Tuesday, April 24, 2018

Spring Cleaning—Be Green, Not Blue


As you upgrade your personal devices to the newest options, do you recycle the old equipment? Being green shouldn't make you blue. Take steps now to remove anxiety later that forgotten sensitive files on your last laptop could become a source of embarrassment or identity theft. Trying to securely delete data at the time you decommission equipment can turn into a multihour chore and a source of stress, but it doesn't need to be that way.
Make sure saved copies of your tax filings, personal photos, and other sensitive files can't be retrieved by the next person with access to your computer's drive by making the drive unreadable to anyone else. Dragging files to the trash or recycle bin doesn't remove data—it just removes the retrieval path to the file and marks that storage space available for other data to occupy sometime in the future. Your pirate treasure is still buried, but the map is missing. "Secure file deletion" functions go a step further to overwrite the data in those locations with random bits immediately.
The introduction and growth of solid state drives in consumer electronics, however, makes overwriting the data in these spaces less dependable than in the standard hard drives of the past. Today's "delete/overwrite" protection comes most reliably from full disk encryption (aka whole disk encryption), which encrypts all data on the machine—including the operating system and temporary files you weren't even aware you created. Follow the motto of a famous infomercial to "set it [full disk encryption] and forget it [the password/key]!" Even if someone removes the drive and puts it into a different machine, the encryption remains in place.
  • Plan A: Encrypt the full disk now using built-in functionality. Create a strong passphrase or password, since this becomes the decryption key! Everything will be encrypted, including the operating system, so you will have to "unlock" the encrypted drive with your personal passphrase every time you start or boot up your computer. Save the generated recovery key somewhere secure (like a password manager or printout stored in a secure office), in case you forget your password and need to access the data on that machine. Here are instructions for some of the most common built-in encryption functions: 
  • Plan B: If full disk encryption wasn't a built-in option, find a free or fee version of full disk encryption software that works with your operating system and personal capability. Check your favorite review sites or try Slant for recommendations.
    • Failsafe: Remove and destroy the drive (Geek Squad offers a three-minute tutorial on hard drive disposal). Most retail stores that accept computer donations for safe recycling will remove the drive and give it to you for secure destruction—just ask them to do that. Hold onto the drive until there's a secure shredding event at work or in your community.

partially reposted from:  https://er.educause.edu/blogs/2017/9/april-2018-spring-cleaning-be-green-not-blue

Monday, April 23, 2018

ITS Request Form Update Add Contacts

We know that sometimes when clients submit a ticket, they want colleagues updated.  We have enabled a new feature allowing contacts to be added to a ticket upon creation.  Next time you submit a ticket using the ITS Request Form, you can add contacts in the "Contact" field.


Important Notice for Some 13-inch Macbook Pros (Non Touch Bar)

Apple has found that some 13-inch Macbook Pros (Non Touch Bar) have a faulty battery that would be eligible for a free replacement.  You can check to see if you are eligible at this Apple Battery Replacement Program site.

Send a PDF version of a document or spreadsheet

Need to send a PDF version of a document or spreadsheet? Share via URL.
Here's how → http://goo.gl/TuFHSE 

Reposted from @GSuite

Monday, April 16, 2018

ITS Customer Satisfaction Survey

Please take a moment to fill out the semesterly ITS Customer Satisfaction Survey.  Please try to think only of your experience with ITS for the Spring 2018 semester. Here is a link to the customer satisfaction survey.
Thank you for your feedback.

Friday, April 13, 2018

Jamboard Training for Students in O'Malley Library: April 18

ITS is presenting a Jamboard Training Session on the following date during Community Period: 
  • Wednesday, April 18th from noon to 1:00 pm
Location:  O’Malley Library Jamboard Room #401

The following topics will be covered:
  • Explain what a Jamboard is and its features 
  • Overview of the system of ownership and collaborators
  • Using the Tool Set
  • Pushing a Jam to the Jamboard
  • Ending a Jamboard session
We will be able to address any Jamboard Related questions you may have.




Thursday, April 12, 2018

COMPLETE: Horan Hall - Brief Network Outage 4/13 at 10am

Physical Plant will be conducting a generator test in Horan Hall today, April 13th at approximately 10:00am. 

There will be two brief outages, one while switching to generator power, the other while switching back to main power.

This will not affect the rest of campus.