Search21 Results

As higher education institutions increasingly rely on digital technology for teaching, research, and administration, the importance of cybersecurity cannot be overstated. Cyber threats such as phishing attacks, data breaches, ransomware, and social engineering have become common, targeting universities, colleges, and those who work and study within them. Staff, faculty, and students are collectively responsible for safeguarding personal and institutional data. This knowledge base article outline
This article provides locations for student printers. The target audience is students.
This article will provide general information about eduroam at Indiana State University. The target audience is students, faculty and staff.
Support for normal office phones will be provided by OIT. Support for special phone lines will be provided by Telecommunications
Support for traditional telephone services is performed by Telecommunications. Requests for repair or installation of traditional telephone services can be requested directly from Telecommunications.
Perceptive Content Apps is the replacement for ImageNow WebNow. Content Apps enables more flexibility by allowing access through any web browser because Java is no longer required as with WebNow. If transitioning from using WebNow, users will notice similarities between the products, or if a new user, the intuitive interface will allow for a quicker and easier learning curve than with WebNow.
This article will provide general information about the University Account created for all students, faculty and staff and used to access the MyISU portal and other web-based resources at Indiana State University.
This article will provide general information about Microsoft Office 365 Multi-Factor Authentication (MFA) for faculty, staff and student employees.
This article provides information on the level of support provided by the Office of Information Technology for the Office 365 Applications.
Email is available to alumni after graduation from ISU. Other services available in Office 365 are terminated 60 days after graduation.
This article contains key TeamDynamix terms and definitions.
This article provides general information about Instructional Tools available at Indiana State University.
This article provides general information about testing your home network to improve your experience working from home.
This article describes ransomware and advises employees on what to do if they think they have been infected by this type of malware.
If a customer does not have a cell phone to use for multi-factor authentication, a One Time Authentication Token may be used. This article explains what to look for in purchasing a token, and how to get it set up after purchase.