KJB136's blog | Information Technology | University of Pittsburgh
!

You are here

KJB136's blog

Merging Your Phones with Teams

Back in the day, nearly all faculty and staff worked almost entirely in a campus office with a Pitt phone extension, while residence hall rooms had campus phones installed — until cell phones made residence halls phones obsolete and the pandemic introduced wide-spread remote work. Many faculty and staff still work one or more days a week from home … and away from their office phone. They now use their home or cell phone to make work calls or use the Teams app from their laptop to talk with coworkers.

Notes from OneNote Masters

OneNote is Microsoft’s electronic note-taking app that help you organize your notes, edit and annotate them, and share them with others. It is available to all Pitt students, faculty, and staff at no cost as part of Microsoft 365. I asked some OneNote devotees what they loved about it. Here's why it’s their go-to app and how they use it.

What Is Phishing and How You Can Spot It

With Cybersecurity Awareness Month coming to a close, it would be a crime not to mention one of the most common scams: phishing. No, I’m not talking about that thing you do on the weekends during the summer at the lake, but rather sketchy emails. Whether it’s an unknown professor asking you to be a part of their research team, “Amazon” asking you to verify a purchase you didn’t make, or an announcement that you’ve won a cruise to the Bahamas, phishing has become trickier to spot and affects more people each day than you’d think.

Eliminate Cyberfilth — 7 Password Hygiene Tips

Passwords — you can’t escape them. Logging into Canvas? Enter your password. Checking your email? Password. Online banking? Amazon purchase? Password, password. Passwords are such an integral part of online life, it’s easy to forget how important they are for protecting your digital footprint. According to the 2022 Verizon Data Breach Investigations Report, over 80% of breaches of online sites and apps were caused by stolen or weak credentials. A little password hygiene can go a long way — because getting hacked stinks.

4 Easy Steps for Staying Secure Online in 2022

Cybersecurity has become one of the biggest IT topics over the last two years, from securing digital learning tools during the pandemic, to widespread phishing scams that continue to target students, faculty, and staff. The seemingly endless cybersecurity news cycle and technical jargon that gets tossed around can make cybersecurity seem overwhelming and like something that should be left to the pros, but each of us have a huge role to play in cybersecurity threat prevention, detection, and remediation.

Digital Inclusion: Turning the Moment into Movement

Digital Inclusion Week (October 3–7) is a week of education, awareness, and activism dedicated to addressing disparities in digital access. Digital inequity disproportionately impacts the lives and careers of people of color, older people, those with disabilities, the poor, and women.  Digital inclusion goals include affordable internet, access to appropriate devices, and digital skills training. Pitt IT is a proud partner in engaging the University and community in making strides toward digital equity.

Get One Step Ahead with OneDrive

OneDrive is Microsoft’s cloud service that lets you store and protect your files, share and simultaneously edit documents, get to your files from anywhere on all your devices, and even recover previous versions or deleted files. (If you’re not familiar with these features, check out this article.) But OneDrive pros utilize other exceptionally handy features that really take you to the next level.

Research Technology for Research Impact

Research takes place in labs. In libraries. At historical sites. In polls, statistical repositories, and news reels. Research methods can be as varied as the fields in which they occur, but one thing they have in common is an increasing reliance on technology.

Pitt IT provides tech that helps researchers in all disciplines to collect, store, and process the data; document their methods, results, and conclusions; and share and collaborate with colleagues and partners. Here are the top Pitt IT tools researchers can start using today.