Beware of any e-mail purporting to be from Information Technology Services asking for your W&L password. Any such e-mail is “phishing”: an attempt to steal personal information. ITS staff will never ask you for your password, via email, phone, or any other means. Remember, your password is your secret.
Never respond to e-mails asking for your W&L password or other personal information, such as bank account or social security numbers. Instead, please forward such phishing attempts to email@example.com, and then delete the email.
Try this quiz to see how well you can identify a phishing attempt
Please protect yourself:
W&L uses constantly updated filters that eliminate most viruses. But newly hatched viruses sometimes slip through our system, so it's important to follow some important rules:
Students should be sure they have installed anti-virus software, and that the most current virus definitions have been added. Anti-virus software is automatically installed and configured on University-owned computers in labs, offices and other settings.
If you suspect that your computer is infected with a virus, contact the Information Desk (call x4357 or use Web Help Desk.
The University recommends the use of security-related software.
Spyware (also known as Adware) can also hinder the proper functioning of your computer. It can also be used to sell your personal information without your knowledge. Here are some rules of thumb to help avoid infection:
Select a hard-to-guess password, and don't share it with anyone, including those who purport to represent W&L (see Phishing section, above). W&L network passwords must meet the following requirements. These requirements are enforced when passwords are changed or created:
You can use mnemonics to create a password that meets those requirements, and is still easy to remember. Try song lyrics, rhymes or common expressions. For instance, the nursery rhyme "Mary had a little lamb, her fleece was white as snow..." with the addition of some additional characters, could yield the password:
If your password becomes known to anyone, change it immediately. Your W&L network password should be different from any other password you use.
If you follow the guidelines on this page, you'll help to avoid identity theft. This resource from the Federal Trade commission explains identity theft, and what to do if your identity is stolen:
Certain types of advanced cell phones, such as Blackberries, iPhones and phones using the Windows Mobile operating system, can be configured to automatically retrieve e-mail and other data from W&L's Exchange (Outlook) server. When the devices are configured in this way, ITS enforces minimum security settings to protect potentially sensitive University data stored on the devices:
These settings may function somewhat differently than described here, depending on the device. If you are a W&L faculty or staff member and would like to configure your smart phone to automatically retrieve e-mail and other data from your Exchange/Outlook account, please contact W&L's Telecommunications Manager at firstname.lastname@example.org
Additionally, there are firewalls dividing the interior network into separate zones based on the role of the IT resources within each zone. For example, web servers have distinct and separate roles from database servers.
If you have an academic or work-related reason for un-blocking a specific computer port, please request an exception by completing a Web Help Desk request; go to https://helpdesk.wlu.edu and select request type "Network" then "Incoming Firewall Exception."