orange iconOperational Response Level: Restricted ›
Information Technology Solutions

Information Technology Solutions

News

IT Solutions NDC Network Maintenance July 30th

July 26, 2021

IT Solutions is planning a network maintenance window at the Notre Dame campus to support ongoing network services, upgrades, and enhancements.

–Scheduled Maintenance Window–
Start: July 30th @ 1700hrs
Complete: July 30th @ 1900hrs

–User Experience–
There will be no or intermittent access to various college systems when onsite at the Notre Dame Campus. Affected services will include, but are not limited to, Colleague, email, file shares, Office 365, Virtual Desktop(s), VoIP phones, wired internet, wireless internet.

Offsite access to Colleague, email, file shares and Office 365 will not be impacted.

Plans for this maintenance window are subject to change. This notice will be updated at https://www.rrc.ca/its/news/.

If you have any questions or concerns regarding this maintenance window please submit an ITS Service Desk ticket here.

 

Emergency Security Policy Update

May 14, 2021

In order to quickly address an important security issue, IT solutions made a change to our Multi Factor Authentication (MFA) configuration on May 12th.

If you are experiencing issues receiving RRC emails on your iPhone or iPad please try deleting and re-installing your account. If you require assistance with this please contact the Service Desk

If you are using an Android device and experiencing issues you will need to install the Outlook for Android application. The instructions can be found here.

If you are having issues connecting to email on your computer, or require further assistance with your smartphone, please contact the Service Desk.

Thank you.

 

COVID-19 (Coronavirus) Phishing Emails and Text Messages

March 19, 2020

A number of new phishing and online scams have surfaced seeking to take advantage of the public’s concern surrounding COVID-19. Scammers often seek to benefit from health scares and this pandemic has spawned dozens of such campaigns, scaring recipients into clicking on harmful links or attachments in emails, text messages and social media posts.

 

Examples of COVID-19 Scams

  • Fabricated notices from health organizations (e.g., Government Agencies, CDC, WHO or local health departments).
  • Information about protecting yourself, your family or your community that contains malicious links or attachments.
  • Charitable appeals, claiming to help victims of the virus, which are not legitimate.
  • Misleading ads or spam about masks or other protective gear, or other helpful hints to combat the virus.
  • Notices from financial institutions indicating online credential updates are required due to branch closures.

Tips to avoid getting tricked

  • Always verify the sender by checking their email address.
  • Beware of online requests for personal information. A coronavirus-themed email that seeks personal information like your Social Insurance Number or login information is a phishing scam. Legitimate government agencies will not ask for that information. Never respond to any email requesting your personal data.
  • Check the link. You can inspect a link by hovering your mouse over the URL to see where it leads. Sometimes, it’s obvious the web address is not legitimate. However, keep in mind phishers can create links that closely resemble legitimate addresses. Delete the email.
  • Watch for spelling and grammatical mistakes. Read the email slowly. If you see spelling, punctuation, and grammatical errors, it’s likely a sign you’ve received a phishing email, delete it.
  • Look for generic greetings. Phishing emails are unlikely to use your name. Greetings like “Dear sir or madam” signal an email is not legitimate.
  • Avoid emails that insist you act now. Phishing emails often try to create a sense of urgency or demand immediate action. The goal is to get you to click on a link and provide personal information — right now. Instead, delete the email.

 

Be vigilant for Coronavirus-COVID-19 phishing emails and text messages during the coming weeks. If you suspect a message may be a phishing scam, please report it by forwarding the email message as an attachment to phishbowl@rrc.ca

Have a cyber security related question?
Send it to CyberAware@rrc.ca

Using Microsoft Teams while working from home

March 17, 2020

Microsoft Teams is available to all College staff who have an active @rrc.ca email account. You can access Microsoft Teams through HUB (in the Launchpad widget, under Applications, click Office 365). You will see Teams listed with your other Office 365 apps. You also can install the Teams app on your computer or mobile device by visiting the Microsoft Teams – Downloads website.

Teams is the chat-based workspace in Office 365 that makes it easy to have conversations, host meetings, share files and collaborate on documents, and get work done with teams across the College. You can tailor your workspace to include the content and capabilities your team needs every day.

Some features of Teams include the following:

  • Use Teams on web browsers, desktop apps, and mobile devices. This ensures that you can stay in touch no matter where you are, which is a big plus if you are working from home.
  • Organize conversations using channels. You can set up channels by topic, discipline, or project and share them with everyone on the team.
  • Start a voice or video call right from within the channel or private chat.
  • Chat the way you work: one-on-one with members of your team, or create group chats with College staff.

Creating a one-on-one or group chat is easy—just follow the instructions provided on the Microsoft Teams Basic User FAQ webpage.

To get a Team created—simply complete the Microsoft Teams Request – Maestro process (Team requests require approval from a supervisor before ITS staff creates the team on your behalf).

For Teams training, tips, and tricks, please see the Microsoft and LinkedIn Learning links on the Microsoft Teams Basic User FAQ webpage.

For more information, or to get started using Teams, please see the following webpages: