Google Changes (a reminder): Google has announced that they are changing from an unlimited storage to a limited storage model.  This change will impact Google Drive, Gmail and Google Photos.  Google anticipates these changes to take effect in July of this year.  To prepare for this change, we would like you to review your current storage usage and delete any unnecessary files.  Removing unneeded files may take some time but doing so will help make sure you are in a good spot when the changes take effect. Note: Media files such as videos, photos, and audio files take up the most amount of space.  Also, view any attachments you may have in your emails and delete those that are no longer needed.

Please complete the following steps:

  1. To confirm how much storage you’re using, go to
  2. To review and delete large or unnecessary files in Drive, go to
  3. To review and delete large or unnecessary files in shared drives, go to
  4. Consider deleting Drive content that you may have copied to a shared drive. If a file resides in 2 locations, it may be consuming twice the storage space.
  5. To search for and delete unnecessary or large emails, go to Manage files in your Google Drive storage and follow the instructions for Gmail.

OculusIT Study:  This study is wrapping up and we are excited to review (and implement) their recommendations.  OIT has already formed the recommended advisory councils and will be holding the initial meetings before the end of the Spring semester. Staffing:  Over the past few months, OIT has experienced a significant number of retirements.  We strive to provide prompt and efficient service to all tickets and calls.  The most efficient way for OIT to track service requests is through the use of the TeamDynamix ticketing system (TDX Client Portal). This will ensure that your issue is resolved in a timely manner and also allow us to monitor and adjust the workload of our staff.  You can send an email to We ask that you be patient as we work through the hiring process.

- Malcolm Rice, CIO


OIT welcomes Anthony “Bubba” Fincher as our newest team member! Bubba comes to us from CSS, and offers a multitude of low voltage and structured cabling knowledge to the Network Infrastructure Team. Bubba will serve as a Cable Plant Engineer, and coordinate OIT requirements during new or renovation construction projects on campus. 


Trying to schedule a meeting? Want to share when you’re available? Forget Calendly, Doodle polls, and the like. Google Calendar could be your best option. If all interested parties would keep their account’s Google Calendar updated with free/busy information, then we could all use this no-cost solution to collaborate.

Please consider sharing your calendar (free/busy only) with everyone at UAH so they’ll know when you’re available for a meeting. To do this, follow the steps below.

  1. On your computer, visit in any web browser. Calendar sharing isn’t supported in the Google Calendar app.
  2. Login and view the My calendars section on the left. Expand that (if it’s collapsed), and find your UAH calendar in the list (it’s probably at the top).
  3. Beside the calendar you want to share, click the three dots and click Settings and sharing.
  4. In the Access permissions for events section, check the box for Make available for University of Alabama in Huntsville and choose, from the drop down to the right, the option for See only free/busy (hide details)

Learn more about access permissions here.



Four Questions to Ask Yourself

Social engineering is a scam where a cybercriminal attempts to trick someone into taking an action against their own best  interests. Usually, the action results in the victim providing confidential information (like their login information) or installing malware on their computer. Most social engineering attacks have four common traits, which signal a far higher likelihood of a scam if all are present. In an article written by Roger Grimes from KnowBe4, he advises asking yourself these four questions to help you avoid becoming a victim.

1. Did the message arrive unexpectedly?

2. Is it the first time the sender has asked you to perform the requested action?

3. Does the request include a stressor such as "you need to do this now"?

4. Can performing the request harm your interests?

If you answer yes to all of them, you should go out of your way to confirm the request is legitimate. Use a trusted method like calling or texting the sender before taking any action. Attackers are always looking for opportunities to take advantage of our helpful nature. Take a moment and consider these 4 questions when you receive an unusual request.  If you receive the request via email and believe it to be fraudulent, click the 3 dots in the upper-right corner of the message and click "Report phishing".  Doing so will flag the message as a possible phishing attempt and will make Google's algorithm better in protecting everyone's inboxes.Thank you all for your diligence and helping keep UAH safe.

Do your part.  #BeCyberSmart

Jeremy Shelley, CISO


Jennie Couch recently commented about Gregory Poveda:

"This is the first time I've ever been assisted by a very polite man who assisted me with my computer. I just want you to know he assisted me really good and is very knowledgeable."