WCCCD       Home
One Vision, One District, One College Apply
Campuses Downriver Campus Downtown Campus Eastern Campus Northwest Campus Ted Scott Campus Mary Ellen Stempfle University Center
   
Student Services School of Continuing Education Administration and Finance Bookstore District Police Authority Distance Learning Educational Affairs Facilities Financial Aid Government Relations Human Resources Information Technology Institutional Effectiveness Programs and Courses About WCCCD Faculty and Staff Students Learning Resource Center
 

October 5 - Tiling and Drywall Course

October 5 and more - Beginner Digital Photography

October 7 and more - PTK Orientation & Scholarship Information Meetings

October 9 and more - Diversity & Inclusion: German, Italian, and Polish American Heritage Month

Through October 11 - Art Exhibition Capstone

October 12 - The United Nations International Day of the Girl Child

October 16 - College Night

October 16 and more - brainfuse Workshop

October 17 - An Immersive Journey into Urban Fiction with Michel Moore

October 17 and more - Diversity & Inclusion: The Other Shore

October 20 and more - True Colors Virtual Workshops

October 21 and more - PTK Spring & Fall Meeting Dates

October 22 - Trick or Treat

October 23 and more - Degree Works Virtual Workshops

October 24 - Think Pink Health & Job Fair

October 24 and more - Resume Writing and Interview Skills Virtual Workshops

October 26 - 12th Annual Halloween Family Fun Day

Through October 31 - Art Exhibit: Lonnell Hurst

Launch Your Career in Pharmacy Technology Today

Certified Comunity & Economic Development Professional (CCEDP)

Chancellor's Fall Semester Greetings to WCCCD Family

November 20 - Holiday Jam

November 21 and more - Scholarship Virtual Workshops

Through November 22 - Art Exhibit: Downriver Campus Student Art Exhibit

November 28 and more - Academic Advising Virtual Workshops

Through December 18 - Art Exhibit: Taylor Childs

January 14 and more - Student Orientation Virtual Workshops

March 26 and more - Time Management Virtual Workshops

April 9 and more - Understanding the Catalog Virtual Workshops

August 26 - Career & Program Overview Day

August 27 and more - Virtual Transfer Equivalency Workshops

New Partnership with Schoolcraft College Provides Seamless Pathway in Culinary Arts

Student Success Angela Miller

Student Success Jeremiah Pettaway

Student Success Elina Villemure

WCCCD Chancellor Dr. Curtis L. Ivery Receives 2024 University of Arkansas "Distinguished Career in Education Award"

Food Bank Donations

Celebrating A Tradition of Transitioning from Students to Practitioners

Student Beta Beta Beta (TriBeta) Application

BRAINFUSE Online Tutoring Information

Brainfuse JobNow

Commercial Driver's License (CDL-A) Training

National Student Clearinghouse e-Transcript

Dental Hygiene Clinic at Northwest Campus

Free COVID-19 Vaccination & Testing Clinics

Earn as you Learn Pharmacy Technology Program

Student Assistance Program

Coronavirus Reporting Hotline

Learning Resource Center Online Resources & Services

Join Student Executive Council

Learning Resource Centers (LRC) and Local Library Partnerships

Information Security

The internet is full of opportunities which essentially changed the way we do business, educate, communicate, socialize and entertain ourselves. With all the opportunities, however, come a lot of risks. Hackers, scammers and spammers are constantly working hard to compromise your personal information and privacy.  WCCCD IT department monitors any potential risks, but it is everyone’s business to practice caution when connected to the internet, and make sure your computer is protected whether you are at work, home or at a coffee shop.

Protect your computer; protect your data and your privacy

The people with malicious intent look for opportunities to do harm using the internet finding unprotected computers and installing Malwares on your computer without your knowledge. 

What is a Malware anyway?

Malware, short for malicious software, is software that get installed without your consent or knowledge and is used to disrupt computer operation, gather sensitive information, or gain access to private information. Criminals from anywhere in the world use malware to steal your personal information, send spam, and commit fraud.

How is this possible?

There are many ways a Malware gets installed to an unprotected computer.

Phishing

Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit cards information by impersonating as a trustworthy entity in an email communication.

https://encrypted-tbn1.gstatic.com/images?q=tbn:ANd9GcQ6FH0SyuuCGHtPNVsJJWjIIPVYULXyN_3gCW7LqTvAwF5eHnaO

Examples of Phishing Messages

The following are actual phishing scam emails sent to our users at the District. The recipients’ address is masked

Pretending IT Department: Email Upgrade

From: Mary.Labib@stmu.ca Time: 2014-08-20 19:12:15
To: XXXXX@wcccd.edu

Your two incoming mails were placed on pending status due to the recent upgrade in our database, In order to receive the messages kindly click: HERE

Login with your correct Webmail information's and wait for responds from our data base service.
We apologize for any inconvenience and do appreciate your understanding.
Regards,

Thank you.
Copyright © 2014 Webmail .Inc . All rights reserved.

