For a better experience, click the Compatibility Mode icon above to turn off Compatibility Mode, which is only for viewing older websites.

Technology Update
October 15, 2013

Table of Contents

October is National Cyber Security Awareness Month

October 1, 2013 marked the 10th anniversary of National Cyber Security Awareness Month, which provides the opportunity to educate the public on safe, secure, and resilient cyber environments. Now more than ever, our lives are connected to the Web: we manage our bank accounts, connect with friends and family, shop, play, and more via our smartphones, computers, and tablets.

The Department of Homeland Security, as well as the National Cyber Security Alliance and the Multi-State Information Sharing and Analysis Center, sponsor National Cyber Security Awareness Month. Check out each of these three pages to learn more.

As a target of malicious cyber-attack, a university's most powerful defense is the education of its faculty, staff, and students. Drexel is no exception: we encourage every member of our campus community to pay attention to security in cyberspace to prevent the theft and misuse of personal information.

Here are some general tips for protecting your online information, as well as learning more about cyber security:

  • NEVER respond to spam or give anyone your login credentials for any account, no matter who asks for it.
  • If you receive an email recommending that you change any of your passwords, always verify these emails by checking another source. For example, messages about accounts or outages at Drexel will also be announced on the IRT home page.
  • Use extreme caution when sharing personal information on social networking sites such as Facebook, Twitter, and LinkedIn. Data miners can use information such as birth dates, email addresses, personal histories (e.g. your birthplace), and more to bypass security questions and gain access to online accounts.
  • DO NOT blindly click on hyperlinks you receive in emails, even if they were sent by someone you know and trust.
    • USE EXTREME CAUTION in these circumstances. Your friend's email could have been spoofed.
    • If the link does not look legitimate, it probably isn't. Hover over a link to see if the link and text match. If not, the link is very likely a scam.
  • Just like your computer, your mobile device can be compromised. Use the same precautions on your mobile device as you would on your computer:
    • Lock your device with a strong password.
    • Ensure that your mobile device requests your permission for each app you download.
    • Only give your phone number to people you trust.
    • Before entering login information or credit card numbers, ensure that you are using a secure site (most sites have a "lock" icon in the top left corner, or contain "https://" in the URL).
  • Learn more about staying safe online at, powered by the National Cyber Security Alliance.
  • Read this news article on Inside Higher Ed’s Web site to learn more about this month's awareness campaign and college/university involvement.
  • Keep up-to-date with new threats to cyber security by following the FBI's Cyber Crime unit.

See "9 Tips to Prevent Computer Viruses and Information Theft" below for more general tips to prevent computer infection and information theft.

9 Tips to Prevent Computer Viruses and Information Theft

Users must remain vigilant and follow basic safety precautions to keep their computers free from infection. Here are some tips you can follow to avoid falling victim to viruses or phishing scams:

  1. NEVER open an attachment to an email (or click on a hyperlink in an email) that appears to be spam or that is sent from an unknown source.
  2. NEVER give out your passwords to anyone, including friends, relatives, or even members of the IRT staff. Legitimate organizations will never ask for your login credentials via any means.
  3. NEVER blindly click hyperlinks. Always check a URL by hovering over the link to see if it matches the one displayed.
  4. Keep your anti-virus software and virus definitions up-to-date by installing Sophos Endpoint Protection, which is available for personal PCs and Macs at (enter your Drexel username and password at the prompt).
  5. Scan your computer at least once a week for viruses. Many programs offer a "quick" scan along with a full scan option. Regularly select the full scan.
  6. If a Web site doesn’t appear trustworthy or is poorly maintained, navigate away from it; do not click on any links or download any content from it.
  7. Don’t download files from peer-to-peer (P2P) programs. They are rife with viruses and malware (and often illegal).
  8. Be mindful of where you choose to make your email address available online. Spammers regularly search the Web for addresses to spam.
  9. Delete spam immediately. If it sounds too good to be true, it probably is. Don’t respond to it, and never, ever give out personal information, no matter who is sending the request.

Check Out the IRT Scam Gallery!

If you haven't visited it before, or haven't visited it for some time, consider checking out the IRT Scam Gallery. There, you can see examples of scam emails and learn what to watch out for in future phishing attempts. These phishing emails are "sanitized" and posted in the gallery on a semi-regular basis, so be sure to check back often.

If you receive any email you think might be a scam, don't hesitate to contact the IRT Help Desk at You can also forward examples of scam emails to for possible inclusion in the Scam Gallery.

PTC Creo and Windows 8 Compatibility

If you need to use PTC Creo (product design software), and currently have Windows 8, you might run into some compatibility issues with older versions of Creo. However, Creo 2.0 does support Windows 8. See PTC’s forum thread for more information regarding compatibility and support.

Attention Fund Managers: Review Phone Charges!

Fund managers should take this time to review their department's phone charges in Web*Telephone. Ensure that names, extensions, and charges are correct. For any necessary changes, send an email to

If you do not have but require access to Web*Telephone, send an email to with the fund/org that you manage.

Allowing Insecure Content in Firefox 23/24 and Chrome

If you are trying to access a Wimba tool (Voice Board, Voice Presentation, etc.) and see the message "Applet should be there, but the Wimba Voice server is down," your browser is most likely blocking insecure content on the page. See AskDrexel for instructions.

Tip: Quiz Settings that Make a Difference

Quick, open-book quizzes in Blackboard can motivate students to revisit course materials before class. If instructors pay attention to a few settings and best practices, they can improve the quiz experience for everyone. For suggestions, see AskDrexel.

Sign Up for OLT Workshops

The Instructional Technolgy Group conducts training sessions on Learn, Camtasia, DragonDrop, Web Basics, Mac OS X, Respondus, SharePoint, and more. In addition, several brown bag lunches and workshops on technology products of interest are held each month. These training sessions are open to members of Drexel’s community as well as the general public.

To reserve a spot at any of these workshops, email us at with your name, institution (if other than Drexel), contact information, and the name of the workshop(s) you would like to attend.

Below is a sampling of workshops taking place in November:

Learn Full Day Workshop

Thursday, November 14, 9:00 a.m. – 4:00 p.m.

Recording and Editing: Camtasia for Windows

Tuesday, November 5, 10:00 a.m. – 12:30 p.m.

HTML Basics

Wednesday, November 6, 2:00 p.m. – 4:00 p.m.

Visit our Web site for our complete training schedule and workshop descriptions. If you need a separate workshop for your department or faculty group on a specific topic, you can email the Instructional Technolgy Group to coordinate a session.

Unless otherwise noted, all training sessions will be held in room 116 of the Korman Center (off the Quad on Drexel's University City Campus, 33rd Street between Market and Chestnut Streets).