Archive for September 2013

Think you deleted that file from your system? Think again!

by in , , , , , , , ,

new video released by SANS.org this month titled "Data Destruction" will help you learn just how difficult it is to truly delete data, and that it actually requires a process called wiping.

Print from your mobile phone, tablet or laptop

by in , , ,

In case you missed the announcement in the August 22 issue of Wavelength, Technology & Communication is very pleased to announce a new service which enables students and employees to print documents from their mobile phone, tablet, or laptop.

Printing from any of these devices is a simple, 3-step process:

  1. Attach any documents you want to print to an email from your official CI email address and send the email & attachments to:
    PrintBW@csuci.edu for black-and-white printing; OR
    PrintCOLOR@csuci.edu for color printing

  2. You'll receive an automated email reply from "Pharos Mobile Printing" confirming that your document is ready to be released.
  3. Finally, go to any MobilePrint-compatible printer on campus and release your print job using your DolphinOne Card
MobilePrint-compatible printers are located throughout Broome Library and many other spaces on campus.
You must complete the release of your print job at a MobilePrint printer within 2 hours, otherwise you'll need to re-send via email again (as described in Step #1 above).

Need more information? Visit the T&C Mobile Printing web page

How to spot a phishing email.

by in , , , , , , , , , ,

With the recent flurry of phishing emails being received these days I thought I would post this quick guide to assist you in determining if the email you received may actually be a phishing email.

It could be a phishing email if:

  • There are misspelled words in the email or it contains poor grammar.
  • The message is asking for personally identifiable information (PII), such as credit card numbers, account numbers, passwords, PIN's or Social Security Number.
  • There are "threats" or alarming statements that create a sense of urgency.  For example: "Your account will be locked until we hear from you" or "We have noticed activity on your account from a foreign IP address".
  • The domain name in the message isn't the one you're used to seeing.  It's usually close to the real domain name but not exact.  For example:
    • Phishing Website:  www.regionsbanking.com
    • Real Website:  www.regions.com