Thursday, October 19, 2017

Horan Hall - Brief Network Outage 10/23 at 10am

Physical Plant will be conducting a generator test in Horan Hall Monday, October 23rd at approximately 10am.

There will be two brief outages, one while switching to generator power, the other while switching back to main power.

This will not affect the rest of campus.

COMPLETE - Planned Network Maintenance - Friday 10/20 1030pm

UPDATE: As of 11pm, this network maintenance was completed successfully. If you have any questions, please contact ITS at extension x-7973 or via email at its@manhattan.edu.

ITS will be conducting network maintenance on the wireless network in Alumni, Thomas, and Hayden Halls. This scheduled maintenance will be conducted on Friday, October 20th from 1030pm-11pm. 

In order to improve the wireless network reliability, there will be scheduled network maintenance in order to upgrade the firmware on the wireless management server. This scheduled network maintenance will affect only the wireless networks in Alumni, Thomas, and Hayden Halls. The wired networks will not be affected.

We apologize for the inconvenience that this may cause. If you have any questions, please contact ITS at extension x-7973 or via email at its@manhattan.edu.

Wednesday, October 18, 2017

Time for a refresh: meet the new Google Calendar for web


Check your schedule. Starting today, a fresh look and new features are coming to Google Calendar on the web to help you manage your time more efficiently and get more done.

We’re taking a lot of what you know and love from Calendar’s mobile application, like the modern color palette and sleek design, and bringing it to the web with a responsive layout that auto-adjusts to your screen size. We’ve also added more features for enterprises to help teams schedule and prepare for meetings.

Over the years, you’ve shared valuable feedback on how we can enhance Calendar to better fit your needs and we’re excited to bring new improvements. Now, it’s even easier to manage your schedule at your desk. In the new Calendar for web, you can:

  • Add rich formatting and hyperlinks to your Calendar invites. Link to relevant spreadsheets, documents or presentations in your Calendar invite and open them directly from the new “Event Detail” view. This can help you create more detailed agendas and ensure all materials are in one place before your meeting starts.

  • Manage multiple calendars side by side in “Day” view. Now you can view and manage calendars in separate columns. This makes it easier for employees who manage multiple calendars, like administrative assistants, to schedule meetings on behalf of their teams. Click “Day” view and select the calendars you want to compare.


There are a number of other changes in Calendar, too. Now you can see contact information of meeting participants when you hover over their names in a Calendar invite. There’s also a new way to view and restore deleted items in one place in case you accidentally delete a meeting invite. Additionally, "Day,” "Week,” and "Month" views are now more accessible, featuring better compatibility with screen readers. For more detail on changes, check out this post.
partially reposted from https://gsuiteupdates.googleblog.com/2017/10/new-calendar-user-interface17.html

Tuesday, October 17, 2017

Google Drive Just Got Easier For You and Your Team!

We’re pleased to announce Drive File Stream, a new application for your Mac or PC. Use Drive File Stream to access all your Google Drive files from your computer while using less disk space and decreasing sync time.
How does it work?
With Drive File Stream, you can:
  • Quickly see all your Google Drive files in Finder/Explorer (including Team Drives).
  • Browse and organize Google Drive files without downloading all of them to your computer.
  • Choose which files or folders you'd like to make available offline.
  • Open files in common apps like Microsoft Office and Adobe Photoshop.
Click here for more information regarding Drive File Stream




How do I get started?
Visit the Drive Help Center to install Drive File Stream and get started.


Click here for a Comparison: Google Backup and Sync vs. Drive File Stream

Partially reposted from https://gsuite.google.com/campaigns/index__drive-fs-eap.html

UPDATE 11:22AM RESOLVED Moodle Log In Issue


UPDATE 1 11:22AM

ITS has found the issue and fixed the Moodle log-in problem. We will be monitoring the server to confirm that it has been completely resolved.

___

We are currently dealing with a log in issue to the Moodle Production server. We are troubleshooting and working to solve the problem. We will post an update when we have more information.  

