Thursday, December 19, 2019

PROTECT Your Account - Holiday Break Safeguards

ITS will NOT be performing updates over the Holiday break.  

ITS will NOT ASK for you to update your password or other personal information.

ITS will NOT DISABLE your account over the break if you do not respond to an email.

Two laptops, suspicious man on one fishing the personal data from the other

As we approach the Christmas Holiday break, ITS would like to remind campus users that we will NOT be performing updates and will NOT ASK for information from you.  Phishing attacks are on the rise and we are taking steps to prevent these attacks from affecting Manhattan College.

If you receive an email or other communication requesting personal information or asking you to update your password - DO NOT RESPOND.  These messages should be reported to ITS or the sending office for validation.

Below are some additional resources that were previously provided to the campus community:

Holiday Scams and Malware Campaigns

Phishing Infographics

Half of all Phishing Sites Now Have the Padlock

Wednesday, December 18, 2019

Leo Hall 4th Floor Power Maintenance

There will be scheduled maintenance to the power circuits servicing the fourth floor of Leo Hall between 12/19/2019 and 12/22/2019 by Pavarini.

This maintenance should not affect the network in the building, however, there is a small possibility the wired and wireless networks on the fourth floor of Leo Hall might be affected. Other floors in the building will not be affected. This maintenance will also not affect any other building on campus.

As this is happening during part of the winter break, ITS will be monitoring the maintenance remotely and will keep in touch with Pavarini for the duration of the maintenance period.

If you have any questions, please contact ITS at or by calling 718-862-7973.

Tuesday, December 10, 2019

Happy Holidays from ITS!

Image result for happy holidays
ITS would like to wish everyone a happy and safe holidays as the Fall 2019 semester comes to an end! Over the break, we will be hard at work to improve and maintain campus technology.

Be sure to keep an eye out for future blog posts in January about upcoming improvements in technology as well as helpful tips and tricks!

Monday, December 9, 2019

Glance MC App - Now with Push Notifications

Manhattan College will soon be Beta Testing its new Push Notification Service / Channel via the Glance MC mobile app. To take advantage of this, you should have the most recent version of the Glance MC app: 1.4.7 on your IOS or 1.4.10 on your Android mobile device.

A push notification is a short message that pops up on a mobile device. App publishers can send them at any time; users don’t have to be in the app or using their devices to receive them. Push Notifications are typically used for delivering brief, time-bound content (a single swipe is all it takes to wipe a notification from existence). Push notifications are an opt-in service (for IOS), and must be enabled if you'd like to receive them. Android, on the other hand, automatically opts-in users to receive push notifications, with an option to manually opt-out.

A sample Glance MC Push Notification

To Opt-In to Push Notifications:
  1. Download the Glance MC app from Google Play or the iOS App Store, if you haven't already done so. Either Click OK, or Don't Allow when prompted with the message requesting permission to send notifications
  2. Be sure you have enabled push notifications for your device as follows:
    1. Apple Device: Click your device “Settings”. Scroll down and choose Glance (or Glance MC). Click "Notifications" and turn on "Allow Notifications"
    2. Android Device: Click your device “Settings”. Click "Applications". Choose Glance (or Glance MC) and under "App Settings", allow Notifications.
The Glance MC app is available in the iTunes App Store and on Google Play. For more on using the Glance MC app, please see the Glance MC Knowledge Base Article.

Since inception in Fall 2016, approx 4900 users have downloaded and logged into the app with its bundled Digital JasperCard. 3300 users have accessed the Digital JasperCard this semester. Other highly used features include the Course Schedule, Favorites, Search (Employee Directory and QuickLinks), and To-Do List. Look for a revamp of the app this Spring Semester!

Sunday, December 8, 2019

Create a Google Calendar Event Right from Gmail!

Did you know that in Gmail, you have the ability to create a Google Calendar event right from an email?

All you need to do to get started is simply select the three vertical dots button
at the top of an email, and select Create Event.
select the three vertical dots button. also know as the option or more button

select the create event button in the menu that appears after selecting the three vertical dots button in gmail

To learn more about this and other helpful features, please visit this article on The Suite Life: 3 quick tricks to help you stay on top of your schedule.

Avoid Online Scams this Holiday Season!

