Updating Emergency Contacts in my.SMU

If you haven’t recently, it’s a good time to update your emergency contacts in my.SMU.

Faculty & Staff Instructions

  1. From the landing page, select Personal Information located under Employee Self – Service.employee self service
  2. Click on Emergency Contacts.
  3. Click Add Emergency Contact.
  4. Enter the Contact Name.
  5. Indicate the Relationship to Employee. If the employee has the same address or telephone select one of the following options:relationship to employeeIf you indicated that the emergency contact address or phone is the same as yours it will display on the screen and can be edited if needed.
  6. If the contact has a different address select Edit Address to provide address information.
  7. If the contact has a different phone select Add Phone Number and indicate the Phone Type and Phone Number.
  8. Click Save. To view a contact list select the Return to Emergency Contacts link.
  9. For multiple contacts check one to be the Primary Contact.primary contact
  10. Edit or Delete contacts by selecting the appropriate icons.edit or delete
  11. Click Save.

Student Instructions

Visit the Update/Verify Personal Info section of the Student Self-Service tutorial: sites.smu.edu/oit/training/story/studentselfservice/story.html.

Microsoft Forefront Replacement Coming this Month!

Microsoft is discontinuing support for and replacing Forefront, our licensed anti-virus application for SMU Windows machines, with a solution called Endpoint Protection.  OIT will begin deploying this replacement product via LANDesk over the next several weeks.

About Endpoint Protection

Endpoint Protection provides anti-virus and anti-malware protection, detection and remediation capabilities.  The agent runs in the background and daily scans to ensure your computer is free from malware.  If malware is present, it will attempt to clean it.  Machines that cannot automatically clean will appear on a report monitored by OIT.  A consultant is then dispatched to remediate the malware.  This new solution functions the same way as Forefront.  Other than a different icon, you probably won’t notice a difference!

About the Installation

  1. Microsoft’s System Center (the engine behind the new Microsoft Endpoint Protection) will be deployed to Windows computers running the LANDesk agent.  When this happens, you can ignore a pop-up alert from Forefront indicating that new software is being installed.  After System Center installs in the background, a new folder is created under “All Programs” called “Microsoft System Center 2012 R2” which you can also ignore.
  2. endpointAs soon as Microsoft Systems Center installation is complete, Forefront will be uninstalled and Endpoint Protection will be deployed to the computer.  This process will cause two alerts to pop-up on your computer screen which you can safely ignore.  The first indicates that you need to update Forefront, and the second states that you need to install antivirus software.  Endpoint Protection will complete shortly after the two pop-up messages appear, and you’ll see new system tray icon.

The deployment is under testing within OIT.  We are scheduled to complete the test rollout on May 15.  Following the successful implementation, the deployment task will be approved for all SMU Windows machines.

Former Work-At-Home User Information

If you have previously used a home download of Microsoft Forefront on your home computers, a version of Endpoint Protection will no longer be available for faculty and staff to download for home use. For a free alternative, Microsoft offers Security Essentials, which is a free home version of Forefront for Windows Vista and Windows 7. If your home computer run Windows 8, antivirus and antispyware software is built-in, so no action is required unless you prefer a paid antivirus solution.
If you have any questions, please contact the Help Desk at 214-768-4357.

Inside.SMU Permissions

How secure is Inside.SMU and who uses it? This webinar will show you how to utilize Inside.SMU’s permissions features for specific audiences. We will explore the differences between Site permissions, and setting up permissions at the Library and List level as opposed to individual items. We’ll also show you how to grant and test permissions to make sure they are applied correctly.

Free & Easy Cloud Backup Solutions

As each semester comes to a close, I like to take stock of all of the documents I’ve written over the last few months and make sure they are backed up. There are plenty of options available to backup and sync your data between multiple computers and mobile devices.

