ITA/ISA Monthly Meeting March 20, 2015 Facilitator: David Miller Manager – OIT Support Services.

Slides:



Advertisements
Similar presentations
Mobile phone based real time solution to track completed / in progress work The programme officer initiates the work by capturing the site image, GPS.
Advertisements

Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
The Office of Information Technology Network Access Control (NAC) Anthony Espinoza Information Security Officer UTSA Office of Information Security.
The Office of Information Technology ITA Meeting May 6, 2010 Harris Room (UC 2.212)
MILLS HALL 110 EXTENSION 1219 Technology Services.
/Calendar Collaboration Document Management Messaging Web Conferencing Best experience across devices.
ITA/ISA Monthly Meeting July 18, 2014 Facilitator: Ben Garcia, Director OIT Support Services.
{ Making Microsoft Office work for you Organizing Your Life at work and home in the Cloud Presented by: Matthew Baker (321)
ITA/ISA Monthly Meeting August 22, 2014 Facilitator: Benjamin Garrison Customer Support Manager OIT Support Services.
Private Cloud (on & off premises) Hybrid CloudPublic Cloud SaaS PaaS IaaS Microsoft’s Online service portfolio Office 365 Microsoft‘s communication.
STANFORD UNIVERSITY INFORMATION TECHNOLOGY SERVICES Protect Your Data, Protect Yourself Tech Briefing August 6, 2010 Turing Auditorium.
Information Security Confidential Two-Factor Authentication Solution Overview Shawn Fulton January 15th, 2015.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
Information Security The University of Texas at Dallas Education – Partnership – Solutions ISC Meeting April 10, 2015 Information Security
PASSWORD MANAGER Why you need one 1. WHAT IS A PASSWORD MANAGER? A modern Password Manager is a browser extension (Chrome, Internet Explorer, Firefox,
UNIVERSITY OF GEORGIA Summer 2015 Orientation Arch Session Presentation.
ITA/ISA Monthly Meeting November 14, 2014 Facilitator: Ben Garcia Director – OIT Support Services.
The Office of Information Technology Two-Factor Authentication.
Penn State University College Of Education Understanding College of Education Resources.
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
Moodle Integration with Microsoft Seree Chinodom Kittisak Onuean BURAPHA UNIVERSITY Powerful Tool for MoodlePowerful Tool for Moodle.
ITA/ISA Monthly Meeting October 10, 2014 Facilitator: Ben Garcia Director – OIT Support Services.
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
5 | Microsoft Confidential 6 | Microsoft Confidential.
INTEROP 2014 Mobile Issues in the Network. Mobile Issues Data loss – Hardware theft or failure – Data corruption Data theft – Hardware theft – Spyware,
HOW-TO guide This tutorial has sound.
OFFICE OF BUDGET AND FINANCE Information Security Office ISC Meeting August 21, 2015 Information Security Office
Faculty and Staff Town Hall Bill Gruszka VP Information Technology/CIO February 11, 2015.
Unified Communications LITN Spring  A set of products that provides a consistent, unified user interface and user experience across multiple devices.
Campus Computing Resources for Researchers Rutgers University Office of Information Technology Presented By:Joe Sanders University Director, OIT Rutgers.
The Office of Information Technology ITA/ISA Monthly Meeting December 12, 2013 Facilitator: Matthew Marr OIT Support Services Manager - Academic Support.
The Office of Information Technology ITA/ISA Monthly Meeting January 10, 2014 Facilitator: Matthew Marr OIT Support Services Manager - Academic Support.
Integrating NAV 2013R2 and Office 365 Office 365 Single Sign-on NAV as an app NAV online document store.
PCIT313. Today’s challenges Deliver applications to mobile platforms (BYOD) Respond to dynamic business requirements for IT: Seasonal/temporary workers.
Offer highly configurable and scalable services Maintain an evergreen service Provide a platform built on security, privacy, and trust.
YOUR NAME Business Development Manager Microsoft Corporation YOUR OR WEBSITE
The Office of Information Technology ITA/ISA Monthly Meeting March 21, 2014 Facilitator: Matthew Marr OIT Support Services Manager - Academic Support.
How Your Customers Will Pay Online & by Phone
Adxstudio Portals Training
ITA/ISA Monthly Meeting February 13, 2015 Facilitator: David Miller Manager – OIT Support Services.
Two-Factor Autentication myUTSA ID+ It takes two!.
Windows Small Business Server 2003 R2 Powering Small Businesses.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Policies and Security for Internet Access
Asif Jinnah Field Desktop Services Enabling a Flexible Workforce, an insider’s view.
Office 365 Overview Sara Grachek Craig Overboe Mary Shrode.
CDAC ITS Security Awareness How to help your daily computer activities remain safe and sane.
Armenia Twinning 2011 Component F – Information Society, 2 – 6 May DEVELOPMENT OF INFORMATION SOCIETY STATISTICS IN LITHUANIA SURVEY ON.
Session ID: Prepared by:. 3 OAUG Membership Helps You Find Answers Network with Users and Experts Influence Oracle.
BuckeyePass Multi-Factor Authentication. 2 What is Multi-Factor Authentication? Adds a 2 nd layer of security Combines something you know with something.
Munix Bus WiFi Authentication, Log Management, Internet Security, Content Filter & VPN Service Internet Gateway & Business Intelligence
Information Technology Services (ITS)
Business Intelligence
INFORMATION TECHNOLOGY NEW USER ORIENTATION
for the Final Stage of our Merger:
Cara Clifford Instructor, Learn iT!
Enterprise Security in Practice
 itunes is a kind of media player, media library and a online radio broadcaster and it is developed by the Apple inc.  Through the itunes user can.
7/29/2018 4:45 PM Manage SharePoint and OneDrive in Office 365: A field guide for administrators Chris Bortlik Modern Workplace Technical Architect Microsoft.
Microsoft 365 Business: Under the Hood
Multifactor Authentication
Power BI Security Best Practices
Technology Resources Welcome to Texas State!.
Microsoft Ignite /20/2018 2:21 PM
Chapter 3 – part2.
INFORMATION TECHNOLOGY NEW USER ORIENTATION
SharePoint Online Authentication Patterns
INFORMATION TECHNOLOGY NEW USER ORIENTATION
Multi-Factor Authentication
IT Office hours – 1 Data Sharing 101
Presentation transcript:

