The CIS Technology Blog
[Student] [Faculty] [Staff] [Security Notices]
Technology Blog Archive
Recent Blog Posts
How to add Another Account
The new Microsoft Teams allows for multi-account support, meaning you will be able to add another account to your Microsoft Teams App.
To add a new account, select your profile picture at the top right of the application window. Then, select Add another account.
Adding another account to your Microsoft Teams desktop app will allow you to get notifications for both accounts, in real time.
You will be able to participate in different chats, calls, and meeting without having to manually switch between accounts.
You will also be able to set your status for each account individually.
For a more in-depth explanation of how to add another account, please visit Manage Accounts and Organizations in Microsoft Teams, or by following the link below:
Other Microsoft Teams-related Updates
View what else is new by following the link: Microsoft What's New in Teams.
Also, linked below is the starting video in Microsoft Teams Youtube Playlist covering Microsoft Teams:
How Microsoft Teams Used to Look:
October is Cybersecurity Awareness Month - CSA
It is CIS's responsibility to share some vital information about how to be safe while using the internet and managing yours and students' information.
Over the next few weeks, CIS will be releasing a weekly blog post that expands on four core topics for this year's CSA month: Phishing, Social Engineering (whaling), Passphrases for passwords, and Ransomware.
At the end of the month, there will be a quiz released to employees and students. Receiving 100% on the quiz will automatically enter the user into a raffle. The raffle will have two winners, one student and one employee, who will each receive a prize* from CIS!
Keep an eye out for the first blog post on October 9, and then every following Monday until the end of the month!
*Please note that prizes will be ordered once they are selected by the prize-winners. CIS will contact prize-winners when the prizes are ready to be picked up from the HelpDesk.
Security Awareness Week 1: Phishing emails
What is Phishing?
Often carried out over email -- although the scam has now spread beyond suspicious emails to phone calls (so-called "vishing"), social media, SMS messaging services (aka "smishing"), and apps -- a basic Phishing attack attempts to trick the target into doing what the scammer wants.
Exactly what the scammer wants can vary wildly between attacks. It might be handing over passwords to make it easier to hack a company or person, or sending payments to fraudsters instead of the correct account. This information is often stolen by making requests that look entirely legitimate -- like an email from your boss, so you don't think twice about doing what is asked.
How would you identify a Phishing email?
Emails that contain the following should be approached with extreme caution, as these are common traits of phishing email:
- Urgent action demands.
- Multiple sources in the from email address line.
- Poor grammar and spelling errors.
- An unfamiliar greeting or salutation.
- Requests for login credentials, payment information, or sensitive data.
- Offers that are too good to be true.
Phishing is also a popular method for cyber attackers to deliver malware by encouraging victims to download a weaponized document or visit a malicious link that will secretly install the malicious payload on the person's computer. These kind of attacks mostly are trying to distribute a trojan malware, ransomware . These cyber hackers are hoping you don't look to deep into the email, that you just gloss over the details and click on the link, or download the attachment. Below is a screenshot of a phishing email, and you can see just how tricky they can be.
Why is Phishing called Phishing?
The overall term for these scams -- Phishing -- is a modified version of the word 'fishing' except in this instance the one doing this fishing is a scammer and they're trying to catch you and reel you in with their sneaky email lure. In most cases, they will send out many of these lures.
FUN FACT! - Why is Phishing spelled with a "Ph"?
The “ph” spelling of phishing is influenced by an earlier word for an illicit act: phreaking, which involves fraudulently using an electronic device to avoid paying for telephone calls. The people who perpetrated phreaking were called “Phreaks,” and since phreaks and hackers were closely linked, the “ph” spelling was used to denote the phishing scams involving these underground groups. Pretty cool!
We hope by sharing these resources with you, that you will have the tools and information necessary to make informed decisions when using the Internet.
Security Awareness Week 2: Ransomware
The CISA defines Ransomware as a "form of malware designed to encrypt files on a device, rendering any files and the systems that rely on them unusable. Malicious actors then demand ransom in exchange for decryption."
Ransomware can be planted into a network using many methods, like Phishing and Social Engineering. Once it is planted, hackers locate and secure access to important files and move those files to a secure network of their own.