You’ve probably seen the commercials on TV or on the radio for paid cloud backup services like Carbonite and BackBlaze. Those services are all well and good, but sometimes the monthly fees can add up, and you may not always need all of the bells and whistles they provide.

Luckily, there are quite a few free solutions that you can use to back up your data as well as have it available from anywhere! Here’s a rundown of some of the most popular choices.

Dropboxdropbox-logo_stacked_2

Dropbox is probably the most popular choice out there. The starting package is completely free and gives you 2GB of space. Since the amount of starting space is so small, Dropbox would be best for those essential smaller documents and files that you use frequently or need access to at multiple devices.

Boxbox-icon

Box is quite similar to Dropbox, but with more options once you get into the pay levels of service. The free version includes more space than the free version of Dropbox, but expect to be persuaded into purchasing a plan.

OneDrive

OneDrive-logo100x100OneDrive is Microsoft’s first big foray into the cloud storage game. If you have a Hotmail, Outlook.com or another type of Microsoft account, you may already have it! You get 7GB as the default for free plans, but you can earn extra space by backing up your cell phone photos, purchasing Office 365 (which is soon to be free for SMU students) or referring friends.

Google Drive

google_drive_logo_3963If you’re more of a Gmail kind of person, Google has you covered, too! Google provides 15GB for free to those holding Google accounts, and more is available for a charge. Of course, Google Drive storage seamlessly works with Google Apps, too.

(Faculty & Staff) CrashPlan Pro

crashplan_clouds eThe University uses CrashPlan Pro for all primary computers. It makes a complete back up of your profile and file folder structure. The above options are great for personal storage, but make sure you’ve installed CrashPlan Pro on your University machine. It could save you a big headache if your machine ever crashed! For full details, visit http://www.smu.edu/BusinessFinance/OIT/Services/Backup.

What’s Your Crash Plan?

Did you know that SMU has a backup service for University owned, primary computers?

CrashPlan Pro is a software application that Faculty and Staff can install on Windows, Macintosh and Linux platforms via LanDesk. After installation, it performs a complete backup of your profile or home directory (file folder structure). If you store your files in the default locations (My Documents, Desktop etc.), those will be included.

CrashPlan-Pro-webpage

Once the initial backup is complete, the application will backup any changes every three hours. Although the process runs continuously in the background, it utilizes very few resources. This process is fully automated and requires no user intervention! When you need to recover data, there’s a quick and easy process to locate the folders or files you need from the backup client.

It’s secure too! The backup is completely encrypted. That means your data is protected by an algorithm that only your SMU ID and password can unlock.

For more information about eligibility, obtaining the software, restoring data, and more, please visit our service page http://www.smu.edu/BusinessFinance/OIT/Services/Backup.

Identify Online Shopping Scams

By Rajat Shetty During the holiday season, Cybercriminals’ potential victims are often caught up in the frenzy of shopping, finding the best deals, and acting quickly to take advantage of limited offers. Email and social networks are clogged with sales and offers, both legitimate and fraudulent. Sometimes haste causes shoppers to miss the warning signs of a fraudulent website.

Avoid Suspicious Websites

Make sure you cross check the contact info before submitting your payment details. In many cases, fake websites put up incorrect contact info like a wrong phone number or an incorrect address. A few other warning signs of suspicious websites are lots of broken links, grammatical mistakes, and spelling errors. If in doubt, don’t check out!

Verify the Web Address (or URL)

Before you type in any credit-card numbers at check out, check the Web address, or uniform resource locator (URL), of the payment page and make sure it’s using a secure connection. You should be seeing either the character string “https://” before the website URL, or a small icon of a green padlock. Also, make sure the URL address is correct, and not a slight misspelling of the real address or a random URL.

For example, check the snapshots below for the official website of Beats headphones. The first one is the original website, whereas the second website is a fraudulent one having the exact layout and font style as the original website. The difference is, when you pay through credit card or debit card on the 2nd website you are not going to receive any headphones (Not even a fake one!)

