February 2018 Technology News

Thursday, February 22, 2018

Office 365 productivity tools launched

Our Office 365 subscriptions just keep getting better and better! On February 19th, ITCS launched four important apps that make any project, whether it’s a group assignment or committee presentation, far more organized, informed and professional than ever before.

Teams. Bring your project group together in one work space through the Teams app. Features include private or team text conversations, video and audio conferencing, file storage, OneNote and Planner project tools. Everything your team needs in one place.

To get started, visit the Teams page to see the features you can use. Then, go to the Microsoft Teams training page to help your work group get started with this powerful tool.

Planner. Organize your project into “buckets,” set deadlines and assign tasks to keep everything on track. See the Microsoft Planner page to learn about all its features, then use the Lynda.com training course to learn how your project group can benefit.

Forms. Create and distribute polls, quizzes and surveys. As results are submitted, use the built-in analytics to evaluate your data. Exporting to Excel also available.

Please note: Forms is a lightweight app to collect feedback and is subject to the same terms and conditions regulating ECU’s survey tools, Qualtrics and REDCap. See the Forms page to read the terms and conditions and learn how Forms works.

Sway. Create image-rich, multimedia presentations using existing documents or from scratch. Embed video, audio, maps, documents and photos – Sway walks you through the process for reports, newsletters, projects and more. Add a password and share the link to your creations stored on the Sway website.

Learn about Sway’s features through the Microsoft Sway website and then access the Lynda.com video course. Ready to start using these powerful productivity tools?

Log in to pirate365.ecu.edu and click the app launcher icon to access these and other Microsoft productivity apps.


Vishing – New Name for an Old Problem

Protect your information at home and at work

Vishing, or voice phishing, is a scam that occurs over the phone. Most often, you receive a phone call from someone giving a fictitious name who attempts to trick you into revealing personal or financial information. This information is then used for identity theft, financial fraud or other criminal activity. However, as the saying goes, “forewarned is forearmed,” and learning to recognize a vishing phone call is one more weapon in your IT security arsenal.

Learn to catch a vish

Vishers (scammers) may offer non-existent, extravagant prizes, products or services to lure you in and then request your credit card number or other personal information to cover “associated fees” or the like.

Other common examples include:

  • Offers from a company with which you’ve never done business.
  • Offers from a business of which you’ve never heard.
  • An announcement that you have won a prize in a contest you did not enter.
  • Promises of unrealistic returns for your money.
  • Pressure to make immediate decisions to give the caller:
    • Money
    • Financial account information
    • Personal information
    • ECU information, including coworker names, contact or personal information
  • Threats of consequences—such as fines or penalties.
  • Unprofessional, hostile or even obscene language.
  • Unsolicited calls offering to help you with debt, unpaid taxes or previous cases of fraud.

You can learn more about these and other signs of a scam from the Federal Trade Commission (FTC) phone scam page.

Protect your information
  • If suspicious of a caller, ask him for a name and number. Advise him you will call back. Then, find the organization’s number on an official website and try to contact the person. If the caller refuses to provide this information or is persistent in asking you for information, advise him that you will not assist and disconnect the call.
  • Do not pay fees for prizes or rewards offered by phone.
  • The IRS will never ask for debit or credit card numbers by phone or demand immediate payment using specific methods like prepaid gift cards, debit cards or wire transfers. The IRS will generally contact you first via U.S. Mail.
  • Do not send money or give out personal information (such as credit card numbers and expiration dates, bank account numbers, dates of birth, or Social Security numbers) in response to unsolicited phone calls from unfamiliar companies or unknown persons.
  • Don’t trust caller ID. Phone numbers and caller identities can be faked. There have been reports of forged phone numbers from government offices, businesses and institutions.
  • Follow this guidance from the FTC:

If you receive what you suspect to be a Vish or believe you have given out university information to a scammer over the phone, please report this to the IT Help Desk 252.328.9866 | 800.340.7081.


March IT Training

Register through Cornerstone


CommonSpot Beginner Training
Wednesday, March 21
9:00 a.m. – 11:00 a.m.
Austin 309

Creating Accessible Content for Instruction
Tuesday, March 13
11:00 a.m. – 12:00 p.m.
Austin 309

iWebfolio E-Portfolio Training
Thursday, March 15
3:00 p.m. – 4:00 p.m.
Laupus Library Room 2502G

SabaMeeting Virtual Classroom
Tuesday, March 20
10:00 a.m. – 12:00 p.m.

Thursday, March 22
3:00 p.m. – 5:00 p.m.
Joyner East 204

University Writing Portfolio Orientation
Monday, March 12
12:00 p.m. – 1:00 p.m.
Joyner East 204

Tuesday, March 6
2:00 – 3:30
Joyner East 204

Wednesday, March 21
9:00 a.m. – 10:30 a.m.

WordPress Official Website Training
Wednesday, March 14
9:00 a.m. – 12:00 p.m.
Austin 309

Tuesday, March 27
1:00 p.m. – 4:00 p.m.
Austin 309

NCSA’s Data Privacy Day is Sunday, January 28

Celebrate by Making Data Privacy and Security Your New Year’s Resolution!