The holidays are a time of large online spending. Approximately 60% of people in the U.S.A. prefer to buy their holiday gifts online. [1] Because so much of spending during the holiday season is done online, malicious people take the opportunity to scam and steal. That is why it is important to maintain a safe and cautious approach while online shopping.

santa shopping online

Let's identify the different types of scams that you should keep an eye out for:

Fake online shops

As the retail rush ramps up, fake online stores pop up to prey on our desire for a bargain. Sometimes, these sites will be poorly designed, but the scammers are betting that, in the festive rush, enough people will be too distracted to be able to tell the difference between these sites and legitimate “pop-up” shops. When shopping on sites such as Amazon, be sure to check who the seller is. Not all items on Amazon are sold by Amazon. Some sellers may be third party or individual sellers, so be sure to check their reputation if the item is not sold by Amazon.
Tip: Look for online reviews and think about phoning the contact number. If there isn’t one, this could be a warning sign.

Charity phishing

Scammers know that many people feel charitable at this time of year and so they target your good will. They may send emails from a bogus charity or ones that purport to come from a legitimate charity but contain a link to a scam site.
Tip: If you want to give to good causes during the holidays, go through the charity in question’s own site.

Fake delivery emails

In the run-up to the holidays, many people have dozens of packages arriving and often lose track of what they’ve ordered. Scammers know this and send out emails that purport to come from legitimate courier companies. These ask recipients to click on a link. When they do, they download malware or are taken to a scam site.
Tip: Check the sender’s address to ensure it is a legitimate company and go to the company’s own website to track orders.

Wish list scams

Wish lists are a way for people to post what gifts they want online. However, these are often easy for anyone to view and, for a fraudster, can be a goldmine. Such lists often contain personal information and this makes the list owner vulnerable to identity theft. Cyber-criminals can also use items on the list for targeted phishing scams.
Tip: Ensure the privacy settings on any online lists are set to high.

E-voucher scams

These are often shared on social media or email and claim to offer free vouchers from well-known brands. Potential victims are told that, to claim a voucher, all they need to do is click on a link. This can take them to a fake site where they will be asked for their details.
Tip: Look out for poor grammar and, if in any doubt, check the voucher by emailing the shop.

Social media scams

Scammers use social media to tempt people with irresistibly good deals on goods such as electronics and jewelry. The social networks are also a place where links to phishing sites and malware can be widely shared. Scammers may even be “friends” of real friends of yours who say yes to every connection request.
Tip: The best defense here is not to click on links that look even remotely suspicious.

[1] Christmas Spending Statistics

Partially reposted from Six Scams to Look Out for this Christmas

Thursday, December 5, 2019

Your Feedback is Needed!

As another semester comes to an end we need your help! We are evaluating how certain services and products benefit the Manhattan College community or could bring value to a particular classroom/computer lab. Please help us by completing the following surveys. Each one will only take 5 minutes or less and your feedback is valued.

Web Print (powered by PaperCut) is a web-based printing service that allows quick printing on campus from your own laptop to any public computer lab printer without the need to install any software. ITS has taken the initiative to implement Web Print in the following computer labs:

DLS - 309, 314
LEO - 102
OMAL - 1FL, 206, 410, 506, Kiosk
RLC - 102, 103, 104, 105, 107, 208

Please take this 2-3 minute survey to tell us about your experience with Web Print and help us learn more about how we can improve this service.

Google Jamboard is a digital whiteboard that can be used by students, professors and staff. It has a range of features from digital whiteboard to remote collaboration to video conferencing and more. ITS introduced them on campus during Summer of 2017 and they are currently located in:

O'Malley - 401
Leo Student Study Space- (4 Jamboards available for use)
Leo Center for Academic Success

Please take this 4-5 minute survey to tell us about your experience with Google Jamboard and help us learn more about where, when, why and how you are using it.

Smart classrooms are defined as rooms that have the latest technology standard in place.

Please take this 4-5 minute survey to tell us about your experience with classroom technology and help us learn more about where, when, why and how you are using it.

Customer satisfaction is very important to us. We value your feedback and would like to hear about your overall experience with ITS.

Please take this 1-2 minute survey to tell us about your experience with ITS for the Fall 2019 semester.

Tuesday, December 3, 2019

Easily Access Your Drive Files in Google Chrome!

Starting December 16th, a new feature called Drive File Suggestions in Google Chrome will allow you to search for your Google Drive files directly from the Chrome URL bar, instead of through Google Drive. Currently, this functionality is limited to files that users have previously opened in Chrome.