Original website

Fake website

Use Caution when Shopping by Phone

Although it can be convenient, use extra care when shopping with your smartphone. Phones are more susceptible to malwares as most do not have an anti-virus. Also, it’s highly unsafe to store your credit card or debit card information on your phone.  Only buy from trusted and familiar websites when you shop through your smartphone, and use a password protected internet connection. Never shop over unsecured public Wi-fi. Remember, it’s always better to check twice before clicking the ok button. People loose thousands of dollars in a haste to snag online deals. Protect yourself from becoming a victim to fraudulent websites by exercising caution before giving out your credit/debit card details.

Security Training

This October as a part of Information Security Awareness Month we are offering an online training for SMU Faculty and Staff. The training only lasts about 30 minutes; however, it is filled with valuable information that can help protect you and the University. Below are some of the topics covered in the training. You are our best defense. Are you prepared?

threat-icon

Social Engineering– Many of today’s most common cyber-attacks are based on social engineering. As such, we explain what social engineering is, how attackers fool people and what to look out for. We show how you can detect these attacks and respond to them.

email-iconEmail and IM- One of the primary means of attacks and exploitation is through email in both simple or large scale attacks and targeted spear phishing attacks. We explain how these attacks work, including recent examples of phishing, spear phishing, malicious attachments and links, and scams. This video shows how to detect these attacks, respond to them, and use both email and IM securely.

file-sharing

Social Networking- Sites such as Facebook, Twitter and LinkedIn have exploded in popularity, with employees and managers sharing all sorts of private information, not only about themselves but about their work. Cyber attackers know this and use this information for identity theft, spreading malware, scams and even targeted attacks. We discuss these risks and the steps you can take to protect yourself and SMU.

Mobile Devices- Today’s mobile devices are extremely powerful, including tablets and smartphones. In most cases these devices have the same functionality, complexity and risks of a computer, but with the additional risk of being highly mobile and easy to lose. We cover how to use mobile devices safely and how to protect the data on them.

security-Training-and-EdWi-Fi Security– This section discusses the risks of public Wi-Fi and steps that you can take to protect yourself. In addition we cover that only authorized Wi-Fi access points with prior management approval can be deployed within SMU.

Telecommuting Working Away from Home- Many SMU employees are no longer working at the office, they work from home or on the road while traveling. There are unique risks for the telecommuter. This module focuses on how these employees can protect themselves and SMU, including laptop security and creating a secure, mobile working environment.

Security-Icon

Physical Security- While physical attacks against your data are less likely to happen, when such incidents do occur they can have a greater impact on your organization. In this module we explain how attackers will attempt to trick and fool their way into restricted areas. We also discuss how you can protect the physical security of your facilities, including enforcing use of SMU-issued identification badges.

Hacked- No matter how effective a security team and their processes are, there will be incidents. This module focuses on how you can help by identifying and reporting an incident. We cover things to look for, such as suspicious activity or virus alerts and whom to report an incident to.

Faculty and staff can login to courses.smu.edu with their SMU credentials to access the training.

Last Week of Information Security Awareness Month

Info-Sec-2013-web-slide

This is the last week of Information Security Awareness month. All training content is posted within Blackboard to simplify the process. It requires about 30 minutes to complete the course. However, you do not have to complete all the videos in one sitting.  Most of the videos are just a few minutes long. The training will remain available after the end of this month; however, we encourage you to take the training as soon as possible, especially if you use sensitive information like credit cards or social security numbers in your day to day activities.

To complete the training:

1. Visit https://courses.smu.edu.
2. Login with your SMU ID and password.
3. Locate the Security Awareness 2013 course in the My Courses section.
4. Click on the tutorial you wish to preview.  Blackboard will remember which ones you have completed and which still remain.
5. Complete the 3 question quiz at the end of each tutorial.

Later this fall, the training will be uploaded to your training transcript in Access.SMU.