Oftentimes, a hacker needs only access into a network, and can gain such access in a myriad of ways. For example:
- By sending phishing emails requesting login information or containing malicious code(as we have seen in last week's post)
- Looking for weaknesses within your network's security
- Users are redirected to a suspicious website that infects their computer by browsing or prompts for them to download files off the internet.
Computer Safety Tips:
Regularly back up important and sensitive data to a separate drive.
Install and regularly update antivirus software on your device.
Exercise caution when following links in emails, text messages, and websites.
Be mindful of what files your are downloading from the internet and avoid suspicious sites.
SPU Employees SPU-Managed Devices:
Software and application patches, anti-virus updates, data backups, mandatory browser and security settings are all implemented by CIS and enforced on your school-issued devices.
However, it is still essential for all employees to use their best judgement when viewing emails and websites.
Example 1. Fake websites
A cyber-criminal will design a carefully-worded phishing email which includes a link to a spoofed version of a popular website. The website imitates the layout of the original site to trick the victim into entering their account credentials.
Example 2. CEO Fraud
An attacker will take control of an email address familiar to the employee, such as their company’s CEO, Human Resources Manager, or IT admin. The hacker will assume this individual’s identity and ask the user to complete an urgent action, such as transferring funds, updating their personal information, or installing a new app.
Example 3. Malware
In these types of phishing attacks, an attacker will try to trick an employee into clicking on a malicious email attachment. Usually, this type of attack is carried out with a fake invoice or delivery notification.
If you think that the email may be legit, go to a link that you know is safe (one that you have save for the company) and log in from there. Or, you can always call the company and confirm or deny the validity of the email you received.
REMEMBER
If you don't recognize the sender, NEVER click on the attachments or links!
Example 4. Smishing
An SMS-based phishing attack in which a hacker will send an SMS or voice message asking the recipient to click on a link to accept a gift, change your password or call a number. The link will take them to a phishing website that they will use to try and gather more information from you.
Also, the link you click on could have malware in it. What does that mean? It could install a program on your phone that will allow the hacker to gain access to all your personal information, e.g. contacts, passwords, email, photos.
Example 5. Vishing
An unknown caller will call the victim and or leave a voicemail urging them to phone them back and hand over personal information, usually by impersonating someone from a trusted company.
The most common type of this is a Tech Support Call.
This attack is widespread in large companies where employees might not know or have met members of the tech support department. Scammers will pretend they need to do a computer update or repair and ask for the victim’s password to do it.
Education is key to beating these attacks. Frequently remind users that you will never ask them to divulge their password over the phone and that they shouldn’t do so under any circumstance.
Creating a Strong Passphrase
It is also important for users to use a strong Passphrase or password for securing your account. A strong password will protect your account while also not containing any personally identifiable words; like your mother's maiden name or your childhood pet. It is also important to use a strong or complex password, as a more simple passphrase can be easily guessed.
Here are some key things to follow when creating a password:
- Use a combination of numbers, capitalization and special characters.
- Use a longer passphrase that you can easily remember.
- Don't use a password you have used before, or a slight variation of a pre-existing password.
Do NOT write down OR your share your SPU password with anyone.
Password Managing
If you are worried about keeping track of your passwords, use a password manager that will keep track and record all of your passwords and where they are used. It is also likely that your phone or Google account will have password tracking enabled.
For more information on SPU's Password Policies, please select here.
Cybersecurity Awareness Month Quizzes
Thank you for joining us for this year's Cybersecurity Awareness month as we covered Phishing, Ransomware, Social Engineering (Spear Phishing), Passphrases, and Canary Files.
If you have questions or concerns about the topics covered, or would like to learn more, a student technician with the HelpDesk would be more than happy to assist! You can contact the HelpDesk by phone at 206.281.2982 or by email at help@spu.edu.
As a reminder, we are offering one quiz for Faculty and Staff and one quiz for Students to test their knowledge on the topics we covered this month. The quiz will remain open until November 15th, 2023.
A Few Rules to Follow:
- One quiz attempt per individual.
- A student may not take the employee quiz and employees may not take the student quiz.
