As a reminder all Enrollment Management department mailboxes (Outlook) were migrated to Office 365 overnight (https://its.wsu.edu/o365-outlook-migration). If you or a coworker are having problems logging in please try using your email address (NID@wsu.edu) as opposed to domain (ad\NID) for user name. Also don’t forget to check portable devices such as cell phones and tablets.
Known issues after migration:
The settings we believe you may have to re-establish with your Office 365 Mailbox include
Please contact EIT if you are still having issues, https://em.wsu.edu/eit/help.
=====================================================
In a social engineering attack, an attacker uses human interaction (social skills) to obtain or compromise information about an organization or its computer systems. An attacker may seem unassuming and respectable, possibly claiming to be a new employee, repair person, or researcher and even offering credentials to support that identity. However, by asking questions, he or she may be able to piece together enough information to infiltrate an organization's network. If an attacker is not able to gather enough information from one source, he or she may contact another source within the same organization and rely on the information from the first source to add to his or her credibility.
Phishing is a form of social engineering. Phishing attacks use email or malicious websites to solicit personal information by posing as a trustworthy organization. For example, an attacker may send email seemingly from a reputable credit card company or financial institution that requests account information, often suggesting that there is a problem. When users respond with the requested information, attackers can use it to gain access to the accounts.
Phishing attacks may also appear to come from other types of organizations, such as charities. Attackers often take advantage of current events and certain times of the year, such as
You can be a victim of identity theft even if you never use a computer. Malicious people may be able to obtain personal information (such as credit card numbers, phone numbers, account numbers, and addresses) by stealing your wallet, overhearing a phone conversation, rummaging through your trash (a practice known as dumpster diving), or picking up a receipt at a restaurant that has your account number on it. If a thief has enough information, he or she may be able to impersonate you to purchase items, open new accounts, or apply for loans.
The Internet has made it easier for thieves to obtain personal and financial data. Most companies and other institutions store information about their clients in databases; if a thief can access that database, he or she can obtain information about many people at once rather than focus on one person at a time. The Internet has also made it easier for thieves to sell or trade the information, making it more difficult for law enforcement to identify and apprehend the criminals.
Identity theft is usually a crime of opportunity, so you may be victimized simply because your information is available. Thieves may target customers of certain companies for a variety of reasons; for example, a company database is easily accessible, the demographics of the customers are appealing, or there is a market for specific information. If your information is stored in a database that is compromised, you may become a victim of identity theft.
Unfortunately, there is no way to guarantee that you will not be a victim of online identity theft. However, there are ways to minimize your risk:
Companies have different policies for notifying customers when they discover that someone has accessed a customer database. However, you should be aware of changes in your normal account activity. The following are examples of changes that could indicate that someone has accessed your information:
Recovering from identity theft can be a long, stressful, and potentially costly process. Many credit card companies have adopted policies that try to minimize the amount of money you are liable for, but the implications can extend beyond your existing accounts. To minimize the extent of the damage, take action as soon as possible:
==================================================================================
The Internal Revenue Service (IRS) has released an alert warning of various types of scams targeting taxpayers this summer.
IR-2017-112, June 26, 2017
WASHINGTON – The Internal Revenue Service today issued a warning that tax-related scams continue across the nation even though the tax filing season has ended for most taxpayers. People should remain on alert to new and emerging schemes involving the tax system that continue to claim victims.
“We continue to urge people to watch out for new and evolving schemes this summer,” said IRS Commissioner John Koskinen. “Many of these are variations of a theme, involving fictitious tax bills and demands to pay by purchasing and transferring information involving a gift card or iTunes card. Taxpayers can avoid these and other tricky financial scams by taking a few minutes to review the tell-tale signs of these schemes.”
EFTPS Scam
A new scam which is linked to the Electronic Federal Tax Payment System (EFTPS) has been reported nationwide. In this ruse, con artists call to demand immediate tax payment. The caller claims to be from the IRS and says that two certified letters mailed to the taxpayer were returned as undeliverable. The scammer then threatens arrest if a payment is not made immediately by a specific prepaid debit card. Victims are told that the debit card is linked to the EFTPS when, in reality, it is controlled entirely by the scammer. Victims are warned not to talk to their tax preparer, attorney or the local IRS office until after the payment is made.
“Robo-call” Messages
The IRS does not call and leave prerecorded, urgent messages asking for a call back. In this tactic, scammers tell victims that if they do not call back, a warrant will be issued for their arrest. Those who do respond are told they must make immediate payment either by a specific prepaid debit card or by wire transfer.
Private Debt Collection Scams
The IRS recently began sending letters to a relatively small group of taxpayers whose overdue federal tax accounts are being assigned to one of four private-sector collection agencies. Taxpayers should be on the lookout for scammers posing as private collection firms. The IRS-authorized firms will only be calling about a tax debt the person has had – and has been aware of – for years. The IRS would have previously contacted taxpayers about their tax debt.
Scams Targeting People with Limited English Proficiency
Taxpayers with limited English proficiency have been recent targets of phone scams and email phishing schemes that continue to occur across the country. Con artists often approach victims in their native language, threaten them with deportation, police arrest and license revocation among other things. They tell their victims they owe the IRS money and must pay it promptly through a preloaded debit card, gift card or wire transfer. They may also leave “urgent” callback requests through phone “robo-calls” or via a phishing email.
Tell Tale Signs of a Scam:
The IRS (and its authorized private collection agencies) will never:
For anyone who doesn’t owe taxes and has no reason to think they do:
For anyone who owes tax or thinks they do:
How to Know It’s Really the IRS Calling or Knocking
The IRS initiates most contacts through regular mail delivered by the United States Postal Service. However, there are special circumstances in which the IRS will call or come to a home or business, such as:
Even then, taxpayers will generally first receive several letters (called “notices”) from the IRS in the mail. For more information, visit “How to know it’s really the IRS calling or knocking on your door” on IRS.gov.
Be safe out there!
=========================================
WSU Pullman ITS is migrating to Level3, WSU’s new local and long distance phone service provider. As part of this migration, there will be changes implemented on the campus phone system throughout this week (June 27 through June 30). We will be working with the new provider to implement all necessary changes and finalize the migration.
There should be no impact to 911 calling or statewide 5-digit dialing between WSU Pullman and the other WSU sites around the state during this transition. If there are problems or issues, Information Technology Services’ implementation team will work identify and resolve all issues as quickly as possible. Additionally, the changes are scheduled to take place after normal business hours to minimize impact to campus users.
Please contact your CougTech Help Desk (cougtech@wsu.edu or 509-335-4357) with any questions or concerns.
Thank you for your patience during this transition.
=========================================
We have received word from ITS that NID services used to create a new NID or FID, or to reset a password for a current NID or FID, will be unavailable for the duration of the upgrade to CS 9.2. If you have received a notice recently to reset your NID password (see below), please be aware that you will be unable to do so starting Friday, June 30, at 10PM, through late in the day on Monday, July 3, when the upgrade completes.
Below is an example of the email sent to you when your NID password is ready to expire. The email is typically sent for 14 days. If you are currently in the 14 day window, we recommend that you reset your password prior to the upgrade. If you do not change it prior to the upgrade, you will need to wait until after July 3.
If you have questions or need assistance, please feel free to email the helpdesk: eit.helpdesk@wsu.edu
=========================================
Construction started on the Grimes Way play field parking lot Monday, June 5, adding more parking stalls. The parking lot will be closed to vehicle parking until mid-July.
=========================================
Please delete if you receive this.
=========================================
Please delete if you receive this.
=========================================