vol.10 no.15 | august 2014 back to school 2014guides, ensuring all students and visitors can locate...

2
FIND YOUR WAY . . . Information Technology Division|Bulletin vol.10 no.15 | August 2014 From Here, It’s Possible MESSAGE FROM THE CIO Welcome back to another energizing, hectic fall semester at Texas Tech University. Our record enrollment, growing sponsored research, and strategic hires add extra excitement to the Fall 2014. In this issue, we welcome you back and remind you of IT Discounts, Educational Opportunities, and the Acceptable Use policy. We also invite you to explore our new Wayfinding kiosks located in the Student Union building. As always, please be vigilant in practicing safe computing; we provide information on a newer strain of IT threats - ransomware. We look forward to another record semester on and off the field - Go Tech!! Sam Segran Associate Vice President for IT and Chief Information Officer In partnership with the Student Government Association and Student Union & Activities, the TTU IT Division has placed three interactive wayfinding kiosks in the Student Union Building (SUB). Visit one of three locations in the SUB: near the ATMs, Police Station, and Barnes & Noble Bookstore, to try out the latest technology tools developed on our campus, for our campus. These touchscreen kiosks display maps of the Student Union Building and the Texas Tech University main campus, as well as Citibus routes, parking information, SUB events, and TTU events (Events@TexasTech). Each kiosk is wheelchair- accessible and has options for high-contrast display and audio guides, ensuring all students and visitors can locate directions and navigate our large, beautiful campus with confidence. For more information about obtaining Wayfinding kiosks or digital signage for your area, please contact IT Help Central 806-742-4357 (HELP) or [email protected]. As you take advantage of the many information resources provided by Texas Tech University, please remember that use of these resources must adhere to the TTU IT Acceptable Use Policy. The Acceptable Use Policy defines your personal responsibilities when using TTU information resources. Examples of institutional information resources include but are not limited to, mobile devices, electronic files, data, computer hardware and software, peripherals, networks, etc. Highlights of the Acceptable Use Policy: The TTU policy applies to all TTU faculty, staff, students, and others granted access to any University information resources, regardless of location or method of access; Information resources must be used in a manner consistent with the mission and objectives of TTU and the State of Texas; TTU faculty, staff, and students must only use information resources they have been granted access to and no one may attempt to circumvent security measures; Information on safe computing practices is available for the campus community at http://safecomputing.ttu.edu. Please report any potential or actual IT security violations or weaknesses immediately to the TTU Information Security Officer at (806) 742-0840 or [email protected]; Be respectful, courteous, and ethical in the use of information resources; Do not share information resources login information (e.g., eRaider user name or password). Account owners are personally responsible for all uses associated with their account; Incidental personal use is restricted to authorized users within certain guidelines (outlined in the Acceptable Use Policy); TTU information resources must not be used for personal/commercial gain or for political activity; and All use of information resources is governed by local policies and applicable state/federal law. We invite you to review the complete list of TTU IT Security Policies at http://www.it.ttu.edu/security. In all things at TTU, Integrity Matters! ACCEPTABLE USE OF TTU INFORMATION RESOURCES BACK TO SCHOOL 2014 Youssef Ettoumi, Economics major, by kiosk near the SUB ATMS. Andres Flores, History major, by kiosk near the SUB Police Station. Kiosk near Barnes & Noble Bookstore.

Upload: others

Post on 22-May-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: vol.10 no.15 | August 2014 BACK TO SCHOOL 2014guides, ensuring all students and visitors can locate directions and navigate our large, beautiful campus with confidence. For more information

FIND YOUR WAY . . .

Information Technology Division|Bulletinvol.10 no.15 | August 2014

From Here, It’s Possible

MESSAGE FROM THE CIO

Welcome back to another energizing, hectic fall semester at Texas Tech University. Our record enrollment, growing sponsored

research, and strategic hires add extra excitement to the Fall 2014. In this issue, we welcome you back and remind you of IT Discounts,

Educational Opportunities, and the Acceptable Use policy. We also invite you to explore our new Wayfinding kiosks located in

the Student Union building. As always, please be vigilant in practicing safe computing; we provide information on a newer

strain of IT threats - ransomware. We look forward to another record semester on and off the field - Go Tech!!

