About 75 Illinois State University courses will be offered through Canvas in the spring of 2023, to help instructional and technical support staff prepare for full adoption.
Pilot program will test ReggieNet replacement in the spring of 2023

About 75 Illinois State University courses will be offered through Canvas in the spring of 2023, to help instructional and technical support staff prepare for full adoption.
Remote work agreements for staff move online to replace paper process.
In the last few months, TechZone, part of the Office of Technology Solutions, has added a new feature to its repertoire: iPhone repair. It has been something that students have been asking about for several years.
We have covered several methods cybercriminals use to get your information or your money. Hopefully, you have learned a lot and have taken steps to make your online presence more secure. However, there is more to cybersecurity than just protecting yourself. Cyberchampions actively help others around them avoid traps set by cyberthieves and reduce human error, the leading vulnerability to cybercrime. This makes cyberchampions invaluable to their families and social groups and in workplaces.
Cybercriminals don’t need to break into secure systems if they can get your password and bypass your other security measures. Here are four tips to help you protect your accounts and passwords.
The Civil Service Council will feature a civil service employee at Illinois State University each month to highlight an exceptional colleague and the outstanding work being done on campus! This month get a chance to learn about and applaud Kevin Hand from the Office of Technology Solutions.
Faculty, staff, graduate assistants and student employees can visit LinkedIn Learning by logging in directly from My.IllinoisState.edu (within the “online tools” or directly from the main “search”).
You might imagine hackers using sophisticated software to break through high-tech firewalls to steal your information. In the real world, criminals use phishing and social engineering attacks to trick people into giving up their credentials or their money. Here are the top five scams that every Redbird should watch out for. “There is a problem
Late in December of 2021, Dr. Roy Magnuson, associate professor of music composition and creative technology in the Wonsook Kim College of Fine Arts, reached out to Craig Jackson, director of Infrastructure Operations and Networking in the Office of Technology Solutions, about a class he was planning to teach during the first half of the
On August 3, Illinois State University information technology (IT) professionals gathered for the annual Continuous Improvement in Technology (CIT) Conference, which was headlined by a keynote speech from Illinois State University President Terri Goss Kinzy. The event was held in a hybrid format, with the in-person events held at the State Farm Hall of Business.