ITS 

Monday, October 16, 2017

Google Drive Update

Google Drive Sync will no longer be supported starting on December 11, 2017, and it will shut down completely on March 12, 2018. You may start seeing messages when you log in notifying of the upcoming changes. It is acceptable to take no action at this point.  Client Services will have more information distributed soon regarding the best procedure to follow to handle this change with Drive.
Google Drive will be replaced by Drive File Stream, a new application for your Mac or PC. Use Drive File Stream to access all your Google Drive files from your computer while using less disk space and decreasing sync time.
How does it work?
With Drive File Stream, you can:
  • Quickly see all your Google Drive files in Finder/Explorer (including Team Drives).
  • Browse and organize Google Drive files without downloading all of them to your computer.
  • Choose which files or folders you'd like to make available offline.
  • Open files in common apps like Microsoft Office and Adobe Photoshop.
More detailed information to follow soon.

Friday, October 13, 2017

Global Handwashing Day: October 15





We want to inform our clients of the steps ITS is taking to follow best practices for keeping our workplace clean:
  • Hand Sanitizer available in all public computer labs
  • ITS wipes down client machines when we work on them
  • ITS wipes down loaner laptops when they are returned

Take the Global Handwashing Quiz to determine how much you know about hygiene and handwashing.

Click on this link for more tips on  Keeping your computer clean

Partially reposted from: https://globalhandwashing.org/wp_quiz/global-handwashing-day-quiz/ and 
https://www.gcflearnfree.org/computerbasics/keeping-your-computer-clean/1/

Tuesday, October 10, 2017

Don't Let a Phishing Scam Reel You In

Cybercriminals use phishing—a type of social engineering—to manipulate people into doing what they want. Social engineering is at the heart of all phishing attacks, especially those conducted via e-mail. Technology makes phishing easy. Setting up and operating a phishing attack is fast, inexpensive, and low risk: any cybercriminal with an e-mail address can launch one.
According to Verizon's 2017 Data Breach Investigations Report, the education sector saw a rise in social engineering–based attacks. Students, staff, and faculty all suffered losses when personal data and research were disclosed to unauthorized parties. Phishing played a part in more than 40% of these breaches. Knowing what you're up against can help you be more secure. Here are a few things you can do to guard against phishing attacks:
  • Limit what you share online. The less you share about yourself, the smaller the target you are for a phishing attack. Cybercriminals use information you post online to learn how to gain your trust.
  • Protect your credentials. No legitimate company or organization will ask for your username and password or other personal information via e-mail. Your school definitely won't. Still not sure if the e-mail is a phish? Contact your IT help desk. (Many institutions now offer a "phish bowl" so end users can quickly and easily report phishy messages or view the latest scams.)
  • Beware of attachments. E-mail attachments are the most common vector for malicious software. When you get a message with an attachment, delete it—unless you are expecting it and are absolutely certain it is legitimate.
  • Confirm identities. Phishing messages can look official. Cybercriminals steal organization and company identities, including logos and URLs that are close to the links they're trying to imitate. There's nothing to stop them from impersonating schools, financial institutions, retailers, and a wide range of other service providers.
  • Trust your instincts. If you get a suspicious message that claims to be from an agency or service provider, use your browser to manually locate the organization online and contact them via their website, e-mail, or telephone number.
  • Check the sender. Check the sender's e-mail address. Any correspondence from an organization should come from an organizational e-mail address. A notice from your college or university is unlikely to come from YourIThelpdesk@yahoo.com.
  • Take your time. If a message states that you must act immediately or lose access, do not comply. Phishing attempts frequently threaten a loss of service unless you do something. Cybercriminals want you to react without thinking; an urgent call to action makes you more likely to cooperate.
  • Don't click links in suspicious messages. If you don't trust the e-mail (or text message), don't trust the links in it either. Beware of links that are hidden by URL shorteners or text like "Click Here." They may link to a phishing site or a form designed to steal your username and password.