This feature will be enabled by default so once it is December 16th, you can simply restart your browsers and you will be able to search for any Drive files that you have access to, including ones that haven’t previously opened in Chrome.

If you leave Drive file suggestions in Chrome enabled, users who are signed in and opted in Chrome sync will see Drive suggestions in the Chrome URL bar for their synced account. For more information about what sync settings users can manage and how they’re managed, as well as how to enable or disable Chrome Sync, see this article on Turning sync on or off in Chrome.

Partially reposted from Drive file suggestions in Google Chrome will be generally available beginning in December

Phishing Scam Currently Circulating

ITS is investigating a phishing scam that is currently circulating.  If you receive the message, please mark it as SPAM and do not click any links.  If you did click on any links in the message, please notify immediately and follow these instructions to clean your account.

Below are the contents of the message:
Date: Tue, Dec 3, 2019 at 9:47 AM
Subject: We Disable your JasperNET

If уоu оwn the аccоunt, уоu cаn гequeѕt аcceѕѕ tо it аgаin. уоuг аccоunt
will be гeаctivаted if уоu ѕign in belоw within 2 dауѕ <>
Yоu'll lоѕe аcceѕѕ tо аll оf уоuг dаtа аnd cоntent like уоuг emаilѕ аnd
emаil fоldeгѕ if уоu dо nоt гeаctivаte.

Wednesday, November 27, 2019

COMPLETE: ConEd Maintenance - Friday 11/29

UPDATE: The transformer replacement has been completed. Lee Hall did not lose power during the maintenance, and therefore did not lose network connectivity. Draddy Gym did lose power, however, all power is back online and all network services have been restored.

Con Edison is doing emergency transformer work on Friday, November 29th. This work will require a temporary shut down of Lee Hall, Draddy Gymnasium, and Alumni Hall. Both the wired and wireless in all three buildings will be down for the duration of this maintenance. This maintenance should not affect any other buildings on campus.

Public safety has been informed along with Residence Life and Facilities. Physical Plant will have personnel on campus to shadow the work and make sure that all systems are returned to normal. ITS will monitor the network throughout the duration of the maintenance period.

If you have any questions regarding this maintenance, please contact Physical Plant.

Monday, November 25, 2019

RESOLVED: Leo 3rd Floor Network Outage

RESOLVED: At 12:10, the network outage has been resolved. Phones and wireless access points should be coming back online momentarily.

Update, 11:58AM: ITS is currently waiting on Physical Plant to investigate some power issues as to the cause of the network outage. We will update the community as soon as we can.

At 11:22AM, ITS was made aware of a network outage affecting both wired and wireless on the 3rd floor of the Leo Engineering building. Other parts of the building should not be affected.

We are currently investigating the issue. We apologize for the inconvenience.

Friday, November 22, 2019

COMPLETE: Horan Hall - Brief Network Outage 11/27 at 10am

UPDATE: Physical Plant conducted the generator test on Tuesday at 10am, instead of Wednesday. The generator test completed successfully and all network services in Horan Hall has been restored.

Physical Plant will be conducting a generator test in Horan Hall on Wednesday, November 27th at approximately 10am.

There will be two brief outages, one while switching to generator power, the other while switching back to main power. Both wired and wireless will be affected during this generator test.

This will not affect the rest of campus.

If you have any questions, please contact ITS at or at extension x-7973. We apologize for this inconvenience.

Thursday, November 21, 2019

RESOLVED: Apporto (Virtual Lab Environment) Outage

UPDATE: As of 3:30PM, issue has been resolved. Apporto is up and running again.

ITS is currently experiencing an outage for our virtual lab environment, Apporto. Use of Apporto is momentarily down until further notice.

An update will be provided here when the issue has been resolved.

Sunday, November 17, 2019

Google Hangouts Classic Deprecation Transition to Google Hangouts Chat Today! ***ACTION REQUIRED***

Google Hangouts Classic will no Longer Work

We’re excited to share that Google will be transitioning to its newest collaboration product, Google Hangouts Chat.

Beginning June 2020, Google will officially deprecate the Google Hangouts Classic feature in Gmail. This will be replaced with the new and improved Google Hangouts Chat feature, which supports many great features aimed towards productivity such as Chat rooms, modern interface, file uploading while chatting, adding Drive files, and much more.

