Search results

276 items matching your search terms.
Filter the results.
Item type













New items since



Sort by relevance · date (newest first) · alphabetically
Citrix Upgrade: Tuesday, Feb. 6
In preparation for the upcoming UNC Health Care Citrix upgrade, older versions of Citrix on School of Medicine computers will need to be upgraded. This upgrade is scheduled to occur on Tuesday, Feb. 6 at 10 p.m.
Located in Vital Signs / School of Medicine IT News
Security vulnerability in Apple macOS High Sierra
Apple has announced a significant security vulnerability in the latest Mac operating system, High Sierra. If you are using a device running macOS High Sierra (latest OS 10.13.x), we recommend that you install software updates from the App Store as soon as possible. If you need assistance please contact 919-962-HELP or use the Click to Chat feature at help.med.unc.edu.
Located in Vital Signs / School of Medicine IT News
Beginning last Thursday, Nov. 9, and continuing Friday morning, Nov. 10, the UNC Health Care email system was targeted by a large scale phishing campaign. Contact ISD immediately (984-974-4357) if you shared your credentials.
Located in Employee News Online / 2017 / Nov. 16
UNC-Guest Wireless to be discontinued on November 29
ITS plans to permanently remove the wireless access channel known as UNC-Guest from the UNC campus network on Wednesday, November 29. It is being replaced by a more robust and more secure access channel labeled as UNC-Guest-PSK. Read more for information on how to connect to UNC-Guest-PSK.
Located in Vital Signs / School of Medicine IT News
Urgent Message for Apple users re: High Sierra update
Recently the new Apple Macintosh operating system (High Sierra) was released in the Apple App Store. If you have an Apple computer it is likely that you have seen a prompt to download and install this update. PLEASE DO NOT install the update at this time. This update will cause problems with Microsoft Office and the UNC wireless eduroam enrollment process. Campus IT groups are currently working with the vendors for a resolution. Please monitor this page for updates.
Located in Vital Signs / School of Medicine IT News
Finalizing the Wireless Site Survey
Beginning the week of Oct. 2, ISD will finalize the wireless site survey originally conducted at UNC Medical Center in June. Four individuals will conduct the surveys, which should take about two weeks to complete.
Located in Employee News Online / 2017 / Oct. 5
Changes to School of Medicine VPN Access
Beginning on Monday, September 18, 2-Step Verification will be required to utilize the UNC School of Medicine Campus VPN to access resources from off-campus locations. The Cisco VPN Client is typically used when off campus to access shared network resources such as the J: drive, and on-campus printers, as well as connecting to your office desktop using the Remote Desktop Connection. Read more for information on registering for 2-Step Verification (Duo).
Located in Vital Signs / School of Medicine IT News
UNC Health Care honored as 'Most Wired Advanced'
UNC Health Care is one of only 27 systems in the United States to be recognized as a 'Most Wired Advanced’ health system by the American Hospital Association (AHA) for its use of information technology to improve patient care and clinical integration.
Located in News / 2017 / July
Beware of tech support scams
ISD Technical Security has seen an increasing number of tech support scams reported, in which scammers posing as technical assistance attempt to gain access to your computer or offer to "fix" your computer for a fee. Find out more about how to spot these scams.
Located in Employee News Online / 2017 / July 6
New Ransomware Threat – Actions required of all users
You may have heard of a new ransomware threat called ‘petya’ that is infecting computer networks around the world via Microsoft Office documents either attached to email messages or stored on web sites/servers for unsuspecting users to download. ISD needs all UNC Health Care employees and providers to take the following actions to prevent this ransomware virus from reaching our network.
Located in Employee News Online / 2017 / June 29