WCCCD       Home
One Vision, One District, One College Apply
Campuses Downriver Campus Downtown Campus Eastern Campus Northwest Campus Ted Scott Campus Mary Ellen Stempfle University Center
Student Services School of Continuing Education Administration and Finance Bookstore District Police Authority Distance Learning Educational Affairs Facilities Financial Aid Government Relations Human Resources Information Technology Institutional Effectiveness Programs and Courses About WCCCD Faculty and Staff Students Learning Resource Center

May 29 and more - Virtual Wellness Wednesdays

May 29 and more - Diversity & Inclusion: Asian and Pacific Islanders Heritage Month

May 29 and more - Diversity & Inclusion: Jewish American Heritage Month

Through May 30 - Art Gallery: Artarama Student Exhibition

June 4 - Art Gallery: Jeff Cancelosi Exhibition

June 5 and more - Diversity & Inclusion: Pride Month

June 5 and more - Diversity & Inclusion: Caribbean American Heritage Month

June 8 - Commencement Information

June 19 - Degree Works Virtual Workshops

Start June 20 - Summer Movie Fest

2024-2025 Scholarship Application Deadline June 28, 2024

Register as a Guest Student at WCCCD

WCCCD Chancellor Dr. Curtis L. Ivery Receives 2024 University of Arkansas "Distinguished Career in Education Award"

September 21 - Public Safety Open House

Food Bank Donations

Celebrating A Tradition of Transitioning from Students to Practitioners

Student Beta Beta Beta (TriBeta) Application

BRAINFUSE Online Tutoring Information

Brainfuse JobNow

Commercial Driver's License (CDL-A) Training

National Student Clearinghouse e-Transcript

Dental Hygiene Clinic at Northwest Campus

Free COVID-19 Vaccination & Testing Clinics

Earn as you Learn Pharmacy Technology Program

Student Assistance Program

Coronavirus Reporting Hotline

Learning Resource Center Online Resources & Services

Join Student Executive Council

Learning Resource Centers (LRC) and Local Library Partnerships

Information Security

The internet is full of opportunities which essentially changed the way we do business, educate, communicate, socialize and entertain ourselves. With all the opportunities, however, come a lot of risks. Hackers, scammers and spammers are constantly working hard to compromise your personal information and privacy.  WCCCD IT department monitors any potential risks, but it is everyone’s business to practice caution when connected to the internet, and make sure your computer is protected whether you are at work, home or at a coffee shop.

Protect your computer; protect your data and your privacy

The people with malicious intent look for opportunities to do harm using the internet finding unprotected computers and installing Malwares on your computer without your knowledge. 

What is a Malware anyway?

Malware, short for malicious software, is software that get installed without your consent or knowledge and is used to disrupt computer operation, gather sensitive information, or gain access to private information. Criminals from anywhere in the world use malware to steal your personal information, send spam, and commit fraud.

How is this possible?

There are many ways a Malware gets installed to an unprotected computer.


Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit cards information by impersonating as a trustworthy entity in an email communication.


Examples of Phishing Messages

The following are actual phishing scam emails sent to our users at the District. The recipients’ address is masked

Pretending IT Department: Email Upgrade

From: Mary.Labib@stmu.ca Time: 2014-08-20 19:12:15
To: XXXXX@wcccd.edu

Your two incoming mails were placed on pending status due to the recent upgrade in our database, In order to receive the messages kindly click: HERE

Login with your correct Webmail information's and wait for responds from our data base service.
We apologize for any inconvenience and do appreciate your understanding.

Thank you.
Copyright © 2014 Webmail .Inc . All rights reserved.

Pretending IT Department: Mailbox full 

From: web@noreply.com Time: 2014-09-14 20:52:52
To: XXXXX1@wcccd.edu
Subject: Email Quota Limit

You have exceeded the storage limit on your mailbox.You will not be able to send or receive new mail until you upgrade your email.

Click the below link and fill the form to upgrade your account.

Webmail Account Administrator

Impersonating Bank

From: test@codiatech.com Time: 2014-09-15 14:27:17
To: ******@wcccd.edu

Dear Customer.

Please will kindly inform you that your online banking service has been suspended due to the urgent report will receive from the fraud agency that your account has been recently used to carry out illegal online transaction.

Inorder for us to reactivated your account, You will need to Identify your Identity by Clicking on the Link Below,


Note: Failure to keep to this above instruction and fill all the requested Information within 3days, Your account will be close and Terminated.


There are many more phishing scam emails that appear to come from a known source such as Facebook, LinkedIn, PayPal, EBay and other messages with links to seemingly innocent e-card, an instant message promising a movie star photo, a pop-up window offering a free game or an attachment.

But any of these temptations could hide malware, which may damage your computer, destroy your information, or enlist your PC in an Internet criminal’s spam-sending army of computers. Or open a back door to your PC, making it easier to attack later.

How to Deal with Phishing Scams?


Even if the email appears to be coming from a familiar source or your friends, think before you click. Attackers can spoof or compromise email accounts of your friends, and send you a scam email.

DO NOT reply or forward these phishing attempts to anyone.
DO NOT click on any links that may be in the message content.
DO NOT provide your user ID and/or password to anyone via email or phone.
DO NOT click on pop-up windows
DO NOT click on cancel, OK, or accept to get rid of a pop-up ad or an unexpected warning – even an offer to remove spyware. Instead, click the Close box (X) or press ALT + F4 on your keyboard.

DO delete phishing scam messages and notify the helpdesk by calling ext. 2666

Protect your PC, Protect your Private Data

  • Turn on your firewall

You wouldn’t leave your house unlocked, so why take that chance with your computer? A firewall puts a protective barrier between your PC and the Internet.

• It’s a kind of security checkpoint that information must pass through before it’s allowed to enter your computer.

• And a firewall also helps make your computer “invisible” to online attackers, viruses and worms.

  • Keep your Operating System up-to-date

Because your operating system, such as Microsoft Windows, is the computer’s brain, check and make sure it’s up to date. And don’t stop there.

• Take advantage of the ability to update PC’s automatically.

  • Keep other software up-to-date

• Hackers work very hard to exploit weaknesses in other software programs you may have installed such Adobe acrobat reader, Microsoft Office products, and other proprietary software. That’s why software companies release security updates and you should make sure they are all updated.

  • Install Antivirus software

Computer viruses, worms and Trojan horses are programs designed to damage your computer, corrupt data, or control your PC.

• Antivirus programs scan everything that goes into your computer – email,  attachments – for thousands of known viruses and try to clean up any they find.

• The anti-virus software must be updated on a daily basis to protect your PC properly from new threats that are developed.  Make sure to follow the anti-virus maker’s configuration steps to downloads the latest updates.

  • Install Antimalware software

• Antimalware programs monitor your computer, looking for known spyware and watching for programs that are trying to install themselves. When they find something, they warn you and help you remove the spyware.

• Keep your antimalware current.

  • Backup your Data

• Backing up your data will save you a lot of headaches.   A regular backup schedule will mitigate any damage done by a virus, and will allow you to get up and running much quicker.

How to Detect Malware Infection

Monitor your computer for unusual behavior. Your computer may be infected with malware if you encounter some of the following:

  • Unexpected pop-up windows. For instance a fake virus alert telling you that you have security threats on your computer
  • Slows down or crashes
  • Won't shut down or restart
  • Other people receive email you did not send
  • Random connections to unknown websites
  • You see toolbars you did not install

What to do if infected

If you experience some of the above unusual behavior with your work computer, please call the service desk/Helpdesk. If the computer is your PC at home, take the following steps:

  • Stop any online activities that require personal information such as banking, filling out forms or surveys, shopping etc.
  • Update your security software, and then run it to scan your computer for viruses and spyware
  • Save your files to an external drive. The best way to clean an infected computer is to format the hard drive wiping everything, and installing a new Operating System.
Copyright ©2008-2024 Wayne County Community College District | 801 W. Fort Street, Detroit, MI 48226 |  CONTACT US