• UAB Toy Drive kicks off Nov. 7

    This year’s UAB Toy Drive has multiple ways to give and multiple ways to celebrate the joy of giving.

    For nearly 30 years, the UAB Toy Drive has collected new, unwrapped toys for children in need throughout the Birmingham metro area. Toys are donated to the U.S. Marine Corps’ Toys for Tots campaign and will be collected from Nov. 7 to Dec. 14.

    Bring your teddy bears to the UAB Home Basketball game on Sunday, Dec. 4 at 1pm for a teddy bear toss!

    This year, you can also drop off toys at collection boxes around campus, or purchase a toy from one of our wish lists:

    You can also mail toys to:

    UAB Toy Drive
    506 10th St. South
    CEC 203
    Birmingham, AL 35233

    In addition to inviting Santa Claus to Cudworth Hall for the final pickup day on Dec. 14, UAB IT will host photos with Santa in front of the TechConnect store at the Hill Student Center from 11 a.m. to 2 p.m. on Wednesday, Nov. 30. Students and employees are welcome to attend.

    Please note that Toys for Tots does not accept donations of clothing, food or realistic-looking weapons. Toys are accepted for children up to age 16.

     
  • UAB CIO Curt Carver wins National CIO of the Year Award

    Vice President and Chief Information Officer Curtis A. Carver Jr., Ph.D., has been named the national CIO of the year in the nonprofit/public sector category at the Inspire CIO ORBIE awards.

     
  • UAB IT employees work The World Games 2022

    UAB IT employees who worked at and volunteered for The World Games 2022 helped serve as ambassadors for Birmingham as the city hosted the international event. 

    “I feel like my biggest accomplishment was helping an Australian couple find the soccer arena and escorting a squash official to the Rec Center,” said Chuck White, interim executive director for network operations.  

    White is being modest — his team helped provide the WiFi network on campus as well as backup services for World Games headquarters. His team worked closely with The World Games 2022 venues to keep up with any issues during their ele11ven days in the city. He stepped up and took charge for a brief period. He dealt with emergency inspections, and helped improve on-campus emergency phones before the Games began.  

    Reggie Hill, a Desktop Services supervisor, has been a dedicated volunteer for more than 30 years with The International Camporee service group. Being able to volunteer for The World Games was a “once in a lifetime event,” he said.  

    Hill originally signed up to volunteer in October. At The World Games, he volunteered at eight venues and did whatever was needed of him. Mostly he found himself helping athletes with anything they needed.  

    “I got to be part of the opening and closing ceremonies. I was able to carry out the Afghanistan flag for the opening ceremony. It was an amazing experience,” Hill said.  

    Vineesh Konda, a database administrator in UAB IT, applied through UAB to volunteer. Konda did not want to miss out on the experience.  

    “I volunteered at the Hoover Met for softball as a ticket scanner,” Konda said. “This is the first time ever that I am volunteering here in the USA and I loved the experience. It's an immense satisfaction being able to contribute to a mega event like this hosted by the city.” 

     
  • Public WiFi not always convenient — and could be dangerous

    You’re at the mall and that Snapchat you need to send won’t go out. The screen sits and loads, the little ghost icon bobs up and down. Open the settings and there it is, the saving grace — free WiFi.

    This scenario has been played out multiple times in stores, theme parks, and restaurants. But who set up the network? There’s always a chance that public connection has a hacker.

    Public WiFi may not be encrypted, meaning that the hackers can steal your information or give your device malware. According to the Norton Cybersecurity Insights Report, more than 600 million users around the world are cybercrime victims, and most of these crimes stem from hackers lurking on public connections.

    Here are some of the most common public WiFi issues security experts see: 

    • Man in the middle attack: A Man in the Middle attack, known as MITM, is when a third-party accesses communication between other parties without anyone realizing it. The third-party can view everything sent between the other two unsuspecting victims, the hackers can even change the information sent.
    • Rogue hotspots: A rogue hotspot is a Wi-Fi access point that has been set up by an attacker. The attackers use trusted network names to lure people in, sometimes known as an Evil Twin. Hackers eavesdrop on their connections and can collect the user details like credit card information and banking details.
    • Malware: Hackers can even push malware onto devices by redirecting people to websites to push Mobile Remote Access Trojan, which is disguised as a file that is “beneficial” to the user and then takes over the devices.