—Sam Segran Associate Vice President for IT and Chief Information Officer

In partnership with the Student Government Association and Student Union & Activities, the TTU IT Division has placed three interactive wayfinding kiosks in the Student Union Building (SUB). Visit one of three locations in the SUB: near the ATMs, Police Station, and Barnes & Noble Bookstore, to try out the latest technology tools developed on our campus, for our campus.

These touchscreen kiosks display maps of the Student Union Building and the Texas Tech University main campus, as well as Citibus routes, parking information, SUB events, and TTU events (Events@TexasTech). Each kiosk is wheelchair-accessible and has options for high-contrast display and audio guides, ensuring all students and visitors can locate directions and navigate our large, beautiful campus with confidence.

For more information about obtaining Wayfinding kiosks or digital signage for your area, please contact IT Help Central 806-742-4357 (HELP) or [email protected].

As you take advantage of the many information resources provided by Texas Tech University, please remember that use of these resources must adhere to the TTU IT Acceptable Use Policy. The Acceptable Use Policy defines your personal responsibilities when using TTU information resources. Examples of institutional information resources include but are not limited to, mobile devices, electronic files, data, computer hardware and software, peripherals, networks, etc. Highlights of the Acceptable Use Policy:• The TTU policy applies to all TTU faculty, staff, students,

and others granted access to any University information resources, regardless of location or method of access;

• Information resources must be used in a manner consistent with the mission and objectives of TTU and the State of Texas;

• TTU faculty, staff, and students must only use information resources they have been granted access to and no one may attempt to circumvent security measures;

• Information on safe computing practices is available for the campus community at http://safecomputing.ttu.edu. Please report any potential or actual IT security violations or weaknesses immediately to the TTU Information Security Officer at (806) 742-0840 or [email protected];

• Be respectful, courteous, and ethical in the use of information resources;

• Do not share information resources login information (e.g., eRaider user name or password). Account owners are personally responsible for all uses associated with their account;

• Incidental personal use is restricted to authorized users within certain guidelines (outlined in the Acceptable Use Policy);

• TTU information resources must not be used for personal/commercial gain or for political activity; and

• All use of information resources is governed by local policies and applicable state/federal law.

We invite you to review the complete list of TTU IT Security Policies at http://www.it.ttu.edu/security. In all things at TTU, Integrity Matters!

ACCEPTABLE USE OF TTU INFORMATION RESOURCES

BACK TO SCHOOL 2014

Youssef Ettoumi, Economics major, by kiosk near the SUB ATMS.

Andres Flores, History major, by kiosk near the SUB Police Station.

Kiosk near Barnes & Noble Bookstore.

Page 2: vol.10 no.15 | August 2014 BACK TO SCHOOL 2014guides, ensuring all students and visitors can locate directions and navigate our large, beautiful campus with confidence. For more information

Contributions by: Katherine Austin Beltz, Ph.D., Jeff Barrington, Darrell Bateman, Logan Beaty, Andrew Bevly, Shannon Cepica, Scott Hall, Ron Nail,

Adrianna Robertson, Amanda Salazar, Britta Tye, and Allen Young.Safe Computing Practices Committee: Sam Segran, Katherine Austin Beltz, Ph.D.,

Jeff Barrington, Darrell Bateman, Shannon Cepica, Scott Hall, Danny Mar, Ron Nail, Yung Ng, Randall Osborne, Mike Simmons, Phil Smith, Ph.D., J Stalcup, Britta Tye,

John Vandygriff, Allen Young, and assistance from IT Division staff.