As a result, any group chats that happen with Google Hangouts Classic will not be shown in the new Google Chat, so be sure to use Google Hangouts Chat to keep track of your messages. We recommend viewing this article on the interoperability of Google Hangouts Chat and Hangouts Classic.

To switch from Google Hangouts Classic to Google Hangouts Chat, all you have to do is navigate to and start chatting there! You can also download the new mobile app for Android or iOS, as well as download the new standalone desktop app. You'll be able to access the desktop app from a prompt that will appear inside

For more help with getting started with Google Hangouts Chat, please view this resource on Getting Started with Google Hangouts Chat.

Friday, November 15, 2019

RESOLVED: Thomas Hall - Network Outage

RESOLVED: ITS was able to come in early this morning, Nov 20, and replace all failed network equipment. All computers, phones, registers, and wireless access points should be back online. If you are still having network connectivity issues, please contact ITS.

UPDATE8: ITS has received the new network equipment replacement this morning. We will be coming in tomorrow, November 20th, at 7am to remove the old failed equipment and install the new equipment. All of wireless throughout Thomas and most of the wired connections on the 3rd and 4th floor will be affected during this maintenance period. We will try to keep the high priority connections online for as long as possible during this move, but they will have a short downtime while we migrate these temporary connections to the newly installed equipment. Due to the extent of this equipment replacement, some roaming outages may occur into the working hours, but we will do the best we can to avoid this.

UPDATE7: As of 1:15pm, after some lengthy troubleshooting, ITS was able to bring a majority of wired and wireless connections back online, including computers and VoIP phones, however, there is still numerous devices down. ITS is still troubleshooting and working with our vendor to get the remaining devices back online. We apologize for this inconvenience.

UPDATE6: As of 11:10am, we received the replacement part from our vendor for the switch failure in Thomas Hall 3rd floor, unfortunately, this did not resolve the original issue. ITS is in contacts with the vendor for next steps. Only emergency computers, phones, and wireless on the 3rd floor has been restored since last Friday. Remaining computers, VoIP phones, and wireless will remain offline. We apologize greatly for this inconvenience, however, are working as hard and as fast as we can to fully restore network capabilities to the affected areas.

UPDATE5: As of 2:50pm, we were able to restore the wireless network for APs located on the third floor only. The remaining APs will stay offline until the replacement equipment has been received. We apologize for this inconvenience.

UPDATE4: As of 12pm, all critical phones and computers in Thomas 3rd floor has been reconnected. ITS has put in a ticket with our vendor to have the original network equipment replaced. Wireless and any remaining connections that are currently down will stay down until we have the replacement equipment.

UPDATE3: As of 10:50am, all POS registers should be online. ITS is working on phones and high priority computers in Financial Aid office.

UPDATE2: As of 9:45am, the temporary network equipment is in place. ITS is slowly migrating connections from the old equipment to the new equipment. We are prioritizing the POS registers, cameras, and phones at this point. Things will start to come online, but slowly.

UPDATE1: As of 9:00am, it has been determined that a piece of network equipment has failed. ITS is currently in the process of bringing a new piece of equipment to Thomas Hall to temporarily replace the old one.

ITS is aware of a network outage in Thomas Hall and is currently working on troubleshooting and fixing the issue.

All POS registers and all wireless networks are affected throughout the building. The wired connections for the 3rd and 4th floors are also affected. Wired connections for the rest of the building are not affected.

ITS will update the community by 9am. We apologize for this inconvenience.

Sunday, November 10, 2019

How Can Higher Ed Better Prepare Cybersecurity Students for a Hot Job Market?

The 2018 (ISC)2 Cybersecurity Workforce Study estimates a global shortage of cybersecurity professionals of around three million workers. This shortage of skilled job seekers is having a real-world impact on companies and the people responsible for cybersecurity at those companies. The study also points out that Gen X and Baby Boomer workers make up about half of the current cybersecurity workforce, leaving many entry-level opportunities for new college graduates and pathways for growth as these more experienced workers approach retirement age.

