IT at Sheffield Hallam University
Header

The University is moving its phone system from analogue to digital and DTS has been running trials of digital (Unified Comms) in various areas.  Following feedback and consultation with users, we now have a model that we will be rolling out across the University. During 2017, we will be installing a traditional-style handset (which does not depend …
Read more

Following a successful pilot last year, DTS and L3S are introducing a new Chromebook loan service from Monday 13 February.  This service is for students to use while they are working in the library.  Chromebooks are different from traditional laptops and many students find them better for studying than laptops or PCs. They are faster …
Read more

Ransomware is a type of malware used for hijacking data in which the attacker encrypts data making it inaccessible and demands payment for the decryption key.  It installs covertly on a computer, typically carried out using a Trojan (a type of virus) disguised as a legitimate file, which is spread through email attachments, infected programs and compromised websites. …
Read more

The December holiday period, when online retail activity peaks, is a particularly rewarding time of year for cyber criminals. You can help protect yourself – and the University – by being alert to the dangers and thinking carefully before you respond to anything if you’re not absolutely sure of the provenance.  Some attempts are easy …
Read more

Several items of portable IT equipment have been lost or stolen both on and off-site recently, including laptops and mobile phones. Obviously these are easily portable and attractive to thieves. To diminish the risk of loss occurring, staff should bear the following in mind; Portable equipment should be locked away at the end of each …
Read more

Phishing uses fraudulent emails, texts and phone calls (vishing) to trick recipients into handing over personal and financial information such as account details and passwords. Such attempts are becoming increasingly professional and try to appear to be genuine by mimicking the look and brand of trusted companies. There are several ways to spot phishing emails: …
Read more

The act of manipulating people into performing actions or divulging confidential information is known as social engineering. There are many forms of social engineering, and you need to be on your guard. People may attempt to collect personal information from you, or to relieve you of your IT equipment. Points to note include; Shoulder surfing. …
Read more

  Wednesday 13 July, Cantor 9234 Are you currently using the new phone system (Unified Communications/SHUWAY)? Would you like to find out more about its capabilities and how you can make the most of using it? Join us at one of our training sessions on the 13th July. To book on to the training, please email shuway@shu.ac.uk …
Read more

Feedback to IT

July 6th, 2016 | Posted by Hannah Taylor in Uncategorized - (0 Comments)

Several feedback initiatives have been implemented within IT Help with the aim to gain more understanding of our staff and students and their experiences when they’ve received support from IS&T. We consistently collect feedback from several sources: Event surveys Once a query has been resolved, you are asked to rate the service you just received …
Read more

The University has a IT Security website formerly named ‘EISF’.  Recently it has been renamed to make it easier to locate and remember –  It is now called ‘IT Security – Policies, Procedures and Guidance’. The web address has not changed from http://eisf.shu.ac.uk/  so any links you have in documents, on websites and in your …
Read more