What personal information are you sharing?

Often, the terms data privacy and data security are considered interchangeable. While they are related, they are not the same at all.

Data privacy addresses user control over how personal information is collected, used and shared, while data security refers to the actual protection of data.

In celebration of National Cyber Security Alliance (NCSA) Data Privacy Day, we’ve collected a few privacy tips and resources to help you gain (or regain) control of your personal information.

  • Personal information is like money. Value it. Protect it. Be mindful of who gets your information and how it is obtained.
  • Own your online presence. Set privacy and security settings to your comfort level for information sharing. It’s OK to limit how and with whom you share information.
  • Lock down your login. A username and password is no longer enough to protect key accounts like email, banking, and social media.Turn on the strongest authentication tools available, such as biometrics, security keys or two-factor authentication. ECU is implementing MFA for student email.
  • Keep a clean machine. Update your security software, web browser and operating system to have the best defense against viruses, malware, and other online threats. ECU offers a free download of Symantec EndPoint antivirus, Windows 10 upgrade and the latest MS Office version for your personal computer.
  • Share with care. Information you post lasts a lifetime. Before posting something about yourself or others online, think about how it might be perceived now and in the future and who might see it. See these social media guidelines for ECU users.
  • Secure your devices. Every device should be secured by a password or strong authentication ‒ finger swipe, facial recognition, etc. These security measures limit access to authorized users only and protect your information if devices are lost or stolen. See these resources for data encryption.
  • Think before you app. Information about you, such as the games you like to play, your contacts list, where you shop and your location, has tremendous value. Be thoughtful about who gets that information and understand how it’s collected through apps.


Privacy Insights for ECU Faculty and Staff

Privacy is good for business

In recognition of this year’s DPD theme, “Respecting Privacy, Safeguarding Data and Enabling Trust,” the tips below can help you, as an ECU employee, protect the data in your care, whether student, staff, faculty, patient or donor.

  • If you collect it, protect it. Follow ECU policies, regulations and standards  to keep individuals’ personal information safe from inappropriate and unauthorized access.
  • Be open. Think about how the consumer may expect his or her data to be used, and design settings to protect this information by default. See this one-page best practices handout.
  • Build trust. Communicate clearly and concisely about the steps we take to achieve and maintain privacy. ECU Regulation on SSN and PII.
  • Maintain our culture of privacy. See this list of storage solutions for sensitive information.
  • Conduct due diligence and maintain oversight of partners and vendors. If someone provides services on your behalf, you are responsible for how your customers’ personal information is collected and used.

Sources: StaySafeOnline.org and the ITCS website.

For more information regarding data security, see the Best Practices for Information Security website.

Increased Account Security for Student Email

Enable your account now through the ECU passphrase maintenance website

Beginning Tuesday, February 13, 2018, your ECU email account will require that both your passphrase and a response from your phone be used to verify your identity when logging in from off campus. This is called Multi-Factor Authentication (MFA), which provides an additional layer of security for your account.

Mandatory MFA for student email begins Tuesday, February 13

You will be notified one week prior to your account being enabled

Once enabled, your email is unavailable until MFA is configured

Ready to Begin Using MFA Now?

Follow these steps to enable your own account. Setup instructions with screen shots are attached (PDF). Visit the MFA website for more information, including a frequently asked questions section.

  1. To enable MFA on your email account, log in to pirateid.ecu.edu from a computer browser.
  2. Click the Multi-Factor Authentication (MFA) icon. A new page opens.
  3. Click the Enable Multi-Factor button. The page changes.
  4. Click the Main Menu button to return to the maintenance home page.
  5. Click the Exit System icon.
  6. Log in to your email account and follow the steps to configure one of the MFA methods below.
Method How it Works

MFA Authentication Options

Multi-Factor Verification (Steps 1 and 2)
Phone Call After signing in to mymail.ecu.edu using your PirateID and passphrase, Microsoft calls your phone. Click the pound (#) key to verify your identity.
Mobile Text After signing in to mymail.ecu.edu using your PirateID and passphrase, Microsoft texts a 6-digit code to your mobile phone. Enter the code to verify your identity. Carrier text messaging rates apply.
Mobile App Download the Microsoft Authenticator app to your mobile. After signing in to mymail.ecu.edu using your PirateID and passphrase, either tap verify in the app or use the one-time password to confirm your identity. Standard message and data charges from your carrier may apply.
App Passwords (Step 3)
App Password
Windows phone, Android, iOS
Microsoft-generated password replaces your ECU passphrase in mobile email settings and other apps for which there is no sign-in screen. If you don’t log in to an app through the purple MyMail page, you need an app password.

Need more information?
Visit the MFA website for step-by-step instructions with screen shots. Need live help? Call the IT Help Desk 252.328.9866 | 800.340.7081 or visit your nearest Pirate Techs location: Joyner 1101 | Health Sciences Student Center 211.