August 2015

Start the Year Off Strong -- With a Strong Password!

As the fall semester starts, we'd like to take the opportunity to remind you to have strong passwords, or passphrases, for all your online accounts and to change them at least yearly.

(Check out this list of the world's weakest passwords: http://www.theguardian.com/technology/2015/jan/21/what-is-the-worlds-weakest-password )

Please remember that the security of any system is only as good as its weakest link. Don’t make your accounts vulnerable with 

Read more about Start the Year Off Strong -- With a Strong Password!

VPN Gives You Secure Remote Access to UT Resources

Did you know that UT runs a virtual private network (VPN) that allows you to securely access UT network resources when off campus? UT-VPN encrypts communications between your computer and the VPN server on campus, allowing you to access UT resources without exposing your traffic to network sniffers and snoops. And because the VPN server issues you a campus IP address while you have a session established with it, a UT-VPN connection gives you campus-network-restricted access to resources like online journals and magazines available through the UT library system.

There are two ways to

Read more about VPN Gives You Secure Remote Access to UT Resources

UTBox -- An Introduction

UTBox is a free cloud storage and file sharing service available to UT Austin faculty staff and students for business and academic purposes.  UTBox features:

  • Unlimited storage and file sharing for approved group accounts (e.g., departments, research groups, etc)
  • 2 TB (terrabyte) storage and file sharing account for Faculty and Staff
  • 150 GB (gigabyte) storage and file sharing account for students
  • Certified for storing some kinds of Category I data
  • Built-in collaboration tools
  • Securely share files across campus or across
Read more about UTBox -- An Introduction

How to Block Nuisance Calls on Your VoIP Phone

If you are receiving nuisance calls from a particular phone number that is not of a threatening or harassing nature (see Malicious Call Trace), you can configure your phone to automatically reject calls from that number.

  1. After receiving a call from the number you wish to block, with your phone hung up, locate the number to be blocked in your "Received Calls" list.  Depending on your
Read more about How to Block Nuisance Calls on Your VoIP Phone

How to Configure and Use the New Voicemail

The recent conversion of the University's phone system to "Voice over IP" (VoIP) also introduced a new voicemail system for which all users need to perform their own configuration. Fortunately, the system is easy to use and to configure.

Configuring a VoIP phone to forward calls to voicemail

Voicemail is available by default. However, the phone is not configured to forward calls to voicemail, in the event that the user doesn't want that to use that feature.

You can forward your

Read more about How to Configure and Use the New Voicemail