Faculty and Staff Resources
Information is available on the UW System COVID-19 webpage. UW System and UWSA employees can see answers to common coronavirus-related questions and ask their own on the UW System COVID-19 Frequently Asked Questions (FAQ) webpage. Submitting a question will require you to log in with your campus credentials.
UW System Administrative Furlough Policy
For information about UW System Furlough Policy, view the latest communication from UW-System.
Essential Online Instructional Tools
Essential Online Instructional Tools
Canvas is UW-Parkside's learning management system (LMS). Canvas is where instructors can build and house online content such as readings, online assignments, quizzes, and discussions.
Use in tandem with Canvas as an asynchronous video recording. Create and/or share videos within your Canvas course, or create them separately and add them to your course as you see fit.
Blackboard Collaborate Ultra
Use in tandem with Canvas as synchronous live video sessions with students. Create Canvas virtual classrooms (Canvas Online Rooms), virtual office space, or communicate, collaborate, and participate in virtual meetings in real-time.
For a comprehensive list of tools, best practices, and strategies, visit the Instructional Continuity webpage.
UW-Extended Campus Online Teaching Resources
Extended Campus has set up a website to provides pathways, templates, shortcuts, and other tools so faculty and instructors can quickly design and be prepared to migrate, adapt, and otherwise move their courses online. This website works hand-in-hand with UW System Administration’s hardware and software technical support and campuses’ hands-on support of their own instructors.
Essentials for Access
DUO, VPN, AND NETWORK DRIVES
Duo is a two-step authentication process to keep information safe. If you do not have Duo access, you will need it.
HOW TO GET DUO
- Install Duo Mobile to your Smartphone from your Apple Store or Google Play Store or contact the Help Desk at 262-595-2444 to arrange for a fob device.
- Complete Duo Training
- Get ID Proofed. Someone will contact you after your training is complete.
VPN allows you to securely access many campus assets. You will need DUO before you can use VPN.
MAP NETWORK DRIVES
To access the Parkside network drive off campus, you will need to set up DUO and VPN. Then, you can follow steps linked below.
You may not need to connect remotely to your campus desktop computer to do your work remotely. If you do, this is what you need to know.
- You MUST be connected to VPN before you can connect to your computer on campus in your office.
- You MUST know your campus computers asset tag number ie; UWP617081
If you are working from home and need to forward your office phone to another number like a personal cell phone (requires VPN), this is what you need to do.
- Go to UW-Parkside logins
- Click on Phone Forwarding and Management on the list.
- Login with your UW-Parkside credentials.
Click on Call Forwarding on the left hand panel and enter the phone number you would like to forward your office phone to.
Jabber and Conference Calls
Jabber (requires VPN) can be used as a chat function, but also integrates with your office phone to make and recieve phone calls to and from your offce phone virtually.
Conference Calls Using Phone
Conference Now can be used for a teleconference meeting for on and off campus attendees.
WebEx Video Conferencing
WebEx Meetings & Personal Room
The Webex Meetings desktop app allows you to start and join meetings quickly and easily. You can schedule, start, and join meetings from your desktop or directly from Microsoft Outlook.
Your Webex Personal Room is your own virtual conference space that's always available and has its own Personal Room link and video address.
Mute your microphone unless you are actively talking
"Mute" or disable video if not absolutely needed (bandwidth reduction)
Assume you are always on camera and that you are always audible (even if you think you're muted or video-disabled)
Avoid side-conversations if you are physically next to someone – cross-talk is especially annoying and distracting to remote participants
Be careful not to talk over others; politely wait your turn and if you are talking for more than a minute at a stretch, pause to let others ask questions or seek clarification
Avoid tapping pencils, moving papers around, rattling ice, setting coffee cups down on table-tops, tapping on keyboards, and other seemingly innocuous sounds – they are unbelievably loud and annoying to others on the call
If conducting a video teleconference, warn your family members not to wander through; some home-attire may not be safe for work
Make notes on what you want to say before the conference starts; take notes on "action items" during the conference whenever you are asked to work on something; don't ramble on; be succinct and short – if it is a question that can be worked "offline" then do that
File Sharing & Team Collaboration
Office 365 Apps: Word, Excel, Teams, and OneDrive
The apps listed below are all accessible through the web-based RangerMail (Office 365), which uses your campus login credentials. Individual apps can be found by clicking on the grid icon often located in the upper-left corner of the browser window.
Microsoft Word, Excel, and more
Your access to Office 365 connects you with many web-based versions of Microsoft applications that you commonly use: Outlook (email and calendar), Word, Excel, and PowerPoint.
Unified communication and collaboration platform that combines persistent workplace chat, video meetings, file storage, and application integration.
Think of OneDrive as your free online storage unit. You have one terabyte of storage space for documents, images, and more. You can share and receive documents and work collaboratively on the same document with others in real-time.
