"></a><a href="https://www.irs.gov/privacy-disclosure/report-phishing">https://www.irs.gov/privacy-disclosure/report-phishing</a>&nbsp;for more information.</li> </ul> </td> </tr> </tbody> </table> <table border="0" cellpadding="10" cellspacing="0"> <tbody> <tr> <td class="m_3752818937302764087pad"> <table border="0" cellpadding="0" cellspacing="0"> <tbody> <tr> <td>鈥</td> </tr> </tbody> </table> </td> </tr> </tbody> </table> <table border="0" cellpadding="0" cellspacing="0" class="m_3752818937302764087heading_block m_3752818937302764087block-11"> <tbody> <tr> <td class="m_3752818937302764087pad"> <h1>Client Services</h1> </td> </tr> </tbody> </table> <table border="0" cellpadding="0" cellspacing="0"> <tbody> <tr> <td class="m_3752818937302764087pad"> <p><strong>Wendy Worlund, Director</strong></p> </td> </tr> </tbody> </table> <table border="0" cellpadding="0" cellspacing="0"> <tbody> <tr> <td class="m_3752818937302764087pad"> <p>The&nbsp;<a href="https://t.e2ma.net/click/iqx99i/i6pexslc/ev64u3" data-saferedirecturl="https://www.google.com/url?q=https://t.e2ma.net/click/iqx99i/i6pexslc/ev64u3&amp;source=gmail&amp;ust=1712323541400000&amp;usg=AOvVaw0bJiBGDgoCs9QdqxiTOYbv">OIT Client Portal</a>&nbsp;not only contains a list of services we offer and a collection of helpful articles. It can be used to submit a new ticket, view the status of your tickets, and see our contact information and the calendar of maintenance events (where you鈥檒l see scheduled downtime for OIT services). Please add a bookmark to your favorite web browser and visit&nbsp;<a href="https://t.e2ma.net/click/iqx99i/i6pexslc/un74u3" data-saferedirecturl="https://www.google.com/url?q=https://t.e2ma.net/click/iqx99i/i6pexslc/un74u3&amp;source=gmail&amp;ust=1712323541400000&amp;usg=AOvVaw2U-kJf-0XNEf_xvQDieqEp">uah.edu/ithelp</a>&nbsp;when you need information about UAH IT.</p> <p>&nbsp;</p> <p>In the top right corner, make sure you鈥檙e already signed in (you鈥檒l see your name if you are). We encourage you to click&nbsp;<strong>Chat With an Agent</strong>&nbsp;for immediate assistance, explore our articles, browse our services, and more! If you click&nbsp;<strong>View My Requests</strong>&nbsp;in the&nbsp;<em>My Tickets</em>&nbsp;box, you can see details and add comments or update open ones.</p> </td> </tr> </tbody> </table> <table border="0" cellpadding="0" cellspacing="0" class="m_3752818937302764087heading_block m_3752818937302764087block-14"> <tbody> <tr> <td class="m_3752818937302764087pad"> <h1>End Of Life</h1> </td> </tr> </tbody> </table> <table border="0" cellpadding="0" cellspacing="0"> <tbody> <tr> <td class="m_3752818937302764087pad"> <p>The Office of Information Technology (OIT) previously announced that as of October 1, 2024, support will end for hardware that is 5 years old or older.</p> <p>&nbsp;</p> <p>To prepare for the enforcement of OIT鈥檚 Device Support Standards, those using UAH-owned devices should take steps to evaluate their device's support life and make arrangements to replace the device if necessary.</p> <p>&nbsp;</p> <p>Please visit&nbsp;<a href="https://t.e2ma.net/click/iqx99i/i6pexslc/ag84u3" data-saferedirecturl="https://www.google.com/url?q=https://t.e2ma.net/click/iqx99i/i6pexslc/ag84u3&amp;source=gmail&amp;ust=1712323541400000&amp;usg=AOvVaw15zu3SJM33gHIfRt09iBRA">What to Know About OIT鈥檚 Support Standards</a>&nbsp;to learn how to estimate the age of your device and what to do if your device is approaching the end of its support life. We provide full instructions in this article, including information about how to purchase a new computer.</p> <p><br>Need to evaluate the support status of a Dell computer or other Dell device? Enter your Dell service tag(s) at&nbsp;<a href="https://t.e2ma.net/click/iqx99i/i6pexslc/q884u3" data-saferedirecturl="https://www.google.com/url?q=https://t.e2ma.net/click/iqx99i/i6pexslc/q884u3&amp;source=gmail&amp;ust=1712323541400000&amp;usg=AOvVaw3yW5jasD1kdLxVlH2ZzQHB">pclookup.uah.edu</a>&nbsp;to quickly determine the support status of your device(s).</p> <p>&nbsp;</p> </td> </tr> </tbody> </table> <table border="0" cellpadding="10" cellspacing="0"> <tbody> <tr> <td class="m_3752818937302764087pad"> <table border="0" cellpadding="0" cellspacing="0"> <tbody> <tr> <td>鈥</td> </tr> </tbody> </table> </td> </tr> </tbody> </table> <table border="0" cellpadding="0" cellspacing="0" class="m_3752818937302764087heading_block m_3752818937302764087block-17"> <tbody> <tr> <td class="m_3752818937302764087pad"> <h1>Infrastructure Update</h1> </td> </tr> </tbody> </table> <table border="0" cellpadding="0" cellspacing="0"> <tbody> <tr> <td class="m_3752818937302764087pad"> <p><strong>Michael Turner, Director</strong></p> </td> </tr> </tbody> </table> <table border="0" cellpadding="0" cellspacing="0"> <tbody> <tr> <td class="m_3752818937302764087pad"> <p>&nbsp;</p> <p>In the near future, the Infrastructure Team will begin the process of removing the legacy 鈥5鈥 (Staff5, Student5, Faculty5, etc.) wireless networks from production access points, and we ask you to start utilizing the 鈥淓duroam鈥 or 鈥淯AH Get Connected鈥 wireless networks instead. If you have problems utilizing 鈥淓duroam鈥 or 鈥淯AH Get Connected,鈥 please open a ticket with the help desk.</p> <p>&nbsp;</p> <p>The Infrastructure Team has been working to enhance and expand the wireless network coverage; however, if you are having an issue with wireless coverage, opening a ticket with the help desk will help us identify and address areas where service is lacking.</p> <p>&nbsp;</p> <p>Additionally, please inform the Infrastructure Team via a ticket if you discover damage to any network jacks or wall plates in your offices across campus. Once we are notified, we will come and repair the jack.</p> </td> </tr> </tbody> </table> <table border="0" cellpadding="10" cellspacing="0"> <tbody> <tr> <td class="m_3752818937302764087pad"> <table border="0" cellpadding="0" cellspacing="0"> <tbody> <tr> <td>鈥</td> </tr> </tbody> </table> </td> </tr> </tbody> </table> <table border="0" cellpadding="0" cellspacing="0" class="m_3752818937302764087heading_block m_3752818937302764087block-21"> <tbody> <tr> <td class="m_3752818937302764087pad"> <h1><strong>Enterprise&nbsp;Applications</strong></h1> </td> </tr> </tbody> </table> <table border="0" cellpadding="0" cellspacing="0"> <tbody> <tr> <td class="m_3752818937302764087pad"> <p><strong>William Eubank, Director</strong></p> </td> </tr> </tbody> </table> <table border="0" cellpadding="0" cellspacing="0"> <tbody> <tr> <td class="m_3752818937302764087pad"> <p>Google is enhancing the Calendar appointment scheduling experience with new features.&nbsp; For those unfamiliar with appointment schedules, you can:</p> <ul> <li aria-level="1">Create and share booking pages so people can book time with you</li> <li aria-level="1">View booked appointments alongside your schedule in Google Calendar</li> <li>More information can be found at the following links:</li> </ul> <p><a href="https://t.e2ma.net/click/iqx99i/i6pexslc/6094u3" data-saferedirecturl="https://www.google.com/url?q=https://t.e2ma.net/click/iqx99i/i6pexslc/6094u3&amp;source=gmail&amp;ust=1712323541400000&amp;usg=AOvVaw1BykPChme0Sk9xWtd5xKDz">Learn about appointment schedules in Google Calendar</a></p> <p>&nbsp;</p> <p>&nbsp;</p> <p><a href="https://t.e2ma.net/click/iqx99i/i6pexslc/mta5u3" data-saferedirecturl="https://www.google.com/url?q=https://t.e2ma.net/click/iqx99i/i6pexslc/mta5u3&amp;source=gmail&amp;ust=1712323541400000&amp;usg=AOvVaw1HLh4jQoCZ_wg5piR9O1oc">Improving the Google Calendar appointment scheduling experience with new features</a></p> </td> </tr> </tbody> </table> </td> </tr> </tbody> </table> </td> </tr> </tbody> </table> <table border="0" cellpadding="0" cellspacing="0"> <tbody> <tr> <td> <table border="0" cellpadding="0" cellspacing="0" class="m_3752818937302764087row-content m_3752818937302764087stack"> <tbody> <tr> <td class="m_3752818937302764087column m_3752818937302764087column-1"> <table border="0" cellpadding="0" cellspacing="0" class="m_3752818937302764087image_block m_3752818937302764087block-1"> <tbody> <tr> <td class="m_3752818937302764087pad"> <p><img height="auto" src="https://ci3.googleusercontent.com/meips/ADKq_NYqEBQjt2t5yQSesP0HtZb6I-UFSB4ya8-QXM2tfmuSq1i8TxvM5ed0KdGGiucCj5zD8aBds-J6FU2qk1-8opc1A-qVUm7C-HuUnZFWNpRcalZhl2bM5m_HKD5HZSx7-8FPkAC8LDIpfdipM1v5Ig=s0-d-e1-ft#https://emma-assets.s3.amazonaws.com/y60fb/33413520e7718fd2cdd944e2bec6c24a/download.jfif" width="131.25" class="CToWUd" data-bit="iit" alt="the Google logo"></p> </td> </tr> </tbody> </table> </td> <td class="m_3752818937302764087column"> <table border="0" cellpadding="0" cellspacing="0" class="m_3752818937302764087image_block m_3752818937302764087block-1"> <tbody> <tr> <td class="m_3752818937302764087pad"> <p><img alt="a Google Calendar display window" height="auto" src="https://ci3.googleusercontent.com/meips/ADKq_NYtOme0RH1ospsENywVHj53m3CQuaV3Dqq-BtHrjzjsmiHxG1nbLAD41T0fodd0eNafD-Yr8FfSAfmK1jM_t5gVYk5Z6Ufy9n_lGL0urJa1H3k2-DyCm4qjEOZ2FC92-yUqrphpeoRypCiKpw0=s0-d-e1-ft#https://d31hzlhk6di2h5.cloudfront.net/20240404/ba/9e/08/c3/72063cb8bdb84ae1650a5965.jpg" width="295.312" class="CToWUd a6T" data-bit="iit"></p> </td> </tr> </tbody> </table> </td> </tr> </tbody> </table> </td> </tr> </tbody> </table> <table border="0" cellpadding="0" cellspacing="0"> <tbody> <tr> <td> <table border="0" cellpadding="0" cellspacing="0" class="m_3752818937302764087row-content m_3752818937302764087stack"> <tbody> <tr> <td class="m_3752818937302764087column m_3752818937302764087column-1"> <table border="0" cellpadding="10" cellspacing="0" class="m_3752818937302764087block-1"> <tbody> <tr> <td class="m_3752818937302764087pad"> <table border="0" cellpadding="0" cellspacing="0"> <tbody> <tr> <td>鈥</td> </tr> </tbody> </table> </td> </tr> </tbody> </table> <table border="0" cellpadding="0" cellspacing="0" class="m_3752818937302764087image_block"> <tbody> <tr> <td class="m_3752818937302764087pad"> <p><img height="auto" src="https://ci3.googleusercontent.com/meips/ADKq_NZ6cUNZR86fwQv7UWLeMv4X1MDc9MveiiuJ9Iv0xs9nZ7s3M41lhWrutn9gbH0a7o7f44KaFgrfpvaENUrzAXOQvwkSbJXgFrBnPPmWse1MeVT7u8uVFxyynmzb1ZHtibVMBp4nwMc-v1DifBk=s0-d-e1-ft#https://d31hzlhk6di2h5.cloudfront.net/20240404/c6/18/38/c9/fe55d7e82f2e686c653e1a86.jpg" width="515" class="CToWUd a6T" data-bit="iit" alt="a keyboard with a key that says tips and tricks with a lightbulb"></p> </td> </tr> </tbody> </table> <table border="0" cellpadding="0" cellspacing="0"> <tbody> <tr> <td class="m_3752818937302764087pad"> <ul> <li>Did you know that Finance has a learning page where you can access training videos and PowerPoints?&nbsp; Check out this&nbsp;<a href="https://t.e2ma.net/click/iqx99i/i6pexslc/2lb5u3" data-saferedirecturl="https://www.google.com/url?q=https://t.e2ma.net/click/iqx99i/i6pexslc/2lb5u3&amp;source=gmail&amp;ust=1712323541400000&amp;usg=AOvVaw1R_OmwrBWoWDpNYTeccqWp">link</a>&nbsp;to learn more about your budget, and transfers!&nbsp;&nbsp;</li> </ul> <p>&nbsp;</p> </td> </tr> </tbody> </table> <table border="0" cellpadding="0" cellspacing="0" class="m_3752818937302764087image_block m_3752818937302764087block-4"> <tbody> <tr> <td class="m_3752818937302764087pad"> <p><img height="auto" src="https://ci3.googleusercontent.com/meips/ADKq_NaBZMhJkVx6nXTmDasraVgvPq9OSLewEvE0ByH1lvmkGPR7kv2TVvYK1O2AjZTkUSojPHdzIRYi69RoJErIZIHuaJIhiaKO31Nn49KDDksgpZvPJQjdrwb6l9kZJzbc1IZ2dK23lbCSoXTzkGA=s0-d-e1-ft#https://d31hzlhk6di2h5.cloudfront.net/20240404/97/39/7f/9f/f53c3194f38f3f08e9712486.png" width="515" class="CToWUd a6T" data-bit="iit" alt="the word kudos with lots of thumbs ups"></p> </td> </tr> </tbody> </table> <table border="0" cellpadding="0" cellspacing="0"> <tbody> <tr> <td class="m_3752818937302764087pad"> <ul> <li aria-level="1">Congratulations Kelly Jo Lyle for being promoted to Software Developer III. We value your hard work and commitment to UAH! Thank you for all you do!</li> <li aria-level="1">Congratulations Hunter Fuller for being promoted to Network Engineer IV / Lead Network Engineer. Thank you for all your dedication and hard work supporting university network operations!