The need for trained cybersecurity professionals is not going to go away. The US Bureau of Labor Statistics projects a 28% growth in US employment for cybersecurity consultants between 2016 and 2026. How can we help our students go beyond the theoretical concepts taught in computer science or cybersecurity classes and make themselves more attractive to future employers? We need to take the lead to encourage students to take the initiative to learn more about current issues in cybersecurity and take advantage of the many cybersecurity resources available.
Here are some ways you can help your students and contribute to narrowing the cybersecurity skills gap:
  • Hold informational sessions on cybersecurity. Help spread the word on your campus about the cybersecurity skills gap and job opportunities. You could ask your CISO or information security team to conduct a cybersecurity seminar or invite local experts to share their knowledge and expertise with your students. The Enterprise Security Team at The Ohio State University has already implemented this idea, and they sponsor an annual and free on-campus Cybersecurity Days to expand knowledge of security and data protection for their entire college community.
  • Sponsor or encourage membership in student associations. There are two student cybersecurity organizations for your students to explore—NationalCybersecurity Student Association and Women in CyberSecurity (WiCyS. The National Cybersecurity Student Association has a number of resources on their website, and you can sign up for their newsletter or follow their Snapchat account to view a day in the life of a cyber student or industry professional. The WiCyS is dedicated to bringing together women in cybersecurity from academia, research, and industry to share knowledge, experience, networking, and mentoring. You can also explore setting up a local WiCyS student chapter on your campus.
  • Offer campus internships. In addition to knowledge of advanced cybersecurity concepts, the most important qualification for cybersecurity employment is relevant work experience. You can help your students by hiring them as interns in your institution's information security department. This offers students real-world experience while providing supplemental staffing for your department. For suggested qualifications and responsibilities, use the Information Security Intern Job Description Template on the EDUCAUSE website as a starting point.
  • Identify scholarship opportunities. The CyberCorps: Scholarship for Services, funded by the NSF, provides up to $22,500 per year for undergraduates and $34,000 per year for graduate students. In return, students commit to work in a for a federal, state, or local agency for a period matching the length of their scholarship. The Cyber Security Degree website provides a comprehensive list of additional cybersecurity scholarships and other career resources.
  • Encourage students to deepen their knowledge. The NICCS Education Training Catalog is a central location where cybersecurity professionals across the nation can find more than 3,000 cybersecurity-related courses. Anyone can use the interactive map and filters to search for courses offered in their local area to add to their skill set, increase their level of expertise, or earn a certification. You could also direct your students to take advantage of the free online courses offered through edXUS Department of Homeland Security, Cybrar, or SANS Cyber Aces Online.
  • Attend cyber competitions. Institutions with an information assurance or computer security curriculum can give their students an additional way to hone their skills and have fun by participating in regional events hosted by the National Collegiate Cyber Defense Competition(NCCDC). The top regional teams can then go on to the National Championship, which was won by University of Virginia in 2018. Another cybersecurity competition for high school and college students is the National Cyber League (NCL), is a defensive and offensive puzzle-based, capture-the-flag style competition. All participants play the games simultaneously and are tested with real cybersecurity challenges they will likely face in the workforce.
  • Participate in cybersecurity conferences. Students may be interested the educational and networking opportunities from attending the annual conferences for the National Cybersecurity Student Association or Women in CyberSecurity. For additional conferences in your area, InfoSec publishes a comprehensive list with hundreds of cybersecurity events in the United States, Europe, and Asia.

Friday, November 8, 2019

Computer Lab Software Request Deadline for Spring 2020 is December 6, 2019

If you would like to request an upgrade of a software already installed in the computer labs or if you would like us to install a new software in the computer labs on campus, please fully read through the information on the link provided and fill out the Software Request form here. (click the big green box that says “Request Service”)

Note that software listed here is already scheduled to be installed, it is not necessary to submit requests for software, unless updating to a new version.

Please note that fully completed forms are required for any change to the labs, even for free software. All software installation media and licenses are also required by the due date.

Requests for the Spring 2020 semester should be submitted by December 6, 2019. Requests submitted after the deadline may not be installed in the labs for the Spring 2020 semester. This is because we need time to develop an installation procedure and test the software in the lab environment before deploying the software. We also require a number of weeks to deploy the lab images across campus, which means our solutions need to be complete and tested several weeks prior to classes beginning.

Please submit your Software Request forms ASAP.

Thursday, November 7, 2019

Training Coordinator Opening

ITS is looking for a new Training Coordinator. Please check out the position and apply if you think you are a good fit or send it to colleagues that you think will be successful. The ideal candidate has years of experience teaching in an educational environment. This person also has a solid background in multimodal learning and pedagogy.

