Marshall University and Cisco engineers have made strides in restoring full service to the WiFi Network on campus. We are working in order from the most impacted to least impacted buildings. For example, if a building has a complete outage, we’ll work to get it fully restored before moving on. Since our last update, Byrd Biotech, Facilities Building, Morrow Library, Smith Communications Building and Old Main are almost completely restored. Significant progress has been made in East Hall and on the South Charleston campus. The team will begin work in the Memorial Student Center and at the School of Pharmacy this afternoon. We will continue to update our Alerts and WiFi page as more information is available.
Marshall University engineers along with Cisco engineers have made steady progress today in getting the remaining WiFi access points connected to the network. Access points in the Shewey building, First Year Residence Halls and the Byrd Biotechnology Science Center have all started to come back online. Technicians will continue to work into the evening and through the week until all access points are back online.
The Marshall University Campus WiFi network continues to experience intermittent outages. Approximately 10 percent of the WiFi access points on campus were not functioning as of late Sunday evening due to troubleshooting efforts during Sunday’s weekly maintenance window. Restoration of these access points is underway, look for further updates at http://www.marshall.edu/wifi .
Cisco engineers have been onsite since late last week and over the entire weekend working with Marshall IT staff to resolve the flaws in Cisco software impacting the campus WiFi network this semester. Progress has been made to identify several problems and it is hopeful all problems will be resolved this week.
Your use of campus WiFi may be disrupted again this week with intermittent outages in an effort to resolve these problems. Please remember that wired services are working.
We appreciate your patience and will continue to work to restore services as quickly as possible.
We will not follow-up with additional emails but will update our WiFi status page (http://www.marshall.edu/wifi) as we progress with restoration of services. If you have specific questions please contact the IT Service Desk via email: ITServiceDesk@marshall.edu, via live chat: http://www.marshall.edu/it, or via telephone: 304.696.3200.
MU WiFi is back up and functioning normally. We apologize for the inconvenience. If you encounter WiFi problems contact MUIT service desk, email@example.com, 304-696-3200.
Update 1:30 PM – Efforts to restore WiFi services are progressing. The support engineers have an action plan that includes bringing up a wireless controller device with a clean configuration then performing a manual re-entry of configuration information. Provided this is successful, we expect services to be restored early this afternoon. This issue is also reported to be affecting wired network ports in those Residence Hall locations with the new ‘in-room WiFi’ access points. Additional details will be posted here and on Twitter @MarshallU_IT as we receive further updates.
Marshall University Wireless Network services for the Huntington and Regional Campuses are currently offline. The current issue was reported earlier this morning. IT staff and management are working alongside Cisco, our wireless vendor, to resolve what is reported to be a technical issue in their product.
We do not have an estimate at this time when services will be back online. Look for further updates to be posted on the News/Alerts section of the Marshall IT main web page https://www.marshall.edu/IT.
Thank you for your patience and we regret any disruption caused by these technical issues.
One issue has been flagged regarding some email accounts are no longer able to send messages using the mail app. If you experience these problems please visit the Apple Support Page.
Computer Security Advisory for All University Faculty & Staff E-mail Recipients
Starting last Friday (5/13/2017) computer security researchers and news media began sharing information about a new computer security attack called ‘WannaCry’. This attack is another variation of malicious software referred to as ‘ransomware’. When a computer becomes infected with ransomware, this malicious code attempts to encrypt (scramble and password-protect) as many data files as it can find available. This occurs not only to the local computer but also to any attached drives and network shares to which your user account has write access. This tactic is called ransomware because the only way to regain access to those encrypted files is to pay a fee – a ransom often starting at $300 and up – to the criminals. If the victim does not pay, then the only other recovery method is to restore the files from a secure backup location.
There have been no major outbreaks reported on the University campus network nor detected by campus network security services. We attribute this in part to faculty and staff cooperation with regular computer software updates, increased information security awareness, and not being heavily targeted (yet) by computer criminals.
If you are responsible for software updates whether on your personally-owned computer, a University-owned computer or a group of your department’s computers, we ask that you take a moment to review the following guidance.
How can you minimize risk to University- and personally-owned computers?
We trust that the following guidance should sound familiar when we remind you that the best defense is to already be following computer security best-practices:
- Is Your Software Updated and Supported? – Be sure all of your computers – whether located on-campus or off-campus – are running the latest supported operating system, security and application software appropriate for your academic or business unit. This is not simply so we can say we run the ‘latest-and-greatest’. Rather software authors focus their efforts on their latest products so they will include the latest security features as well as fix known-security bugs. For a PC: we strongly suggest Microsoft Windows 10 ver 1607 and later and Symantec Endpoint Protection v. 14. Windows XP, Windows Vista and Windows 8.0 are no longer supported; For a Mac: you should be at Mac OS 10.12.x and Symantec Endpoint Protection for Mac v. 14. Mac OS prior to 10.10 (Yosemite) is no longer supported. Marshall University Information Technology provides the above recommendations. Please consult with your campus IT Support team for configurations supported by the MU School of Medicine and Marshall Health.
- Are you Patched? – Be sure all of your computers – whether located on-campus or off-campus – are configured to automatically receive and apply security updates when they are released. For a PC: Use Windows Update and make sure both Critical and Important Updates are applied. For a Mac: Go to your Apple menu click ‘About this Mac…’ and then ‘Software Updates’ or open the App Store and click on the ‘Updates’ icon.
- Is Your Important University and Personal Data Backed-up? – Take steps now to have a backup copy of important documents and data. For items which are essential to University or Department operations, these should be saved to a secure location (such as a campus-managed fileserver) which has a regularly scheduled backup. For personal items, use of an external hard drive or high-capacity thumb-drive which can be attached for backup then promptly disconnected, is highly recommended. Remember, ransomware will attempt to encrypt any and all data files which you have write access. Recovery is limited to those items which were inaccessible by the user (campus-managed backups) or were offline (disconnected hard drive or thumb-drive) at the point of infection.
- Are You Being Cautious with E-mail and Websites? – Always exercise suspicion for unsolicited e-mail and unfamiliar web sites, particularly those which urge you to ‘open this attached file’ or ‘click this web page link’ for some urgent action. Many of us work in areas where we do receive unsolicited documents and in those cases, ask a trusted colleague or an IT support resources for a second opinion before opening the message. A mobile device may be used in cases where you want to preview the file, but understand that the malicious payload may only be designed to affect a desktop or laptop computer. This allows you to delete the file or entire message before ever attempting to preview/open it on the computer.
- Report Suspicious Computer Behavior, Alerts, or E-mail Messages – We understand that it is difficult for everyone to stay up-to-date and how they should respond to an ongoing stream of important computer security issues. You can assist by reporting unexpected or suspicious activity to computers located to your closest campus Information Technology Support or IT Information Security professional.Please reach out to one of the following IT Service Desk or IT Service Provider contacts:
On January 15th, 2017, MU Information Technology will be eliminating the self-service feature for creating/managing group aliases and vanity email addresses. These features, (group aliases and vanity addresses) are being migrated to our Exchange Server environment. Existing group aliases are being converted to Exchange distribution groups and will continue to function. Beginning on 1/15/17, all future requests or changes to vanity addresses or group aliases will need to go through the IT Service Desk to have a request ticket created in our FootPrints system.
If you require further assistance, please contact the IT Service Desk: