Technology@Wooster

  • Inside
  • Events
  • Colleague Self Service
  • Scotweb
  • 365 email
  • Moodle
  • Wooster.edu
  • For Students
    • What Technology do I need at Wooster
    • New Student Technology Orientation
    • IT Policies and Procedures
    • Available Software
    • Computer Labs
    • IS Formatting
    • Printing
      • Poster Printing
    • Wireless
  • For Faculty/Staff
    • IT Policies and Procedures
    • Printing
    • Faculty Technology Purchases
    • Available Software
    • Computer Labs
    • Professional DevelopmentUse this category to mark workshops, birds of a feather, and other training opportunities so they display when someone clicks on Professional Development.
    • Projects in a BoxCategory used for workshop “handouts.”
  • FAQs
  • Events
  • Resources
    • Showcase
    • Software
      • ArcGIS Access
      • LinkedIn Learning Access
      • Mathematica Installation
      • Microsoft Teams
      • Moodle
        • Moodle Articles
      • NameCoach Login
      • Qualtrics Login
      • RStudio Server Login
      • WordPress(Voices)
    • Reserving Equipment
    • WorkshopsCategory used for workshop “handouts.”
  • About Us
    • All Staff
    • Applications Development
    • Educational Technology
      • About
      • Student Digital Media Assistants
    • Technology Services
      • Digital Infrastructure
      • Media and Event Support
        • Student Media Services Assistants
      • Outreach
      • Projects
      • Service Desk
        • Student Technology Assitants
    • What we can assist you with
  • Book a Meeting
    • Educational Technology
    • Help Desk
  • Knowledge Base
  • The Threat of SIM Swapping

    The Threat of SIM Swapping

    A lot of online services and websites offer users the ability to protect their accounts using two-factor authentication through phone text. This post will go over a way that hackers have found in order to do just that. A SIM swapping is a technique used by a cyber-criminal in order to take control of accounts…

    October 20, 2020
  • Cybersecurity Occupations

    Cybersecurity Occupations

    Happy Cybersecurity Month! Since it is Cybersecurity Month, it would be great to highlight career paths that can be present in Cybersecurity. Cybersecurity has become very prevalent and in demand since technology has become ubiquitous in our society. Cybersecurity is important because it helps to protect everyone’s information. Cybercrime Magazine gives a list of 50…

    October 19, 2020
  • Keeping Data Safe

    Keeping Data Safe

    Happy Cyber Security Month! On Readwrite, Nirnay Butle, authors an article called “12 Things to Know About Cybersecurity Now.” In the article, it talks about ways people can lose their data which includes unauthorized links, spam messages, applications, weak privacy, and precaution. Here are some aways to keep your data safe: Internet links that have…

    October 19, 2020
  • What is Malware?

    What is Malware?

    Photo by Markus Spiske on Unsplash What is Malware? Malware, which is a combination of the words malicious and software, is an umbrella term for any kind of software designed with malicious intent.  Not all malware is destructive, though it can cause annoying behaviors such as generating an abundance of pop-up ads or cause your computer to run slowly. In…

    October 16, 2020
  • Data Breaches

    Data Breaches

    Why should you care about data breaches and why are they a potential threat?  A data breach is a security incident where information is accessed without authorization. Other terms for this are data spill, unintentional information disclosure, data leak, and information leakage. Data breaches can harm businesses and consumers in many ways. As technology progresses, more information is spread throughout the digital world, making…

    October 16, 2020
  • What is the purpose of a firewall?

    What is the purpose of a firewall?

    Even though we don’t think about it very often, network security is extremely important. This post is going to discuss a device that is used to enforce protection in networks. A firewall is a component that is used to monitor the incoming and outgoing traffic in a network. The term ‘firewall’ can be used to…

    October 15, 2020
  • An Introduction to SQL Injection Attacks

    An Introduction to SQL Injection Attacks

    This Cybersecurity month, I wanted to introduce everyone to one kind of vulnerabilities that can exploited to take advantage of web applications. Many websites we use every day depend on databases for their backend infrastructure. Databases can be created and managed using a programming language called Structured Query Language (SQL). Statements written in SQL to…

    October 15, 2020
  • SPAM, Phishing and your Email

    With cybersecurity month here, we wanted to remind you that the SPAM, and Phishing are the largest attacks against individuals. To help lessen this risk, messages that appear suspicious are being placed into a quarantine at Office 365. The vast majority of messages are correctly categorized, but there are a number of false positives. If…

    October 1, 2020
  • #ICYMI: October 2, 2020 Edition

    #ICYMI: October 2, 2020 Edition

    Here for You Educational Technology and Technology Services is still working hard to bring you new updates, resources, and more! Follow this blog and social media accounts to be sure to stay up to date with the latest information. Need Help? Students in need of help? Need help with a video, audio, Microsoft 365, Moodle,…

    September 28, 2020
  • Microsoft Updates

    We have highlighted updates from Microsoft below. Click the link in the Description to visit a video or support page. If you see “Sign In,” click and enter your College credentials. Use the icons at the bottom of the spreadsheet to open it full size or download a copy.

    September 28, 2020
←Previous Page
1 … 18 19 20 21 22 … 40
Next Page→

Copyright © 2022 The College of Wooster

Helpdesk Hours: Monday-Friday 8:30am-5:30pm