</li> <li aria-level="1">Congratulations to Mike Kleystueber in his retirement from UAH! Please join OIT in congratulating him on this achievement.</li> </ul> </td> </tr> </tbody> </table> <table border="0" cellpadding="0" cellspacing="0" class="m_3752818937302764087image_block"> <tbody> <tr> <td class="m_3752818937302764087pad"> <p><img height="auto" src="https://ci3.googleusercontent.com/meips/ADKq_NYwUSTrGSDOPoDytkD3Q2IwaXmpi80rB3FbkDySHYGJfogfhHXUS5T6DEH7dQ2JqfokuaBUhFflLgFftdoVCfkVIMCzLqDeetbza7HWx6Pk3LGBhi4C0Gv7Ohw6lJVnKu2lTuFn8LsfV2Q6Wtk=s0-d-e1-ft#https://d31hzlhk6di2h5.cloudfront.net/20240404/98/47/dd/0a/bc3a3e1c8f33dbf5e023044d.png" width="515" class="CToWUd a6T" data-bit="iit" alt="the text &quot;welcome aboard&quot; in blue"></p> </td> </tr> </tbody> </table> <table border="0" cellpadding="0" cellspacing="0" class="m_3752818937302764087block-7"> <tbody> <tr> <td class="m_3752818937302764087pad"> <ul> <li>Sai Kaniganti, Software Developer II</li> </ul> </td> </tr> </tbody> </table> <table border="0" cellpadding="10" cellspacing="0"> <tbody> <tr> <td class="m_3752818937302764087pad"> <table border="0" cellpadding="0" cellspacing="0"> <tbody> <tr> <td>鈥</td> </tr> </tbody> </table> </td> </tr> </tbody> </table> <table border="0" cellpadding="0" cellspacing="0" class="m_3752818937302764087menu_block"> <tbody> <tr> <td class="m_3752818937302764087pad"> <table border="0" cellpadding="0" cellspacing="0"> <tbody> <tr> <td> <p class="m_3752818937302764087menu-links"><a href="https://t.e2ma.net/click/iqx99i/i6pexslc/iec5u3" data-saferedirecturl="https://www.google.com/url?q=https://t.e2ma.net/click/iqx99i/i6pexslc/iec5u3&amp;source=gmail&amp;ust=1712323541400000&amp;usg=AOvVaw3rqfTG1lMJvC2BY3BVFtUB">OIT Client Portal</a>&nbsp;<a href="https://t.e2ma.net/click/iqx99i/i6pexslc/y6c5u3" data-saferedirecturl="https://www.google.com/url?q=https://t.e2ma.net/click/iqx99i/i6pexslc/y6c5u3&amp;source=gmail&amp;ust=1712323541401000&amp;usg=AOvVaw3FK0K6suPopTbXd_kuq-34">Banner Upgrade Center</a>&nbsp;<a href="https://t.e2ma.net/click/iqx99i/i6pexslc/ezd5u3" data-saferedirecturl="https://www.google.com/url?q=https://t.e2ma.net/click/iqx99i/i6pexslc/ezd5u3&amp;source=gmail&amp;ust=1712323541401000&amp;usg=AOvVaw2dEEvXzZitlakWDmT725-V">OIT Project Site</a></p> </td> </tr> </tbody> </table> </td> </tr> </tbody> </table> <table border="0" cellpadding="10" cellspacing="0"> <tbody> <tr> <td class="m_3752818937302764087pad"> <p>Let us know if there is a topic you would like OIT to cover by sending an email to&nbsp;<a href="mailto:oit@uah.edu"></a><a href="mailto:oit@uah.edu">oit@uah.edu</a>.</p> </td> </tr> </tbody> </table> </td> </tr> </tbody> </table> </td> </tr> </tbody> </table> <table border="0" cellpadding="0" cellspacing="0" class="m_3752818937302764087row-1"> <tbody> <tr> <td> <table border="0" cellpadding="0" cellspacing="0" class="m_3752818937302764087row-content m_3752818937302764087stack"> <tbody> <tr> <td class="m_3752818937302764087column m_3752818937302764087column-1"> <table border="0" cellpadding="0" cellspacing="0" class="m_3752818937302764087image_block m_3752818937302764087block-1"> <tbody> <tr> <td class="m_3752818937302764087pad"> <p><img height="auto" src="https://ci3.googleusercontent.com/meips/ADKq_NanAJwKC_RZdR6MktncHab3upY90m-na9gWP3MBaTbRBESdj5PA_ARMhcO4JaDwSNqxS7BvevSXgqqb969emwOEm9NJdiqNhppT0CaYJcCFlxfpV_VnUXTp3p_fs7DD1GVmfBxmEaOx8J4wRLA=s0-d-e1-ft#https://d31hzlhk6di2h5.cloudfront.net/20240404/b7/e6/fa/67/2559f07e74534028325e30b6.png" width="175" class="CToWUd a6T" data-bit="iit" alt="UAH information technology logo"></p> </td> </tr> </tbody> </table> </td> <td class="m_3752818937302764087column"> <table border="0" cellpadding="0" cellspacing="0" class="m_3752818937302764087image_block m_3752818937302764087block-1"> <tbody> <tr> <td class="m_3752818937302764087pad"> <p><img height="auto" src="https://ci3.googleusercontent.com/meips/ADKq_NbfB35emm7pABYCDro_gznwI-7thLNma_DHfyRDVfAkJJMYjWDBwy9pOukCIKK_qSxKVlzIE3lVJlUn1EIOxsSKQCYExW31zfSNbvrHFxKmL6YXSTztP6KM9oDObsaaAXSpv2lmORrdPiuuBbg=s0-d-e1-ft#https://d31hzlhk6di2h5.cloudfront.net/20240404/f5/40/3e/45/083c579e813c84495587e6ae.jpg" width="175" class="CToWUd a6T" data-bit="iit" alt="UAH Charger Village exterior"></p> </td> </tr> </tbody> </table> </td> <td class="m_3752818937302764087column m_3752818937302764087column-3"> <table border="0" cellpadding="10" cellspacing="0" class="m_3752818937302764087heading_block m_3752818937302764087block-1"> <tbody> <tr> <td class="m_3752818937302764087pad"> <h1>Quarterly Newsletter April, 2024</h1> </td> </tr> </tbody> </table> </td> </tr> </tbody> </table> </td> </tr> </tbody> </table> <table border="0" cellpadding="0" cellspacing="0"> <tbody> <tr> <td> <table border="0" cellpadding="0" cellspacing="0" class="m_3752818937302764087row-content m_3752818937302764087stack"> <tbody> <tr> <td class="m_3752818937302764087column m_3752818937302764087column-1"> <table border="0" cellpadding="10" cellspacing="0" class="m_3752818937302764087mobile_hide m_3752818937302764087block-1"> <tbody> <tr> <td class="m_3752818937302764087pad"> <table border="0" cellpadding="0" cellspacing="0"> <tbody> <tr> <td>鈥</td> </tr> </tbody> </table> </td> </tr> </tbody> </table> </td> </tr> </tbody> </table> </td> </tr> </tbody> </table> <table border="0" cellpadding="0" cellspacing="0" class="m_3752818937302764087row-3"> <tbody> <tr> <td> <table border="0" cellpadding="0" cellspacing="0" class="m_3752818937302764087row-content m_3752818937302764087stack"> <tbody> <tr> <td class="m_3752818937302764087column m_3752818937302764087column-1"> <table border="0" cellpadding="0" cellspacing="0" class="m_3752818937302764087heading_block m_3752818937302764087block-1"> <tbody> <tr> <td class="m_3752818937302764087pad"> <h1><strong>From the CIO</strong></h1> </td> </tr> </tbody> </table> <table border="0" cellpadding="0" cellspacing="0"> <tbody> <tr> <td class="m_3752818937302764087pad"> <p><strong>Malcolm Rice</strong></p> </td> </tr> </tbody> </table> <table border="0" cellpadding="0" cellspacing="0"> <tbody> <tr> <td class="m_3752818937302764087pad"> <p>In our commitment to providing efficient support, the Office of Information Technology (OIT) offers various methods of assistance. Understanding the purpose of each can enhance your experience and ensure timely resolution of your queries.<strong>Communication Methods</strong></p> <p>&nbsp;</p> <p>1.&nbsp; Phone calls and direct emails to our Help Desk</p> <ul> <li aria-level="1">Effective for quick queries or direct communication with OIT.</li> <li aria-level="1">256-824-3333 /&nbsp;<a href="mailto:helpdesk@uah.edu"></a><a href="mailto:helpdesk@uah.edu">helpdesk@uah.edu</a></li> </ul> <p>2.&nbsp;<a href="https://t.e2ma.net/click/iqx99i/i6pexslc/uj04u3" data-saferedirecturl="https://www.google.com/url?q=https://t.e2ma.net/click/iqx99i/i6pexslc/uj04u3&amp;source=gmail&amp;ust=1712323541400000&amp;usg=AOvVaw21fTAY91VSl_oaea21Gxuk">OIT Client Portal</a>:</p> <ul> <li aria-level="1">For computer-related issues (repairs, software installations) or problems with OIT-supported applications like Banner.</li> <li aria-level="1">Access instructional articles and self-help solutions.</li> </ul> <p>3.&nbsp;<a href="https://ours.uah.edu/Login.html" data-saferedirecturl="https://www.google.com/url?q=https://ours.uah.edu/Login.html&amp;source=gmail&amp;ust=1712323541400000&amp;usg=AOvVaw2wb9ihH35kQB77_exppOgT">On-Line User Request System</a>&nbsp;(OURS)</p> <ul> <li aria-level="1">Ideal for requesting specific data (e.g., Excel spreadsheets).</li> <li aria-level="1">Users on campus can coordinate with data custodians to submit requests on THEIR behalf.</li> <li aria-level="1">Data custodians, as subject matter experts, facilitate accurate information retrieval.</li> </ul> <p>4.&nbsp;<a href="https://t.e2ma.net/click/iqx99i/i6pexslc/q414u3" data-saferedirecturl="https://www.google.com/url?q=https://t.e2ma.net/click/iqx99i/i6pexslc/q414u3&amp;source=gmail&amp;ust=1712323541400000&amp;usg=AOvVaw29NbLuzNdVMRzmzAkQFIUb">OIT Project Site</a>:</p> <ul> <li aria-level="1">Use the Project Intake Form on this platform for project-related requests.</li> <li aria-level="1">Initiating a request in this location triggers a discovery meeting to understand your project details.</li> <li aria-level="1">Enables efficient scheduling and resource allocation.</li> </ul> <p><strong>Benefits</strong></p> <ul> <li aria-level="1">Efficiency: <ul> <li aria-level="2">Streamlined processes for specific needs result in faster response times.</li> </ul> </li> <li aria-level="1">Centralized Communication: <ul> <li aria-level="2">Prevents emails from getting lost in individual inboxes.</li> <li aria-level="2">All relevant information and communications are consolidated in one place.</li> </ul> </li> </ul> <p><strong>How to Choose?</strong></p> <ul> <li aria-level="1">Quick Queries<strong>:&nbsp;</strong>Traditional channels (Phone Calls, Direct Emails).</li> <li aria-level="1">Specific Data Requests: On-Line User Request System (OURS).</li> <li aria-level="1">Issues with Computer or OIT-Supported Applications: OIT Client Portal.</li> <li aria-level="1">Project-related Requests<strong>:</strong>&nbsp;<a href="https://t.e2ma.net/click/iqx99i/i6pexslc/6w24u3" data-saferedirecturl="https://www.google.com/url?q=https://t.e2ma.net/click/iqx99i/i6pexslc/6w24u3&amp;source=gmail&amp;ust=1712323541400000&amp;usg=AOvVaw0lS6TkULK3TLXm_aEWwecO">OIT Project Site</a>.</li> </ul> <p>By choosing the right method, you not only ensure your request is promptly addressed but also contribute to a more organized and efficient support process.</p> <p>&nbsp;</p> </td> </tr> </tbody> </table> <table border="0" cellpadding="5" cellspacing="0" class="m_3752818937302764087heading_block m_3752818937302764087block-4"> <tbody> <tr> <td class="m_3752818937302764087pad"> <h1>Projects</h1> </td> </tr> </tbody> </table> <table border="0" cellpadding="0" cellspacing="0"> <tbody> <tr> <td class="m_3752818937302764087pad"> <p>As we enter the new year, a priority will be on completing the transition from Self-Service Banner (SSB) 8 to the more modern and user-friendly Self-Service Banner 9. You might have already experienced the enhanced interface in applications such as Leave Balances (Employee), Budget Query (Finance), Personal Information (General), and Student Profile (Student).</p> <p>We are actively working with various departments to implement the remaining applications of SSB 9, including Timesheets, Requisitions, and Registration.&nbsp;</p> <p>Stay tuned for updates on additional SSB 9 applications, and thank you for your cooperation as we strive to enhance your user experience.</p> <p>You can visit the&nbsp;<a href="https://t.e2ma.net/click/iqx99i/i6pexslc/mp34u3" data-saferedirecturl="https://www.google.com/url?q=https://t.e2ma.net/click/iqx99i/i6pexslc/mp34u3&amp;source=gmail&amp;ust=1712323541400000&amp;usg=AOvVaw1-DkQDnCuY_fumeeKc6ogi">OIT Project Site</a>&nbsp;to view a list of the current open projects.&nbsp;</p> </td> </tr> </tbody> </table> <table border="0" cellpadding="10" cellspacing="0"> <tbody> <tr> <td class="m_3752818937302764087pad"> <table border="0" cellpadding="0" cellspacing="0"> <tbody> <tr> <td>鈥</td> </tr> </tbody> </table> </td> </tr> </tbody> </table> <table border="0" cellpadding="0" cellspacing="0" class="m_3752818937302764087heading_block m_3752818937302764087block-7"> <tbody> <tr> <td class="m_3752818937302764087pad"> <h1>Cybersecurity</h1> </td> </tr> </tbody> </table> <table border="0" cellpadding="0" cellspacing="0"> <tbody> <tr> <td class="m_3752818937302764087pad"> <p><strong>Jeremy Shelley, CISO</strong></p> </td> </tr> </tbody> </table> <table border="0" cellpadding="0" cellspacing="0"> <tbody> <tr> <td class="m_3752818937302764087pad"> <p><strong><a href="https://t.e2ma.net/click/iqx99i/i6pexslc/2h44u3" data-saferedirecturl="https://www.google.com/url?q=https://t.e2ma.net/click/iqx99i/i6pexslc/2h44u3&amp;source=gmail&amp;ust=1712323541400000&amp;usg=AOvVaw2mrxHk_yEmLfSX-Q1K-H24"><strong>2024 Annual Cybersecurity Awareness Training Course is Now Live!