Windows 8.1 End of Life Schedule

Every Windows product has a life cycle. The life cycle begins when a product is released and ends when it's no longer supported. Knowing key dates in this life cycle helps you make informed decisions about when to update, upgrade or make other changes to your software. 
Windows 8.1 Mainstream support will end January 9, 2018
Windows 8.1 Extended support will end January 10, 2023
Microsoft Support Reference to determine: Which Windows operating system am I running?


Manhattan College ITS loads Windows 10 on all ITS supported compatible devices.

Next Steps

If you happen to have a computer with Windows 8.1 please upgrade your computer to Windows 10 before January 9, 2018.  You can contact ITS for assistance.

Windows 7 End of Life Schedule

Every Windows product has a life cycle. The life cycle begins when a product is released and ends when it's no longer supported. Knowing key dates in this life cycle helps you make informed decisions about when to update, upgrade or make other changes to your software. 
Windows 7 Support will end January 14, 2020.
Microsoft Support Reference to determine: Which Windows operating system am I running?


Manhattan College ITS loads Windows 10 on all ITS supported compatible devices.

Next Steps

If you happen to have a computer with Windows 7 please upgrade your computer before January 14, 2020.  You can contact ITS for assistance.
Further details:  Windows 7 End of Life Schedule 

RESOLVED: Network Outage - Leo 4th Floor

RESOLVED: As of 10:45am, the network outage in Leo 4th floor has been resolved


ITS is aware of a network outage affecting Leo Engineering building, fourth floor. Both wired and wireless is affected at this time.  The rest of the building is not affected.

ITS has reached out to electricians to look into this issue. We will updated the community as soon as we can once this issue has been resolved.

We apologize for any inconvenience that this may cause.

Sunday, October 27, 2019

Top Tips to Securely Using Social Media

Manhattan College IT Services is sharing cyber safety tips in support of raising awareness during National Cyber Security Awareness Month, October 2019.


Social media sites, such as Snapchat, Facebook, Twitter, Instagram, and LinkedIn, are amazing resources, allowing you to meet, interact, and share with people around the world. However, with all this power comes risks--not just for you, but your family, friends, and employer. In this post, we cover the key steps to making the most of social media securely and safely. 


Be careful and think before posting. Anything you post will most likely become public at some point, impacting your reputation and future, including where you can go to school or the jobs you can get. If you don’t want your family or boss to see it, you probably shouldn’t post it. Also, be aware of what others are posting about you. You may have to ask others to remove what they share about you. 


Almost all social media sites have strong privacy options. Enable them when possible. For example, does the site really need to be able to track your location? In addition, privacy options can be confusing and change often. Make it a habit to check and confirm they are working as you expect them to. 


Secure your social media account with a long, unique passphrase. A passphrase is a password made up of multiple words, making it easy for you to type and remember, but hard for cyber attackers to guess. 

Lock Down Your Account 

Even better, enable two-factor authentication on all of your accounts. This adds a one-time code with your password when you need to log in to your account. This is actually very simple and is one of the most powerful ways to secure your account. 


Just like in email, bad guys will attempt to trick or fool you using social media messages. For example, they may try to trick you out of your password or credit card. Be careful what you click on: If a friend sends you what appears to be an odd message or one that does not sound like them, it could be a cyber attacker pretending to be your friend. 

Terms of Services

Know the site’s terms of service. Anything you post or upload might become the property of the site.


If you want to post anything about work, check with your supervisor first to make sure it is okay to publicly share.
Follow these tips to enjoy a much safer online experience. To learn more on how to use social media sites safely, or report unauthorized activity, check your social media site’s security page.

Be Secure Online! Refer to Manhattan College's Cyber Safety site for additional resources.

Refer to Manhattan College's Email Signature Knowledge Base 
Article for instructions on how to create your own email signature. 
Using a Manhattan College email signature is important because it is the perfect opportunity to brand every message you send. By creating a cohesive email signature for each employee on your team, you create brand recognition in every person to whom your employees sends emails. 

Reach out to IT Services with any questions:

Partially reposted from

Friday, October 25, 2019

COMPLETE: Planned Network Maintenance OV on 10/29 at 530am

COMPLETE: As of 540am, this maintenance has been completed successfully.

