Windows 11 has more rigorous hardware requirements than Windows 10, and some older computers will not be able to be updated to Windows 11. Please work with your school or department IT professionals to either upgrade your devices to Windows 11 or replace your old computer as necessary.
Our teams have been working together to enhance our AV and videoconferencing capabilities. Starting February 24, Logitech Zoom Rooms can now connect to Teams Meetings via the Tap Controller. Additionally, we have streamlined the classroom computer experience by removing unnecessary applications, disabling non-essential settings, ensuring quicker startup times and seamless presentations.
We are making a major upgrade to our campus calling system and transitioning to Microsoft Teams Voice in 2025. This cloud-based phone system will integrate with Microsoft Teams, allowing seamless calls directly within the app, enhancing both communication and collaboration. As part of this transition, several general-purpose phone numbers will be deactivated and reconfigured for emergency dialing only, ensuring a smooth and reliable upgrade to our new system.
Our new software store OnTheHub launched this month! Explore OnTheHub and take advantage of the new streamlined process for accessing essential software.
As cyber threats continue to evolve, it's crucial to stay informed and vigilant against phishing attacks, especially those targeting multi-factor authentication (MFA) systems like Duo. Phishing is a psychological attack used by cyber criminals to trick you into giving up sensitive information or obtaining access to your account. These attacks often masquerade as legitimate communications from trusted sources, making them particularly dangerous.
Microsoft 365 Copilot, Copilot Chat and Zoom AI are approved for use with highly confidential university data. While Microsoft 365 Copilot, Copilot Chat and Zoom AI are approved for this use, it is equally important that users and meeting participants use additional safe privacy and security best practices when utilizing these applications. Any information that is shared with others during the technology session—as well as through transcripts, notes, or other documentation—must be protected.
As the university approaches the end of the fiscal year, it is time to get your ducks in a row to make for a smooth Technology Risk Assessment process for any applications or hardware devices you need to purchase for your business operations. These dates are so that you can plan accordingly and submit your Technology Risk Assessments to allow for processing from the Risk and Compliance team, as well as Procurement Services, so there is no loss of service.