IT News

This category contains 203 posts

IT Service of the Month: Banner/Reporting Services

Service Description Banner by Ellucian is WCU’s enterprise resource planning (ERP) solution. An ERP is a comprehensive, integrated computer information system used to manage the university’s administrative services, consolidating all business operations into a uniform and enterprise wide system environment. Banner operates in these areas: Finance, Student Services, Alumni and Development, Human Resources, and Financial Aid. More […]

Curative Analysis: ‘Own IT’ for May 2018

The Curative Analysis team in IT is tasked with finding the causes of significant IT issues that affect campus. In this news update, we draw your attention to some of the problems being investigated or issues handled recently. Upper Campus Network Connectivity:  Power loss to the Graham building recently cause the failure of network connectivity […]

IT Service of the Month: Wireless Network Connectivity

Service Description WCU provides wireless network connectivity (WiFi) in most academic and residential spaces, for use by faculty, staff, and students via Education Roaming. Education Roaming, or eduroam, is a secure, world-wide roaming Wi-Fi access service developed for the research and education community. It allows students, faculty, and staff from participating institutions to obtain Wi-Fi […]

Curative Analysis: ‘Own IT’ for April 2018

The Curative Analysis team in IT is tasked with finding the causes of significant IT issues that affect campus. In this news update, we draw your attention to some of the problems being investigated or issues handled recently. Outlook 2016 for Mac:  Clients using Outlook 2016 for Mac may have noticed that appointments or meetings are […]

What Happens after I Submit a Project Request?

After submitting a Project Request from the Request a new IT project link shown below, several steps are taken to put the request into the project queue. From an Information Technology (IT) perspective, the process looks like the workflow diagram shown at the end of this article; for simplification, here’s what actually happens: Step 1—Discovery […]

IT Service of the Month: ITV Teleconferencing and Video Conferencing

Service Description We provide standard video conferencing for virtual business meetings, and interactive video classes allowing place-bound students to attend WCU classes in a video environment. Instructional Television is two-way audio and/or video conferencing. Classes are shared by local sites connecting to remote sites. Depending on how the course is set up, students at both […]

Information Security Awareness: Don’t Get Hooked

Phishing attacks pose a major risk to any organization and continue to target people at WCU. Since these threats won’t go away any time soon, it is important to provide education about the warning signs of phishing, the potential risks of falling prey to an attack, and how we can protect ourselves from getting hooked. […]

Curative Analysis: ‘Own IT’ for March 2018

The Curative Analysis team in IT is tasked with finding the causes of significant IT issues that affect campus. In this news update, we draw your attention to some of the problems being investigated or issues handled recently. PAW Print Printing:  In January, IT began receiving reports that clients were being prompted for a release key […]

IT Service of the Month: Physical Computer Security

The Division of IT (DoIT) offers assistance to identify and procure appropriate security methods for University-owned or personal computers. We will help install and implement the selected security devices or systems for University-owned computers. University-owned laptops come with two security features – the WCU logo etched onto the cover and Computrace installed to help locate […]

Information Security Awareness: Beef Up Your Physical Security

Remember, protecting information means much more than phishing and passwords. Here are some tips for beefing up your physical security and related policies: Be aware of unauthorized attempts to access restricted spaces through “tailgating” and social engineering. Also, be aware of people that might be trying to see sensitive information on your computer screens. Don’t […]