- Only scores of 100% will be automatically entered into the raffle.
- Prizes will only be given out to the winning individual(s) after they have made their *selection.
- One prize per winner.
*Raffle winners will be contacted by CIS and choose their prize from the available options. Options include bluetooth speakers and/or gift cards.
Faculty and Staff Quiz Here
Student Quiz Here
Guest WiFi
Guest WiFi is available for parents, friends, and campus guests. Connect to the network ID called SPU-Guests , then launch a web browser and follow the guest registration instructions. Guests must provide a valid, non-SPU email address or a text-messaging cell phone number for registration. Guest WiFi is bandwidth-limited. SPU students should use the network named SPU-Wireless for high speed internet access. Learn more here .
Outdoor Wifi Locations
Outdoor WiFi locations are available in Tiffany Loop, Martin Square, and in front of the C-Store.
SPU Online Services
All of your online services can be found by clicking on the icon in the top right corner of of any SPU webpage and navigating to the Students tab.
Microsoft Office 365 for Education
There are many Microsoft Office products available to you as an SPU student, including:
Microsoft Teams
Microsoft Teams is a great collaboration tool that all SPU students have access to. Instant message your classmates, host a study group online, share files, and more. See here for more information: Study Groups In-Person and Online .
OneDrive for Business
As an SPU student you receive ample cloud storage space in OneDrive for Business. Your documents can be stored securely here and your account is accessible from any of your devices, on or off-campus. Documents can also be shared with others for group collaboration. Learn more here .
Microsoft Office Suite
Current students may obtain the latest version of Microsoft Office for Windows or Mac through the Microsoft Student Advantage Program. There is no cost to install the software on up to 5 personal devices, including your computer (PC or Mac), tablet (iPad or Android), or mobile phone (iPhone or Android). The Office Suite provides powerful productivity tools including: Word, Excel, PowerPoint, OneDrive, and Outlook. Learn more here .
More Office Apps
In addition to the Microsoft Office Suite (Word, Excel, PowerPoint, OneDrive, and Outlook) there are numerous apps that are available for you to use, such as Lists, Project, Visio, Planner and more. Log into your account to see what's available today .
Minecraft for Education
You have access to Minecraft at no additional cost through your SPU account. See here for more information.
Printing and Copying
SPU provides a campus-wide printing/copying program for students. There are Multi-Function Printers (MFPs) located across campus for your use. You can submit print jobs via the web from on or off campus and print them from any MFP once arriving on campus. You can also print directly from your computer or a USB flash-drive, copy, and scan to email. Document scanning on the MFPs is free and does not require print credit. Detailed instructions are posted at each MFP and on the CIS website: MFP Student Printing.
Print Credits
You receive print credits at the beginning of each quarter that accumulates through the academic school year as part of your Technology Fee.
- Students enrolled in 12 or more credits get $5.00 per quarter
- Students enrolled in 11 credits or less get $2.50 per quarter.
- When print credit has been used up, you can use Falcon Funds on your SPU ID Card for additional printing.
Watch Out for Scams!
While many illegitimate messages are filtered out of your inbox some may still get through. SPU will NEVER ask you to send or verify your login credentials or other personal/confidential information via email. Your account credentials should not be shared with anyone!
Job Scams
You've probably already received several emails scam offering an employment opportunity from someone who appears to be associated with SPU. Please delete these messages and do not respond. All legitimate jobs at the university are posted on SPU's Handshake platform . Employers on Handshake are vetted to guarantee their trustworthiness. Here is a blog post with more information to help you identify and avoid employment scammers. If you have any questions about the legitimacy of an email message please forward it to help@spu.edu.
Phishing
Phishing scams often come in the form of email messages attempting to steal your username and password. PLEASE DO NOT reply to these messages or follow web links where you must confirm or enter your username and password. If you have questions about the legitimacy of a message, please forward it to help@spu.edu and we can assist. See this CyberSecurity Awareness Month blog post about phishing for additional information.
Peer-to-Peer File Sharing and Copyright Compliance
File sharing software that copies and distributes songs, movies, videos, games, and software applications without the permission of the owner is a Copyright Law violation that can subject you to criminal and civil liability. Content owners use technological means to track the file sharing of their intellectual property on the Internet. SPU is required by law to inform you if we are aware, you have violated copyright law and must provide your information to copyright owners for legal action if you do not cease illegal activity. You are responsible for the activities of your computer when connected to the campus network. See Copyright Basics and DMCA Copyright Compliance / Peer-to-Peer File Sharing for more information about copyright compliance.
Update Your Emergency Contacts and SPU Alert Info
It is important to be made aware of campus emergencies in real-time, as information is available.
- SPU-Alert is the emergency alert system used to notify you of campus emergencies via text, email, and voice calls. We need your current contact information so that we can send you alerts during a campus emergency.
- Emergency Contact Information includes the contact details SPU should use in the event that an emergency situation happens to you.
The beginning of the school year is a great time to review and update your information. Log into the Banner Information System , go to the Personal Menu , update your information on the Emergency Alert System and Emergency Contact Information pages.
SPU will NEVER ask you to send your login credentials or other personal/confidential information via email. Your account credentials should never be shared with anyone.
Is Your Computer Connected to SPU?
CIS works behind the scenes to make sure your SPU-issued Windows computer is updated with the latest security patches, performing optimally, and has access to the SPU Software Center. Device management is crucial in protecting and securing sensitive information, and you can do your part by making sure your SPU computer connects to our management domain.
To ensure your device is secure and connecting properly, please follow the instructions on the Software Center page to load and install an application (we recommend using this time to make sure Zoom is on the current version 5.10.7). If you are unable to load the Software Center or the installation does not succeed, please contact CIS so we can make sure this service, as well as other update services are running correctly on your computer.
Software Updates
Some software tools, such as Zoom, won't work unless you are on the current version. Make sure these tools are updated before you need them in class. If you didn't already install the latest version of Zoom from the Software Center on your computer (see above), do so now and check if other software updates are available.
Office Equipment
Gather any office equipment that you took home for the summer. Possible items may include your computer, monitor(s), docking station, cables, keyboard, mouse, printer, headset, webcam, office chair, etc. Carefully package your equipment when transporting to avoid costly damage.
Please Check Your Classrooms in Advance!
In-Person Classes
Stop by your classroom and log in to the podium computer or try plugging in your laptop if you plan to use it for your lessons to make sure you have the right adaptors. Do a quick run-through of a presentation and test any specialized software. If you spot any problems, please contact the CIS Help Desk at 206-281-2982 or www.spu.edu/cishelpdesk .
If you need a refresher on how to operate the podium PCs or other presenting technologies in classrooms, please first refer to the recorded lesson on SPU Classroom Technology . To schedule a one-on-one training with a CIS technician, please contact the CIS HelpDesk at 206-281-2982 or www.spu.edu/cishelpdesk.
If you might need to record or stream your in-person class to support a student not able to be in the room, please test your webcam and microphone with the computer in the classroom (or be prepared to bring your laptop). If you have any questions about recording with Zoom or Panopto, sharing the recording with your class, or need a webcam and microphone please contact Educational Technology and Media at etmhelp@spu.edu for advice as soon as possible.
Please do not unplug, power off equipment, or move computer podium cables. Before leaving your classroom please return the podium equipment exactly how you found it.
Online Classes
If you will teach online, please ensure you have a Canvas course set up. If you are teaching synchronously, please also familiarize yourself with setting up a Zoom class and make sure Zoom is updated to the latest version. Start here for information about features available on Zoom and how to get signed up. A Zoom Licensed account should be used for any class instruction. This will allow you to host a class over Zoom class of unlimited duration and with up to 300 participants.
Can I Have a Mac?
Yes! If you or your instruction would benefit from using a Apple Mac instead of a standard PC you may select one at your next upgrade cycle. Some Mac options may have an additional fee due to higher cost. See the Centralized PC Purchasing Policy for details.
