Skip to content

Other ways to search: Events Calendar | UTHSC News

Issue 25

Issue 25, October 12, 2021

This communication was generated by UTHSC Information Technology Services to educate and inform our campus community about available technology tools, training opportunities, news, and events that will help you and the university achieve excellence in patient care, education, research, and community service.
In this edition
  1. October is Cybersecurity Awareness Month
  2. Don’t Update to Windows 11 Just Yet!
  3. Leave Your UTHSC-Owned Computers On Over the Weekend
  4. New to TechConnect:  Pager Rental and Management Access!
  5. Save Your Zoom Meetings to OneDrive or SharePoint
  6. REDCap
  7. Upcoming Online Microsoft Training
  8. How to Use Outlook Calendar as a To-Do List
  9. Encrypting Your Emails
  10. Why Measurement Matters
  11. What is an Insider Threat?
  12. ITS Spotlight: Lisa Aitken
October is Cybersecurity Awareness Month

Each year, October is Cybersecurity Awareness Month, a national public awareness effort increasing the understanding of cyber threats and empowers the American public to be safer and more secure online.
We have almost reached the halfway point in the month, but there are still events for you to participate in to learn more about cybersecurity. Make sure you join in on the Scavenger Hunt to be able to win fabulous prizes. There is also targeted talks you are welcome to attend:
  • Tomorrow – October 13 – 11 am – Social Engineering and Phishing – Register here
  • October 19 – 11 am – Ransomware – Register here
  • October 28 – 11 am – Protecting Your Identity – Register here
Information about these activities can be found on the Cybersecurity Awareness Month webpage.

Don’t Update to Windows 11 Just Yet!

As you may know, Windows 11 is now available, and it looks fantastic (you can learn more on the official Microsoft Windows 11 site).

But, Let Us Test W11 Before You Install

We do not recommend immediately upgrading UTHSC-owned computers to any new operating system until the vendor has addressed any early software deficiencies, and we can confirm that your current applications are compatible with the new system.

Leave Your UTHSC-Owned Computers On Over the Weekend

Make Sure Your Windows Operating System and Apps Are Up-Date With This Simple Tip!

Our Patch Management Team pushes out updates for certain applications and operating systems to UTHSC devices. Apple device updates are pushed through the cloud. However, Windows machines must be connected to the UTHSC network in order to get the updates. Per policy, UTHSC devices should be powered on over the weekend to receive these updates.

Working Remotely?

If you are working remotely, you must be connected through the UTHSC VPN and leave your computer on over the weekend to receive updates.

New to TechConnect: Pager Rental and Management Access! 

The Pager administration process has been transitioned into TechConnect!

Visit the Pager Rental and Management Access service to add, reassign, retire and report lost/stole pagers. The process will help business managers, departments, and the Telecom Team better manage UTHSC pagers and the associated costs.

Need to Request a Pager?

All pager requests should now be submitted using the TechConnect Request Service form on this webpage.

Save Your Zoom Meetings to OneDrive or SharePoint

We have talked about the difference between a Zoom meeting and a webinar. And, we have taught you how to record and upload your meetings (you've done a fabulous job, BTW). 

But are your Zoom recordings going to the correct location? Does it matter where they are stored?

Yes, it does! You should be saving your Zoom meeting recordings to OneDrive or SharePoint. While you have the option to save your recordings to Zoom, these recordings are automatically deleted after approximately 120-days, and this is not a HIPAA-compliant storage location.

Still Need Help?

Not sure how to save Zoom recordings to OneDrive or SharePoint? We mention how to do it in Step 2 of our Zoom: Recording and Uploading Meetings article, but if you need additional assistance, contact the Service Desk at 901.448.2222 or fill out a service request.


REDCap is a secure web platform for building and managing online databases and surveys. REDCap’s streamlined process for rapidly creating and designing projects offers a vast array of tools that can be tailored to virtually any data collection strategy.  While REDCap can be used to collect virtually any type of data (including PII, FERPA, 21 CFR Part 11, FISMA, and HIPAA-compliant environments), it is specifically geared to support online or offline data capture for research studies and operations.

Learn more about REDCap, including how to get access at the CBMI website.

Microsoft has some excellent training courses we recommend:

Design Captivating Presentations with Microsoft PowerPoint
PowerPoint allows you to create, view, present, or share presentations quickly and easily. Get started by learning to navigate PowerPoint, design presentations, and use helpful presentation tools. Register
  • Oct 19 - 11:00 - 12:00 pm
Get started with Microsoft Teams
Join us to learn how to accomplish the fundamental tasks in Teams. Learn how to easily communicate with your coworkers, save time while working and collaborating, and see how teamwork and projects can be managed in a central space. Register
  • Oct 20 - 3:00 - 4:00 pm
  • Oct 28 - 9:30 - 10:30 am
Build Collaborative Workspaces in Microsoft Teams
Join us to explore effective, virtual workspaces for projects and workgroups. Microsoft Teams offer the flexibility to set up a workspace that suits your needs. Register
  • Oct 18 - 4:00 - 5:00 pm
  • Oct 22 - 5:00 - 6:00 pm
Introduction to Microsoft Excel
Join us for a free, 60-minute training on Microsoft Excel for the new or novice user. The training will focus on overall navigation, formatting, simple formulas, charts and tables and an overview of printing. Register
  • Oct 22 - 9:30 - 10:30 am
  • Oct 29 - 9:30 - 10:30 am
How to Use Outlook Calendar as a To-Do List

The Outlook Calendar might just be the most effective way to manage your tasks and to-do lists. In this 10-minute video, Simpletivity's Scott Friesen shows you how to set up the Microsoft Outlook Calendar as a to-do list on both the desktop and mobile app. You may never look at your calendar the same way again!

Encrypting Your Emails

You must use encryption if you are emailing anything confidential or classified such as:

  • protected health information (PHI)
  • personally identifiable information (PII)
  • HIPAA information
  • FERPA information
  • educational records
  • credit card information
  • anything protected by governmental or institutional regulations, it must be encrypted

Encryption ensures that protected or sensitive information is not intercepted during email transmission, thus protecting you and the university from potentially costly and reputation-damaging data breaches.

How Do You Encrypt Emails?

You can enter a descriptive subject line as long as the word encrypt is included somewhere within it. Examples: New Student Information encrypt or Encrypt New Student Information.

Learn more about encryption on Cybersecurity's Encrypt Your Email webpage.

Lean 6 Sigma
Why Measurement Matters

In Lean 6 Sigma training, we use a quote from H. James Harrington: “Measurement is the first step that leads to control and eventually to improvement. If you can’t measure something, you can’t understand it. If you can’t understand it, you can’t control it. If you can’t control it, you can’t improve it.”

But sometimes we think, “I can’t measure this,” and just give up.

GoLeanSixSigma has a great article called 7 Ways to Measure & Manage Soft Skills. Take a look – it might help you figure out how to measure the seemingly “unmeasurable.”

While reading that article, it reminded me of a story Dr. Jeff Winer told our BPM class a few years ago, but it still rings true today.

A hospital had a printer in a remote location. Residents complained about walking so far to get a printout, but the hospital rep's reply was, “Sorry, the printer can’t be moved any closer.”

That is until someone decided to focus on this pain point.

  • They determined the average time a resident spent walking to and from the printer.
  • They took the number of residents and came up with the total amount of time spent walking.
  • Then, they put that into a dollar amount – how much money it was costing to have residents walk back and forth.

After seeing this MEASUREMENT of how much MONEY the hospital was losing by having the printer in that location, the printer was moved.

Remember, your time is valuable and a good measurement to be used when trying to improve a process.

What is an Insider Threat?

An Insider Threat is a human security risk that originates within an organization. According to the 2019 Verizon Data Breach Investigation Report, a third of all data breaches within organizations involve internal staff. Part of the patient safety and protection of our university is knowing what is acceptable while accessing UTHSC technology, data, and resources. Help combat insider threats by understanding your responsibilities and report violations that expose us all to this threat.

Any violations or suspicious behavior should be reported to the Office of Cybersecurity at or 901.448.1880.

Examples of an insider threat include:

  • Malicious Insiders
    • a disgruntled employee
    • someone who has access to information they shouldn't
  • Negligent Insiders
    • someone tricked by social engineering
    • someone who doesn't know how to protect the data they have

Both negligent and malicious insiders are highly dangerous. Their actions must be detected before any harm is done, such as granting access to sensitive data, bypassing approved security protocols, or leaking data.

Insider threats can be difficult to spot, and vigilance is needed from the UTHSC community to protect our assets. Here are some signs to watch for:

  • personality and behavioral changes
  • disagreements with coworkers/campus policies
  • accessing large amounts of data if that is not normal work processes
  • odd working hours
  • attempts to move data offsite
  • staff and/or Students permanently leaving campus
  • unauthorized attempts to access servers and data
  • authorized but unusual access to servers and data
  • financial distress/unexplained financial gain
Lisa Aitken

In each issue, we feature one of our amazing ITS team members. We learn more about Lisa Aitken who leads our Customer Technology Support team in this segment.

What is your role and how long have you been in ITS at UTHSC? My current role is Director of Customer Technology Support.  I’ve had the pleasure of working for UTHSC for 35 years. My employment started in the Chancellor’s Office in 1986 and I transferred to ITS in 1989. The technical achievement in 1986 was replacing 5520 Word Processors with Digital Equipment Corporation computers, DECmate & Rainbow. And yes, Rainbow was the name of a computer. Additionally, this was the beginning of email for the campus.

What is a day in the life of Lisa like? Mainly managing an awesome team, helping our campus customers, and reading lots of emails, chats, and articles. My days are successful because of our CTS team; Brad Terhune, Camielle Smith, Dylan Haynes, Michael Barbieri, Brad Gordon, Travis Grose, Cody Jenkins, Jason Kirk, Richard Williams, Kyle Smith, Nigel Riggs, Joseph Callaway, Micah Hubbard, and Eric Jackson.

What is your favorite thing about working at UTHSC? The people! I have met many awesome people, made wonderful friends, and some I consider family.

What’s something most people don’t know about you? Several years ago, I attended training at Juvenile Court for a Court Appointed Special Advocate. A Court Appointed Special Advocate (CASA) is a trained volunteer appointed by a judicial officer to provide advocacy for a child who is under the jurisdiction of the courts due to abuse or neglect. I loved it! I felt like I was helping children and helping children is a passion of mine. It had its rewards and heartbreaks but to this day, I still keep in contact with one of the children, I believe, I helped.

Lastly, I’m celebrating my 25-year wedding anniversary with the love of my life!

May 26, 2022