Update: This maintenance has been rescheduled for Tuesday at 530am. Sorry for the inconvenience.

ITS will be conducting maintenance in Overlook Manor on Monday, October 28th at 530am. This maintenance should be complete by 7am.

In order to improve network reliability, there will be scheduled network maintenance in order to upgrade firmware on the network equipment that services OV. This network maintenance will affect both of the wired and wireless networks throughout Overlook. This maintenance will not affect any other buildings on campus.

We apologize for this inconvenience. If you have any questions, please feel free to contact ITS at 178-862-7973 or via email at

RESOLVED: 12:35pm BANNER OUTAGE - 25 October 2019 12:29pm

UPDATE: 12:35pm
The issue has been resolved as of 12:33pm, we do not expect another outage to occur but will continue to monitor closely.

You may need to restart your browser.

ITS is investigating an issue causing login failures to Banner and Self Service.

Next update no later than 12:50pm

Monday, October 21, 2019

Improving Real-Time Collaboration in Google Docs for Assistive Technology Users

It’s now easier for users of assistive technologies, like screen readers and Braille displays, to keep track of real-time updates made by collaborators in a document. With live edits, you can view a periodically updated summary of collaborator changes in a convenient sidebar. In Google Docs we believe that collaboration works best when it works for everyone.

New edits made by collaborators appear in the live edits sidebar.

To see live edits, open the Accessibility settings by going to Tools > Accessibility settings and check “Turn on screen reader support.” Then, select “Show live edits” from the Accessibility menu. To learn more, see this article in Google's Help Center.

Helpful links

Reach out to IT Services with any questions:

Sunday, October 20, 2019

Cyber World Reality Facts

sobering cyber stats

millenials often fall victim to cybercrime
  1. Microsoft Security Intelligence Report and Consumer Reports
  2. AARP, “Caught in the Scammer’s Net: Risk Factors That May Lead to Becoming an Internet Fraud Victim,” 2014
  3. Norton Cyber Security Insights Report Q1, 2017
  4. Ponemon Institute, “2015 Cost of Cyber Crime Study: Global,” 2015
  5. Facebook
  6. Federal Trade Commission, “The Top Frauds of 2017”

For more information on this topic review The Facts Get Clued into the Cyber World Reality.

Be Secure Online! Refer to Manhattan College's Cyber Safety site for additional resources.

Refer to Manhattan College's Email Signature Knowledge Base 
Article for instructions on how to create your own email signature. 
Using a Manhattan College email signature is important because it is the perfect opportunity to brand every message you send. By creating a cohesive email signature for each employee on your team, you create brand recognition in every person to whom your employees sends emails. 

Reach out to IT Services with any questions:

Friday, October 18, 2019

25Live Training Resources

25Live is the site our campus community uses to schedule an event or book a meeting room on campus.  The ITS Training Team has put together a training course with 25Live materials.  The course contains instructions for the 25Live Mobile View and the 25Live Pro View and resources for the best way to book a room on campus using 25Live.  Clients who complete this course will be awarded a 25Live Digital Badge.

This course is located on the Moodle Pro Dev server please access the course here:  

25Live Training Course 
The ITS Knowledge Base also has 25Live Resources.

25Live Mobile View:  Best option to book a room.

25Live Pro View:  Additional resources for power users and room approvers.

Feel free to contact ITS with any questions:
email:       TEL . 718-862-7973

Sunday, October 13, 2019

Step Up to Stronger Passwords

Weak and reused passwords continue to be a common entry point for account or identity takeover and network intrusions. Simple steps and tools exist to help your end users achieve unique, strong passwords for their dozens of accounts. Help your community members improve their individual and collective security by sharing the following tips.