ITA/ISA Monthly Meeting March 20, 2015 Facilitator: David Miller Manager – OIT Support Services

Agenda ItemsPresenterTime Allotted Two-Factor Authentication Implementation Anthony Espinoza Office of Information Security Mark McCoy OIT Infrastructure Services 25 min SharePoint Online Tip of the Month: “Creating A Meeting Work Space in SharePoint Online” Art Pagano SharePoint Development and Integration - VPAIE 25 min OIT Spring Tech Fest Update Rosalind Ong De Trevino and Dalinda Hanna OIT Customer Relations and Communications 10 min Office of Information Security Updates: InSight Changes, General Computer Awareness, and Computer Encryption Lance Pritchard and Brad Cooper Office of Information Security 15 min General Updates / Open Discussion David Miller OIT Support Services 15 min ITA / ISA Meeting Agenda Attendees: ITA’s, ISA’s and OIT representatives Date and Time: Friday, February 13, :30pm – 4:00pm Location: Main Campus Building Bldg. MB Downtown Campus Frio St. Bldg. FS (Remote Site)

The Office of Information Technology Two-Factor Authentication Presented by: Anthony Espinoza – Office of Information Security Mark McCoy – OIT Infrastructure Services

The Office of Information Technology Agenda What is two-factor authentication? Why are we implementing two-factor? What is affected? What tool is used and how does it work?

The Office of Information Technology What is two-factor authentication?  To provide assurance of a user’s identity, we require users to authenticate  Authentication is based on factors  Knowledge factors (something you know, like a password)  Possession factors (something you have, like a phone)  Inherence factors (something you are, like a fingerprint)  Adding a check of “something you have” to the regular myUTSA ID password check (“something you know”) provides two- factor authentication

The Office of Information Technology Why are we implementing two-factor authentication?  UT System memo requiring two-factor authentication in certain cases  Phishing attacks at UT System institutions resulted in financial losses  If the secret in a single-factor authentication scheme gets compromised, full authentication is possible  Successful phishing attacks can compromise single-factor authentication

The Office of Information Technology What services will be affected by two-factor authentication? When an employee connects to the UTSA network via VPN or terminal services such Citrix Modification of employee banking or financial information Server admin or other individual working from a remote location uses admin credentials to access a server containing confidential university data Faculty services tab in ASAP – November 2015

The Office of Information Technology What tool is used and how does it work?  We will use mobile devices to provide two-factor authentication using a tool called Toopher  Toopher works with both iPhones and Android phones, and provides an SMS (text messaging) option

The Office of Information Technology How does it work? The first time a user accesses a Toopher-protected application, he/she is asked to download the free Toopher app or use the SMS text option to “pair” their mobile device with their myUTSA ID The user then completes the two-factor authentication using the Toopher app, SMS option, or pre-generated one-time password

The Office of Information Technology Toopher Demo

Creating A Meeting Work Space in SharePoint Online Presented by Art Pagano SharePoint Development and Integration - VPAIE SharePoint Online Tip of the Month:

Office of Information Security Updates Updates: InSight Changes General Computer Awareness Computer Encryption Presented by Lance Pritchard and Brad Cooper Office of Information Security

Main Page

Registration

Agend a

Breakout Sessions

Session Matrix

Session Description

UC Map

Mobile App

Vendor Fair Academic Technology – OIT Apple ARC Campus Technology Store CDWG Code 42 College of Education & Higher Development- UTSA OITConnect Support Services Randstad Ricoh Student Computing Services – OIT Verizon Workspace Solutions Customer Relations & Communication – OIT Dell Deltaware Human Resources – UTSA Jabra Microshare New Horizons

General Updates Reminder: New Qualtrics Survey System Implementation – May 2015 Computer specification recommendations to be published April 2015 Reminder: Microsoft Office ProPlus available for UTSA Faculty and Staff personal computing use o Up to 5 separate computers and 5 Mobile Devices o Access from my.utsa.edu > Faculty/Staff WebMail (OWA) to download Next ITA / ISA Meeting: Friday, April 10, 2015 o Also available through Microsoft Lync o Time – 2:30 p.m. to 4:00 p.m. Questions and Answers

Please try our other services! OIT Social Media Sites:

Thank You