October 28, 2021
Gather ‘round, WCM… it’s almost Halloween, which means it’s time to regale you with some spooky tales! As we close out National Cybersecurity Awareness Month, join us for some scary stories about protecting data while working remotely:
October 28, 2021
As mentioned in a previous message, our RightFax service was moved to an improved cloud server. Incoming faxes to printers, emails, distribution lists will still be sent to the same locations, and Xerox workflows not changing at this time. However, you will need to access a new site to log into RightFax; the Righfax desktop client will no longer be used on the new server.
How to log into the new RightFax
To access RightFax:
October 27, 2021
Presenting your screen in Zoom and can't get that pesky floating meeting controls panel out of your way? Hiding it takes only a few seconds! Learn how you can move your meeting controls from the screen so you can present with ease.
Read more about how you can manage your meeting while screen sharing on Zoom's support site, and visit our TipUp site to view our past episodes!
October 27, 2021
Apple recently announced the release of their newest operating system, Monterey.
Should I upgrade to Monterey?
If you would like to upgrade to Monterey on the computer you use to access WCM resources, ITS does support this new OS.
October 20, 2021
In light of the increased digital security attacks worldwide, WCM is fully transitioning to using Duo two-factor
authentication when accessing Office 365 email, calendars, and contacts via Outlook, Apple Mail, and Outlook on the
web (o365.weill.cornell.edu) on your laptop, desktop, or mobile device.
October 19, 2021
If you export or copy-paste data into Excel from other sources, you can sometimes end up with some questionably formatted data. The last thing you want to do is spend hours cleaning up hundreds of line items - that's where Excel's TRIM and CLEAN functions come in! Get a quick tutorial in our latest TipUp video.
October 18, 2021
For all the sophisticated techniques hackers use to access sensitive data, there are some really simple steps you can take to protect yours: namely, keep your desk clean!
In the info security biz this is called a “clean desk policy” and it’s exactly what it sounds like:
October 11, 2021
Data breaches happen. Just last week, the livestreaming video game site Twitch reported a massive data leak that included the platform’s source code, as well as payments made to thousands of streamers. Awkward.
Are there fees associated with Consent to be Contacted for Research?
Currently, there are no fees associated with using the CCR protocol.
How do I get started using the Consent to be Contacted for Research protocol?
Investigators interested in using the CCR protocol as one of their research recruitment methods should email ccr-support@med.cornell.edu with a brief description of their study (incl. IRB protocol number) and patient cohort of interest. The study team will need approval from the Institutional Review Board (IRB) and Protocol Review and Monitoring Committee (PRMC) to use the CCR protocol.
The study team will then meet with the Research Informatics (RI) team to discuss the project and assess the feasibility of using CCR as one of the recruitment methods. The goals of the consult session are for the study team to better understand the overall CCR workflow and for the RI team to begin drafting a computable phenotype of the study’s inclusion/exclusion criteria. Once the study cohort has been identified, researchers will be given the list of patients in Epic whom they are able to message to via MyChart.