Partially reposted from:  https://er.educause.edu/blogs/2017/9/october-2018-dont-let-a-phishing-scam-reel-you-in

Monday, October 9, 2017

New Resources Added in 25Live

In 25Live, “Resources” are items or services your event may need, such as technical equipment:

  • Projector 
  • Microphone  (podium or wireless handheld) 
  • Laptop 
  • Audio Visual (AV) Assistance
You can either add these when you submit your space request, or you can go back to the event record and add the Resource. One of the most important steps in requesting services for your event when your first submit your space request.

If you are creating the request, ‘Resources’ is the screen after you select the location.







Monday, October 2, 2017

License Server Maintenance starting Friday, October 6th, at 10:00PM

Update: License server maintenance was complete as of 10:35 PM on Friday, October 6th, 2017. Abaqus Research, Matlab, Maple, and Comsol were all tested and are currently working.

ITS will be performing license server maintenance on Friday, October 6th at 10:00PM. This maintenance will effect the following software:

1. MATLAB
2. MAPLE 
3. COMSOL

The maintenance is expected to be done by 12:00 AM on Saturday, October 7th. The maintenance will effect all users that are on the Manhattan College network and that use the software that have been listed above.

We apologize for any inconvenience that this may cause. If you have any questions, please contact ITS at its@manhattan.edu or at extension x-7973.

Client Services Support Update, Mondays and Thursdays 10-2:30pm

All of Client Services and Operations offices will be extremely short staffed between the hours of 10am to 2:30pm during the Fall 2017 Semester. This is due to the block scheduling of classes going forward, and is out of ITS' control. The timeframe for each staff shortage will change each semester due to schedule changes made by scholastic department chairs.

Within this time frame, only the following types of issues will be addressed:

Classroom Emergency Issues
Previously Scheduled Appointments

All other requests will be processed in the order of which they were received. In addition, we will have a surge of staff members after 2:30pm, to address immediate issues as they arise. Please be mindful this policy is being put into place so that we can better support the Manhattan College community.

If you have any specific questions or concerns, please email its@manhattan.edu or call 718-862-7973


Saturday, September 30, 2017

Computer Lab Software Request Deadline for Spring 2018 is November 10, 2017
If you would like to request an upgrade of a software already installed in the computer labs or if you would like us to install a new software in the computer labs on campus, please fully read through the information on the link provided and fill out the Software Request form here. (click the big green box that says “Request Service”)

Note that software listed here is already scheduled to be installed, it is not necessary to submit requests for software, unless updating to a new version.

Please note that fully completed forms are required for any change to the labs, even for free software. All software installation media and licenses are also required by the due date.

Requests for the Spring 2018 semester should be submitted by November 10, 2017. Requests submitted after the deadline may not be installed in the labs for the Spring 2018 semester. This is because we need time to develop an installation procedure and test the software in the lab environment before deploying the software. We also require a number of weeks to deploy the lab images across campus, which means our solutions need to be complete and tested several weeks prior to classes beginning.


Please submit your Software Request forms ASAP.

Thursday, September 28, 2017

Client Services Offices Closed Tuesday, October 3 from 11:45-4:15 for Fall Job & Internship Day

All Client Services offices  will be closed Tuesday, October 3 from 11:45 am - 4:15 pm so our student employees (STARS) are able to attend the 2017 Fall Job & Internship Day. Please plan accordingly.
For classroom emergencies only, please call x7973.




Friday, September 22, 2017

Inbox by Gmail



Overview to Inbox by Gmail

Inbox offers a more productive way to review your email. Inbox still syncs to Gmail and has an effect on how email is handled there. Terms like "marked as read", and "archived" are deliberately phased out. Instead, Inbox treats your emails like to-dos. The app assumes  that you need to do something with every email. Some are critical pieces of information you need to sort or set aside, some demand replies, and some inform you that you need to do something outside your inbox like pay a bill. 
In all of those cases, "reading" an email doesn't mean you're done with it, so why treat it as such?


