June 2016

Equipment Circulation Temporarily Closed

Posted June 30, 2016

Tags:



Effective Date: July 2016

In July 2016, Equipment Circulation will be closed for inventory and renovation.

During July, please email us to reserve equipment. In order to ensure your equipment is available, please provide at least two business days' notice.

Equipment Circulation will reopen in late July.

If you have any questions or concerns, please email us or call 630.752.4357 (HELP).

LabShare Retirement

Posted June 24, 2016

Tags: ,



Effective Date: August 12, 2016

LabShare will be retired on August 12 in order to encourage better data security. This network drive was used to store and share lab data and reports in the natural sciences. Files currently stored on LabShare should be moved before August 12.

Rationale

  • LabShare allows anyone to view, modify, and delete any files. This is not secure.
  • The following secure options are available:

Impact on College Community

Science faculty with files stored on LabShare should move them to a different storage option (listed above) before August 12. After August 12, you will no longer have access to these files.

If you would like help choosing the best storage option or have other questions or concerns, please email us or call 630.752.4357 (HELP).

SPSS License Updates

Posted June 23, 2016

Tags: ,



Effective Date: June 29, 2016

At 10:00 PM on June 29, we will update SPSS licenses for the 2017 fiscal year. During this update, SPSS will be unavailable.

Key Features and Benefits

  • Users will no longer receive a message that their license is expiring.
  • SPSS will be available as usual after the update.

Impact on College Community

SPSS will be unavailable from 10:00 to 11:00 PM on Wednesday, June 29.

If you have any questions or concerns, please email us or call 630.752.4357 (HELP).

Training Site Migration

Posted June 23, 2016

Tags:



Effective Date: June 30, 2016

On June 30, training materials will move from training.wheaton.edu to www.wheaton.edu/ait. This will combine all Academic and Institutional Technology information and resources into one website.

Training materials are now located within our Support and Services pages. On each page, training materials, how-to guides, and links to external information are listed under Helpful Resources.

This table can help you find migrated resources:

Adobe Software
Banner
Global Protect (VPN)
Jabber
JotForm
Microsoft Office
Perceptive Content
Remark
Skype for Business
ThunderCloud Storage
ThunderCloud Training

  

If you have any questions, email us or call 630.752.4357 (HELP).

Phishing Alert | "jonathan.blanchard"

Posted June 9, 2016

Tags:



Some employees recently received an email claiming to be a request for payment. The email includes a “drive link” to a payment form and asks the recipient to fill it out as quickly as possible.

This email is a phishing attempt. Do not click the link. Thank you to all who reported this scam.

If you responded to this scam, please contact us at 630.752.4357 (HELP).

How to Spot a Phishing Attempt

Phishing Example

The images above are screenshots of two different versions of this phishing attempt. Here are some indications that these emails are not what they claim to be:

  1. The sending email addresses do not match the name at the bottom of the email.
  2. The subject line is the target’s Wheaton username in firstname.lastname format and was almost certainly taken from their email address. While this does not always indicate a phishing attempt, it's still a sign to be more cautious than usual.
  3. The email is poorly worded and very ambiguous. Though it requests payment, the description gives no details of the reason, the amount, or the recipient of the money.
  4. Notice that both emails are intentionally vague. This is an attempt make the target feel it is necessary to click the link for more information.
  5. Both emails contain a reference to a “drive link.” Phishing attempts often use technical terminology to disguise how little information they contain. The link may take the target to an actual payment form, it may mine for personal information, or it may lead to a website that initiates a download of malware. It is never wise to click on any link in an unsolicited email, especially from a sender you do not know.
  6. Neither email contains a signature with pertinent contact information. Most organizations require some form of standardized signature that includes phone number, email address, website information. Although some phishing attempts will include a signature, most scammers do not want to be contacted and will not include this information.

Some versions of these emails are better at imitating legitimate requests than others. If you notice any of the warning signs listed above in an email you receive, do not click on the link or respond to the sender.

Always exercise caution when responding to emails. If you're not sure whether an email is legitimate, contact us or call 630.752.4357 (HELP).

Media Center