Here are some of our recent news items. Please look these over for important information.
Phishing scheme circulating
IT Services was made aware of emails circulating which are a phishing scheme. The warning to us stated the malicious emails come from an address ending in .edu with links supposedly back to the West Virginia state Employee Self Serve system. While the ones we have seen come from .edu domain sites, future ones may come from other sites with different domains as this scheme morphs. Do not follow the instructions.
If you receive one of these emails, but you did not click on the link, forward it to email@example.com. After you send it, delete it immediately and delete it from your Deleted Items folder right after that.
If you already received the email and followed the instructions, do the following steps immediately.
- Turn your computer off.
- Unplug the network cable if your system is connected by a wired connection to the network.
- Call the Shepherd IT Service Desk at 304-876-5457. We will work with you to fix any problems.
Miller hall Wi-Fi enhancements
The Wi-Fi network in Miller hall was expanded and activated for both the residents and administrative personnel.
New printing tool deployment
IT Services is deploying a new tool, Print Logic, to assist with the administration of printers/printing. Some users may begin seeing the new software. We will communicate more detailed information upon a full deployment.
Butcher Center Classroom WiFi enhancements
WiFi is now available in Butcher Center classrooms 112, 113, 114, 118, and 127.
Spam or phishing attack weekend of January 20-22, 2017
IT Services was informed over the weekend of January 20-22, 2017, that some students received emails that were either SPAM or a PHISHing attack. These emails looked enticing and legitimate, as many revolved around job opportunities or free goods, but, please be aware that these emails, and others like them, often are not legitimate. As of January 19th, Homeland Security has also issued a similar warning to all universities nationwide, outlining the same.
Always use caution when viewing and processing email. Take extra care whenever asked to access another ‘link’ or open any ‘attachments’.
Here are some rules of thumb to identify red flags in determining a valid email:
- FROM: You don’t recognize the sender or sender’s address. This is an unexpected or unusual email with an embedded hyperlink or an attachment from someone that I have not communicated with recently.
- SUBJECT: Subject line is irrelevant and/or does not match the email content.
- TO: You were sent an email with others, but you do not recognize any of the other recipients.
- DATE/TIME: Was this email sent at an unusual time, like 3 am?
- CONTENT: Am I being asked to do ‘something’ to avoid a negative consequence or to gain something of value? Does the content have bad grammar or poor spelling?
- HYPERLINKS: When you hover your mouse over the hyperlink, does the site that it is directing you to match what is on the hyperlink or to another place?
- ATTACHMENTS: Also be suspicious. You don’t recognize the file type.
If you are unsure if you have a malicious or legitimate email and would like assistance, please contact the IT Service Desk for assistance at 304.876.5457. You can also elect to email us your issue to firstname.lastname@example.org; or you may visit us in person in the lower floor of the Library (ASC area).
Guest Wi-Fi now available
Shepherd has guest Wi-Fi access available in some buildings currently. We are working to expand coverage to other buildings as time allows. Please click on the Guest Wi-Fi Access tab on the left side of this page for all of the information including which buildings have coverage and how to connect your devices to it.
General information and cautions about phishing attacks
Periodically emails circulate in the email systems which are either trying to phish your information or contain viruses. Do not be duped by these emails. They look official but do not come from Shepherd’s I. T. Services department.
If you have further questions, want more details or are not sure if an email you received is one of them, please contact the User Support Desk. Our contact information is below.
If you think your computer is infected, you can submit all the details in an email to email@example.com. This will create a work order in our system. We will contact you about scheduling an on-site appointment or to have you bring the system to us.
Here is an educational resource pertaining to Social Engineering attacks and how to recognize them Social Engineering Red Flags
Updated April 21, 2017