Faculty and Staff Technology News | July 31, 2018

WebEx Upgrade Coming August 1

Please Note: WebEx is a cloud-hosted service and is subject to continuous updates scheduled by Cisco.

On Wednesday, August 1, Cisco is launching a new interface for WebEx Meeting Center. This upgrade includes a redesigned interface with updated options for accessing meeting controls, controlling video layouts and sharing content.Training Center, which is typically used by faculty for instructional web conferencing is not affected by this upgrade.

What’s New

Centralized Meeting Controls

Meeting controls are docked at the bottom of the meeting screen. The controls hide when not in use and re-appear when you move your mouse.

New Sharing Options

The Sharing option is quickly accessible from the Meeting Controls dock. When used, thumbnails help you quickly find content you want to share.

Video Only Layouts

Users can choose one of three video-only layout options.

  1. Active Speaker Video: Single video of attendee who is actively speaking displays.
  2. Active Speaker and Thumbnail: Large video of active speaker displays center screen along with scrollable list of thumbnail videos at bottom of screen.
  3. Grid View: Scrollable video grid of all attendees.

Video + Sharing Layouts

Users can choose one of three Video + Sharing layout options.

  1. Active Speaker and Thumbnail: Thumbnail video of active speaker displays next to content and a scrollable list of videos of attendees displays above content
  2. Side-by-Side View: Scrollable grid of videos displays next to shared content
  3. Floating View: Floating panel displays videos and can be moved or resized.

ECU Buccaneer Redirects Students to Eduroam

Starting July 31, 2018, students connecting to the Buccaneer network will be redirected to enroll into eduroam, ECU’s primary network. This redirect process is in preparation for the decommissioning (shut down) of the Buccaneer wireless network scheduled for December 13.

Eduroam offers a secure connection, protecting your data from malicious activity. Eduroam is also a global wireless network for research and education institutions. Enrolling in eduroam allows you to travel to participating institutions and connect to the eduroam network with your existing ECU credentials.

For a list of participating institutions within the United States, visit https://www.eduroam.us/institutions.

For device-specific instructions on enrolling into eduroam, please go to http://www.ecu.edu/itcs/help/eduroam

Need help? Call the IT Help Desk at 252.328.9866 | 800.340.7081.

macOS Dropping Support for 32-bit Applications

The current version of macOS High Sierra is the last version of macOS to run 32-bit apps. Once your system upgrades to the next version of macOS, you will receive the following message when you launch a 32-bit application:

“<NameOfApp> is not optimized for your mac. This app needs to be updated by its developer to improve compatibility.”

If you receive this message, contact the app’s manufacturer for the 64-bit version. Once you install the 64-bit version, there should be no further problems. ITCS is currently checking ECU’s managed apps for this conflict, including those on the ECU Download Center.

To check your Mac apps in advance, follow these steps:

1.      Click the Apple icon.
2.      Choose About This Mac. A dialog box opens.

3.      Click the System Report button.
4.      Scroll down to the Software section.

5.      Choose Applications. A list of apps opens. See the 64-Bit (Intel) column. “Yes” indicates a 64-bit app.

Banner 9 Finance Forum

Save the Date!! If you are a Banner user, join us Monday, August 6, for a 3-hour Banner 9 Finance Forum. This half-day session will introduce you to Banner 9 Finance as well as easy navigation to your favorite forms.

Registration opened July 2 through Cornerstone. We anticipate each session to fill up quickly, so reserve your seat as soon as possible! Sessions will be streamed live and recorded. See you there—

Microsoft Intune Replaces AirWatch for Mobile Device Management

We all enjoy the convenience of information access through many devices:  office computers, laptops, tablets and mobile phones, both personal and university-purchased. However, we also balance this access with two of our most important responsibilities at ECU, data protection and data security.

ITCS assists us in minimizing the risk of a data breach while enabling anywhere productivity by implementing standard security protections that follow state and federal mandates. Two of these standards are Mobile Device Management (MDM) and Mobile App Management (MAM).

Mobile Device Management configures certain security settings on a personal or ECU-owned mobile device to allow access to sensitive ECU data. Examples of devices that might require MDM include:

  • Department laptop/tablet carts where devices are checked out or used by many members
  • A personal mobile device that accesses sensitive or protected information.

ECU’s previous MDM product, AirWatch, has been retired and replaced with Microsoft Intune. If your device was previously configured with AirWatch, you can now enroll with Intune. See these step-by-step instructions from Microsoft. Intune is available for Windows, Mac, iOS and Android.

Mobile App Management allows departments to lock down certain applications to comply with security policies. For example, MAM could be used to prevent downloads from Outlook. ITCS is currently testing this Intune feature with ECU systems over the next few months.

We all appreciate the convenience of BYOD (bring your own device) at ECU. And the Microsoft Intune service allows access to needed information without sacrificing security.

Enterprise Vault Items Move Back to Your Mailbox

ITCS prepares for the move to Office 365 email

As ECU moves toward moving faculty/staff email to Office 365, the next step is migrating Enterprise Vault items back to your mailbox.

At a Glance

1.      ECU is moving faculty/staff email to Office 365 during 2018-19.

2.      Enterprise Vault items migrating BACK to mailbox is the next step.

3.      Users don’t need to prepare for this migration.

4.      Once they are moved back to your mailbox, items will follow ECU expiration rules, including those messages stored in your Online Archive folder.