Staying Cyber Safe
Staying Cyber-Safe While Working From Home
With millions of people worldwide being asked to work from home due to the ongoing spread of coronavirus, scammers are targeting remote workers with phishing campaigns and malware. Here are some general guidelines for working at home and what to watch for so that you do not become a victim.
What are common indicators of phishing attempts?
- Suspicious sender’s address. The sender's address may imitate a legitimate business. Cybercriminals often use an email address that closely resembles one from a reputable company by altering or omitting a few characters.
- Generic greetings and signature. Both a generic greeting—such as “Dear Valued Customer” or “Sir/Ma’am”—and a lack of contact information in the signature block are strong indicators of a phishing email. A trusted organization will normally address you by name and provide their contact information.
- Spoofed hyperlinks and websites. If you hover your cursor over any links in the body of the email, and the links do not match the text that appears when hovering over them, the link may be spoofed. Malicious websites may look identical to a legitimate site, but the URL may use a variation in spelling or a different domain (e.g., .com vs. .net). Additionally, cybercriminals may use a URL shortening service to hide the true destination of the link.
- Spelling and layout. Poor grammar and sentence structure, misspellings, and inconsistent formatting are other indicators of a possible phishing attempt. Reputable institutions have dedicated personnel who produce, verify, and proofread customer correspondence.
- Suspicious attachments. An unsolicited email requesting that a user download and open an attachment is a common delivery mechanism for malware. A cybercriminal may use a false sense of urgency or importance to help persuade a user to download or open an attachment without examining it first.
How do you avoid being a victim?
- Be suspicious of unsolicited phone calls, visits, or email messages from individuals asking about employees or other internal information. If an unknown individual claims to be from a legitimate organization, try to verify his or her identity directly with the company.
- Do not provide personal information or confidential information about your institution, employees, and students through email. You can share information on secured channels like Network Drives, Sharepoint, MS Teams, or through phone calls.
- Do not reveal personal or financial information in email, and do not respond to email solicitations for this information. This includes following links sent in email.
- Don't send sensitive information over the internet before checking a website's security. (See Protecting Your Privacy for more information.)
- Pay attention to the URL (Uniform Resource Locator) of a website. Look for URLs that begin with "https"—an indication that sites are secure—rather than "http.”
- Look for a closed padlock icon—a sign your information will be encrypted.
- If you are unsure whether an email request is legitimate, try to verify it by contacting the company directly. Do not use contact information provided on a website connected to the request; instead, check previous statements for contact information. Information about known phishing attacks is also available online from groups such as the Anti-Phishing Working Group. (See the APWG eCrime Research Papers.)
- Install and maintain antivirus software, firewalls, and email filters to reduce some of this traffic. (See Understanding Firewalls for Home and Small Office Use, Protecting Against Malicious Code, and Reducing Spam for more information.)
What do you do if you think you are a victim?
- If you believe you might have revealed sensitive information about your institution, report it to your supervisor and the Help Desk at firstname.lastname@example.org.
- If you believe your financial accounts may be compromised, contact your financial institution immediately and close any accounts that may have been compromised. Watch for any unexplainable charges to your account.
- Immediately change any passwords you might have revealed. If you used the same password for multiple resources, make sure to change it for each account, and do not use that password in the future.
- Watch for other signs of identity theft. (See Preventing and Responding to Identity Theft for more information.)
- Consider reporting the attack to the police, and file a report with the Federal Trade Commission.
Working from home – computer checklist:
- Use strong passwords - 12 characters or more, mixture of letters, numbers, special characters
- Use a two-factor authentication – DUO Two-Step Authentication
- Use a VPN – Global Protect
- Use a firewall
- Use an antivirus software
- Secure your home router
- Install updates regularly
- Back up your data
- Look out for phishing emails and sites
- Watch out for work-from-home scams
- Lock your device
If you have any questions or concerns, please contact our Help Desk at 262-595-2444 or email us at email@example.com.
FITNESS AND WELLNESS
HESM 430 | Fitness Program Management
Students have provided the campus with some resources to help us all practice wellness through fitness and mindfulness during this time. On the Fitness and Wellness page, you will find their “homemade” exercise classes as well as a list of links to recommended resources for various topics related to health and wellbeing. Please peruse and participate in a few of the resources pulled together for you. #wfh
TIPS FOR WORKING REMOTELY
- Find an area with minimal distractions. Think out of the box: a front porch may be the quietest spot around.
- Make sure family members know you're working and not available for random tasks.
- Set a schedule – get up at a regular time; take lunch at a regular time; wrap up when the work day is complete and your tasks are finished.
- Don't sit in one position for more than 30 minutes. At the very least, stand up and stretch or walk around the room. Eye strain is a thing.
- Let your counterparts and colleagues know when you are stepping away for lunch and when you return.
- You have several means of communicating (email, jabber, phone calls, etc.). Make a habit of regularly checking each.
- Maintain discipline in breaking away from immersive tasks to communicate with or respond to others
- Never underestimate the value of talking on the phone to someone. One 10-minute phone call can easily replace 30 minutes of email or chat.