Access: GRANTED! Clearing-up Registration Clearance Problems

ITS has received a few reports of problems with entering registration clearances in the portal.  Here are a couple of the most common problems reported, as well as how to work around them.
You do not have permissions to view any advisees that match the selected criteria

Make sure the correct term is selected in the […]

By |November 10th, 2014|Tech Tips and Tricks, TigerTech|Comments Off

Downloading the Microsoft Office Suite from Office365

As a Georgetown College student, you are entitled to download and install a full copy of Microsoft Office for Windows or OSX (Mac).  To download Office in 4 easy steps:

Login to webmail ( with your full e-mail address and password.
Click the gear icon , and select “Office365 Settings”.
On the left-hand side, select “Software”.
Office365 will […]

By |August 27th, 2014|Tech Tips and Tricks|Comments Off

Quick Phone and Fax Tips

As the school year starts, you will likely be corresponding with people via phone and fax.  Here are some basic tips to help you communicate efficiently and effectively with our telephony resources.
All About Caller ID
If you’ve ever had anyone ignore your office phone calls because they didn’t recognize your suspicious-looking “8000” number, you’re not […]

By |August 21st, 2014|Tech Tips and Tricks, TigerTech|Comments Off

Your Y: Drive… It’s not just there for your health

Without mentioning any specific three-letter government agencies, hard-drive failures have been in the news lately. I recently came across an interesting article that mentions how data loss due to hard drive failure is still a huge problem for both businesses and individuals.  Here are some key points from this article:

From a survey, 66% of […]

By |July 10th, 2014|Tech Tips and Tricks, TigerTech|Comments Off

Periodic Password Changes Keep You Safe

I’ve mentioned before how choosing unique passwords and changing them periodically can help keep your account secure, but have you ever wondered why?  Today I’ll discuss the methods in which attackers attempt to compromise your system, and how password changes work to effectively thwart them.

When an attacker attempts to compromise your password, they will […]

By |May 12th, 2014|Tech Tips and Tricks, TigerTech|Comments Off