</strong></a></strong></p> <p>&nbsp;</p> <p>&nbsp;</p> <p>UAH faces more threats than ever before. From phishing scams to ransomware attacks, cyber threats are constantly evolving, putting UAH鈥檚 systems and data at risk.&nbsp;</p> <p><strong>&nbsp;</strong></p> <p>We're excited to announce the 2024 Cybersecurity Awareness Refresher Training Course is live and available at&nbsp;<a href="https://t.e2ma.net/click/iqx99i/i6pexslc/ia54u3" data-saferedirecturl="https://www.google.com/url?q=https://t.e2ma.net/click/iqx99i/i6pexslc/ia54u3&amp;source=gmail&amp;ust=1712323541400000&amp;usg=AOvVaw2J5seI4hXzzCwNqiYrhBRI"></a><a href="https://uah.instructure.com/courses/74623">https://uah.instructure.com/courses/74623</a>. All employees will receive a reminder email in the coming weeks to complete the course. The course consists of a short video and PowerPoint presentation.&nbsp; This training is required for all faculty and staff and must be completed by 12/15/2024.</p> <p><strong>&nbsp;</strong></p> <p><strong>Reminder:&nbsp; Your UAH Email is intended for UAH Business</strong></p> <p>&nbsp;</p> <p>This is your friendly reminder that UAH policy states that your UAH email account is intended ONLY for official university business. Please do not use your UAH email account for personal business such as your personal bank information or recovery email for access to personal sites. Using your UAH account in this way could lead to a compromise of your account, unauthorized access to UAH data, or loss of access to these other accounts should you no longer work for UAH.&nbsp;</p> <p><strong>&nbsp;</strong></p> <p><strong>Watch Out for Tax-Based Phishing Emails</strong></p> <p>&nbsp;</p> <p>A number of educational institutions in the US are reporting phishing attempts against faculty, staff, and students by individuals attempting to collect personal information and even steal money from you. These phishing attempts will say they are from some tax service, consumer advocacy group, taxpayer advocacy panel or even pose as the Internal Revenue Service.&nbsp; Many times these emails will contain false links to claim tax credits, collect a refund, or contest a bill you may have with the IRS. These emails may even contain personal information such as the last four digits of your social security number, relevant dollar amounts, or your home address.&nbsp;&nbsp;</p> <p><strong>&nbsp;</strong></p> <p>If you receive such a phishing email:</p> <ul> <li aria-level="1">Don鈥檛 reply to the email.</li> <li aria-level="1">Don鈥檛 open any attachments to the email.</li> <li aria-level="1">If the email claims to be from the IRS, contact the IRS to verify its legitimacy or go to&nbsp;<a href="https://t.e2ma.net/click/iqx99i/i6pexslc/y254u3" data-saferedirecturl="https://www.google.com/url?q=https://t.e2ma.net/click/iqx99i/i6pexslc/y254u3&amp;source=gmail&amp;ust=1712323541400000&amp;usg=AOvVaw3Yp__DZWzRmovU9bmhgb80"></a><a href="https://www.irs.gov/privacy-disclosure/report-phishing">https://www.irs.gov/privacy-disclosure/report-phishing</a>&nbsp;for more information.</li> </ul> </td> </tr> </tbody> </table> <table border="0" cellpadding="10" cellspacing="0"> <tbody> <tr> <td class="m_3752818937302764087pad"> <table border="0" cellpadding="0" cellspacing="0"> <tbody> <tr> <td>鈥</td> </tr> </tbody> </table> </td> </tr> </tbody> </table> <table border="0" cellpadding="0" cellspacing="0" class="m_3752818937302764087heading_block m_3752818937302764087block-11"> <tbody> <tr> <td class="m_3752818937302764087pad"> <h1>Client Services</h1> </td> </tr> </tbody> </table> <table border="0" cellpadding="0" cellspacing="0"> <tbody> <tr> <td class="m_3752818937302764087pad"> <p><strong>Wendy Worlund, Director</strong></p> </td> </tr> </tbody> </table> <table border="0" cellpadding="0" cellspacing="0"> <tbody> <tr> <td class="m_3752818937302764087pad"> <p>The&nbsp;<a href="https://t.e2ma.net/click/iqx99i/i6pexslc/ev64u3" data-saferedirecturl="https://www.google.com/url?q=https://t.e2ma.net/click/iqx99i/i6pexslc/ev64u3&amp;source=gmail&amp;ust=1712323541400000&amp;usg=AOvVaw0bJiBGDgoCs9QdqxiTOYbv">OIT Client Portal</a>&nbsp;not only contains a list of services we offer and a collection of helpful articles. It can be used to submit a new ticket, view the status of your tickets, and see our contact information and the calendar of maintenance events (where you鈥檒l see scheduled downtime for OIT services). Please add a bookmark to your favorite web browser and visit&nbsp;<a href="https://t.e2ma.net/click/iqx99i/i6pexslc/un74u3" data-saferedirecturl="https://www.google.com/url?q=https://t.e2ma.net/click/iqx99i/i6pexslc/un74u3&amp;source=gmail&amp;ust=1712323541400000&amp;usg=AOvVaw2U-kJf-0XNEf_xvQDieqEp">uah.edu/ithelp</a>&nbsp;when you need information about UAH IT.</p> <p>&nbsp;</p> <p>In the top right corner, make sure you鈥檙e already signed in (you鈥檒l see your name if you are). We encourage you to click&nbsp;<strong>Chat With an Agent</strong>&nbsp;for immediate assistance, explore our articles, browse our services, and more! If you click&nbsp;<strong>View My Requests</strong>&nbsp;in the&nbsp;<em>My Tickets</em>&nbsp;box, you can see details and add comments or update open ones.</p> </td> </tr> </tbody> </table> <table border="0" cellpadding="0" cellspacing="0" class="m_3752818937302764087heading_block m_3752818937302764087block-14"> <tbody> <tr> <td class="m_3752818937302764087pad"> <h1>End Of Life</h1> </td> </tr> </tbody> </table> <table border="0" cellpadding="0" cellspacing="0"> <tbody> <tr> <td class="m_3752818937302764087pad"> <p>The Office of Information Technology (OIT) previously announced that as of October 1, 2024, support will end for hardware that is 5 years old or older.</p> <p>&nbsp;</p> <p>To prepare for the enforcement of OIT鈥檚 Device Support Standards, those using UAH-owned devices should take steps to evaluate their device's support life and make arrangements to replace the device if necessary.</p> <p>&nbsp;</p> <p>Please visit&nbsp;<a href="https://t.e2ma.net/click/iqx99i/i6pexslc/ag84u3" data-saferedirecturl="https://www.google.com/url?q=https://t.e2ma.net/click/iqx99i/i6pexslc/ag84u3&amp;source=gmail&amp;ust=1712323541400000&amp;usg=AOvVaw15zu3SJM33gHIfRt09iBRA">What to Know About OIT鈥檚 Support Standards</a>&nbsp;to learn how to estimate the age of your device and what to do if your device is approaching the end of its support life. We provide full instructions in this article, including information about how to purchase a new computer.</p> <p><br>Need to evaluate the support status of a Dell computer or other Dell device? Enter your Dell service tag(s) at&nbsp;<a href="https://t.e2ma.net/click/iqx99i/i6pexslc/q884u3" data-saferedirecturl="https://www.google.com/url?q=https://t.e2ma.net/click/iqx99i/i6pexslc/q884u3&amp;source=gmail&amp;ust=1712323541400000&amp;usg=AOvVaw3yW5jasD1kdLxVlH2ZzQHB">pclookup.uah.edu</a>&nbsp;to quickly determine the support status of your device(s).</p> <p>&nbsp;</p> </td> </tr> </tbody> </table> <table border="0" cellpadding="10" cellspacing="0"> <tbody> <tr> <td class="m_3752818937302764087pad"> <table border="0" cellpadding="0" cellspacing="0"> <tbody> <tr> <td>鈥</td> </tr> </tbody> </table> </td> </tr> </tbody> </table> <table border="0" cellpadding="0" cellspacing="0" class="m_3752818937302764087heading_block m_3752818937302764087block-17"> <tbody> <tr> <td class="m_3752818937302764087pad"> <h1>Infrastructure Update</h1> </td> </tr> </tbody> </table> <table border="0" cellpadding="0" cellspacing="0"> <tbody> <tr> <td class="m_3752818937302764087pad"> <p><strong>Michael Turner, Director</strong></p> </td> </tr> </tbody> </table> <table border="0" cellpadding="0" cellspacing="0"> <tbody> <tr> <td class="m_3752818937302764087pad"> <p>&nbsp;</p> <p>In the near future, the Infrastructure Team will begin the process of removing the legacy 鈥5鈥 (Staff5, Student5, Faculty5, etc.) wireless networks from production access points, and we ask you to start utilizing the 鈥淓duroam鈥 or 鈥淯AH Get Connected鈥 wireless networks instead. If you have problems utilizing 鈥淓duroam鈥 or 鈥淯AH Get Connected,鈥 please open a ticket with the help desk.</p> <p>&nbsp;</p> <p>The Infrastructure Team has been working to enhance and expand the wireless network coverage; however, if you are having an issue with wireless coverage, opening a ticket with the help desk will help us identify and address areas where service is lacking.</p> <p>&nbsp;</p> <p>Additionally, please inform the Infrastructure Team via a ticket if you discover damage to any network jacks or wall plates in your offices across campus. Once we are notified, we will come and repair the jack.</p> </td> </tr> </tbody> </table> <table border="0" cellpadding="10" cellspacing="0"> <tbody> <tr> <td class="m_3752818937302764087pad"> <table border="0" cellpadding="0" cellspacing="0"> <tbody> <tr> <td>鈥</td> </tr> </tbody> </table> </td> </tr> </tbody> </table> <table border="0" cellpadding="0" cellspacing="0" class="m_3752818937302764087heading_block m_3752818937302764087block-21"> <tbody> <tr> <td class="m_3752818937302764087pad"> <h1><strong>Enterprise&nbsp;Applications</strong></h1> </td> </tr> </tbody> </table> <table border="0" cellpadding="0" cellspacing="0"> <tbody> <tr> <td class="m_3752818937302764087pad"> <p><strong>William Eubank, Director</strong></p> </td> </tr> </tbody> </table> <table border="0" cellpadding="0" cellspacing="0"> <tbody> <tr> <td class="m_3752818937302764087pad"> <p>Google is enhancing the Calendar appointment scheduling experience with new features.&nbsp; For those unfamiliar with appointment schedules, you can:</p> <ul> <li aria-level="1">Create and share booking pages so people can book time with you</li> <li aria-level="1">View booked appointments alongside your schedule in Google Calendar</li> <li>More information can be found at the following links:</li> </ul> <p><a href="https://t.e2ma.net/click/iqx99i/i6pexslc/6094u3" data-saferedirecturl="https://www.google.com/url?q=https://t.e2ma.net/click/iqx99i/i6pexslc/6094u3&amp;source=gmail&amp;ust=1712323541400000&amp;usg=AOvVaw1BykPChme0Sk9xWtd5xKDz">Learn about appointment schedules in Google Calendar</a></p> <p>&nbsp;</p> <p>&nbsp;</p> <p><a href="https://t.e2ma.net/click/iqx99i/i6pexslc/mta5u3" data-saferedirecturl="https://www.google.com/url?q=https://t.e2ma.net/click/iqx99i/i6pexslc/mta5u3&amp;source=gmail&amp;ust=1712323541400000&amp;usg=AOvVaw1HLh4jQoCZ_wg5piR9O1oc">Improving the Google Calendar appointment scheduling experience with new features</a></p> </td> </tr> </tbody> </table> </td> </tr> </tbody> </table> </td> </tr> </tbody> </table> <table border="0" cellpadding="0" cellspacing="0"> <tbody> <tr> <td> <table border="0" cellpadding="0" cellspacing="0" class="m_3752818937302764087row-content m_3752818937302764087stack"> <tbody> <tr> <td class="m_3752818937302764087column m_3752818937302764087column-1"> <table border="0" cellpadding="0" cellspacing="0" class="m_3752818937302764087image_block m_3752818937302764087block-1"> <tbody> <tr> <td class="m_3752818937302764087pad"> <p><img height="auto" src="https://ci3.googleusercontent.com/meips/ADKq_NYqEBQjt2t5yQSesP0HtZb6I-UFSB4ya8-QXM2tfmuSq1i8TxvM5ed0KdGGiucCj5zD8aBds-J6FU2qk1-8opc1A-qVUm7C-HuUnZFWNpRcalZhl2bM5m_HKD5HZSx7-8FPkAC8LDIpfdipM1v5Ig=s0-d-e1-ft#https://emma-assets.s3.amazonaws.com/y60fb/33413520e7718fd2cdd944e2bec6c24a/download.jfif" width="131.25" class="CToWUd" data-bit="iit" alt="the Google logo"></p> </td> </tr> </tbody> </table> </td> <td class="m_3752818937302764087column"> <table border="0" cellpadding="0" cellspacing="0" class="m_3752818937302764087image_block m_3752818937302764087block-1"> <tbody> <tr> <td class="m_3752818937302764087pad"> <p><img alt="a Google Calendar display window" height="auto" src="https://ci3.googleusercontent.com/meips/ADKq_NYtOme0RH1ospsENywVHj53m3CQuaV3Dqq-BtHrjzjsmiHxG1nbLAD41T0fodd0eNafD-Yr8FfSAfmK1jM_t5gVYk5Z6Ufy9n_lGL0urJa1H3k2-DyCm4qjEOZ2FC92-yUqrphpeoRypCiKpw0=s0-d-e1-ft#https://d31hzlhk6di2h5.cloudfront.net/20240404/ba/9e/08/c3/72063cb8bdb84ae1650a5965.jpg" width="295.312" class="CToWUd a6T" data-bit="iit"></p> </td> </tr> </tbody> </table> </td> </tr> </tbody> </table> </td> </tr> </tbody> </table> <table border="0" cellpadding="0" cellspacing="0"> <tbody> <tr> <td> <table border="0" cellpadding="0" cellspacing="0" class="m_3752818937302764087row-content m_3752818937302764087stack"> <tbody> <tr> <td class="m_3752818937302764087column m_3752818937302764087column-1"> <table border="0" cellpadding="10" cellspacing="0" class="m_3752818937302764087block-1"> <tbody> <tr> <td class="m_3752818937302764087pad"> <table border="0" cellpadding="0" cellspacing="0"> <tbody> <tr> <td>鈥</td> </tr> </tbody> </table> </td> </tr> </tbody> </table> <table border="0" cellpadding="0" cellspacing="0" class="m_3752818937302764087image_block"> <tbody> <tr> <td class="m_3752818937302764087pad"> <p><img height="auto" src="https://ci3.googleusercontent.com/meips/ADKq_NZ6cUNZR86fwQv7UWLeMv4X1MDc9MveiiuJ9Iv0xs9nZ7s3M41lhWrutn9gbH0a7o7f44KaFgrfpvaENUrzAXOQvwkSbJXgFrBnPPmWse1MeVT7u8uVFxyynmzb1ZHtibVMBp4nwMc-v1DifBk=s0-d-e1-ft#https://d31hzlhk6di2h5.cloudfront.net/20240404/c6/18/38/c9/fe55d7e82f2e686c653e1a86.jpg" width="515" class="CToWUd a6T" data-bit="iit" alt="a keyboard with a key that says tips and tricks with a lightbulb"></p> </td> </tr> </tbody> </table> <table border="0" cellpadding="0" cellspacing="0"> <tbody> <tr> <td class="m_3752818937302764087pad"> <ul> <li>Did you know that Finance has a learning page where you can access training videos and PowerPoints?