Following a successful pilot last year, DTS and L3S are introducing a new Chromebook loan service from Monday 13 February. This service is for students to use while they are working in the library. Chromebooks are different from traditional laptops and many students find them better for studying than laptops or PCs. They are faster …
Read more
New Chromebook service for the Libraries
February 7th, 2017 | Posted by in IT improvements - (0 Comments)Be careful when you click – watch out for Ransomware
January 10th, 2017 | Posted by in Uncategorized - (0 Comments)Ransomware is a type of malware used for hijacking data in which the attacker encrypts data making it inaccessible and demands payment for the decryption key. It installs covertly on a computer, typically carried out using a Trojan (a type of virus) disguised as a legitimate file, which is spread through email attachments, infected programs and compromised websites. …
Read more
Cybercrime – protecting yourself and the University
December 1st, 2016 | Posted by in Uncategorized - (0 Comments)The December holiday period, when online retail activity peaks, is a particularly rewarding time of year for cyber criminals. You can help protect yourself – and the University – by being alert to the dangers and thinking carefully before you respond to anything if you’re not absolutely sure of the provenance. Some attempts are easy …
Read more
Several items of portable IT equipment have been lost or stolen both on and off-site recently, including laptops and mobile phones. Obviously these are easily portable and attractive to thieves. To diminish the risk of loss occurring, staff should bear the following in mind; Portable equipment should be locked away at the end of each …
Read more
Phishing uses fraudulent emails, texts and phone calls (vishing) to trick recipients into handing over personal and financial information such as account details and passwords. Such attempts are becoming increasingly professional and try to appear to be genuine by mimicking the look and brand of trusted companies. There are several ways to spot phishing emails: …
Read more
The act of manipulating people into performing actions or divulging confidential information is known as social engineering. There are many forms of social engineering, and you need to be on your guard. People may attempt to collect personal information from you, or to relieve you of your IT equipment. Points to note include; Shoulder surfing. …
Read more
Wednesday 13 July, Cantor 9234 Are you currently using the new phone system (Unified Communications/SHUWAY)? Would you like to find out more about its capabilities and how you can make the most of using it? Join us at one of our training sessions on the 13th July. To book on to the training, please email shuway@shu.ac.uk …
Read more
Several feedback initiatives have been implemented within IT Help with the aim to gain more understanding of our staff and students and their experiences when they’ve received support from IS&T. We consistently collect feedback from several sources: Event surveys Once a query has been resolved, you are asked to rate the service you just received …
Read more
The University has a IT Security website formerly named ‘EISF’. Recently it has been renamed to make it easier to locate and remember – It is now called ‘IT Security – Policies, Procedures and Guidance’. The web address has not changed from http://eisf.shu.ac.uk/ so any links you have in documents, on websites and in your …
Read more
By Simon Alexander and Gavin Moore Two new features are currently being distributed to Managed Desktop workstations which will improve the experience of staff and students using computers at SHU for 2016/17: Application Jukebox Application Jukebox allows you to use a piece of software without the application being installed on the PC. This will enable …
Read more