Category Archives: TechNews

Printer Fleet Refresh Coming Over Winter Break

As we head towards winter break, Technology will be refreshing and updating the printer and multifunction device (MFD) fleet across the campus. This refresh is part of an ongoing effort to right-size and optimize our printer resources.

Over the past few years, we have seen a decline in printer utilization as more work and learning has shifted online, especially since the start of the pandemic. In addition, with the closure and relocation of some campus spaces, we no longer require the same number of printers in all locations.

The upcoming refresh will reduce the total number of printers and MFDs by approximately 50%. The remaining devices will be strategically placed in high-traffic public locations and departments with the highest continuing need.

Despite the overall reduction, the new printer fleet will be equipped with technology to improve the printing experience:

  • Tap to Print – Students and employees will be able to print from anywhere on campus by logging into CampusPrint or printing from a Simmons managed computer to the following print queues:
    • Campus Print BW SingleSided
    • Campus Print BW DoubleSided
    • Campus Print Color SingleSided
    • Campus Print Color DoubleSided
  • Enhanced scanning and copying features – Updated MFDs allow scanning directly to Google Drive.

For large print, copy, or scan jobs, we recommend utilizing the Copy Mail Center in the Lower Level of the MCB. The Copy Mail Center specializes in high-volume, high-quality jobs at affordable prices.

Please let the Technology Service Desk know if you have any questions about the upcoming changes or need assistance with printing. We hope these printer improvements will lead to an even more efficient and positive printing experience across Simmons!

Phishing, Rogue Sharkpass/DUO pushes, and Job scams

A “wolf in sheep’s clothing”: someone or something that seems to be good but is actually not good at all

Some of you may have received a Phishing Email with the subject “A file has been shared with you”, or something similar.  This email “appears” to be coming from someone within Simmons or even from an external email address.  Clicking the link brings the victim to a web page that looks like an official-looking webpage and asks them to enter their username and password.  Once that information has been entered on the webpage it is captured by the cyber criminals.

Example of SharkPass

Almost immediately following, the cybercriminals attempt to login to Simmons’s email and systems with the stolen credentials and the victim will receive a Duo authentication request known as a “Rogue Push”, meaning one that was not requested.  If the victim approves the Duo request, then the cybercriminals are allowed in.  Think before you click!

The Job Scam is intended to steal money from the victim in one of two ways.  The first is that they ask for personal information plus a bank name.  They will then send an official looking email from that bank asking the victim to confirm details and maybe to reset a PIN code.  The scammers will try to use this information to login to the bank account and withdraw money.  The second way is to send the victim a paycheck in advance with instructions to use that check to purchase supplies or a computer from their vendor.  The victim purchases these items before the bank has time to clear the deposited check.  The fake check will bounce and the victim is left responsible for the purchases.  Other variations of this scam have involved sending cryptocurrency such as bitcoin to the scammers. 

Example email

As phishing and job scams targeting higher education persist, vigilance is key. Carefully inspect unsolicited emails and do not click links or provide information without verifying legitimacy first. Report suspect message as phishing in Gmail.  Research employers thoroughly when job hunting and avoid requests for upfront fees or personal details. Never provide banking information. Stay alert and contact the IT help desk with any online safety concerns. Using caution and common sense are our best defenses against those looking to take advantage.

Simmons Moodle Update

Moodle IconWe are excited to announce a significant upgrade to our learning management system, Simmons Moodle, which will take place on January 8, 2024. The transition to Moodle 4.1 represents a substantial improvement in our online learning experience, offering enhanced features and a more user-friendly interface.

Key benefits of this upgrade include:

Modern User Interface: A new sleek and intuitive interface that will make navigation and course management more straightforward.

Improved Mobile Compatibility: Increased responsiveness on mobile devices, allowing for a seamless learning experience on smartphones and tablets.

Enhanced Accessibility: Better support for accessibility standards, ensuring that all community members can access and benefit from online resources.

Streamlined Assignment Submission: Students will find it easier to submit assignments, and instructors will have a more convenient grading process.

Advanced Analytics: Improved data analytics tools, helping instructors and administrators make data-driven decisions to support student success.

There will be a scheduled downtime on the morning of January 8th, 2024, to ensure a smooth transition. We anticipate that Moodle will be unavailable for four to six hours. We apologize for any inconvenience this may cause and appreciate your understanding.

We are committed to providing the best online learning environment for our university community, and this upgrade is a significant step towards achieving that goal. To that end, we will continue to update the Simmons community with details about specific improvements directly through the Moodle platform. In addition, the Center for Faculty Excellence will be providing instructor workshops to further introduce new key features on January 10th at 11 a.m., and January 11th at 2 p.m.

Thank you for your cooperation and patience as we work to enhance your Moodle experience. If you have any concerns or questions, or would like to be considered as part of a small pilot group to provide early feedback about the new Moodle experience, please don’t hesitate to contact our Moodle Support team at [email protected].

October is CyberSecurity Awareness Month

Greetings! I’m Kristen Howard, the new Information Security Officer at Simmons University. My main goal is to work with faculty, staff, and students to raise awareness about cybersecurity and foster a secure online setting. By partnering together, we can protect the university’s information and enable a safe and effective digital environment for everyone in our community.

This month we will focus on the human role in cybersecurity.

See Yourself in Cyber. #BeCyberSmart.

Even though cybersecurity may seem like a complex subject, ultimately, it’s really all about people. This month we focus on the “people” part of cybersecurity, providing information and resources to help everyone make smarter decisions whether on the job, at home, or at school. 

4 Things You Can Do to #BeCyberSmart

Security Awareness Training and Phishing Tests

One of the ways we can protect ourselves is through security training on a regular basis.  This reinforces our knowledge of cybersecurity over time and becomes part of our subconscious defense behavior.  Beginning in November, we will make short learning videos available on a monthly basis for people to review.  After that, it’s time to test our Phishing skills and apply what we have learned in the form of fake Phishing emails.  Can you spot the Phish?   

About Your Role

When we say See Yourself in Cyber, we mean see yourself in cyber no matter what role you play. As an individual or consumer, take steps to protect your online information and privacy. Faculty, staff, and service providers can take ownership of their role by putting cybersecurity in place to prevent incidents while protecting the University’s brand and reputation. Administrators support critical operations and are a part of the network of functions and systems that others rely on.

Remember: your role plays an important part in ensuring cybersecurity for the larger ecosystem!

Avoid Becoming a Social Engineering Victim – Four Questions to Ask Yourself:

Social engineering is a scam where a cybercriminal attempts to trick someone into taking an action against their own best interests. Usually, the action results in the victim providing confidential information (like their login information) or installing malware on their computer. Most social engineering attacks have four common traits, which signal a far higher likelihood of a scam if all are present.

Image describe process of possible scenarios

Long Image Description:

Did the message arrive unexpectedly? Yes. Is it the first time the sender has asked you to perform the requested action? Yes. Does the request include a stressor, such as “You need to do this now”? Yes. Can performing the request harm your interest? Yes. If you answer yes to all of them, you should go out of your way to confirm the request is legitimate. Use a trusted method like calling or texting the sender before taking any action.

Not every message with these four traits is absolutely a social engineering scam. Our email inboxes, voicemail and postal mailboxes are full of unexpected requests; that is life. But when these four traits are present, stop, look, and think before you act!

Phishing and Social Engineering 

Phishing and social engineering campaigns are still a top source of ransomware and other malware[1]. 

Phishing is a type of cybersecurity attack where malicious actors send messages pretending to be a trusted person.  Social Engineering is the psychological manipulation of people into performing actions like installing malicious software, clicking a malicious link, or divulging sensitive information.

Reduce your chances of your falling victim to phishing attacks!

Beware of messages that:

  • Do not clearly identify themselves or their company
  • Come from an email address that does not match the company’s domain
  • Do not give full contact information such as the title of sender, the company’s physical address, or phone number
  • Make too good to be true offers with no strings attached
  • Ask to pay an upfront fee or asks you to transfer money for them
  • Ask to give your credit card or bank account numbers
  • Ask to send copies of personal documents
  • Remember: DO NOT provide any personal information, especially Social Security numbers or financial information. Legitimate companies would not ask for this information over the phone or email.

If an email looks suspicious, do not respond and do not click on any links or attachments. When available, “Report phishing” to block other suspicious emails.

[1] 2023 Verizon Data Breach Investigations Report (DBIR)

Please send any questions or concerns to Simmons Information Security Officer, Kristen Howard, or the Technology Service Desk.