Protecting Student Privacy
We all value our privacy and are frustrated when others are careless with the sensitive information we entrust them with. You are entrusted with sensitive information about students and others the Seattle Pacific University community and you share in the responsibility to protect our students by complying with regulations and University policies. The Regulated Data Chart provides a simple overview of which places have the security and contractual protections to store certain types of sensitive Regulated Data. You can also learn more about campus Data Policy, Data Laws and Regulations, and Handling Confidential Data responsibly.
Using a Personal Computer for Work
Personal computers and departmentally-purchased computers (unmanaged) do not have the same security and regulatory compliance protections that SPU-managed computers purchased and managed by CIS have. Personal devices or cloud resources (Google Docs, DropBox, etc.) used for work purposes are subject to eDiscovery and can be confiscated or seized if they are suspected to contain information related to a lawsuit against the institution. Protect our student's data, yourself, your property, and the University by following the Use of Personal / Un-Managed Devices for Work policy.
Use OneDrive for Cloud File Storage
Storage platforms like Dropbox and Google Drive are not compliant for sensitive or regulated University data, such as information protect by FERPA. OneDrive for Business is the contractually protected platform approved for storing sensitive documents in the cloud.
CIS Staffing Shortage
Like many administrative offices, CIS continues to experience staffing shortages. The dedicated folks in CIS thank you in advance for your patience as we churn through your support requests at a slower pace than either of us would like. If you know someone who would be a good addition to the CIS team, the department is offering a $1000 referral bonus for hires that retain for at least 6 months.
Classrooms and Technology
Demaray Hall 150 received a significant upgrade this summer, including a brand new projector, ceiling mounted speakers, an iPad for secondary room controls, microphones and more. This will help the room be more user friendly and set us up for other future enhancements in the space. We are also beginning to make plans now for additional room updates over Winter break.
SPU Classroom Technology Training
CIS has published various technology training videos including one co-hosted with ETM on Classroom Technology. You can find this and other recordings here .
Subjects covered specifically in the SPU Classroom Technology video are:
- 00:00-25:45 - review of existing technology in classrooms (computer podium, projector controls, document camera), troubleshooting potential technology issues
- 25:45-38:00 - recording lessons in an on-campus classroom (Panopto), hardware needed to record, recording challenges in the classroom
You are welcome to live stream from the classroom, however live streaming in classrooms is currently not supported by CIS or ETM.
Emergency Classroom Support
Even with good preparation it is always possible that some technology will not function as expected in the classroom. It is CIS's priority to assist you in these cases.
If you run into technology problems in your classroom, call the CIS HelpDesk at 206-281-2982. We will do everything we can to provide assistance on the phone or immediately dispatch a technician to your room.
Our goal is to correct technology issues before they turn into a classroom crisis. If you experience any trouble at all during a class period but can't wait for support, please be sure and let us know about it later.
Software in Classrooms and Academic Labs
All classroom and lab computers have a broad range of software installed and configured, but please let the CIS HelpDesk know if anything is missing. Additionally, if there are any new software needs, please inform the CIS HelpDesk as soon as possible. There is often a review and testing process required for new software.
For more information on how to request new software for academic computers or how to request an update to existing software, see here .
Peer-to-Peer File Sharing and Copyright Compliance
File sharing software that copies and distributes songs, movies, videos, games, and software applications without the permission of the owner is a Copyright Law violation that can subject you to criminal and civil liability. Content owners use technological means to track the file sharing of their intellectual property on the Internet. SPU is required by law to inform you if we are aware, you have violated copyright law and must provide your information to copyright owners for legal action if you do not cease illegal activity. You are responsible for the activities of your computer when connected to the campus network. See Copyright Basics and DMCA Copyright Compliance / Peer-to-Peer File Sharing for more information about copyright compliance.
Guest WiFi
Guest WiFi is available for parents, friends, and campus guests. Connect to the network ID called SPU-Guests , then launch a web browser and follow the guest registration instructions. Guests must provide a valid, non-SPU email address or a text-messaging cell phone number for registration. Guest WiFi is bandwidth-limited. SPU students should use the network named SPU-Wireless for high speed internet access. Learn more here .
Campus Printing and Personal Printers
There are Multi-Function Printers (MFPs) available to you in many locations on campus. Each quarter you will receive credits to use towards printing and copying. We encourage all students to use these MFPs rather than bring a personal printer on campus. If you do need a personal printer on campus, please know that your wireless printers will not work on the campus wireless network. Disable the wireless networking on your printer and use a USB cable (available at the SPU Bookstore or other stores) to connect to your computer.
For Information about on-campus printing and copying see: Student Printing
SPU will NEVER ask you to send your login credentials or other personal/confidential information via email. Your account credentials should not be shared with anyone.
CIS HelpDesk Operations
Helpdesk walk-in hours will be limited to 10am-4pm on weekdays. The helpdesk will no longer provide evening and weekend support. We also expect the current longer than historical response times on work requests to be the new normal.
Reason for the Change
There are three key drivers for this change: headcount reductions; the transition from salaried to hourly staff, and minimum wage increases without budget enhancements for several years have decreased student employee labor hours.
Centralized PC Purchasing Changes
CIS is changing the way computers are funded and refreshed to better steward limited resources. The Centralized PC Purchasing Policy has been updated to reflect these changes. This shift will mean the following:
- One PC / Knowledge Worker - CIS will provide one standard PC (Windows or Mac) to each employee classified as a knowledge worker. CIS will cover the up-front expense and a permanent budget transfer is no longer required.
- Second Devices - With very limited exceptions, all employees with more than one computer will be reduced down to a single device.
- Shared Computers - All shared computers (student / adjunct workstations, kiosks, etc.) will be reviewed for business need. Devices without a clearly explained need will be eliminated. Funding of shared computers by business units will not change. See the Centralized PC Purchasing Policy for details.
- Equipment Refresh Cycle - Equipment refresh cycle goals, under 5 years, have been increased by 1 year.
- Equipment Stewardship - All equipment will be "stewarded" by CIS. When positions become vacant, computers will be returned to CIS to be rebuilt and re-issued when a position is filled.
- Eliminated Equipment Budget - Funds stewarded by CIS to maintain/replace any eliminated equipment has already been returned to the institution to reduce the deficit.
Reason for the Change
The Centralized PC Purchasing budget has been significantly reduced to reduce overall institutional operating expense. The change necessitates a realignment of existing equipment investments and downsizing the numbers of computers on campus to fit within SPU's budget and support labor capacity. Returning equipment to CIS during employee transitions simplifies inventory and asset tracking processes, improves device security, ensures better use of resources, and sets new employees up for success with a freshly refurbished device.
Printer Program Changes
The fleet of Multi-Function-Printers (MFPs) will be reduced from 85 printers to 50 printers across campus. The locations eliminated were determined based on usage, distance to the next closest MFP, and accessibility. This change also necessitates the removal of sending print jobs directly to a printer. Secure Print will be the only option to print to the University MFPs.
Reason for the Change
Budget for the Centralized Printing program has been significantly reduced and requires downsizing of the MFP fleet. The shift to Secure Print significantly reduces complexity, support expense, and reduces the risk of printing sensitive information to publicly accessible printers.
Additional Service Reductions and Changes
AV Equipment Checkout
Audio/visual equipment for checkout from the CIS Helpdesk has been eliminated. CIS will develop a list of local vendors that rent equipment to support events.
AV Event Support
AV technology support for online and in-person events has been eliminated. CIS will develop a list of local contractors you may hire to provide these services.
Matthew File Shares
The current hardware platform past its end-of-life and will not be replaced. CIS will work with departments to transition their files to Document Libraries in Office 365 over the course of the '23-'24 Academic Year.
If you've been waiting for a good time to review, re-organize, or remove old content from Matthew, now is a great time since it'll expedite the migration process once we get started.
Reach out to cis-bst@spu.edu if you'd be interested in moving your department's files early in the process and we meet to start things moving.
Tableau for Data Reporting
The University's Tableau license for ongoing maintenance has been canceled. CIS will continue to operate the Tableau server in a locked-down fashion for some time, but expect most departments to slowly transition reports and dashboards to Power BI.
Project Management
The IT Project Manager position and project management services offered by CIS have been eliminated. CIS will continue to partner in the review of technology projects, but project management will now be done by the requesting department's leadership or professional services staff provided by technology vendors.