CAES Web Team
-
After consultation with our in-house cybersecurity experts and state technology officials, we are immediately directing institutions that TikTok, as well as Telegram and WeChat, not be used on any state-owned and/or -issued devices including mobile phones and laptops unless it is for an authorized law enforcement or security purpose.
-
Adapted from the StackExchange Information Security forum. Q: Most of us know to be careful when clicking on links in our email. But every day we click on links that Google shows us. Why are links in an email considered more dangerous than links from search results? A: You can generally trust search results because…
-
Qualtrics is a Web-based survey tool that makes it easy for students, faculty and staff to create their own UGA-branded surveys, invite participants and review results. OIT can help you set up a Qualtrics account or reset your password.
-
What is DocuSign? DocuSign helps get a document electronically signed. It’s safe — everything is encrypted — and it’s easy to use. How do I get an account? Submit a ticket for the OIT Service Desk at: https://uga.teamdynamix.com/TDClient/2060/Portal/Requests/ServiceDet?ID=42725 Getting signatures on a document Step 1: Create an envelope Definition: An envelope is a document you…
-
This document is intended for locations supported by CAES IT staff. Locations that are supported by county IT may have to gain approval for the installation of this software from their own IT group. You must have UGA ArchPass set up in order to use VPN software. ArchPass is required to access UGA leave balances,…
-
In case the need arises, here is OIT’s list of suggestions for business continuity in the event of a campus/county office closure. Please do these steps ahead of time so that you are ready if and when this happens. If you have problems or issues with any laptops, please let your OIT tech (or County…
-
This short guide will show you how to install UGA’s Cisco VPN client on a computer which has Trend Micro installed. Trend Micro is your computer’s antivirus and actively monitors your computer in order to keep it protected. This function perceives the VPN client as malicious when you attempt to install it with Trend Micro…
Posted in: Desktop Support -
In this guide, you will learn: 1) What Malware is and what it can do, 2) How to detect Malware, 3) How to remove PUP software, 4) How to remove Malware, 5) What to do when you have a severe Malware infection, and 6) How to reinstall your operating system.
-
This is an obvious guide on how to avoid malware. The reason I call it “obvious” is because the tips you see in here are very easy, low level, and you’ve probably heard of them before. When we talk about malware we are referring to a generic description of any unwanted items on your computer.…