&nbsp; Check out this&nbsp;<a href="https://t.e2ma.net/click/iqx99i/i6pexslc/2lb5u3" data-saferedirecturl="https://www.google.com/url?q=https://t.e2ma.net/click/iqx99i/i6pexslc/2lb5u3&amp;source=gmail&amp;ust=1712323541400000&amp;usg=AOvVaw1R_OmwrBWoWDpNYTeccqWp">link</a>&nbsp;to learn more about your budget, and transfers!&nbsp;&nbsp;</li> </ul> <p>&nbsp;</p> </td> </tr> </tbody> </table> <table border="0" cellpadding="0" cellspacing="0" class="m_3752818937302764087image_block m_3752818937302764087block-4"> <tbody> <tr> <td class="m_3752818937302764087pad"> <p><img height="auto" src="https://ci3.googleusercontent.com/meips/ADKq_NaBZMhJkVx6nXTmDasraVgvPq9OSLewEvE0ByH1lvmkGPR7kv2TVvYK1O2AjZTkUSojPHdzIRYi69RoJErIZIHuaJIhiaKO31Nn49KDDksgpZvPJQjdrwb6l9kZJzbc1IZ2dK23lbCSoXTzkGA=s0-d-e1-ft#https://d31hzlhk6di2h5.cloudfront.net/20240404/97/39/7f/9f/f53c3194f38f3f08e9712486.png" width="515" class="CToWUd a6T" data-bit="iit" alt="the word kudos with lots of thumbs ups"></p> </td> </tr> </tbody> </table> <table border="0" cellpadding="0" cellspacing="0"> <tbody> <tr> <td class="m_3752818937302764087pad"> <ul> <li aria-level="1">Congratulations Kelly Jo Lyle for being promoted to Software Developer III. We value your hard work and commitment to UAH! Thank you for all you do!</li> <li aria-level="1">Congratulations Hunter Fuller for being promoted to Network Engineer IV / Lead Network Engineer. Thank you for all your dedication and hard work supporting university network operations!</li> <li aria-level="1">Congratulations to Mike Kleystueber in his retirement from UAH! Please join OIT in congratulating him on this achievement.</li> </ul> </td> </tr> </tbody> </table> <table border="0" cellpadding="0" cellspacing="0" class="m_3752818937302764087image_block"> <tbody> <tr> <td class="m_3752818937302764087pad"> <p><img height="auto" src="https://ci3.googleusercontent.com/meips/ADKq_NYwUSTrGSDOPoDytkD3Q2IwaXmpi80rB3FbkDySHYGJfogfhHXUS5T6DEH7dQ2JqfokuaBUhFflLgFftdoVCfkVIMCzLqDeetbza7HWx6Pk3LGBhi4C0Gv7Ohw6lJVnKu2lTuFn8LsfV2Q6Wtk=s0-d-e1-ft#https://d31hzlhk6di2h5.cloudfront.net/20240404/98/47/dd/0a/bc3a3e1c8f33dbf5e023044d.png" width="515" class="CToWUd a6T" data-bit="iit" alt="the text &quot;welcome aboard&quot; in blue"></p> </td> </tr> </tbody> </table> <table border="0" cellpadding="0" cellspacing="0" class="m_3752818937302764087block-7"> <tbody> <tr> <td class="m_3752818937302764087pad"> <ul> <li>Sai Kaniganti, Software Developer II</li> </ul> </td> </tr> </tbody> </table> <table border="0" cellpadding="10" cellspacing="0"> <tbody> <tr> <td class="m_3752818937302764087pad"> <table border="0" cellpadding="0" cellspacing="0"> <tbody> <tr> <td>鈥</td> </tr> </tbody> </table> </td> </tr> </tbody> </table> <table border="0" cellpadding="0" cellspacing="0" class="m_3752818937302764087menu_block"> <tbody> <tr> <td class="m_3752818937302764087pad"> <table border="0" cellpadding="0" cellspacing="0"> <tbody> <tr> <td> <p class="m_3752818937302764087menu-links"><a href="https://t.e2ma.net/click/iqx99i/i6pexslc/iec5u3" data-saferedirecturl="https://www.google.com/url?q=https://t.e2ma.net/click/iqx99i/i6pexslc/iec5u3&amp;source=gmail&amp;ust=1712323541400000&amp;usg=AOvVaw3rqfTG1lMJvC2BY3BVFtUB">OIT Client Portal</a>&nbsp;<a href="https://t.e2ma.net/click/iqx99i/i6pexslc/y6c5u3" data-saferedirecturl="https://www.google.com/url?q=https://t.e2ma.net/click/iqx99i/i6pexslc/y6c5u3&amp;source=gmail&amp;ust=1712323541401000&amp;usg=AOvVaw3FK0K6suPopTbXd_kuq-34">Banner Upgrade Center</a>&nbsp;<a href="https://t.e2ma.net/click/iqx99i/i6pexslc/ezd5u3" data-saferedirecturl="https://www.google.com/url?q=https://t.e2ma.net/click/iqx99i/i6pexslc/ezd5u3&amp;source=gmail&amp;ust=1712323541401000&amp;usg=AOvVaw2dEEvXzZitlakWDmT725-V">OIT Project Site</a></p> </td> </tr> </tbody> </table> </td> </tr> </tbody> </table> <table border="0" cellpadding="10" cellspacing="0"> <tbody> <tr> <td class="m_3752818937302764087pad"> <p>Let us know if there is a topic you would like OIT to cover by sending an email to&nbsp;<a href="mailto:oit@uah.edu"></a><a href="mailto:oit@uah.edu">oit@uah.edu</a>.</p> </td> </tr> </tbody> </table> </td> </tr> </tbody> </table> </td> </tr> </tbody> </table> OIT Newsletter 4th Quarter 2023 2024-04-04T08:53:01-05:00 2024-04-04T08:53:01-05:00 /oit/news/18504-oit-newsletter-4th-quarter-2023 <table border="0" cellpadding="0" cellspacing="0" class="m_4513566364523050835row-2"> <tbody> <tr> <td> <table border="0" cellpadding="0" cellspacing="0" class="m_4513566364523050835row-content m_4513566364523050835stack"> <tbody> <tr> <td class="m_4513566364523050835column m_4513566364523050835column-1"> <table border="0" cellpadding="0" cellspacing="0" class="m_4513566364523050835heading_block m_4513566364523050835block-5"> <tbody> <tr> <td class="m_4513566364523050835pad"> <h1>FROM THE CIO</h1> </td> </tr> </tbody> </table> <table border="0" cellpadding="0" cellspacing="0" class="m_4513566364523050835heading_block m_4513566364523050835block-6"> <tbody> <tr> <td class="m_4513566364523050835pad"> <h3><sup>Malcolm Rice</sup></h3> </td> </tr> </tbody> </table> <table border="0" cellpadding="5" cellspacing="0"> <tbody> <tr> <td class="m_4513566364523050835pad"> <p><strong>Service Level Agreement (SLA):</strong></p> <p>OIT has recently developed a Service Level Agreement (SLA) designed to enhance the efficiency and reliability of our technology support services.</p> <p>The SLA serves as a formal commitment from OIT, outlining specific timelines for response and resolution to ensure a more predictable and satisfactory experience for our campus community.</p> <p><strong>SLA Terms</strong>:</p> <p><strong><em>Priority Levels:</em></strong>&nbsp;The SLA defines different priority levels based on the nature and urgency of reported incidents or service requests. This allows us to allocate resources effectively and address critical issues promptly.</p> <p><strong><em>Response Time:</em></strong>&nbsp;The SLA specifies the timeframe within which you can expect an initial response to your tickets.</p> <p><strong><em>Resolution Time:</em></strong>&nbsp;Guidelines are provided regarding the resolution of reported incidents.</p> <p>For detailed information on the terms and conditions of our SLA, click&nbsp;<a href="https://t.e2ma.net/click/iatzii/i6pexslc/m1cku2" data-saferedirecturl="https://www.google.com/url?q=https://t.e2ma.net/click/iatzii/i6pexslc/m1cku2&amp;source=gmail&amp;ust=1712324866890000&amp;usg=AOvVaw3-KCE1W9UZnn5L_m3iRpNK">here</a>.</p> <p><strong>OIT Device Support:</strong></p> <p>It is often time-consuming and a security risk to attempt to support aging UAH-owned devices. Each year, OIT evaluates the current technologies and establishes a level of obsolescence. Devices that are not fully supported will no longer be provided with replacement parts and software, and we will only provide extremely limited support on such devices.</p> <p>With the decreasing cost of computer hardware and the increase in the number of computers on campus, it is often much more cost-effective for the university to replace obsolete equipment than attempt to repair or support it after the manufacturer or vendor no longer can.&nbsp;</p> <p>To give the campus time to replace any devices, enforcement will not begin until October 1, 2024. If you need assistance in determining the status of your device, please enter a ticket by sending an email to&nbsp;<a href="mailto:helpdesk@uah.edu"></a><a href="mailto:helpdesk@uah.edu">helpdesk@uah.edu</a>.</p> <p>For detailed information on our Device Support Standards, visit&nbsp;<a href="https://t.e2ma.net/click/iatzii/i6pexslc/2tdku2" data-saferedirecturl="https://www.google.com/url?q=https://t.e2ma.net/click/iatzii/i6pexslc/2tdku2&amp;source=gmail&amp;ust=1712324866890000&amp;usg=AOvVaw306XLJLpJ1-jwBmA63TEe8">OIT Device Support</a>.</p> <p><strong>Your Feedback Is Important:</strong></p> <p>As we roll out this SLA and the Device Support procedures, we encourage you to provide feedback. Your feedback helps us refine and improve our services to better meet the needs of our campus community.</p> </td> </tr> </tbody> </table> <table border="0" cellpadding="10" cellspacing="0" class="m_4513566364523050835block-8"> <tbody> <tr> <td class="m_4513566364523050835pad"> <table border="0" cellpadding="0" cellspacing="0"> <tbody> <tr> <td>鈥</td> </tr> </tbody> </table> </td> </tr> </tbody> </table> <table border="0" cellpadding="0" cellspacing="0" class="m_4513566364523050835image_block"> <tbody> <tr> <td class="m_4513566364523050835pad"> <p><img src="https://ci3.googleusercontent.com/meips/ADKq_NZpc5wOFNA6NNjzg3j6DXM3B4i0GDg_cS5scIcRcotQrWINeHoS-_ZP9yR9ZmMSrSQ36VW7L7lhCD3H0JIcVtbSUBXaxOwFKxF3du8I9FaF8oHauuZ6Up5YdtaCU7KHMQUIz_qZQoovEQjksRc=s0-d-e1-ft#https://d31hzlhk6di2h5.cloudfront.net/20231201/c4/5b/df/d3/6fd8ad7c464d2b940495f730.jpg" width="574" class="CToWUd" data-bit="iit" alt="rainbow text that says welcome aboard"></p> </td> </tr> </tbody> </table> <table border="0" cellpadding="10" cellspacing="0"> <tbody> <tr> <td class="m_4513566364523050835pad"> <ul> <li>Van Hudson, Help Desk Technician</li> <li>Ryan Pounders, Software Developer I</li> <li>Rhianna O'Reilly, Help Desk Technician</li> </ul> </td> </tr> </tbody> </table> <table border="0" cellpadding="10" cellspacing="0"> <tbody> <tr> <td class="m_4513566364523050835pad"> <p>We are so happy to have you here, and wish you well in your careers!</p> </td> </tr> </tbody> </table> <table border="0" cellpadding="10" cellspacing="0"> <tbody> <tr> <td class="m_4513566364523050835pad"> <table border="0" cellpadding="0" cellspacing="0"> <tbody> <tr> <td>鈥</td> </tr> </tbody> </table> </td> </tr> </tbody> </table> <table border="0" cellpadding="0" cellspacing="0" class="m_4513566364523050835image_block"> <tbody> <tr> <td class="m_4513566364523050835pad"> <p><img src="https://ci3.googleusercontent.com/meips/ADKq_NbRyDFORkQ4kmoNuqUSvKIg0eAJm6tm6Jh5kK3he0V6lgDoNt4M6vtwCYBhOYM7RI5nuKM0t9lQUaXAtSolVpmRHsqFqtMw2DMN5LD5NgQ683BWozwBv7OZJtpNkc_eWxI9vqRTjGtpb1t9fCs=s0-d-e1-ft#https://d31hzlhk6di2h5.cloudfront.net/20231201/9d/4c/44/21/7d58156569c44cf534679fb4.png" width="575" class="CToWUd a6T" data-bit="iit" alt="a picture of a lock with the word security next to it"></p> </td> </tr> </tbody> </table> <table border="0" cellpadding="0" cellspacing="0" class="m_4513566364523050835heading_block m_4513566364523050835block-14"> <tbody> <tr> <td class="m_4513566364523050835pad"> <h3>Jeremy Shelley, CISO</h3> </td> </tr> </tbody> </table> <table border="0" cellpadding="5" cellspacing="0" class="m_4513566364523050835block-15"> <tbody> <tr> <td class="m_4513566364523050835pad"> <p><strong>Required Annual Cybersecurity Training Reminder</strong></p> <p>If you have not yet completed the annual cybersecurity training course on Canvas, please do so ASAP. The deadline for completion is December 1st.