How to See Calendar Availability

    When Scheduling a Meeting Create a meeting request in one of the following ways: From the Inbox, select New Items> Meeting (or use the keyboard shortcut Ctrl + Shift + Q.) From the calendar, select New Meeting (or use the keyboard shortcut Ctrl + Shift + Q.) From an email message in the Inbox, select the Reply with Meeting (or use […]

    Read More

    Incoming Freshman Guide

    Getting Started with IT at TAMHSC As an incoming freshman, you’ll have a lot on your mind. Don’t let tech-related questions overwhelm you! The Office of Information Technology (OIT) is here to guide you through everything you’ll need to know about IT at Texas A&M Health Science Center (TAMHSC). Take Advantage of Special Student Discounts […]

    Read More

    Listing of HSC Affiliates that are Approved for email Auto-forwarding

    Below you will find a list of all HSC Affiliates that have been approved to auto-forward to their institution’s email servers. This decision was made based on the affiliate agreements that are in place for each institution. If your institution is not on the list, please email helpdesk@tamhsc.edu to request it be added. OIT Security […]

    Read More

    HSC Emergency Alert FAQ

    Q: What is the purpose of the emergency alert system at the Texas A&M Health Science Center? A: As mandated by Texas House Bill 2758, for the safety of faculty, staff and students, in the event of a campus emergency, a notification must be sent by using email or telephone notification and any other means the […]

    Read More

    All About Phishing

    Phishing is… “A cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals to providing sensitive data such as personally identifiable information, banking, and credit card details, and passwords. The information is then used to access important accounts and can […]

    Read More

    HSC-ID – Group Ownership

    Group Owners have the ability to control who has access to their group from the HSC-ID web portal.  Owners are generally assigned during the creation of the group, but sometimes are reassigned as job descriptions and business roles change. In some situations, it is necessary for more than one person to have ownership rights for a group. […]

    Read More

    Guide to Duo Two-Factor Authentication

    Duo Security for HSC The Office of Information Technology has two-factor authentication through Duo Security. Using Duo can help lower the chances of a malicious user accessing HSC resources. What is Two-Factor Authentication? Two-factor authentication adds a second layer of security to your online accounts and is separate and independent from your username and password. […]

    Read More

    Tech Tips for Travelers

    Six quick and easy steps to take in order to make your computing experiences away from home as safe as possible! 1. Download Cisco AnyConnect Virtual Private Network (VPN) The Cisco AnyConnect VPN client allows you to access TAMHSC resources from your personal or work laptop. Even if you don’t need access to TAMHSC resources, a […]

    Read More

    Meltdown and Spectre Information

    Meltdown and Spectre are two recently discovered security vulnerabilities that affect all modern processors, computing devices and operating systems. By taking advantage of design flaws in processors, attackers can see sensitive data in your computer that shouldn’t normally be accessible like passwords and encryption keys. Meltdown takes advantage of the isolation that should occur between […]

    Read More

    Mac Keychain – Update, Reset, Delete Instructions

    Overview Keychain Access is an OS X app that stores your passwords, certificates, and other sensitive account information; reducing the number of information you have to remember and manage.  When you access a website, email account, network server, or other password-protected items, you may be given the option to remember or save the password. If […]

    Read More