    Using public WiFi is a risk; there is always a chance that someone is lurking. However, there are ways to stay safe when using public hotspots.

    • Limit access: When you are on a public connection, try not to access anything that has personal information attached to it. If there is someone lurking, they will be able to get important data.
    • VPN: VPN stands for Virtual Private Network, and is used to protect your connection as well as personal information online. It encrypts your data and hides your IP address, which lets you browse without fear of someone snooping.
    • Secure connections: A secure connection will encrypt the information being sent between two parties. It can verify that the other party the data is being exchanged with is safe.

    When browsing, whether it is on a private network or public there are ways to see if a website you have been directed to is safe. Most websites will encrypt data for you with the Transport Layer Security, TLS. This is an authentication and security protocol that is implemented in almost any browser and web server.

    Types of Internet Encryption:

    • HTTPS: Hypertext Transfer Protocol Secure, the main Internet protocol for encryption
    • POPS: Post Office Protocol, receiving email encryptions. It is not used as often as IMAP but it is still around
    • NNTPS: Network News Transfer Protocol, is encryption used for transporting users between news serves and for users to read or posting articles online.

    When using the internet, it is always best to play it safe. Make sure devices are up to date with the latest software. Use a VPN for at-home or on-the-go browsing. Utilize antivirus software to scan for any viruses that could have been pushed onto your devices. UAB IT offers both VPNs and antivirus software for faculty, staff, and students to use for a cyber-safe campus.

    Learn more about how to stay cyber safe by visiting our security webpage.

  • RCM transition will unite technology talent, centralize IT services

    UAB is preparing to unite technology talent from across the university campus into a new UAB IT, taking advantage of the RCM transition to create a comprehensive department focused on empowering the UAB community with world-class technology resources and customer[…]

  • Viva gives insights into your work day and habits

    Twice a month you get a Microsoft Viva email that's easy to overlook — but it contains personalized information to help you build better habits and prioritize well-being.  Viva insights show you trends in your work habits, such as how[…]

  • Help us celebrate Toy Drive with the UAB Blazers 

    To help the UAB Toy Drive, UAB Athletics has generously partnered with UAB IT to host a Teddy Bear Toss at the Blazers’ Sunday, Dec. 4, home game against South Alabama at 1pm.  Anyone who brings a teddy bear or[…]

  • Urgent messages might be scam

    Ever get an urgent email from your boss asking you to help them out of a jam by buying gift cards? It’s almost certainly a scam. The messages, which have been prevalent over the last few years but have ramped[…]

  • On-campus, remote or both: Stay on top of tech tips

    With UAB’s new alternate work options program, employees may find themselves working in different environments depending on the day.  Keeping up with UAB technology policies and procedures will help keep you and your tech safe and secure, no matter where[…]

  • UAB Toy Drive kicks off Nov. 7

    This year’s UAB Toy Drive has multiple ways to give and multiple ways to celebrate the joy of giving. For nearly 30 years, the UAB Toy Drive has collected new, unwrapped toys for children in need throughout the Birmingham metro[…]

  • Email transition project adds greater security to accounts

    UAB IT has wrapped up a months-long project to transition all individual UAB email accounts to modern authentication, which adds greater security, particularly when using mobile devices.  Modern authentication requires you to use two-factor authentication — at UAB, that means[…]

  • Keep your data safe on campus and off

    With the advent of UAB’s new remote work options, UAB IT offers technology guidelines for those on and off-campus, and those who are hybrid, with security is at the heart of these policies. One of the best tools for keeping[…]

  • Securing your password

    For any of your accounts — including your BlazerID — your password can be a gateway to reams of information, from your birth date to your bank data. Protecting your password means more than just not sharing it — it[…]

  • Help us stop phishing in its tracks

    Phishing is the simplest gateway for scammers looking to break into UAB’s network — and we need you to remain vigilant to help keep them away. How can you spot a phish? There are some tips: Check the sender’s email[…]


All Articles

Social Media

TechKnow Podcast

Events

Twitter

Follow us on Twitter