Articles - Lighting The Way

Article Archives

News Articles

University MOR Associates IT Leadership Program

University MOR Associates IT Leadership Program   Program Overview The MOR Associates IT Leadership Program (ITLP) is an 8-month program intended to help IT leaders improve skills in a number of key areas such as: delegating, developing people, strategic...

IT Community Awards

2019 IT Community Awards We are happy to announce two IT Community Awards for 2019! Nominate your fellow UIC IT members today!   The UIC IT Community Leadership (ITCL) Award The UIC IT Community Rising Star (ITRS) Award   The UIC IT Community Leadership...

New Features coming to Blackboard this Fall 2017

Blackboard has made recent improvements in functionality that we’d like users to explore before integrating them into our UIC system in the upgrade planned for August 12, 2017. Users have been asked to use the link below and their current login credentials to access...

Week 4 National Cyber Security Awareness Month 

We end this month’s security awareness campaign with a last look at phish login webpages. Now that we have a better idea of what red flags to look for, let’s review what steps to take if you determine you’ve been tricked. 1. Remain Calm Keeping a clear...

New System for Managing your University of Illinois Password

The One ID and Password (OIDPW) phase of the University of Illinois Identity and Access Management (IAM) Project (http://web.uillinois.edu/IAM) was successfully implemented at the UIC campus over the weekend of October 14-16, 2016. What is different? From now on you...

Week 3 National Cyber Security Awareness Month 

For the first two weeks of National Cyber Security Awareness Month, we focused on phishing email messages and the links they contained to phishing login webpages. This week we’re taking a closer look at phishing login webpages. Common Red Flags to look for to...

Week 2 National Cyber Security Awareness Month

Last week we learned what phishing and spear phishing is. This week we’ll focus on tips for identifying phish email messages. Basic cybersecurity isn’t that difficult, it just takes a wee bit of time. Often the case is that a phishing victim was just...

Week 1 National Cyber Security Awareness Month

Cyber-criminals use phishing (a form of social engineering) to gather credentials and other information about you to either attack your accounts or service provider. A spear phish attack is a sophisticated attack in which the bad actor researches your institution (in...

Your New Learning Technology Solutions Team

The ACCC has merged the offices previously known as ITL and LETS to establish the new Learning Technology Solutions (LTS) team. ACCC-LTS is dedicated to helping faculty explore the ecosystem of instructional technology resources and systems available at UIC. ACCC-LTS...

Identity and Access Management Changes at UIC

We wanted to notify you about the University of Illinois Identity and Access Management (IAM) Project (http://web.uillinois.edu/IAM) and the changes that will happen when UIC goes live with the One ID and Password (OIDPW) phase of the project in October 2016. A goal...