Information Technology Recommendations
To appropriately plan for continuity in academic, research, patient care, and operational/administrative business activities in the event of campus closure, please consider the following:
Test your connectivity
- Internet connectivity speeds
- Appropriate internet speed for remote learning should be at minimum 10Mbps.
- To take exams and quizzes online, it is best to use a hardline connection via an Ethernet port if possible to ensure your ability to complete the assessment
- Access to all relevant systems and/or resources
- Accessing meetings via Zoom to gain familiarity with the tool and its capabilities
- Create a basic Zoom account to get started
- A webcam and headphones with microphone are strongly recommended
Public vs. private systems/resources
Some of our systems and/or IT resources will require VPN access in order to securely access certain internal resources while outside the office/campus. VPN uses encryption and other security mechanisms to ensure that only authorized users can access the network and that data cannot be intercepted.
For information about which services / systems require VPN, please refer to the intranet page (requires login).
|No VPN Required||VPN/Secured Access Required|
|Canvas Learning Management System||Departmental file shares / mapped drives|
|Bridge Compliance Training Application||NextGen for UNT Health|
|Curriculum Management Application (TCOM)||NextGen for Correctional|
|Accellion & Box File Transfer tools||Animal Lab Application|
|Ideate||Willed Body Application|
|Axiom budget software||Application Extender|
|Account Management System (ams.unt.edu)|
|IClicker Classroom Response System|
Information security considerations
Follow best practices when working remotely:
- Use a VPN
- Make sure the device you use has an updated operating system, is patched, and has updated antivirus software.
- Avoid using personal devices for UNTHSC work.
- Do not let family members and children use devices designated or used for UNTHSC work.
- Avoid mixing work activities with personal computing use.
Be wary of phishing scams or malware attacks using this event to compromise credentials or spread ransomware. Many phishing attempts may use official looking, CDC, government, or UNTHSC/UNT logos or information to trick users into a false sense of security or urgency.
- Remember the [EXT] tag in the subject to denote an external sender vs. an internal user.
- Confirm any unusual requests using a secondary method outside of email.
- Be vigilant in interpreting the authenticity of email messages
- Check the actual sending email address
- Avoid clicking on links or attachments from unknown or unexpected senders.
- Report any questionable or suspicious messages to email@example.com
Please contact our IT helpdesk for assistance:
This page was last modified on March 17, 2020