Skip to main content.

Technology FAQ

How to Report a Technology Issue or Security Concern

Having trouble with technology? Report any issues or concerns you encounter through the university’s online ticketing system, the **TDX Help Desk**. You can submit a ticket for assistance with a variety of technology-related problems.

Access the TDX Help Desk by clicking here: TDX Ticketing System.

What is TDX?

TDX, short for TeamDynamix, is the system used behind the scenes by the Office of Information Technology (OIT) and the ASUN/CSE Technology Department to track and resolve technology-related issues and requests. When you submit a ticket through the TDX Help Desk, it helps them efficiently address your concerns.

How can I access technical support resources?

You can access a variety of support resources through the following channels:

  • Online Knowledge Base: Search for solutions and troubleshooting guides for common technology issues.
  • Help Desk Portal: Submit a ticket or chat with a support representative for personalized assistance.
  • In-Person Support: Visit a designated help desk located in the Knowledge Center or Room 331C in the Joe Crowely Student Union for face-to-face assistance.

What are the university’s policies regarding acceptable use of technology?

The university has policies in place to ensure responsible and ethical use of technology resources. These policies cover areas such as academic integrity, copyright, data security, and acceptable use of university networks. Please refer to the university’s official policies for detailed information.

How can I reset my NETID Password?

If you’ve forgotten your NETID password, you can reset it yourself through the university’s Identity Portal. This portal allows you to manage your NETID account, including resetting your password.

What to do if I receive a suspicious email?

If you receive a suspicious email, here’s what to do:

  1. Do Not Click or Open Anything:
    • Links: Avoid clicking on any links within the email, even if they seem legitimate.
    • Attachments: Never open any attachments, including documents, images, or files.
  2. Identify Potential Red Flags:
    • Sender’s Address: Check the sender’s email address carefully. Does it look legitimate and match the sender’s actual domain?
  3. Forward the Email to OIT
    • By forwarding the suspicious email to OIT at abuse.unr.edu , they can verify the email is malicious and protect other users.

How can I protect myself from cyber threats?

Here are some tips to enhance your cybersecurity:

  • Use strong and unique passwords for all your online accounts.
  • Be wary of phishing emails and suspicious websites. Don’t click on links or attachments from unknown senders.
  • Keep your software and operating systems updated with the latest security patches.
  • Use antivirus and anti-malware software to protect your devices from malicious programs.
  • Be cautious when using public Wi-Fi networks. Avoid accessing sensitive information on public Wi-Fi.