Pretending IT Department: Mailbox full 

From: web@noreply.com Time: 2014-09-14 20:52:52
To: XXXXX1@wcccd.edu
Subject: Email Quota Limit

You have exceeded the storage limit on your mailbox.You will not be able to send or receive new mail until you upgrade your email.

Click the below link and fill the form to upgrade your account.

Webmail Account Administrator

Impersonating Bank

From: test@codiatech.com Time: 2014-09-15 14:27:17
To: ******@wcccd.edu
Subject: YOUR FIDELITY ONLINE BANKING ACCOUNT HAS BEEN BLOCK

Dear Customer.

Please will kindly inform you that your online banking service has been suspended due to the urgent report will receive from the fraud agency that your account has been recently used to carry out illegal online transaction.

Inorder for us to reactivated your account, You will need to Identify your Identity by Clicking on the Link Below,

http://ghan.5gbfree.com/Log/hre/hgfr/fidelity/index.php

Note: Failure to keep to this above instruction and fill all the requested Information within 3days, Your account will be close and Terminated.

THANK YOU
FIDELITY BANK

There are many more phishing scam emails that appear to come from a known source such as Facebook, LinkedIn, PayPal, EBay and other messages with links to seemingly innocent e-card, an instant message promising a movie star photo, a pop-up window offering a free game or an attachment.

But any of these temptations could hide malware, which may damage your computer, destroy your information, or enlist your PC in an Internet criminal’s spam-sending army of computers. Or open a back door to your PC, making it easier to attack later.

How to Deal with Phishing Scams?

https://encrypted-tbn1.gstatic.com/images?q=tbn:ANd9GcSYs9oqB92dwxrP_38KekLHrZwfQXbP_587orzgYlH18Rf1PbeDhQ

Even if the email appears to be coming from a familiar source or your friends, think before you click. Attackers can spoof or compromise email accounts of your friends, and send you a scam email.

DO NOT reply or forward these phishing attempts to anyone.
DO NOT click on any links that may be in the message content.
DO NOT provide your user ID and/or password to anyone via email or phone.
DO NOT click on pop-up windows
DO NOT click on cancel, OK, or accept to get rid of a pop-up ad or an unexpected warning – even an offer to remove spyware. Instead, click the Close box (X) or press ALT + F4 on your keyboard.

DO delete phishing scam messages and notify the helpdesk by calling ext. 2666

Protect your PC, Protect your Private Data

  • Turn on your firewall

You wouldn’t leave your house unlocked, so why take that chance with your computer? A firewall puts a protective barrier between your PC and the Internet.

• It’s a kind of security checkpoint that information must pass through before it’s allowed to enter your computer.

• And a firewall also helps make your computer “invisible” to online attackers, viruses and worms.

  • Keep your Operating System up-to-date

Because your operating system, such as Microsoft Windows, is the computer’s brain, check and make sure it’s up to date. And don’t stop there.

• Take advantage of the ability to update PC’s automatically.

  • Keep other software up-to-date

• Hackers work very hard to exploit weaknesses in other software programs you may have installed such Adobe acrobat reader, Microsoft Office products, and other proprietary software. That’s why software companies release security updates and you should make sure they are all updated.

  • Install Antivirus software

Computer viruses, worms and Trojan horses are programs designed to damage your computer, corrupt data, or control your PC.

• Antivirus programs scan everything that goes into your computer – email,  attachments – for thousands of known viruses and try to clean up any they find.

• The anti-virus software must be updated on a daily basis to protect your PC properly from new threats that are developed.  Make sure to follow the anti-virus maker’s configuration steps to downloads the latest updates.

  • Install Antimalware software

• Antimalware programs monitor your computer, looking for known spyware and watching for programs that are trying to install themselves. When they find something, they warn you and help you remove the spyware.

• Keep your antimalware current.

  • Backup your Data

• Backing up your data will save you a lot of headaches.   A regular backup schedule will mitigate any damage done by a virus, and will allow you to get up and running much quicker.

How to Detect Malware Infection

Monitor your computer for unusual behavior. Your computer may be infected with malware if you encounter some of the following:

  • Unexpected pop-up windows. For instance a fake virus alert telling you that you have security threats on your computer
  • Slows down or crashes
  • Won't shut down or restart
  • Other people receive email you did not send
  • Random connections to unknown websites
  • You see toolbars you did not install

What to do if infected

If you experience some of the above unusual behavior with your work computer, please call the service desk/Helpdesk. If the computer is your PC at home, take the following steps:

  • Stop any online activities that require personal information such as banking, filling out forms or surveys, shopping etc.
  • Update your security software, and then run it to scan your computer for viruses and spyware
  • Save your files to an external drive. The best way to clean an infected computer is to format the hard drive wiping everything, and installing a new Operating System.
 
Copyright ©2008-2024 Wayne County Community College District | 801 W. Fort Street, Detroit, MI 48226 |  CONTACT US