One of the biggest challenges in helping students who are at risk of academic failure is identifying them early enough in the term to make a difference. While there are many data points that can be used to predict a student’s success or failure, the most valuable is the insight offered by a caring instructor who has first-hand experience with the student. Find out how you can help with Academic Alerts.
Last November, the Office of Information Technology (IT) and University Communications requested feedback from the campus community on UM Today, a software framework for collecting, organizing and sharing announcements primarily among University of Mississippi (UM) students, faculty, and staff. We were pleased with both the number of responses (almost 900) and the quality of insights […]
Notifications from cell phones can be distracting. Whenever attempting to unwind for the evening, loud notifications from devices can become bothersome. To remedy problems with the device providing loud notification sounds, “Do Not Disturb” can be set up so that most sound and vibrations can be stopped for a period of time. To enable “Do […]
Cyber criminals continue to come up with new and creative ways to fool people. A new type of scam is gaining popularity— personalized scams. Cyber criminals find or purchase information about millions of people, then use that information to personalize their attacks. Below we show you how these scams work and walk you through a common example. The more you know about these scams, the easier it is for you to spot and stop them.
National Cybersecurity Awareness Month is commemorating its 15th year this October. This nationwide effort is sponsored by the Department of Homeland Security to provide education about cyber threats and offer tips and best practices concerning how to stay safe online. The University of Mississippi Office of Information Technology remains committed to protecting information through the […]
On Wednesday, October 17, The Office of Information Technology (IT) will apply additional security measures to enhance the protection of our services and defend against cyber attacks. Effective on that date, it will be necessary to establish a Virtual Private Network (VPN) connection prior to accessing the SAP GUI. What to Do? For SAP users, IT suggests […]
There is no shortage of fake jobs. Employment scams are commonly designed to steal your personal information, credentials, and money. Many of these schemes involve virtual assistant, secret shopper, or similar work-at-home positions, often along with receipt of fake checks. The scammers typically try to build trust over several different communications (including social media, calls, […]
Back in 2012, when student email accounts were being migrated to Gmail, we developed a small site at go.olemiss.edu to explain what was happening and to provide instructions. It also linked to the other services that were included in our contract with Google. Before long, we realized this was such an easy URL for people […]