The Three Classes of Email: Pinned, Snoozed, or Done




With Inbox, you are given a few options for dealing with email. The three primary actions you can take on emails are to pin them, snooze them, or mark them as done. Here's what those three functions do (as well as their counterparts in Gmail proper):
  • Pin: When you pin an email, it gets more prominent placement in your inbox.  If it's something you'll need to come back to like travel confirmation, reference documents, or an important conversation, pinning it is probably the right way to go. 
  • Snooze: You may need an email but not necessarily right now. Inbox allows you to snooze it so it disappears from your inbox and comes back at a later time. You can specify a specific time, use vague presets like "tomorrow afternoon" or let Google decide with a "Someday" option for things you don't want to deal with now, but that aren't time-sensitive. If you view your inbox in Gmail, snoozed messages will be archived.
  • Done: This is for when you don't need a message anymore. Marking an email as "Done" removes it from your inbox or visible bundles. You can still search for it, but it won't be cluttering everything up. In Gmail this also archives your messages and the functionality is similar in Inbox.
SWIPE FEATURE
IMPORTANT:  PLEASE NOTE BEFORE YOU SWIPE AWAY ALL YOUR MAIL:
You must commit to the Google InBox paradigm and be aware when you swipe mail away it becomes "archived."


Click here to get Inbox by Gmail and review highlights and videos of the features.


Partially reposted from https://www.google.com/inbox/


Monday, September 18, 2017

COMPLETE: 7:20am Major network maintenance the morning of September 28 at 6am.

ITS will be performing major network maintenance the morning of September 28 at 6am.

Several major services will be affected between 6:00am and 7:00am
Banner 9
The Once Card system and Card Access to doors.
Some Jaspernet Authenticated Services such
25 Live.



Avoiding Ransomware Attacks

Ransomware is a type of malware designed to encrypt users’ files or lock their operating systems so attackers can demand a ransom payment. According to a 2016 Symantec reportthe average ransom demand is almost $700 and “consumers are the most likely victims of ransomware, accounting for 57 percent of all infections between January 2015 and April 2016.”
Similar to a phishing attack, ransomware executes when a user is lured to click on an infected link or e-mail attachment or to download a file or software drive while visiting a rogue website. Sophisticated social engineering techniques are used to entice users to take the desired action; examples include
  • an embedded malicious link in an e-mail offers a cheap airfare ticket (see figure 1);
  • an e-mail that appears to be from Google Chrome or Facebook invites recipients to click on an image to update their web browser (see figure 2); or
  • a well-crafted website mimics a legitimate website and prompts users to download a file or install an update that locks their PC or laptop.



Figure 1. Phishing e-mail with ransomware embedded in a link
Figure 1. Phishing e-mail with ransomware embedded in a link
Figure 2. A fake Google Chrome e-mail
Figure 2. A fake Google Chrome e-mail

To avoid becoming a victim of ransomware, users can follow these tips:
  • Delete any suspicious e-mail. Messages from unverified sources or from known sources that offer deals that sound too good to be true are most likely malicious (see figure 3). If in doubt, contact the alleged source by phone or by using a known, public e-mail address to verify the message’s authenticity.
  • Avoid clicking on unverified e-mail links or attachments. Suspicious links might carry ransomware (such as the CryptoLocker Trojan).
  • Use e-mail filtering options whenever possible. E-mail or spam filtering can stop a malicious message from reaching your inbox.
  • Install and maintain up-to-date antivirus software. Keeping your operating system updated with the latest virus definitions will ensure that your security software can detect the latest malware variations.
  • Update all devices, software, and plug-ins on a regular basis. Check for operating system, software, and plug-in updates often — or, if possible, set up automatic updates — to minimize the likelihood of someone holding your computer or files for ransom.
  • Back up your files. Back up the files on your computer, laptop, or mobile devices frequently so you don’t have to pay the ransom to access locked files.



Figure 3. An example ransomware e-mail message
Figure 3. An example ransomware e-mail message