Archive for December, 2016

November 2016

0 Commentsby   |  12.06.16  |  Banner

November 2016 by the numbers:

  • 124 end-user support requests resolved
  • 58 development and administration issues resolved
  • 78 new development and administration issues created
  • projects in-progress
  • project completed
  • 1 project requested
  • 99.92% average uptime
  • 20% of myACU sessions were from mobile and tablet devices for Fall 2016

Did you know?

The type of information shared on social media can provide fodder for phishing attacks and even identity theft, or allow people to make assumptions about you based on the groups that you are affiliated with. As a result, keep these dos and don’ts in mind when sharing online.

What else is going on?

  • Personnel changes –  We are in the final stage of hiring a new Systems Analyst to replace Brennan Turner, who is moving into a programming position.  We intend to have someone hired and ready to start in early January.
  • Student Life communication – We are working with Student Life to implement a new event communication site that will be integrated with myACU.  The new site will replace and enhance the “On the Hill” area in myACU (aka login ads). The new site and functionality will go live in early January.
  • Banner improvements – We have successfully deployed multiple Banner XE applications to production this year, including Employee Profile, Student Advising Profile and Faculty Grade Entry.  All of these self-service applications are available through the Banner link in myACU and provide a glimpse of enhancements that are on the horizon.  Our next set of applications include Banner Student Registration XE as well as the first part of Banner administrative forms (aka Big Banner, Internet Native Banner or INB).

See November 2016 – Resolved Issues for more details.

 

Managing Your Online Reputation

0 Commentsby   |  12.02.16  |  Security

You should understand how to present yourself on social networking sites and how to safeguard your information. What many may consider temporary or fleeting will most likely remain on the Internet forever. As a result, keep these dos and don’ts in mind when sharing online.

Dos

  • Ask questions about who can access the information you are posting online, who controls and owns the information, and what is shared with third party.
  • Maintain a backup of the content you post on professional networking sites (e.g., LinkedIn).
  • Understand the default privacy settings on the social networking sites you use and how to change them to match your comfort level.
  • Keep your personal information private. Assess whether it’s necessary to share sensitive information such as your birthday, mailing address, phone number, e-mail, mother’s maiden name, or Social Security number.
  • Be cautious about accepting requests to connect online. Connect only to people you trust who will not misuse the information you post.
  • Check the location settings on photos and videos you post to social networking sites.
  • Avoid joining online groups where you don’t know all the members or what they stand for.
  • Use passphrases to protect your social media accounts. A passphrase is a set of words that create a phrase that is 20 to 30 characters long.

Don’ts

  • Don’t share too much information that could be used to complete a profile about you. For example, share your birthday, but not the year you were born. Or share your hometown, but not the address where you live.
  • Don’t share any information that is being used for verification purposes such as your mother’s maiden name, the name of your first pet, or the street where first lived. Consider making up alternate answers to those questions that only you would know.
  • Don’t post when you are traveling or going out of town on vacation. It’s an open invitation letting criminals know that you are in a different location and that your home is vacant.
  • Don’t post photos of inappropriate or illegal activities.
  • Don’t click on attachments or links without checking the source.
  • Don’t “check in” to every place you visit. That information could be used to identify you in a vulnerable location.
  • Don’t use weak passwords, and never share your passwords!

(This content was provided by Educause.)