Mail Stop 2008Phone: 742-5151Fax: 742-5155

Copyright 2014 Texas Tech University

IT Website:www.infotech.ttu.edu

Texas Tech University Website:

www.ttu.edu

Computer-BasedTraining(CBT):

cbt.ttu.edu

Safe Computing Practices:safecomputing.ttu.edu

Scan the barcode to view IT Bulletins online

www.infotech.ttu.edu/itbulletin

Ransomware is malware (malicious software) used for extortion. Using ransomware, Internet criminals will take control of a computer and the files stored on it, and hold them hostage until a ransom is paid. Criminals hold the information and system hostage by either blocking access to the computer, or encrypting the files. Access to the computer or files is restored once the ransom is paid.

As with most spam and phishing schemes, ransomware is usually introduced through email, enticing the reader to visit a website or open an attachment. Some Internet criminals cleverly impersonate credible authorities or organizations. Ransomware can also be distributed by pop-up windows on public websites that have been compromised. Once a system is infected with ransomware, the user receives a hostile communication outlining the terms of the ransom. Unfortunately, those that pay the ransom often do not get full system and data access back, and they are subject to further identity theft.

Be on guard and protect yourself against ransomware and other Internet based criminal activities:• Install anti-virus and anti-malware software;• Maintain operating system and application updates- we

recommend that you configure your system to install automatic updates:

» Windows Users: http://windowsupdate.microsoft.com

» Mac Users: Use Software Update in System Preferences

• Think before you click email links, pop-ups, websites; and• Backup your system regularly.If you believe that your system is infected with ransomware, shut down your computer and contact your area or department IT professional. For more information or questions about ransomware on TTU-owned systems, please contact IT Help Central at (806) 742-4357 (HELP) or via email at [email protected]. You can find additional cyber security tips at http://safecomputing.ttu.edu.

TTU students, faculty, staff - and even alumni - are eligible to receive discounts on hardware and software products by being a part of the Red Raider community. Visit the IT Help Central website at http://www.ithelpcentral.ttu.edu and click on the “Buying the Right Computer” link for recommendations, as well as links to the Apple and Dell online stores for a variety of hardware purchases. For TTU site licensed software, visit http://www.itts.ttu.edu/software for information on obtaining a variety of software titles at little or no cost. For additional questions, call IT Help Central at (806)742-4357 (HELP) or [email protected].

Through partnerships with Dell and Apple, the TTU Information Technology Division and TTU Procurement Services have streamlined the process for departments to obtain the best pricing possible on technology hardware. For more information on hardware recommendations, visit IT Help Central’s “Buying the Right Computer” page at http://www.ithelpcentral.ttu.edu. For your department’s convenience, online purchase orders can be pre-populated through the Purchasing Department’s website. Equipment can be delivered to the location of your choice, such as your department or Central Warehouse. For Texas Tech departmental purchases, visit http://techbuy.ttu.edu.

The Information Technology Division offers a wide range of educational opportunities for students, faculty, and staff. We offer instructor-led and self-paced instruction, delivered in the classroom and online. We invite you to attend our regularly scheduled classroom courses; you may review and register at the following location - www.itts.ttu.edu/training/shortcourses. Most of these sessions are held in the Advanced Technology Learning Center (ATLC) computer labs, located in the west basement of the University Library building. We also provide customized sessions, and can bring the training to a location of your choice.

In addition, the TTU IT Division partners with Skillsoft (CBT - cbt.ttu.edu) to offer self-paced, non-credit online training courses. With a catalog of over 5,000 online courses, covering a wide range of business, technical, financial, management, and communication topics, there is something for everyone. These rich and engaging courses are available at no additional cost to the TTU community. Courses are accessible 24/7 and you can even download courses for offline viewing. Visit www.itts.ttu.edu/training for more information on shortcourses or computer-based training. If you have any questions, please contact us at [email protected].

IT DISCOUNTS: DEPARTMENTAL PURCHASES

IT DISCOUNTS: PERSONAL PURCHASES

JUST IN TIME: JUST YOUR WAY- IT SKILLS

RANSOMWARE: WHAT YOU NEED TO KNOW