A password is often all that stands between you and sensitive data. It’s also often all that stands between a cybercriminal and your account. Below are tips to help you create stronger passwords, manage them more easily, and take one further step to protect against account theft.
  • Always: Use a unique password for each account so one compromised password does not put all of your accounts at risk of takeover.
  • Good: A good password is 10 or more characters in length, with a combination of uppercase and lowercase letters, plus numbers and/or symbols — such as pAMPh$3let. Complex passwords can be challenging to remember for even one site, let alone using multiple passwords for multiple sites; strong passwords are also difficult to type on a smartphone keyboard (for an easy password management option, see “best” below).
  • Better: A passphrase uses a combination of words to achieve a length of 20 or more characters. That additional length makes its exponentially harder for hackers to crack, yet a passphrase is easier for you to remember and more natural to type. To create a passphrase, generate four or more random words from a dictionary, mix in uppercase letters, and add a number or symbol to make it even stronger — such as rubbishconsiderGREENSwim$3. You’ll still find it challenging to remember multiple passphrases, though, so read on.
  • Best: The strongest passwords are created by password managers — software that generates and keeps track of complex and unique passwords for all of your accounts. All you need to remember is one complex password or passphrase to access your password manager. With a password manager, you can look up passwords when you need them, copy and paste from the vault, or use functionality within the software to log you in automatically. Best practice is to add two-step verification to your password manager account. Keep reading!
  • Step it up! When you use two-step verification** (a.k.a., two-factor authentication or login approval), a stolen password doesn’t result in a stolen account. Anytime your account is logged into from a new device, you receive an authorization check on your smartphone or other registered device. Without that second piece, a password thief can’t get into your account. It’s the single best way to protect your account from cybercriminals.
**Please note: this option is not available for Manhattan College accounts but should be considered for external (personal) accounts.

    How to pick a proper password.

    Partially reposted from

    Monday, October 7, 2019

    IT Services Training Team presents on Digital Accessibility

    Alberto DeAngelis and Anita McCarthy presented at the Montgomery County Community College Technology and Learning Conference on October 4th. Their presentation on Digital Accessibility was among 1 of 25 hot topics facing education institutions today.  Close to 300 participants attended the technology conference in Blue Bell, PA .
    The Training Team has created an online, self paced Digital Accessibility course.

    If interested in this topic feel free to reach out to ITS with any questions:

    Sunday, October 6, 2019

    Stop That Phish


    phishing computer screen

    Email and messaging services (such as Skype, Twitter, or Snapchat) are one of the primary ways we communicate. We not only use these technologies every day for work, but also to stay in touch with friends and family. Since so many people around the world depend on these technologies, they have become one of the primary attack methods used by cyber attackers. This attack method is called phishing. Learn what phishing is and how you can spot and stop these attacks, regardless if you are at work or at home.

    What Is Phishing

    Phishing is a type of attack that uses email or a messaging service to fool you into taking an action you should not take, such as clicking on a malicious link, sharing your password, or opening an infected email attachment. Attackers work hard to make these messages convincing and tap your emotional triggers, such as urgency or curiosity. They can make them look like they came from someone or something you know, such as a friend or a trusted company you frequently use. They could even add logos of your bank or forge the email address so the message appears more legitimate. Attackers then send these messages to millions of people. They do not know who will take the bait, all they know is the more they send, the more people will fall victim.

    Protecting Yourself

    In almost all cases, opening and reading an email or message is fine. For a phishing attack to work, the bad guys need to trick you into doing something. Fortunately, there are clues that a message is an attack. Here are the most common ones:
    • A tremendous sense of urgency that demands “immediate action” before something bad happens, like threatening to close an account or send you to jail. The attacker wants to rush you into making a mistake.
    • Pressuring you to bypass or ignore your policies or procedures at work.
    • A strong sense of curiosity or something that is too good to be true. (No, you did not win the lottery.)
    • A generic salutation like “Dear Customer.” Most companies or friends contacting you know your name.
    • Requesting highly sensitive information, such as your credit card number, password, or any other information that a legitimate sender should already know.
    • The message says it comes from an official organization, but has poor grammar or spelling or uses a personal email address like
    • The message comes from an official email (such as your boss) but has a Reply-To address going to someone’s personal email account.
    • You receive a message from someone you know, but the tone or wording just does not sound like him or her. If you are suspicious, call the sender to verify they sent it. It is easy for a cyber attacker to create a message that appears to be from a friend or coworker.
    Ultimately, common sense is your best defense. If an email or message seems odd, suspicious, or too good to be true, it may be a phishing attack. 
    Be Secure Online! Refer to Manhattan College's Cyber Safety site for additional resources.

    Refer to Manhattan College's Email Signature Knowledge Base 
    Article for instructions on how to create your own email signature.

    Using a Manhattan College email signature is important because it is the perfect opportunity to brand every message you send. By creating a cohesive email signature for each employee on your team, you create brand recognition in every person to whom your employees sends emails. 

    Reach out to IT Services with any questions: