MSUTexas

Information Technology

Services

Midwestern State University's Information Technology department is located on our Wichita Falls campus, in the Memorial Building. We provide the following services: 
  • Account creation, maintenance, and deletion
  • Audio/Visual Equipment, Setup, Recordings
  • Classroom Technology Quotes, Installation, Support
  • Computer/Printing Lab Management
  • Course Evaluations
  • Data Backup, Storage, Reporting and Recovery
  • Digital Signage
  • Hard Drive Removal
  • Hardware Quotes, Installation, Support
  • Infrastructure
  • Laptop Updates and Repairs (MSU property)
  • Login Assistance 
  • Office technology Installation, Moves, Support
  • Portal Login
  • Software Vetting, Quotes, Installation, Support
  • Telecommunications Services
  • Third Party Application Support
  • Wired and Wireless Infrastructure

Midwestern State University is becoming MSU Texas! Read about upcoming changes to our website and email here: MSU Texas

Projects

Current Projects

MSU IT Projects List
Project Name Time Frame Progress Notes
Facilities Services TrackIT License and Server Fall 2017 Complete
Radius Fall 2018 Complete
Banner 8 to Banner 9  Fall 2018 In Progress
Degree Works Spring 2018 Complete
TouchNet Single Sign-On Spring 2019 TBD
Domain Name Change Spring 2019 Ongoing
ADA IT Compliance Ongoing Ongoing
Wepa Printing Services Ongoing Ongoing
Information Security Program Ongoing Ongoing
Ad Astra TBD TBD

Capital Projects

MSU IT Projects List
Project Name Time Frame Progress Notes
Language Learning Center Summer 2018 Complete
Lifelong Learning Center Summer 2018 Complete
MSU PD Move Summer 2018 Complete
Alumni House Move Summer 2018 Complete
DCOBA AV Remodel Summer 2018 Complete
Campus Fiber Project Fall 2018 In Progress
Moffett Library Remodel Fall 2018 In Progress
Health Sciences Building Spring 2019 In Progress

IT HEAF

MSU IT Projects List
Project Name Time Frame Progress Notes
Wifi Upgrade Fall 2018 Complete
Server Replacements Spring 2019 Complete
Computer Lifecycle Replacement Ongoing Ongoing
Computer Lab Software Ongoing Accepting Requests for Spring 2019
Classroom Technology Ongoing Ongoing

Known Issues

  • Remote Access Scams 

    MSU IT wants to make you aware of remote access scams growing in intensity across the broader Internet.

       Users affected by this type of scam may see a web browser screen pop up when browsing that warns of technical issues and urgently asks you to call a phone number or allow a technician to remotely access your computer. These notices will often say they are from Microsoft or Windows.

    Image of a browser tab titled "Microsoft Notice" with a popup saying "Your ISP has blocked your PC. Call Microsoft immediately" followed by a toll free phone number.This looks like an error window from Microsoft and says "Windows Virus Warning! Identity Theft and Hacking Possibilities. Contact Microsoft Certified Live Technicians."

    If you are ever asked to call a phone number or provide remote system access by ANY Internet resource you should immediately contact the Information Technology help desk at extension 4278 for guidance.

    Users of Midwestern State University information resources should never provide remote access to any outside party without first consulting with MSU IT to validate the request.

    ** If you are presented with a screen similar to the examples shown above, turn off your computer immediately and call Information Technology at 4278. ** 

 

  • Petya Ransomware attack 

    MSU IT would like to make all MSUnet users aware of another ransomware attack currently underway.   So far, systems in Spain, France, Ukraine, and Russia have been taken hostage and threat intelligence agencies report that it is expected to go world-wide rather quickly.  The ransomware, named Petya, purportedly utilizes the Eternal Blue tools leaked from the US National Security Agency by a hacking group known as The Shadow Brokers.  

    The ransomware delivered in this attack presents a message like the one shown below to infected users.This prompt has a solid background and screen text that resembles the boot menu that shows when a computer starts up. It tells the user that their harddisks have been encrypted and that they can purchase a key to restore their data.
    If you are presented with a message like the example shown above, turn off your computer immediately and call Information Technology at 4278.

    To help IT help you protect your digital resources please remember your training and watch for the following red flags when dealing with unexpected or unknown email:
    1. Were you expecting the email? If not take a much more critical view of opening the message and reach out to the purported sender to validate the message before clicking links or opening attachments.
    2. Inspect all aspects of the email. Mouse over the links without clicking them and if the link looks odd reach out to the purported sender to validate the message before clicking links or opening attachments.
  • WannaCry Ransomware attack 

    MSU IT would like to make all MSUnet users aware of a worldwide ransomware attack currently underway. So far over 45 thousand attacks have been reported by the SANS Internet Storm Center and infections have been seen in 74 different countries. The attacks purportedly utilize tools leaked from the US National Security Agency by a hacking group known as The Shadow Brokers.

    The ransomware delivered in this attack presents a message like the one shown below to infected users.
    This screen tells the user that their files have been encrypted, and advises users to pay for recovery. It also shows countdown timers for payment deadlines and data deletion deadlines.
    If you are presented with a message like the example shown above, turn off your computer immediately and call Information Technology at 4278.

    To help IT help you protect your digital resources please remember your training and watch for the following red flags when dealing with unexpected or unknown email:
    1. Were you expecting the email? If not take a much more critical view of opening the message and reach out to the purported sender to validate the message before clicking links or opening attachments.
    2. Inspect all aspects of the email. Mouse over the links without clicking them and if the link looks odd reach out to the purported sender to validate the message before clicking links or opening attachments. 
  • Spora Ransomware 

    The unfortunate user who is attacked by this ransomware is presented with a ransom screen that is similar to the examples shown below and once a user is presented with one of these messages the damage has already been done. All the data on your computer at this point are most likely irretrievable.

    In this image, a browser window tells the user that all their work and personal files were encrypted.
    This ransomware goes by the name Spora and is a professionally coded product that seems to have been developed by an especially well preparedteam of Russian cyber criminals. Spora can sit idle on your system and can detonate the malicious payload even when you are not connected to the Internet.

    Spora is delivered in a variety of ways but predominantly by phishing emails that lure a recipient into clicking a dangerous link or opening a malicious attachment.

    To help IT help you protect your digital resources please remember your training and watch for the following red flags when dealing with unexpected or unknown email:
    1. Were you expecting the email? If not take a much more critical view of opening the message and reach out to the purported sender to validate the message before clicking links or opening attachments.
    2. Inspect all aspects of the email. Mouse over the links without clicking them and if the link looks odd reach out to the purported sender to validate the message before clicking links or opening attachments.

  • Google Docs phishing incident

    Accounts from public email services such as Yahoo, Google, and Outlook.com that have been compromised are being used to send emails similar to the example shown below:
    This is an email from a known sender, that shows in the recipient's inbox as being sent to an unknown sender.
    If you receive such an email, please forward it to phishingreports@mwsu.edu and then delete it immediately. The “Open in Docs” link leads to a malicious site hosted in the public Google hosting environment. Google has been made aware of this scheme and is working to shut it down.

Supported Hardware and Software

At this time, MSU Information Technology does not work on any hardware not owned by Midwestern State University. 

Minimum Supported Hardware


Hardware Supported by MSU IT
Dell Optiplex 390 Dell computer tower
Dell Latitude Exx10
  • E6510, E6410, etc.
Dell laptop
Mac products
  • Must support El Capitan or newer
  • iMac (Late 2012)

    Mac Mini (Late 2012)

    MacBook Air (Mid 2012)

    MacBook Pro (Mid 2012)

Mac all-in-one desktop Macbook

Supported Software

A list of our currently supported software is available upon request. 

Students may access Microsoft Office 365 for free through the Microsoft website at the  Office 365 for Students site.

ITAC

MSU Information Technology Advisory Committee (ITAC)

Vision: To improve the effectiveness and efficiency of MSU information technology services, the committee will work with the Information Technology Department to ensure proper support and strategic alignment of technologies and infrastructure that enhances the quality of MSU’s administrative and academic technologies.

Mission: To evaluate and make recommendations to the Administrative Council on selection and use of software and hardware solutions. To openly discuss issues that relate to both Academics and Administration and to recommend solutions for those issues and recommend a budget for the acquisition of technology.

The committee will provide the IT Department with recommendations on strategic direction and project priorities that support technologies aligned with administrative and academic needs.

ITAC Membership 2017-2018

December 2018

  • Agenda TBD - Dec 7, 2018 at 2pm
  • Meeting Presentation

November 2018

  • Agenda TBD - Nov 9, 2018 at 2pm
  • Meeting Presentation

October 2018

April 2018
February 2018
November 2017
October 2017