</p> <p><strong>Automated Application Patching on Primary UAH Domain</strong></p> <p>Beginning December 11th, OIT will begin automatically applying patches and updates to installed applications on Windows 10 and 11 systems in the primary UAH campus domain (DS domain). We have been testing this process within OIT, and on computers in the Nursing Department, Library, and the College of Engineering with no negative repercussions reported.</p> <p>Our Cyberinsurance carrier has asked UAH to meet an aggressive patch schedule with critical vulnerabilities patched within 7 days.</p> <p>This automatic patching will reduce the number of vulnerabilities on UAH systems, improving the security for the entire university.</p> <p><strong>How It Works</strong></p> <p>When a new patch for an application is made available, OIT will publish it to computers in the primary UAH campus domain (DS domain) to be downloaded within 7 days. For those rare application updates that require a restart of your computer, you will be prompted to restart your system and can choose to delay the restart by up to 5 days.&nbsp;</p> <p>You will see alerts like the one below on Windows 10 (the alerts for Windows 11 are similar).</p> </td> </tr> </tbody> </table> <table border="0" cellpadding="0" cellspacing="0" class="m_4513566364523050835image_block"> <tbody> <tr> <td class="m_4513566364523050835pad"> <p><img src="https://ci3.googleusercontent.com/meips/ADKq_NZx2kCC4msuno-jPhx7ltwaIgsBmVAHGa3FZ8zUojNFaoufxgt0lgfTOZJcQxW7TEdYcX6KfcK3EbQIgS93cQX9EwhA1jnFfeY4mu5qvWebdpKaB1ozXTLRt6EZBt16TnBb9RvbtI3ZxP84Lmk=s0-d-e1-ft#https://d31hzlhk6di2h5.cloudfront.net/20231201/cc/7a/45/d7/beccc6f9aca71f36cc3c5966.png" width="575" class="CToWUd a6T" data-bit="iit" alt="a notification appearing on one's screen from IT"></p> </td> </tr> </tbody> </table> <table border="0" cellpadding="10" cellspacing="0"> <tbody> <tr> <td class="m_4513566364523050835pad"> <p>These alerts are not indicative of a virus infection and are labeled with the UAH OIT logo. While these updates are a new process and the temptation may be to ignore these notifications, it is critically important that you allow these updates to be installed to avoid a forced installation at an inconvenient time.</p> </td> </tr> </tbody> </table> <table border="0" cellpadding="10" cellspacing="0"> <tbody> <tr> <td class="m_4513566364523050835pad"> <table border="0" cellpadding="0" cellspacing="0"> <tbody> <tr> <td>鈥</td> </tr> </tbody> </table> </td> </tr> </tbody> </table> <table border="0" cellpadding="5" cellspacing="0" class="m_4513566364523050835heading_block m_4513566364523050835block-19"> <tbody> <tr> <td class="m_4513566364523050835pad"> <h1>CLIENT SERVICES</h1> </td> </tr> </tbody> </table> <table border="0" cellpadding="0" cellspacing="0" class="m_4513566364523050835heading_block m_4513566364523050835block-20"> <tbody> <tr> <td class="m_4513566364523050835pad"> <h3>Wendy Worlund, Director</h3> </td> </tr> </tbody> </table> <table border="0" cellpadding="10" cellspacing="0"> <tbody> <tr> <td class="m_4513566364523050835pad"> <p><strong>Reminders about Multi-Factor Authentication</strong></p> <p aria-level="1">Google 2-Step Verification is similar to but&nbsp;<em>separate from</em>&nbsp;Duo. Both utilize a second factor (commonly a mobile device) to add an extra layer of security to your UAH accounts. For any SSO systems like Canvas and myUAH, Duo is required. For any Google Workspace products like Gmail and Drive, you will use Google 2-Step. Keep reading for more examples.</p> </td> </tr> </tbody> </table> </td> </tr> </tbody> </table> </td> </tr> </tbody> </table> <table border="0" cellpadding="0" cellspacing="0" class="m_4513566364523050835row-3"> <tbody> <tr> <td> <table border="0" cellpadding="0" cellspacing="0" class="m_4513566364523050835row-content m_4513566364523050835stack"> <tbody> <tr> <td class="m_4513566364523050835column m_4513566364523050835column-1"> <table border="0" cellpadding="0" cellspacing="0" class="m_4513566364523050835heading_block m_4513566364523050835block-1"> <tbody> <tr> <td class="m_4513566364523050835pad"> <h3>Duo</h3> </td> </tr> </tbody> </table> <table border="0" cellpadding="10" cellspacing="0" class="m_4513566364523050835block-2"> <tbody> <tr> <td class="m_4513566364523050835pad"> <ul> <li>myUAH</li> <li>Banner</li> <li>Canvas</li> <li>See others in&nbsp;<a href="https://t.e2ma.net/click/iatzii/i6pexslc/imeku2" data-saferedirecturl="https://www.google.com/url?q=https://t.e2ma.net/click/iatzii/i6pexslc/imeku2&amp;source=gmail&amp;ust=1712324866890000&amp;usg=AOvVaw05TDZ0bRgIsSnbHycEkEzd">this article</a></li> </ul> </td> </tr> </tbody> </table> </td> <td class="m_4513566364523050835column m_4513566364523050835column-2"> <table border="0" cellpadding="0" cellspacing="0" class="m_4513566364523050835heading_block m_4513566364523050835block-1"> <tbody> <tr> <td class="m_4513566364523050835pad"> <h3>Google 2-Step Verification</h3> </td> </tr> </tbody> </table> <table border="0" cellpadding="10" cellspacing="0" class="m_4513566364523050835block-2"> <tbody> <tr> <td class="m_4513566364523050835pad"> <ul> <li>Gmail</li> <li>Google Drive</li> <li>Google Calendar</li> <li>Google Docs, Slides, Sheets</li> </ul> </td> </tr> </tbody> </table> </td> </tr> </tbody> </table> </td> </tr> </tbody> </table> <table border="0" cellpadding="0" cellspacing="0" class="m_4513566364523050835row-4"> <tbody> <tr> <td> <table border="0" cellpadding="0" cellspacing="0" class="m_4513566364523050835row-content m_4513566364523050835stack"> <tbody> <tr> <td class="m_4513566364523050835column m_4513566364523050835column-1"> <table border="0" cellpadding="10" cellspacing="0" class="m_4513566364523050835block-1"> <tbody> <tr> <td class="m_4513566364523050835pad"> <p aria-level="1">Duo allows you to manage your devices easily and at any time. Please see&nbsp;<a href="https://t.e2ma.net/click/iatzii/i6pexslc/yefku2" data-saferedirecturl="https://www.google.com/url?q=https://t.e2ma.net/click/iatzii/i6pexslc/yefku2&amp;source=gmail&amp;ust=1712324866890000&amp;usg=AOvVaw14ct3FGb4CjzWs_QD1zTxB"></a><a href="https://uah.teamdynamix.com/TDClient/2075/Portal/KB/ArticleDet?ID=67315">https://uah.teamdynamix.com/TDClient/2075/Portal/KB/ArticleDet?ID=67315</a>&nbsp;for more information.</p> <p aria-level="1">When adding an international phone number to Duo, add it as a Wi-Fi-only device.</p> </td> </tr> </tbody> </table> <table border="0" cellpadding="10" cellspacing="0" class="m_4513566364523050835block-2"> <tbody> <tr> <td class="m_4513566364523050835pad"> <p><strong>No Email Client Required</strong></p> <p>Did you know that it鈥檚 not necessary to use a desktop application and locally store your email on your computer? You鈥檒l see faster performance when using your mail and calendar if you switch from a desktop client (such as Microsoft Outlook) to a web-based app! We recommend using&nbsp;<a href="https://t.e2ma.net/click/iatzii/i6pexslc/e7fku2" data-saferedirecturl="https://www.google.com/url?q=https://t.e2ma.net/click/iatzii/i6pexslc/e7fku2&amp;source=gmail&amp;ust=1712324866890000&amp;usg=AOvVaw2O3iinIwwseIePLINU3jnS">mail.uah.edu</a>&nbsp;to access your UAH email. From there, you can access many Google apps (Calendar, Drive, and more). Please let us know if you have any questions.</p> <p><strong>Prevent Loss of Data</strong></p> <p>If you are a faculty or staff member, please make sure you鈥檙e backing up your UAH computer with CrashPlan. Visit&nbsp;<a href="https://t.e2ma.net/click/iatzii/i6pexslc/uzgku2" data-saferedirecturl="https://www.google.com/url?q=https://t.e2ma.net/click/iatzii/i6pexslc/uzgku2&amp;source=gmail&amp;ust=1712324866890000&amp;usg=AOvVaw3S76Dlejv-PX8oM5zuiNBj"></a><a href="https://chargerware.uah.edu/all-software/crashplan">https://chargerware.uah.edu/all-software/crashplan</a>&nbsp;to get started.</p> <p><strong>Install the Software You Need</strong></p> <p>Most UAH faculty &amp; staff members can install approved software products even if they do not have an administrator login to their computer.&nbsp;<a href="https://t.e2ma.net/click/iatzii/i6pexslc/ashku2" data-saferedirecturl="https://www.google.com/url?q=https://t.e2ma.net/click/iatzii/i6pexslc/ashku2&amp;source=gmail&amp;ust=1712324866890000&amp;usg=AOvVaw1VYroWxVkodmFqDsX-lenP">Read our article about how to do this here.</a></p> <p>Students are included in what software products are available in Chargerware. Please visit&nbsp;<a href="https://t.e2ma.net/click/iatzii/i6pexslc/qkiku2" data-saferedirecturl="https://www.google.com/url?q=https://t.e2ma.net/click/iatzii/i6pexslc/qkiku2&amp;source=gmail&amp;ust=1712324866890000&amp;usg=AOvVaw3ZtR7kaQSMxaj22N08ms_8">chargerware.uah.edu</a>&nbsp;for more information.</p> <p><strong>Physically Secure Your Device&nbsp;</strong></p> <p>The holiday season often brings on more lost devices (misplaced or stolen). To help prevent theft and unauthorized access, make sure that a PIN or password is required to access your device. Also, never leave your laptop or mobile device unattended in a public place, and lock your devices when not in use. Use caution when leaving a device in a car; take all valuables inside or at least hide them from plain view.</p> <p>Losing your device could contribute to identity theft as well. Please secure the data on your device (whether it鈥檚 someone else鈥檚 or your own). Add your mobile device to your cloud account so you can find it or remotely wipe it if lost or stolen:</p> <p><a href="https://t.e2ma.net/click/iatzii/i6pexslc/6cjku2" data-saferedirecturl="https://www.google.com/url?q=https://t.e2ma.net/click/iatzii/i6pexslc/6cjku2&amp;source=gmail&amp;ust=1712324866890000&amp;usg=AOvVaw1SbN4-J6iBT4JpYUCjGmvj">Find, lock, or erase your lost Android device</a></p> <p><a href="https://t.e2ma.net/click/iatzii/i6pexslc/m5jku2" data-saferedirecturl="https://www.google.com/url?q=https://t.e2ma.net/click/iatzii/i6pexslc/m5jku2&amp;source=gmail&amp;ust=1712324866890000&amp;usg=AOvVaw0WbWqqjHy5Ksfvj9Kmmc9q">Get started with Apple's "Find My"</a></p> </td> </tr> </tbody> </table> <table border="0" cellpadding="10" cellspacing="0" class="m_4513566364523050835block-3"> <tbody> <tr> <td class="m_4513566364523050835pad"> <table border="0" cellpadding="0" cellspacing="0"> <tbody> <tr> <td>鈥</td> </tr> </tbody> </table> </td> </tr> </tbody> </table> <table border="0" cellpadding="0" cellspacing="0" class="m_4513566364523050835image_block"> <tbody> <tr> <td class="m_4513566364523050835pad"> <p><img src="https://ci3.googleusercontent.com/meips/ADKq_NbQ0iqFHAAnq0zG4PQU7C_hIIVykgpsmRzWVrQm1sgMbEwFHCqacpiCOMroeBjDbYkd0Uf7JjZYG-PuUIpEDlEOpejPWvnqcXS8tAmebRwfJzdyhJZ9DF5uwXAoCvr-4SUPeihlmJJvK-01IaU=s0-d-e1-ft#https://d31hzlhk6di2h5.cloudfront.net/20231201/d9/f2/69/3e/67fe184d71fc849046bfbb05.png" width="575" class="CToWUd" data-bit="iit" alt="OIT Projects"></p> </td> </tr> </tbody> </table> <table border="0" cellpadding="10" cellspacing="0" class="m_4513566364523050835block-5"> <tbody> <tr> <td class="m_4513566364523050835pad"> <p>To view the current list of OIT projects, please visit the&nbsp;<a href="https://t.e2ma.net/click/iatzii/i6pexslc/2xkku2" data-saferedirecturl="https://www.google.com/url?q=https://t.e2ma.net/click/iatzii/i6pexslc/2xkku2&amp;source=gmail&amp;ust=1712324866890000&amp;usg=AOvVaw0zkhXBkymqskg9zhrVQT22">OIT Project Site</a>.