Zoom is the new Cornell web conferencing platform.
On Tuesday, January 10, 2017 CIT will hold two campus Zoom training sessions in Bailey Hall. Please share with your units and departments, all are welcome to attend.
Zoom Basics will be held from 1:00pm – 2:00pm. Topics covered in Zoom Basics will include;
- logging in,
- configuring your profile,
- scheduling from the web profile,
- in session controls,
- how to install the Zoom Client App,
- information on further Zoom support and online tutorial.
Zoom Advanced will be held from 2:00pm – 3:00pm. Topics will include Zoom features such as;
- break out rooms,
- the Zoom mobile app,
- scheduling from the Zoom Client app,
- Zoom Outlook Plug-In.
To attend via Zoom: https://cornell.zoom.us/j/793895430?pwd=eWVzu3WuERI%3D
Find out more at http://www.it.cornell.edu/services/webconferencing/
Box launched an updated user experience back in September, making it even easier to work in Box. We encourage you to try the new Box experience. To try the new experience on your Box account go to https://cornell.app.box.com/on/allnewbox.
To see everything the new interface includes go to: http://itnews.cornell.edu/check-out-new-box-user-experience
All college owned computers currently have “Identity Finder” software installed in order to assist faculty and staff in identifying confidential, restricted, or personally identifiable, information that might be stored on them. Beginning in November 2016, CALS OIT will reinitiate the effort of automatically running Identity Finder on all college owned computers on a quarterly basis.
Following the completion of Identity Finder scanning on college owned computers, a results window similar to the image below will appear. If the software locates data that it identifies as potentially confidential, restricted, or personally identifiable, it is up to each employee to act upon the Identity Finder results and decide how to handle the data.
If you don’t have ID Finder on your computer, please submit a request here: http://help.cals.cornell.edu”
Microsoft has removed Outlook 2011 for Mac from the Office 365 Portal and announced that the email and calendar application will no longer be supported as of October 2017. For these reasons, and to focus support resources where there is greatest demand, as of March 31, 2017, Outlook 2011 for Mac will no longer be supported by the IT Service Desk and the Cornell Office 365 team.
Would you like to know more? Go to: http://itnews.cornell.edu/upgrade-outlook-2011-mac-outlook-2016-mac
On October 21, 2016, support will end for Symantec Endpoint Protection (SEP) and PGP Encryption. Individuals who installed Symantec Antivirus from Cornell websites on their personally owned computers need to remove SEP and install / enable one of the following options. Computers that are not transitioned away from SEP by October 21 will have out-of-date virus definitions, making them increasingly vulnerable to attack.
There is not a free home use license under Cornell’s current contract, CIT recommends the following free options:
- Windows 8 and 10 use built-in Windows Defender
- Windows 7 use Microsoft Security Essentials
- Mac OS use Sophos Home
We don’t use or recommend TeamViewer but some of our clients might use it, if so be aware of this compromise and let us know if you have questions.
Policy changes by the world’s major email service providers are increasingly starting to affect delivery of Cornell email for people who have chosen to automatically forward their Cornell email to another non-Cornell account.
In response, on May 31st, CIT will change the method used to automatically forward Cornell email.
To find out more go to: http://www.it.cornell.edu/services/guides/email/external-delivery.cfm
Starting Monday, May 23, 2016, in order to better protect Cornell’s community against malicious email attachments that often pose as something legitimate, the IT Security Office has requested that a list of file types most often used to deliver malware be blocked from Cornell’s email systems. This change aligns our systems with those of many of our peer institutions and industry best practices.
See more info, including a full list of the blocked file types: http://www.it.cornell.edu/services/guides/email/blocked-attachments.cfm
A new wave of ransomware (malicious software that encrypts files for ransom) is being reported in the news and by some users within the Cornell community. These particular instances of ransomware trick Windows users into either applying fake software updates (e.g. Adobe) or enabling features in products like Microsoft Office.
Find out more at IT: Status Alert Details
Fraudulent emails are targeting Cornell by claiming to be from a Cornell office or official, requesting personal information and passwords. They are trying to scare people into reacting by creating a sense of urgency with ALL CAPS, threatening to close an account, etc. Unfortunately, these types of phishes are becoming incredibly common.
For a recent example where someone almost transferred $9,000 due to a phish, see the security alert we posted on December 17, 2015, Highly sophisticated email fraud is leveraging Cornell names and relationships: http://www.it.cornell.edu/services/alert.cfm?id=4117
Status Alert Details
Source: IT: Status Alert Details