KJB136's blog | Information Technology | University of Pittsburgh
!

You are here

KJB136's blog

Revolutionizing the Annual Budget Letter Process

At the University of Pittsburgh and in technology, innovation is a way of life. Recently, Pitt IT partnered with the Office of Budget Operations (OBO) within the Controller’s Office to transform their annual Target Letter process, which establishes budget targets for each University unit. This collaboration has resulted in a more efficient, accurate, and automated approach.

Lessons to Help You Catch Phish

Phishing attacks can come in various forms—emails, texts, or social media messages. Click, respond, or otherwise give your personal information to hacker, and your system, data, and money are in big trouble. A successful phish can even give a bad actor access to Pitt systems and data, potentially risking the whole University and its students, faculty, staff, alumni, and partners! But you can stop phishing attempts before they can do you any harm. Learn to spot the signs of a phishing attack and know what to do if you get one.

Duo Multifactor Authentication: Your Safety Sidekick

Even with strong, unique passwords for every account — and let’s face it, many people just rotate through a handful of passwords while using standard security questions — hackers manage to break into people’s accounts. That's where Multifactor Authentication (MFA) steps in as your digital sidekick, adding an extra layer of security to protect your accounts.

Stay Up-to-Date on Updates

One of the easiest ways to boost your cybersecurity is to keep your software and apps updated. Every day, developers are looking for clues that hackers are trying to break into their systems. They are searching for holes where cybercriminals could sneak in, even if they’ve never been breached before. They then release updates to fix these issues and keep the bad actors out. All you have to do is install the latest updates for your devices, software, and apps — including web browsers — to get the latest protections.

Unlock the Code to Win the Password Game

October is Cybersecurity Awareness Month, which is a great time to level up your security game! While we’re all familiar with the classic advice to "create unique and strong passwords," keeping track of all those passwords is a whole other story. Who can remember a different 20-character string of letters, numbers, and symbols for every account? Enter the password manager: your new security cheat code.

Cybersecurity Matters in Every Field

Think of cybersecurity as a skill only for tech pros? Think again. As technology becomes more integrated into all aspects of our lives, cybersecurity is an increasingly important consideration in most careers across the job market.  With Cybersecurity Awareness Month (October) right around the corner, here’s a look at how cybersecurity applies to different fields.

Email Etiquette 101: Ensure Your Emails Are Read

Let’s be real — emailing professors or colleagues can feel like throwing a paper airplane into an abyss. Crafting a clear, professional, and respectful email can help ensure that people read and respond to your messages, while poor email etiquette can negatively impact relationships with colleagues and clients according to a study by the Journal of Business and Technical Communication. Fear not! Here’s a crash course on how to master the art of email etiquette.

5 Tech Considerations for Working or Studying at Home

Gotta love technology. It lets us study, meet, or work wherever we happen to be – whether it’s on campus, in a public space, or at home! Hybrid and remote environments are the norm for many people these days. But while it offers next-level convenience, it is crucial to ensure your remote setup is optimized for productivity and security. Here are five essential steps for working off-site.