&nbsp;</p> </td> </tr> </tbody> </table> <table border="0" cellpadding="10" cellspacing="0" class="m_4513566364523050835block-6"> <tbody> <tr> <td class="m_4513566364523050835pad"> <table border="0" cellpadding="0" cellspacing="0"> <tbody> <tr> <td>鈥</td> </tr> </tbody> </table> </td> </tr> </tbody> </table> <table border="0" cellpadding="0" cellspacing="0" class="m_4513566364523050835image_block"> <tbody> <tr> <td class="m_4513566364523050835pad"> <p><img src="https://ci3.googleusercontent.com/meips/ADKq_Na-z4DHF0_9tOpoy-PydYH4Ah1Tj-QXrN-tcMscBQS2u5VQojSOb1i72kRp3haBl4kbtOxS0wU5Pn4wtuNg-KaZEgNu4Y6uhLiDxsAuA_C7Yzx97_C_Db4Kl4Hg_wXgkcxMafND7jKWkyszgeg=s0-d-e1-ft#https://d31hzlhk6di2h5.cloudfront.net/20231201/c9/9a/f3/5e/f138f109377aa4715a1387d2.png" width="575" class="CToWUd a6T" data-bit="iit" alt="spotlight on"></p> </td> </tr> </tbody> </table> <table border="0" cellpadding="10" cellspacing="0" class="m_4513566364523050835heading_block m_4513566364523050835block-8"> <tbody> <tr> <td class="m_4513566364523050835pad"> <h1>How to Reach OIT</h1> </td> </tr> </tbody> </table> <table border="0" cellpadding="10" cellspacing="0"> <tbody> <tr> <td class="m_4513566364523050835pad"> <p>Did you know that you can reach out for technical support from OIT via several channels? See shortcuts to them all in our Client Portal at&nbsp;<a href="https://t.e2ma.net/click/iatzii/i6pexslc/iqlku2" data-saferedirecturl="https://www.google.com/url?q=https://t.e2ma.net/click/iatzii/i6pexslc/iqlku2&amp;source=gmail&amp;ust=1712324866890000&amp;usg=AOvVaw193kB-MNdRIn7mQih8g5MN">uah.edu/ithelp</a>. The Client Portal offers forms, ticket history, Knowledge Base articles, and more!</p> <p aria-level="1">1. Call 256-824-3333 for remote help 24/7/365.</p> <p aria-level="1">2. Chat with an agent 24/7/365 using&nbsp;<a href="https://t.e2ma.net/click/iatzii/i6pexslc/yimku2" data-saferedirecturl="https://www.google.com/url?q=https://t.e2ma.net/click/iatzii/i6pexslc/yimku2&amp;source=gmail&amp;ust=1712324866890000&amp;usg=AOvVaw0oq6R02rErR8ZI3DDgXt9a">this link</a>.</p> <p aria-level="1">3. Use our Chatbot, called&nbsp;<a href="https://t.e2ma.net/click/iatzii/i6pexslc/ebnku2" data-saferedirecturl="https://www.google.com/url?q=https://t.e2ma.net/click/iatzii/i6pexslc/ebnku2&amp;source=gmail&amp;ust=1712324866890000&amp;usg=AOvVaw22SzHWvmEngTKfRvTsvFHs">ITChat</a>&nbsp;(click the message bubble in the bottom right corner of the ITChat page).</p> <p aria-level="1">4. Send an e<a href="https://t.e2ma.net/click/iatzii/i6pexslc/u3nku2" data-saferedirecturl="https://www.google.com/url?q=https://t.e2ma.net/click/iatzii/i6pexslc/u3nku2&amp;source=gmail&amp;ust=1712324866890000&amp;usg=AOvVaw3R6drJ-dLZ4fIbtL537XjD"></a><a href="/oit/contact">/oit/contact</a>mail to&nbsp;<a href="mailto:helpdesk@uah.edu"></a><a href="mailto:helpdesk@uah.edu">helpdesk@uah.edu</a>. We respond to emails during Help Desk Hours (weekdays when UAH is open; 8:00 am to 5:00 pm).</p> <p aria-level="1">5. Visit us at the OIT Help Desk, which is located inside the&nbsp;<a href="https://t.e2ma.net/click/iatzii/i6pexslc/awoku2" data-saferedirecturl="https://www.google.com/url?q=https://t.e2ma.net/click/iatzii/i6pexslc/awoku2&amp;source=gmail&amp;ust=1712324866890000&amp;usg=AOvVaw2N2vfnzw2FdvrmvGyw0neP">M. Louis Salmon Library</a>.</p> </td> </tr> </tbody> </table> <table border="0" cellpadding="10" cellspacing="0"> <tbody> <tr> <td class="m_4513566364523050835pad"> <table border="0" cellpadding="0" cellspacing="0"> <tbody> <tr> <td>鈥</td> </tr> </tbody> </table> </td> </tr> </tbody> </table> <table border="0" cellpadding="0" cellspacing="0" class="m_4513566364523050835image_block"> <tbody> <tr> <td class="m_4513566364523050835pad"> <p><img src="https://ci3.googleusercontent.com/meips/ADKq_NaPxSRjwV6Wr6vndM37uEz3KbWZ3BkQutO8Dekfqsh9ziqsfkqsRH0J5vkccaxmCGPvjAavhKoErY-ID-l5G06Tpt-sSWzpVfSD4sZ3U3a6tIWU91qkxtGGqlWAnj-SlJMocpLsIay2s789cSg=s0-d-e1-ft#https://d31hzlhk6di2h5.cloudfront.net/20231201/c6/18/38/c9/fe55d7e82f2e686c653e1a86.jpg" width="573" class="CToWUd" data-bit="iit" alt="a keyboard with a key that says tips and tricks with a lightbulb"></p> </td> </tr> </tbody> </table> <table border="0" cellpadding="10" cellspacing="0"> <tbody> <tr> <td class="m_4513566364523050835pad"> <ul> <li>When submitting a ticket to the helpdesk for an error message you received on your computer, include a picture of the error message and the date and time you received it. You can easily copy the image by pressing the s/windows/shift keys on your keyboard and then pasting (ctrl v) it into your ticket.</li> </ul> </td> </tr> </tbody> </table> <table border="0" cellpadding="10" cellspacing="0"> <tbody> <tr> <td class="m_4513566364523050835pad"> <table border="0" cellpadding="0" cellspacing="0"> <tbody> <tr> <td>鈥</td> </tr> </tbody> </table> </td> </tr> </tbody> </table> <table border="0" cellpadding="0" cellspacing="0" class="m_4513566364523050835heading_block m_4513566364523050835block-14"> <tbody> <tr> <td class="m_4513566364523050835pad"> <h1>INFRASTRUCTURE&nbsp;</h1> </td> </tr> </tbody> </table> <table border="0" cellpadding="0" cellspacing="0" class="m_4513566364523050835heading_block m_4513566364523050835block-15"> <tbody> <tr> <td class="m_4513566364523050835pad"> <h3>Mike Turner, Director</h3> </td> </tr> </tbody> </table> <table border="0" cellpadding="10" cellspacing="0"> <tbody> <tr> <td class="m_4513566364523050835pad"> <p>The Network Team is currently evaluating several new vendors of wireless access points for potential future use at UAH. The current plan is to deploy Aruba access points in Spragins Hall and Charger Village Food Court as well as Juniper Mist access points in the cafeteria and VBH OIT areas. These new access points have the latest 802.11 standards enabled, supporting 2.4, 5, and 6GHz wireless connections (devices supporting the 6E standard). Utilizing these access points will be seamless to the users (they will still broadcast UAH Get Connected and Eduroam SSIDs).</p> <p>Please continue to utilize only the Eduroam and UAH Get Connected SSIDs, as the Faculty5, Student5, and Staff5 networks will be removed from our broadcast soon.&nbsp;</p> <p>The Infrastructure Team has been working to make several enhancements to the overall fiber infrastructure that connects UAH to the outside world. We have added a second Dense Wave Division Multiplexing (DWDM) Add/Drop node in the Library, bringing the total number of units to two on campus, and significantly improving our redundancy and resiliency. We are currently working with both Alabama A&amp;M and Alabama Super Computer to enable additional external connections, further improving our external redundancy.&nbsp;</p> </td> </tr> </tbody> </table> </td> </tr> </tbody> </table> </td> </tr> </tbody> </table> <table border="0" cellpadding="0" cellspacing="0" class="m_4513566364523050835row-5"> <tbody> <tr> <td> <table border="0" cellpadding="0" cellspacing="0" class="m_4513566364523050835row-content m_4513566364523050835stack"> <tbody> <tr> <td class="m_4513566364523050835column m_4513566364523050835column-1"> <table border="0" cellpadding="10" cellspacing="0" class="m_4513566364523050835block-1"> <tbody> <tr> <td class="m_4513566364523050835pad"> <table border="0" cellpadding="0" cellspacing="0"> <tbody> <tr> <td>鈥</td> </tr> </tbody> </table> </td> </tr> </tbody> </table> <table border="0" cellpadding="10" cellspacing="0" class="m_4513566364523050835heading_block m_4513566364523050835block-2"> <tbody> <tr> <td class="m_4513566364523050835pad"> <h1>QUICK LINKS</h1> </td> </tr> </tbody> </table> <table border="0" cellpadding="10" cellspacing="0" class="m_4513566364523050835block-3"> <tbody> <tr> <td class="m_4513566364523050835pad"> <ul> <li><a href="https://t.e2ma.net/click/iatzii/i6pexslc/qopku2" data-saferedirecturl="https://www.google.com/url?q=https://t.e2ma.net/click/iatzii/i6pexslc/qopku2&amp;source=gmail&amp;ust=1712324866890000&amp;usg=AOvVaw1iHrGuBZDmSd09rZ6EeZqF">OIT Client Portal</a></li> <li><a href="https://t.e2ma.net/click/iatzii/i6pexslc/6gqku2" data-saferedirecturl="https://www.google.com/url?q=https://t.e2ma.net/click/iatzii/i6pexslc/6gqku2&amp;source=gmail&amp;ust=1712324866890000&amp;usg=AOvVaw17SA4gFdl_w7WcFbT9Gg5r">Banner Upgrade Center</a></li> <li><a href="https://t.e2ma.net/click/iatzii/i6pexslc/m9qku2" data-saferedirecturl="https://www.google.com/url?q=https://t.e2ma.net/click/iatzii/i6pexslc/m9qku2&amp;source=gmail&amp;ust=1712324866890000&amp;usg=AOvVaw3FXcg9bOvtqDrpDEpwCA47">OIT Project Site</a></li> </ul> </td> </tr> </tbody> </table> <table border="0" cellpadding="10" cellspacing="0"> <tbody> <tr> <td class="m_4513566364523050835pad"> <p>Let us know if there is a topic you would like OIT to cover by sending an email to&nbsp;<a href="mailto:oit@uah.edu"></a><a href="mailto:oit@uah.edu">oit@uah.edu</a>.&nbsp;</p> </td> </tr> </tbody> </table> </td> </tr> </tbody> </table> </td> </tr> </tbody> </table> <table border="0" cellpadding="0" cellspacing="0" class="m_4513566364523050835row-2"> <tbody> <tr> <td> <table border="0" cellpadding="0" cellspacing="0" class="m_4513566364523050835row-content m_4513566364523050835stack"> <tbody> <tr> <td class="m_4513566364523050835column m_4513566364523050835column-1"> <table border="0" cellpadding="0" cellspacing="0" class="m_4513566364523050835heading_block m_4513566364523050835block-5"> <tbody> <tr> <td class="m_4513566364523050835pad"> <h1>FROM THE CIO</h1> </td> </tr> </tbody> </table> <table border="0" cellpadding="0" cellspacing="0" class="m_4513566364523050835heading_block m_4513566364523050835block-6"> <tbody> <tr> <td class="m_4513566364523050835pad"> <h3><sup>Malcolm Rice</sup></h3> </td> </tr> </tbody> </table> <table border="0" cellpadding="5" cellspacing="0"> <tbody> <tr> <td class="m_4513566364523050835pad"> <p><strong>Service Level Agreement (SLA):</strong></p> <p>OIT has recently developed a Service Level Agreement (SLA) designed to enhance the efficiency and reliability of our technology support services.</p> <p>The SLA serves as a formal commitment from OIT, outlining specific timelines for response and resolution to ensure a more predictable and satisfactory experience for our campus community.</p> <p><strong>SLA Terms</strong>:</p> <p><strong><em>Priority Levels:</em></strong>&nbsp;The SLA defines different priority levels based on the nature and urgency of reported incidents or service requests. This allows us to allocate resources effectively and address critical issues promptly.</p> <p><strong><em>Response Time:</em></strong>&nbsp;The SLA specifies the timeframe within which you can expect an initial response to your tickets.</p> <p><strong><em>Resolution Time:</em></strong>&nbsp;Guidelines are provided regarding the resolution of reported incidents.</p> <p>For detailed information on the terms and conditions of our SLA, click&nbsp;<a href="https://t.e2ma.net/click/iatzii/i6pexslc/m1cku2" data-saferedirecturl="https://www.google.com/url?q=https://t.e2ma.net/click/iatzii/i6pexslc/m1cku2&amp;source=gmail&amp;ust=1712324866890000&amp;usg=AOvVaw3-KCE1W9UZnn5L_m3iRpNK">here</a>.</p> <p><strong>OIT Device Support:</strong></p> <p>It is often time-consuming and a security risk to attempt to support aging UAH-owned devices. Each year, OIT evaluates the current technologies and establishes a level of obsolescence. Devices that are not fully supported will no longer be provided with replacement parts and software, and we will only provide extremely limited support on such devices.</p> <p>With the decreasing cost of computer hardware and the increase in the number of computers on campus, it is often much more cost-effective for the university to replace obsolete equipment than attempt to repair or support it after the manufacturer or vendor no longer can.&nbsp;</p> <p>To give the campus time to replace any devices, enforcement will not begin until October 1, 2024. If you need assistance in determining the status of your device, please enter a ticket by sending an email to&nbsp;<a href="mailto:helpdesk@uah.edu"></a><a href="mailto:helpdesk@uah.edu">helpdesk@uah.edu</a>.</p> <p>For detailed information on our Device Support Standards, visit&nbsp;<a href="https://t.e2ma.net/click/iatzii/i6pexslc/2tdku2" data-saferedirecturl="https://www.google.com/url?q=https://t.e2ma.net/click/iatzii/i6pexslc/2tdku2&amp;source=gmail&amp;ust=1712324866890000&amp;usg=AOvVaw306XLJLpJ1-jwBmA63TEe8">OIT Device Support</a>.</p> <p><strong>Your Feedback Is Important:</strong></p> <p>As we roll out this SLA and the Device Support procedures, we encourage you to provide feedback. Your feedback helps us refine and improve our services to better meet the needs of our campus community.