5.      Users will be free to organize their messages as they need through manual archiving.

6.      Users should check Junk folder.

7.      Call the IT Help Desk for help.

The Big Picture

Moving both email systems (faculty/staff and students) to Office 365 will help you communicate more effectively with your students. For example, it will be easier to coordinate calendars and work with many of the other tools and apps available with Office 365, such as Teams, OneNote, Planner, Sway and more.

What to Expect

During the migration, items dated within the last three years go back to your mailbox while everything else migrates to your Online Archive folder. Your mailbox will expand to accommodate current messages as well as vault items. You receive an email once the move is complete.

How to Prepare

There is nothing you need do to prepare for this part of the project. However, after the transfer, you can manage your mailbox to suit your needs. For example, create a folder in the Online Archive and drag/drop items from your mailbox or create a rule to automatically archive particular messages.

Information to Know

  • The Online Archive folder is available through Outlook (Windows) and Piratemail (Mac and Windows).
  • Online Archive items are subject to the same expiration rules as all other mailbox folders.

Have Questions or Need Help? Contact the IT Help Desk at 252.328.9866 | 800.340.7081

Office 365: OneDrive Storage and Teams Make Work Easy

OneDrive
So you’ve started storing work files in your OneDrive folder and configured the sync feature. Now, take this to the next level with real-time collaboration. Learn how through this Microsoft article on collaboration.

Teams
Would your department or research team like to learn more about how to use Microsoft Teams to your advantage? Contact Learning Platforms’ Allen Dennis to schedule a presentation. Allen gives you the overview of how to create a team, how to add members, how to manage the file space, conduct meetings and more.

For the self-starters, here are a few self-help options:

August IT Training

Register through Cornerstone: www.ecu.edu/itcs/help/cornerstone

WebEx for Instruction: Virtual Classroom

Monday, August13
2:00 p.m. – 4:00 p.m.
Online

Friday, August 17
10:00 a.m. – 12:00 p.m.
Joyner East 204

WordPress Official Website Training

Wednesday, August 22
9:00 a.m. – 12:00 p.m.
Austin 309

VoiceThread

Friday, August 3
10:00 a.m. – 11:30 a.m.
Online

Tuesday, August 7
11:00 a.m. – 12:30 p.m.
Austin 308

TurningPoint Audience Response System Workshop

Wednesday, August 15
2:00 p.m. – 3:30 p.m.
Joyner East 204

REDCap Basic User Training

Thursday, August 30
9:00 a.m. – 10:30 a.m.
Laupus Library Rm. 2502G

My Mediasite Training

Monday, August 6
1:00 p.m. – 2:30 p.m.
Austin 309

Wednesday, August 8
2:00 p.m. – 3:30 p.m.
Austin 309

Wednesday, August 15
2:00 p.m. – 3:30 p.m.
Austin 309

Tuesday, August 21
1:00 p.m. – 2:30 p.m.
Austin 309

Wednesday, August 22
2:00 p.m. – 3:30 p.m.
Austin 309

Macs and Windows Vulnerable to Ransomware

Infected ECU computers will be wiped

Unless you’ve been stranded on a desert island for the last few weeks, you know that ransomware is a global threat affecting vulnerable Windows and Mac computers. Yes, even the Macintosh OS can be infected by this insidious malware that locks your system, encrypts your data and infects the network to which you are connected. While this threat may seem scary and overwhelming, there are ways to circumvent being a victim. Read on to get started.

How Does Ransomware Work?

The user clicks on a malicious link or document that triggers the ransomware code. If the computer’s software is unpatched and unprotected, the worm finds its way in and looks for files to encrypt. After encrypting your files, it then moves on to the network to find other Mac or Windows targets.

If the ransomware cannot encrypt anything or access the network, it can go dormant until triggered.

Even if you pay the ransom, and the files are decrypted, the thieves may have left a way to reinfect your system at a later date in order to extort more money from you.

What Happens if Your ECU Computer Becomes Infected?

If your ECU computer becomes infected with ransomware, ITCS cannot recover your data. The hard drive will be wiped and all data will be lost.

How Can You Protect Yourself?

Following these tips for your ECU or personal computer will go a long way toward protecting your system from ransomware.

  1. Do not store ECU data on your computer.
  2. Create and manage a backup for data that is stored on the system.
  3. Do not open spam emails or emails from unknown senders.
  4. Do not download or open attachments from suspicious emails.
  5. Do not click links in suspicious emails.
  6. Keep your operating system up to date.
  7. Keep Symantec EndPoint Protection up to date. It is also available for your personal computer from the ECU Download Center.
  8. Turn off administrative privileges on your computer account. Use a separate account with higher level privileges if needed.
  9. Remove outdated plugins in your web browsers.

While not completely fool-proof, these actions go a long way toward keeping your data safe from hackers.

Need more help or have questions? Contact the IT Help Desk at 252.328.9866 | 800.340.7081.

What You Need to Know Before Purchasing Apple Laptops

The new 2016 MacBook Pro models have two major changes in the hardware that should be noted.

Hardware change one:

The new SSD hard drive is soldered to the board. This means it cannot be replaced without replacing the entire logic board. Retrieval of data on the laptop may not be possible depending on the extent of the damage. (Apple warranty is for manufacturing issues only; not for liquid spills, drops or abuse).

With this new format, it will be critical for you to back up your data using the Piratedrive for sensitive documents and OneDrive for off-campus collaboration.

Hardware change two:

The ports on the sides of your new laptop have completely changed. They are now all USB-C, so you will need to research the adapters to attach any monitors, printers, keyboards or other peripherals. The Belkin USB-C to Gigabit Ethernet Adapter is required to attach to ECU’s network. Details can be found at: https://support.apple.com/en-us/HT204360.

New features: