Clemson University faculty, staff and students using Microsoft Outlook for email can now use the generic Report button to report phishing or junk emails. Reporting an email through this method will still send your email to the Clemson Security Operations Center (CSOC) for review and investigation. The Security Shield Report button has been removed from Outlook to help streamline this process.
But if you need to provide additional information beyond just reporting an email, use the Report Phishing Service through the TigerHub system.
Please contact the CCIT Support Center if you have any questions.
Cybercriminals are leveraging the high interest in artificial intelligence (AI) tools as part of new targeted campaigns. These often appear as “free” AI tools or in false advertisements that link to sites impersonating an official AI site.
If downloaded, the fake AI tool will include a ransomware executable, which will encrypt files and demand payment to unlock the user’s content.
Here are some tips to help avoid falling for this scam:
Only download from official websites. Always examine the URL carefully.
Be suspicious of “free” tools or offers that seem too good to be true.
Research a company or product first before downloading anything.
Scan files with security tools before opening them.
If you need assistance with downloading AI tools, please contact your Clemson University IT Consultant.
Proofpoint has recently discovered a new attack vector that cybercriminals are using to compromise users’ computers. In this scheme, users are prompted with a notification pop-up on a webpage, in a Word document or when opening a PDF file, saying that there is a problem. And the notification will include a button saying something like “How to Fix” or “Auto-Fix”.
The fake instructions for how to “fix” the problem will typically ask the user to copy and paste some code into Windows PowerShell or the Run dialog box. Because this code is only being copied and pasted, most antivirus software will not have an opportunity to inspect and catch the malicious code. Once this code is run by the victim on their computer, it triggers the download of additional malware and other nefarious activities.
Clemson University users should exercise caution if presented with this error, and it is recommended to reach out to the area’s IT Consultant for assistance.
As Microsoft discontinues support for Windows 10 later this year, all University-owned devices running Windows operating systems are forced to upgrade to Windows 11. To ensure you continue to receive important security updates, performance enhancements, and ongoing support, CCIT engineers will be upgrading all University-owned devices currently running Windows 10 to Windows 11.
What This Means for You:
Automatic Upgrade: CCIT will handle the upgrade process for you, minimizing any disruption.
Improved Security & Performance: Windows 11 is designed with modern security features and performance improvements to keep your systems running smoothly.
New Features: Enjoy a refreshed interface, productivity enhancements, and better support for hybrid work environments.
Upgrade Timeline:
A phased approach to upgrades begins on May 15, 2025 and will continue on a weekly basis through August 28. Impacted users will receive an email from CCIT with their scheduled upgrade window.
If you have any questions or would like to discuss your upgrade timeline, feel free to reach out to your local IT Consultant, or email ithelp@clemson.edu.
Resources to Help You Prepare: Here are some helpful resources about Windows 11 and the transition:
A new vulnerability in Apple’s AirPlay has been uncovered by Oligo Security Research that could potentially allow bad actors to compromise devices such as your Mac laptop, AirPlay speakers and receivers, or even the CarPlay system in your automobile.
Because of this vulnerability, users could experience a denial of service, loss of sensitive information, or possibly distractions while driving in the form of unwanted sounds or images being displayed on your automobile console.
To help protect yourself against this vulnerability:
Update any device that supports AirPlay to the latest version of the software available.
Verify on your AirPlay device that the setting “Allow AirPlay for” is set to just “Current User.”
Disable the AirPlay receiver on any device where it is not needed.
Clemson users are seeing an influx of QR Scam emails. In these emails, like the one below targeting employees referencing a Compensation Guide, the recipient is given a QR code to scan with their phone.
But if a user follows the link from the QR code, they are presented with a fake login page which will steal the user’s login and password account information. The cybercriminals are hoping that you will be less protected and have limited information by moving you to your phone.
Some of these fake QR code emails claim to be from Microsoft, while others are targeting students with fake job opportunities.
You should always check the sender’s email address before following any link or QR code. Any official email from Clemson will have a clemson.edu address.
If you receive a suspicious email with a QR Code, use the Report Phishing button in Outlook to have the Clemson Security Operations Center review and investigate the email for you.
Graduation is an exciting time for every Tiger, but it unfortunately does mean a change to some of the software and services you’ve grown accustomed to during your time at Clemson. Luckily, with a few minutes of review, you can prepare your technology and data for graduation.
Frequently Asked Questions
Do I keep my Clemson Google account?
Graduates will have access to their Clemson Google account for one year following graduation. Please note that forwarding of your @clemson.edu email address will cease soon after your username is deactivated. We suggest updating your contacts or accounts to use a different email address so you don’t lose anything when your account is closed.
We recommend you move your Google Drive files to another cloud storage service or personal Google Drive account in preparation for the closure of your Clemson Google account after one year. You can use Google Takeout (takeout.google.com) to export your Google account data if you wish to store it elsewhere, or you can use the transfer service (takeout.google.com/transfer) if you plan to move it to another Google account.
What about the files in my other cloud storage accounts?
Your access to Box and OneDrive will end one year after graduation. We recommend that you download your files from those accounts as soon as possible, so you don’t forget about them.
Any files you create and manage in CUapps (Citrix) are stored on your U: drive (also called Home Directory). You will have access to your U: drive for one year after graduation, so be sure to download those files before you lose them. The CCIT Knowledge Base contains instructions to access your U: drive for macOS and Windows.
If you use the Palmetto Cluster or any of Clemson’s research computing storage, we recommend you download your data from there as well. For research computing assistance, contact Research Computing and Data.
What software do I keep?
Once you graduate, you will no longer qualify to reinstall Clemson’s site-licensed software. Access to the Adobe Creative Cloud will be disabled upon graduation as well. Make sure to save copies of your Adobe files, projects and assets, or use these instructions from Adobe on how to transfer your assets to a new Adobe profile.
Save a copy of your unofficial transcript after final grades are submitted. After your Username is deactivated, you will no longer be able to access your unofficial transcript—we suggest you save a copy sooner rather than later. After your Username is deactivated, you will have to request an official copy for a fee, as directed by the Registrar’s transcripts page.
Save a copy of your tax records. After your Username is deactivated, you will no longer be able to access iRoar for your billing information. If your account is deactivated and you need to get these records, contact CCIT at (864) 656-3494.
If you have any questions or need assistance, please contact CCIT Support by calling/texting (864) 656-3494, emailing ITHELP@clemson.edu or starting a chat by clicking the orange chat box on this page.
Spring cleaning isn’t just for your home—your computer needs a refresh too! Clearing out old files, updating software and decluttering your desktop can improve performance, enhance security and free up valuable space. Follow the tips below to clean up your digital devices and start the season more organized!
Declutter your desktop, sort files into folders and rename files logically so you can quickly locate what you need.
Free up space on your computer
A cluttered hard drive can slow down your system. Delete unwanted files, empty your recycle bin, clear your browser cache and delete temporary downloads to free up storage space on your computer.
Update software
Keeping your programs up-to-date ensures your computer stays secure and runs smoothly. Software updates often include important security patches that protect your system from vulnerabilities. Make sure your operating system and applications are set to update automatically or check for updates regularly.
Remove unused software
Unused programs take up storage and can slow down your device. Uninstall any applications you no longer use, freeing up space and improving your computer’s performance.
Taking the time to clean up and organize your digital space can boost efficiency, protect your data and extend the life of your device. Start your spring cleaning today and enjoy a faster, more secure computer! Contact the CCIT Support Center if you need assistance with any of these spring cleaning tech tips.
Welcome to CCIT This Week, where we give you a rundown of news, tips, upcoming maintenance and more. This page will be updated throughout the week. Follow us on Instagram, Facebook and X (formerly Twitter) for information and timely updates. Check outage and maintenance information on the CCIT Status Page.
News
The CCIT Support Center offers real-world experiences and skills for students! Clemson University students, faculty and staff rely on technology every day, and the Clemson Computing and Information Technology (CCIT) Support Center is often their first stop when issues arise. Students working in the Support Center develop professional skills while still studying full-time, which differentiates them from others when they prepare for the job market after graduation.
The Clemson VPN login process has been changed. On Friday, February 14, CCIT upgraded the virtual private network (VPN), changing the login process. When connecting to the VPN, rather than seeing a pop-up that requires you to enter your Clemson credentials plus the word “push,” you will now be directed to the standard Clemson login page and Duo prompt.
The next Research Computing and Data live workshop is a two-part series on advanced deep learning in Pytorch! Join the RCD team on March 25 and 27 at 2 p.m. for these live sessions on advanced PyTorch development topics including model fine-tuning, using multiple GPUs during training, experiment tracking, and more. Registration is required; open to all Palmetto users. Participants must have basic familiarity with Python programming and a good grasp of Pytorch fundamentals.
The popular GIS Fundamentals Workshop Series continues! These workshops have been streamlined to cover six critical topics that guarantee coverage of all the GIS fundamentals. The next workshop topic will be “Intermediate Spatial Analysis” on Friday, March 14. These hybrid workshops are free and open to all Clemson students, faculty, and staff; no previous experience is necessary! Sessions will be delivered both online and in person every other Friday from 1:30 to 4:30 p.m. Note: Attendance at the first two workshops is mandatory to participate in the remaining sessions.
Get ready to get creative at Makerday XVIII! Makerday is Clemson’s largest show-and-tell event, promoting creativity, innovation, and design. It allows students, clubs and faculty to show off the things they’ve made this semester, as well as interact with stations to make buttons, stickers, t-shirts and more. Drop-in to Makerday on Tuesday, April 15 between 3 to 6 p.m. in the Watt Family Innovation Center atrium.
Follow these tech tips to help you stay safe during Spring Break! Spring Break is right around the corner and itineraries may be well underway. Now more than ever, staying safe on trips extends far beyond applying enough sunscreen, staying hydrated and moving in groups. In fact, technology can play a key role in keeping you safe, especially when so many of our plans involve our smartphones and different applications.
Spring Break is right around the corner and itineraries may be well underway. Now more than ever, staying safe on trips extends far beyond applying enough sunscreen, staying hydrated and moving in groups. In fact, technology can play a key role in keeping you safe, especially when so many of our plans involve our smartphones and different applications.
Here are some quick reminders to ensure you can stay tech safe this Spring Break too:
Use Clemson VPN when connecting to “unsecured” wifi networks. This will keep others from potentially accessing what you are browsing, especially with transactions.
Seek out eduroam networks if traveling near another campus community. These are more secure and you will automatically connect to them if you use those devices on Clemson’s eduroam. There are over 33,000 eduroam connections worldwide!
Do not plug your cellphone charger directly into a USB port at the airport or on transportation. Always use a charger block and an outlet.
Passwords protect all of your devices. Do not use passwords that are easily breakable either. 1234 is a good way to have your information 123-gone. While sharing is caring in most scenarios, keep those passwords to yourself.
Disable Bluetooth when not in use. It may be tempting to keep it on all the time, but this is one way to prevent unwanted device pairings/connections.
Do not fall for phishing scams or too-good-to-be-true deals for rentals of any kind. Ensure you are using a secure, legitimate service website. Cybercriminals know that Spring Break happens in March, too.
Avoid sharing your exact location on social media. Be mindful that people may be able to locate you and while it may be tempting to share exactly where you are and the cool stuff you are doing on your trip, consider how it impacts your safety and the safety of others around you.
We wish all of our Tigers a happy, healthy, and safe Spring Break. Take care of yourselves and know that we are here to support you if needed. To see the adjusted Spring Break CCIT Support Center hours, visit this page.