</p> </td> </tr> </tbody> </table> <table border="0" cellpadding="10" cellspacing="0" class="m_4513566364523050835block-8"> <tbody> <tr> <td class="m_4513566364523050835pad"> <table border="0" cellpadding="0" cellspacing="0"> <tbody> <tr> <td>鈥</td> </tr> </tbody> </table> </td> </tr> </tbody> </table> <table border="0" cellpadding="0" cellspacing="0" class="m_4513566364523050835image_block"> <tbody> <tr> <td class="m_4513566364523050835pad"> <p><img src="https://ci3.googleusercontent.com/meips/ADKq_NZpc5wOFNA6NNjzg3j6DXM3B4i0GDg_cS5scIcRcotQrWINeHoS-_ZP9yR9ZmMSrSQ36VW7L7lhCD3H0JIcVtbSUBXaxOwFKxF3du8I9FaF8oHauuZ6Up5YdtaCU7KHMQUIz_qZQoovEQjksRc=s0-d-e1-ft#https://d31hzlhk6di2h5.cloudfront.net/20231201/c4/5b/df/d3/6fd8ad7c464d2b940495f730.jpg" width="574" class="CToWUd" data-bit="iit" alt="rainbow text that says welcome aboard"></p> </td> </tr> </tbody> </table> <table border="0" cellpadding="10" cellspacing="0"> <tbody> <tr> <td class="m_4513566364523050835pad"> <ul> <li>Van Hudson, Help Desk Technician</li> <li>Ryan Pounders, Software Developer I</li> <li>Rhianna O'Reilly, Help Desk Technician</li> </ul> </td> </tr> </tbody> </table> <table border="0" cellpadding="10" cellspacing="0"> <tbody> <tr> <td class="m_4513566364523050835pad"> <p>We are so happy to have you here, and wish you well in your careers!</p> </td> </tr> </tbody> </table> <table border="0" cellpadding="10" cellspacing="0"> <tbody> <tr> <td class="m_4513566364523050835pad"> <table border="0" cellpadding="0" cellspacing="0"> <tbody> <tr> <td>鈥</td> </tr> </tbody> </table> </td> </tr> </tbody> </table> <table border="0" cellpadding="0" cellspacing="0" class="m_4513566364523050835image_block"> <tbody> <tr> <td class="m_4513566364523050835pad"> <p><img src="https://ci3.googleusercontent.com/meips/ADKq_NbRyDFORkQ4kmoNuqUSvKIg0eAJm6tm6Jh5kK3he0V6lgDoNt4M6vtwCYBhOYM7RI5nuKM0t9lQUaXAtSolVpmRHsqFqtMw2DMN5LD5NgQ683BWozwBv7OZJtpNkc_eWxI9vqRTjGtpb1t9fCs=s0-d-e1-ft#https://d31hzlhk6di2h5.cloudfront.net/20231201/9d/4c/44/21/7d58156569c44cf534679fb4.png" width="575" class="CToWUd a6T" data-bit="iit" alt="a picture of a lock with the word security next to it"></p> </td> </tr> </tbody> </table> <table border="0" cellpadding="0" cellspacing="0" class="m_4513566364523050835heading_block m_4513566364523050835block-14"> <tbody> <tr> <td class="m_4513566364523050835pad"> <h3>Jeremy Shelley, CISO</h3> </td> </tr> </tbody> </table> <table border="0" cellpadding="5" cellspacing="0" class="m_4513566364523050835block-15"> <tbody> <tr> <td class="m_4513566364523050835pad"> <p><strong>Required Annual Cybersecurity Training Reminder</strong></p> <p>If you have not yet completed the annual cybersecurity training course on Canvas, please do so ASAP. The deadline for completion is December 1st.</p> <p><strong>Automated Application Patching on Primary UAH Domain</strong></p> <p>Beginning December 11th, OIT will begin automatically applying patches and updates to installed applications on Windows 10 and 11 systems in the primary UAH campus domain (DS domain). We have been testing this process within OIT, and on computers in the Nursing Department, Library, and the College of Engineering with no negative repercussions reported.</p> <p>Our Cyberinsurance carrier has asked UAH to meet an aggressive patch schedule with critical vulnerabilities patched within 7 days.</p> <p>This automatic patching will reduce the number of vulnerabilities on UAH systems, improving the security for the entire university.</p> <p><strong>How It Works</strong></p> <p>When a new patch for an application is made available, OIT will publish it to computers in the primary UAH campus domain (DS domain) to be downloaded within 7 days. For those rare application updates that require a restart of your computer, you will be prompted to restart your system and can choose to delay the restart by up to 5 days.&nbsp;</p> <p>You will see alerts like the one below on Windows 10 (the alerts for Windows 11 are similar).</p> </td> </tr> </tbody> </table> <table border="0" cellpadding="0" cellspacing="0" class="m_4513566364523050835image_block"> <tbody> <tr> <td class="m_4513566364523050835pad"> <p><img src="https://ci3.googleusercontent.com/meips/ADKq_NZx2kCC4msuno-jPhx7ltwaIgsBmVAHGa3FZ8zUojNFaoufxgt0lgfTOZJcQxW7TEdYcX6KfcK3EbQIgS93cQX9EwhA1jnFfeY4mu5qvWebdpKaB1ozXTLRt6EZBt16TnBb9RvbtI3ZxP84Lmk=s0-d-e1-ft#https://d31hzlhk6di2h5.cloudfront.net/20231201/cc/7a/45/d7/beccc6f9aca71f36cc3c5966.png" width="575" class="CToWUd a6T" data-bit="iit" alt="a notification appearing on one's screen from IT"></p> </td> </tr> </tbody> </table> <table border="0" cellpadding="10" cellspacing="0"> <tbody> <tr> <td class="m_4513566364523050835pad"> <p>These alerts are not indicative of a virus infection and are labeled with the UAH OIT logo. While these updates are a new process and the temptation may be to ignore these notifications, it is critically important that you allow these updates to be installed to avoid a forced installation at an inconvenient time.</p> </td> </tr> </tbody> </table> <table border="0" cellpadding="10" cellspacing="0"> <tbody> <tr> <td class="m_4513566364523050835pad"> <table border="0" cellpadding="0" cellspacing="0"> <tbody> <tr> <td>鈥</td> </tr> </tbody> </table> </td> </tr> </tbody> </table> <table border="0" cellpadding="5" cellspacing="0" class="m_4513566364523050835heading_block m_4513566364523050835block-19"> <tbody> <tr> <td class="m_4513566364523050835pad"> <h1>CLIENT SERVICES</h1> </td> </tr> </tbody> </table> <table border="0" cellpadding="0" cellspacing="0" class="m_4513566364523050835heading_block m_4513566364523050835block-20"> <tbody> <tr> <td class="m_4513566364523050835pad"> <h3>Wendy Worlund, Director</h3> </td> </tr> </tbody> </table> <table border="0" cellpadding="10" cellspacing="0"> <tbody> <tr> <td class="m_4513566364523050835pad"> <p><strong>Reminders about Multi-Factor Authentication</strong></p> <p aria-level="1">Google 2-Step Verification is similar to but&nbsp;<em>separate from</em>&nbsp;Duo. Both utilize a second factor (commonly a mobile device) to add an extra layer of security to your UAH accounts. For any SSO systems like Canvas and myUAH, Duo is required. For any Google Workspace products like Gmail and Drive, you will use Google 2-Step. Keep reading for more examples.</p> </td> </tr> </tbody> </table> </td> </tr> </tbody> </table> </td> </tr> </tbody> </table> <table border="0" cellpadding="0" cellspacing="0" class="m_4513566364523050835row-3"> <tbody> <tr> <td> <table border="0" cellpadding="0" cellspacing="0" class="m_4513566364523050835row-content m_4513566364523050835stack"> <tbody> <tr> <td class="m_4513566364523050835column m_4513566364523050835column-1"> <table border="0" cellpadding="0" cellspacing="0" class="m_4513566364523050835heading_block m_4513566364523050835block-1"> <tbody> <tr> <td class="m_4513566364523050835pad"> <h3>Duo</h3> </td> </tr> </tbody> </table> <table border="0" cellpadding="10" cellspacing="0" class="m_4513566364523050835block-2"> <tbody> <tr> <td class="m_4513566364523050835pad"> <ul> <li>myUAH</li> <li>Banner</li> <li>Canvas</li> <li>See others in&nbsp;<a href="https://t.e2ma.net/click/iatzii/i6pexslc/imeku2" data-saferedirecturl="https://www.google.com/url?q=https://t.e2ma.net/click/iatzii/i6pexslc/imeku2&amp;source=gmail&amp;ust=1712324866890000&amp;usg=AOvVaw05TDZ0bRgIsSnbHycEkEzd">this article</a></li> </ul> </td> </tr> </tbody> </table> </td> <td class="m_4513566364523050835column m_4513566364523050835column-2"> <table border="0" cellpadding="0" cellspacing="0" class="m_4513566364523050835heading_block m_4513566364523050835block-1"> <tbody> <tr> <td class="m_4513566364523050835pad"> <h3>Google 2-Step Verification</h3> </td> </tr> </tbody> </table> <table border="0" cellpadding="10" cellspacing="0" class="m_4513566364523050835block-2"> <tbody> <tr> <td class="m_4513566364523050835pad"> <ul> <li>Gmail</li> <li>Google Drive</li> <li>Google Calendar</li> <li>Google Docs, Slides, Sheets</li> </ul> </td> </tr> </tbody> </table> </td> </tr> </tbody> </table> </td> </tr> </tbody> </table> <table border="0" cellpadding="0" cellspacing="0" class="m_4513566364523050835row-4"> <tbody> <tr> <td> <table border="0" cellpadding="0" cellspacing="0" class="m_4513566364523050835row-content m_4513566364523050835stack"> <tbody> <tr> <td class="m_4513566364523050835column m_4513566364523050835column-1"> <table border="0" cellpadding="10" cellspacing="0" class="m_4513566364523050835block-1"> <tbody> <tr> <td class="m_4513566364523050835pad"> <p aria-level="1">Duo allows you to manage your devices easily and at any time. Please see&nbsp;<a href="https://t.e2ma.net/click/iatzii/i6pexslc/yefku2" data-saferedirecturl="https://www.google.com/url?q=https://t.e2ma.net/click/iatzii/i6pexslc/yefku2&amp;source=gmail&amp;ust=1712324866890000&amp;usg=AOvVaw14ct3FGb4CjzWs_QD1zTxB"></a><a href="https://uah.teamdynamix.com/TDClient/2075/Portal/KB/ArticleDet?ID=67315">https://uah.teamdynamix.com/TDClient/2075/Portal/KB/ArticleDet?ID=67315</a>&nbsp;for more information.</p> <p aria-level="1">When adding an international phone number to Duo, add it as a Wi-Fi-only device.</p> </td> </tr> </tbody> </table> <table border="0" cellpadding="10" cellspacing="0" class="m_4513566364523050835block-2"> <tbody> <tr> <td class="m_4513566364523050835pad"> <p><strong>No Email Client Required</strong></p> <p>Did you know that it鈥檚 not necessary to use a desktop application and locally store your email on your computer? You鈥檒l see faster performance when using your mail and calendar if you switch from a desktop client (such as Microsoft Outlook) to a web-based app! We recommend using&nbsp;<a href="https://t.e2ma.net/click/iatzii/i6pexslc/e7fku2" data-saferedirecturl="https://www.google.com/url?q=https://t.e2ma.net/click/iatzii/i6pexslc/e7fku2&amp;source=gmail&amp;ust=1712324866890000&amp;usg=AOvVaw2O3iinIwwseIePLINU3jnS">mail.uah.edu</a>&nbsp;to access your UAH email. From there, you can access many Google apps (Calendar, Drive, and more). Please let us know if you have any questions.</p> <p><strong>Prevent Loss of Data</strong></p> <p>If you are a faculty or staff member, please make sure you鈥檙e backing up your UAH computer with CrashPlan. Visit&nbsp;<a href="https://t.e2ma.net/click/iatzii/i6pexslc/uzgku2" data-saferedirecturl="https://www.google.com/url?q=https://t.e2ma.net/click/iatzii/i6pexslc/uzgku2&amp;source=gmail&amp;ust=1712324866890000&amp;usg=AOvVaw3S76Dlejv-PX8oM5zuiNBj"></a><a href="https://chargerware.uah.edu/all-software/crashplan">https://chargerware.uah.edu/all-software/crashplan</a>&nbsp;to get started.</p> <p><strong>Install the Software You Need</strong></p> <p>Most UAH faculty &amp; staff members can install approved software products even if they do not have an administrator login to their computer.&nbsp;<a href="https://t.e2ma.net/click/iatzii/i6pexslc/ashku2" data-saferedirecturl="https://www.google.com/url?q=https://t.e2ma.net/click/iatzii/i6pexslc/ashku2&amp;source=gmail&amp;ust=1712324866890000&amp;usg=AOvVaw1VYroWxVkodmFqDsX-lenP">Read our article about how to do this here.</a></p> <p>Students are included in what software products are available in Chargerware. Please visit&nbsp;<a href="https://t.e2ma.net/click/iatzii/i6pexslc/qkiku2" data-saferedirecturl="https://www.google.com/url?q=https://t.e2ma.net/click/iatzii/i6pexslc/qkiku2&amp;source=gmail&amp;ust=1712324866890000&amp;usg=AOvVaw3ZtR7kaQSMxaj22N08ms_8">chargerware.uah.edu</a>&nbsp;for more information.</p> <p><strong>Physically Secure Your Device&nbsp;</strong></p> <p>The holiday season often brings on more lost devices (misplaced or stolen). To help prevent theft and unauthorized access, make sure that a PIN or password is required to access your device. Also, never leave your laptop or mobile device unattended in a public place, and lock your devices when not in use. Use caution when leaving a device in a car; take all valuables inside or at least hide them from plain view.</p> <p>Losing your device could contribute to identity theft as well. Please secure the data on your device (whether it鈥檚 someone else鈥檚 or your own). Add your mobile device to your cloud account so you can find it or remotely wipe it if lost or stolen:</p> <p><a href="https://t.e2ma.net/click/iatzii/i6pexslc/6cjku2" data-saferedirecturl="https://www.google.com/url?q=https://t.e2ma.net/click/iatzii/i6pexslc/6cjku2&amp;source=gmail&amp;ust=1712324866890000&amp;usg=AOvVaw1SbN4-J6iBT4JpYUCjGmvj">Find, lock, or erase your lost Android device</a></p> <p><a href="https://t.e2ma.net/click/iatzii/i6pexslc/m5jku2" data-saferedirecturl="https://www.google.com/url?q=https://t.e2ma.net/click/iatzii/i6pexslc/m5jku2&amp;source=gmail&amp;ust=1712324866890000&amp;usg=AOvVaw0WbWqqjHy5Ksfvj9Kmmc9q">Get started with Apple's "Find My"</a></p> </td> </tr> </tbody> </table> <table border="0" cellpadding="10" cellspacing="0" class="m_4513566364523050835block-3"> <tbody> <tr> <td class="m_4513566364523050835pad"> <table border="0" cellpadding="0" cellspacing="0"> <tbody> <tr> <td>鈥</td> </tr> </tbody> </table> </td> </tr> </tbody> </table> <table border="0" cellpadding="0" cellspacing="0" class="m_4513566364523050835image_block"> <tbody> <tr> <td class="m_4513566364523050835pad"> <p><img src="https://ci3.googleusercontent.com/meips/ADKq_NbQ0iqFHAAnq0zG4PQU7C_hIIVykgpsmRzWVrQm1sgMbEwFHCqacpiCOMroeBjDbYkd0Uf7JjZYG-PuUIpEDlEOpejPWvnqcXS8tAmebRwfJzdyhJZ9DF5uwXAoCvr-4SUPeihlmJJvK-01IaU=s0-d-e1-ft#https://d31hzlhk6di2h5.cloudfront.net/20231201/d9/f2/69/3e/67fe184d71fc849046bfbb05.png" width="575" class="CToWUd" data-bit="iit" alt="OIT Projects"></p> </td> </tr> </tbody> </table> <table border="0" cellpadding="10" cellspacing="0" class="m_4513566364523050835block-5"> <tbody> <tr> <td class="m_4513566364523050835pad"> <p>To view the current list of OIT projects, please visit the&nbsp;<a href="https://t.e2ma.net/click/iatzii/i6pexslc/2xkku2" data-saferedirecturl="https://www.google.com/url?q=https://t.e2ma.net/click/iatzii/i6pexslc/2xkku2&amp;source=gmail&amp;ust=1712324866890000&amp;usg=AOvVaw0zkhXBkymqskg9zhrVQT22">OIT Project Site</a>.&nbsp;</p> </td> </tr> </tbody> </table> <table border="0" cellpadding="10" cellspacing="0" class="m_4513566364523050835block-6"> <tbody> <tr> <td class="m_4513566364523050835pad"> <table border="0" cellpadding="0" cellspacing="0"> <tbody> <tr> <td>鈥</td> </tr> </tbody> </table> </td> </tr> </tbody> </table> <table border="0" cellpadding="0" cellspacing="0" class="m_4513566364523050835image_block"> <tbody> <tr> <td class="m_4513566364523050835pad"> <p><img src="https://ci3.googleusercontent.com/meips/ADKq_Na-z4DHF0_9tOpoy-PydYH4Ah1Tj-QXrN-tcMscBQS2u5VQojSOb1i72kRp3haBl4kbtOxS0wU5Pn4wtuNg-KaZEgNu4Y6uhLiDxsAuA_C7Yzx97_C_Db4Kl4Hg_wXgkcxMafND7jKWkyszgeg=s0-d-e1-ft#https://d31hzlhk6di2h5.cloudfront.net/20231201/c9/9a/f3/5e/f138f109377aa4715a1387d2.png" width="575" class="CToWUd a6T" data-bit="iit" alt="spotlight on"></p> </td> </tr> </tbody> </table> <table border="0" cellpadding="10" cellspacing="0" class="m_4513566364523050835heading_block m_4513566364523050835block-8"> <tbody> <tr> <td class="m_4513566364523050835pad"> <h1>How to Reach OIT</h1> </td> </tr> </tbody> </table> <table border="0" cellpadding="10" cellspacing="0"> <tbody> <tr> <td class="m_4513566364523050835pad"> <p>Did you know that you can reach out for technical support from OIT via several channels? See shortcuts to them all in our Client Portal at&nbsp;<a href="https://t.e2ma.net/click/iatzii/i6pexslc/iqlku2" data-saferedirecturl="https://www.google.com/url?q=https://t.e2ma.net/click/iatzii/i6pexslc/iqlku2&amp;source=gmail&amp;ust=1712324866890000&amp;usg=AOvVaw193kB-MNdRIn7mQih8g5MN">uah.edu/ithelp</a>. The Client Portal offers forms, ticket history, Knowledge Base articles, and more!</p> <p aria-level="1">1. Call 256-824-3333 for remote help 24/7/365.</p> <p aria-level="1">2. Chat with an agent 24/7/365 using&nbsp;<a href="https://t.e2ma.net/click/iatzii/i6pexslc/yimku2" data-saferedirecturl="https://www.google.com/url?q=https://t.e2ma.net/click/iatzii/i6pexslc/yimku2&amp;source=gmail&amp;ust=1712324866890000&amp;usg=AOvVaw0oq6R02rErR8ZI3DDgXt9a">this link</a>.</p> <p aria-level="1">3. Use our Chatbot, called&nbsp;<a href="https://t.e2ma.net/click/iatzii/i6pexslc/ebnku2" data-saferedirecturl="https://www.google.com/url?q=https://t.e2ma.net/click/iatzii/i6pexslc/ebnku2&amp;source=gmail&amp;ust=1712324866890000&amp;usg=AOvVaw22SzHWvmEngTKfRvTsvFHs">ITChat</a>&nbsp;(click the message bubble in the bottom right corner of the ITChat page).</p> <p aria-level="1">4. Send an e<a href="https://t.e2ma.net/click/iatzii/i6pexslc/u3nku2" data-saferedirecturl="https://www.google.com/url?q=https://t.e2ma.net/click/iatzii/i6pexslc/u3nku2&amp;source=gmail&amp;ust=1712324866890000&amp;usg=AOvVaw3R6drJ-dLZ4fIbtL537XjD"></a><a href="/oit/contact">/oit/contact</a>mail to&nbsp;<a href="mailto:helpdesk@uah.edu"></a><a href="mailto:helpdesk@uah.edu">helpdesk@uah.edu</a>. We respond to emails during Help Desk Hours (weekdays when UAH is open; 8:00 am to 5:00 pm).</p> <p aria-level="1">5. Visit us at the OIT Help Desk, which is located inside the&nbsp;<a href="https://t.e2ma.net/click/iatzii/i6pexslc/awoku2" data-saferedirecturl="https://www.google.com/url?q=https://t.e2ma.net/click/iatzii/i6pexslc/awoku2&amp;source=gmail&amp;ust=1712324866890000&amp;usg=AOvVaw2N2vfnzw2FdvrmvGyw0neP">M. Louis Salmon Library</a>.</p> </td> </tr> </tbody> </table> <table border="0" cellpadding="10" cellspacing="0"> <tbody> <tr> <td class="m_4513566364523050835pad"> <table border="0" cellpadding="0" cellspacing="0"> <tbody> <tr> <td>鈥</td> </tr> </tbody> </table> </td> </tr> </tbody> </table> <table border="0" cellpadding="0" cellspacing="0" class="m_4513566364523050835image_block"> <tbody> <tr> <td class="m_4513566364523050835pad"> <p><img src="https://ci3.googleusercontent.com/meips/ADKq_NaPxSRjwV6Wr6vndM37uEz3KbWZ3BkQutO8Dekfqsh9ziqsfkqsRH0J5vkccaxmCGPvjAavhKoErY-ID-l5G06Tpt-sSWzpVfSD4sZ3U3a6tIWU91qkxtGGqlWAnj-SlJMocpLsIay2s789cSg=s0-d-e1-ft#https://d31hzlhk6di2h5.cloudfront.net/20231201/c6/18/38/c9/fe55d7e82f2e686c653e1a86.jpg" width="573" class="CToWUd" data-bit="iit" alt="a keyboard with a key that says tips and tricks with a lightbulb"></p> </td> </tr> </tbody> </table> <table border="0" cellpadding="10" cellspacing="0"> <tbody> <tr> <td class="m_4513566364523050835pad"> <ul> <li>When submitting a ticket to the helpdesk for an error message you received on your computer, include a picture of the error message and the date and time you received it. You can easily copy the image by pressing the s/windows/shift keys on your keyboard and then pasting (ctrl v) it into your ticket.</li> </ul> </td> </tr> </tbody> </table> <table border="0" cellpadding="10" cellspacing="0"> <tbody> <tr> <td class="m_4513566364523050835pad"> <table border="0" cellpadding="0" cellspacing="0"> <tbody> <tr> <td>鈥</td> </tr> </tbody> </table> </td> </tr> </tbody> </table> <table border="0" cellpadding="0" cellspacing="0" class="m_4513566364523050835heading_block m_4513566364523050835block-14"> <tbody> <tr> <td class="m_4513566364523050835pad"> <h1>INFRASTRUCTURE&nbsp;</h1> </td> </tr> </tbody> </table> <table border="0" cellpadding="0" cellspacing="0" class="m_4513566364523050835heading_block m_4513566364523050835block-15"> <tbody> <tr> <td class="m_4513566364523050835pad"> <h3>Mike Turner, Director</h3> </td> </tr> </tbody> </table> <table border="0" cellpadding="10" cellspacing="0"> <tbody> <tr> <td class="m_4513566364523050835pad"> <p>The Network Team is currently evaluating several new vendors of wireless access points for potential future use at UAH. The current plan is to deploy Aruba access points in Spragins Hall and Charger Village Food Court as well as Juniper Mist access points in the cafeteria and VBH OIT areas. These new access points have the latest 802.11 standards enabled, supporting 2.4, 5, and 6GHz wireless connections (devices supporting the 6E standard). Utilizing these access points will be seamless to the users (they will still broadcast UAH Get Connected and Eduroam SSIDs).</p> <p>Please continue to utilize only the Eduroam and UAH Get Connected SSIDs, as the Faculty5, Student5, and Staff5 networks will be removed from our broadcast soon.&nbsp;</p> <p>The Infrastructure Team has been working to make several enhancements to the overall fiber infrastructure that connects UAH to the outside world. We have added a second Dense Wave Division Multiplexing (DWDM) Add/Drop node in the Library, bringing the total number of units to two on campus, and significantly improving our redundancy and resiliency. We are currently working with both Alabama A&amp;M and Alabama Super Computer to enable additional external connections, further improving our external redundancy.&nbsp;</p> </td> </tr> </tbody> </table> </td> </tr> </tbody> </table> </td> </tr> </tbody> </table> <table border="0" cellpadding="0" cellspacing="0" class="m_4513566364523050835row-5"> <tbody> <tr> <td> <table border="0" cellpadding="0" cellspacing="0" class="m_4513566364523050835row-content m_4513566364523050835stack"> <tbody> <tr> <td class="m_4513566364523050835column m_4513566364523050835column-1"> <table border="0" cellpadding="10" cellspacing="0" class="m_4513566364523050835block-1"> <tbody> <tr> <td class="m_4513566364523050835pad"> <table border="0" cellpadding="0" cellspacing="0"> <tbody> <tr> <td>鈥</td> </tr> </tbody> </table> </td> </tr> </tbody> </table> <table border="0" cellpadding="10" cellspacing="0" class="m_4513566364523050835heading_block m_4513566364523050835block-2"> <tbody> <tr> <td class="m_4513566364523050835pad"> <h1>QUICK LINKS</h1> </td> </tr> </tbody> </table> <table border="0" cellpadding="10" cellspacing="0" class="m_4513566364523050835block-3"> <tbody> <tr> <td class="m_4513566364523050835pad"> <ul> <li><a href="https://t.e2ma.net/click/iatzii/i6pexslc/qopku2" data-saferedirecturl="https://www.google.com/url?q=https://t.e2ma.net/click/iatzii/i6pexslc/qopku2&amp;source=gmail&amp;ust=1712324866890000&amp;usg=AOvVaw1iHrGuBZDmSd09rZ6EeZqF">OIT Client Portal</a></li> <li><a href="https://t.e2ma.net/click/iatzii/i6pexslc/6gqku2" data-saferedirecturl="https://www.google.com/url?q=https://t.e2ma.net/click/iatzii/i6pexslc/6gqku2&amp;source=gmail&amp;ust=1712324866890000&amp;usg=AOvVaw17SA4gFdl_w7WcFbT9Gg5r">Banner Upgrade Center</a></li> <li><a href="https://t.e2ma.net/click/iatzii/i6pexslc/m9qku2" data-saferedirecturl="https://www.google.com/url?q=https://t.e2ma.net/click/iatzii/i6pexslc/m9qku2&amp;source=gmail&amp;ust=1712324866890000&amp;usg=AOvVaw3FXcg9bOvtqDrpDEpwCA47">OIT Project Site</a></li> </ul> </td> </tr> </tbody> </table> <table border="0" cellpadding="10" cellspacing="0"> <tbody> <tr> <td class="m_4513566364523050835pad"> <p>Let us know if there is a topic you would like OIT to cover by sending an email to&nbsp;<a href="mailto:oit@uah.edu"></a><a href="mailto:oit@uah.edu">oit@uah.edu</a>.&nbsp;</p> </td> </tr> </tbody> </table> </td> </tr> </tbody> </table> </td> </tr> </tbody> </table> Cybersecurity Awareness Month Week 4 2023-10-30T10:05:21-05:00 2023-10-30T10:05:21-05:00 /oit/news/18116-cybersecurity-awareness-month-week-4 Jeremy Shelley <p><img src="//images/news/cybersecurity-awareness-month-banner.jpg" alt="cybersecurity awareness week illustration"></p><!-- BEGIN Intro Text --> <p>Many UAH personnel participate in a Hybrid work model - working part of the week from campus and part of the week from home. While it is very convenient to work from home, the hybrid work model does potentially introduce additional cyber risks to UAH that could originate on your home wireless networks and devices in your home. Thankfully there are some simple steps you can take at home to not only protect UAH but you and your family鈥檚 data as well.</p> <p><img src="//images/news/cybersecurity-awareness-month-banner.jpg" alt="cybersecurity awareness week illustration"></p><!-- BEGIN Intro Text --> <p>Many UAH personnel participate in a Hybrid work model - working part of the week from campus and part of the week from home. While it is very convenient to work from home, the hybrid work model does potentially introduce additional cyber risks to UAH that could originate on your home wireless networks and devices in your home. Thankfully there are some simple steps you can take at home to not only protect UAH but you and your family鈥檚 data as well.</p>