[{"id":440,"date":"2026-05-07T22:01:24","date_gmt":"2026-05-07T22:01:24","guid":{"rendered":"https:\/\/blogs.clemson.edu\/ccit\/?p=440"},"modified":"2026-05-07T22:01:24","modified_gmt":"2026-05-07T22:01:24","slug":"update-on-cybersecurity-incident-involving-canvas-vendor-instructure","status":"publish","type":"post","link":"https:\/\/blogs.clemson.edu\/ccit\/2026\/05\/07\/update-on-cybersecurity-incident-involving-canvas-vendor-instructure\/","title":{"rendered":"Update on cybersecurity incident involving Canvas vendor Instructure"},"content":{"rendered":"\n<p>CCIT is\u00a0monitoring\u00a0a cybersecurity incident involving Instructure, the company that provides Canvas, as part of a broader event affecting multiple institutions.\u00a0Updates from Instructure are available on the\u00a0company&#8217;s\u00a0<a href=\"https:\/\/status.instructure.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">status page<\/a>.<\/p>\n\n\n\n<p>Canvas administrators are reviewing the Clemson\u00a0instance\u00a0and Canvas is universally unavailable for all institutions. CCIT will share updates as more information becomes available.<\/p>\n\n\n\n<p>If you are contacted by cybercriminals, do not engage and\u00a0delete\u00a0the message.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CCIT is\u00a0monitoring\u00a0a cybersecurity incident involving Instructure, the company that provides Canvas, as part of a broader event affecting multiple institutions.\u00a0Updates from Instructure are available on the\u00a0company&#8217;s\u00a0status page. Canvas administrators are reviewing the Clemson\u00a0instance\u00a0and Canvas is universally unavailable for all institutions. CCIT will share updates as more information becomes available. If you are contacted by cybercriminals, [&hellip;]<\/p>\n","protected":false},"author":4202,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[127936,128194],"tags":[],"coauthors":[128195],"class_list":["post-440","post","type-post","status-publish","format-standard","hentry","category-cybersecurity-alerts","category-miscellaneous"],"fimg_url":false,"_links":{"self":[{"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/posts\/440","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/users\/4202"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/comments?post=440"}],"version-history":[{"count":0,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/posts\/440\/revisions"}],"wp:attachment":[{"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/media?parent=440"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/categories?post=440"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/tags?post=440"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/coauthors?post=440"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}},{"id":439,"date":"2026-05-04T13:47:26","date_gmt":"2026-05-04T13:47:26","guid":{"rendered":"https:\/\/blogs.clemson.edu\/ccit\/?p=439"},"modified":"2026-05-07T22:01:44","modified_gmt":"2026-05-07T22:01:44","slug":"canvas-vendor-instructure-reports-cybersecurity-incident","status":"publish","type":"post","link":"https:\/\/blogs.clemson.edu\/ccit\/2026\/05\/04\/canvas-vendor-instructure-reports-cybersecurity-incident\/","title":{"rendered":"Canvas vendor Instructure reports cybersecurity incident"},"content":{"rendered":"\n<p>CCIT is aware of a cybersecurity incident involving Instructure, the company that provides Canvas, as part of a broader event affecting multiple institutions.&nbsp;<\/p>\n\n\n\n<p>CCIT is actively&nbsp;monitoring&nbsp;the situation, and Canvas administrators are reviewing the Clemson instance for any usability or service impacts.&nbsp;Updates from Instructure are available on the&nbsp;company\u2019s&nbsp;<a href=\"https:\/\/status.instructure.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">status page<\/a>.&nbsp;CCIT&nbsp;will share updates as more information becomes available.&nbsp;<\/p>\n\n\n\n<p>According to Instructure, the information involved may include names, email addresses,&nbsp;Clemson student ID (CUID)&nbsp;numbers&nbsp;and messages among users. At this time,&nbsp;Instructure&nbsp;says it has found no evidence that passwords, dates of birth, government identifiers or financial information were involved. If that changes, Instructure says it will notify impacted institutions.&nbsp;<\/p>\n\n\n\n<p>Even when passwords are not part of an incident, criminals can use details such as a Clemson email address and&nbsp;CUID number to make phishing emails, impersonation&nbsp;attempts&nbsp;and other social engineering attempts look more convincing. Students,&nbsp;faculty&nbsp;and staff should stay alert for unexpected emails, texts or calls&nbsp;that&nbsp;request login credentials, ask for personal&nbsp;information&nbsp;or urge immediate action.&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CCIT is aware of a cybersecurity incident involving Instructure, the company that provides Canvas, as part of a broader event affecting multiple institutions.&nbsp; CCIT is actively&nbsp;monitoring&nbsp;the situation, and Canvas administrators are reviewing the Clemson instance for any usability or service impacts.&nbsp;Updates from Instructure are available on the&nbsp;company\u2019s&nbsp;status page.&nbsp;CCIT&nbsp;will share updates as more information becomes available.&nbsp; [&hellip;]<\/p>\n","protected":false},"author":4202,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[127936,128194],"tags":[],"coauthors":[128195],"class_list":["post-439","post","type-post","status-publish","format-standard","hentry","category-cybersecurity-alerts","category-miscellaneous"],"fimg_url":false,"_links":{"self":[{"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/posts\/439","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/users\/4202"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/comments?post=439"}],"version-history":[{"count":0,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/posts\/439\/revisions"}],"wp:attachment":[{"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/media?parent=439"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/categories?post=439"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/tags?post=439"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/coauthors?post=439"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}},{"id":437,"date":"2026-04-23T20:46:32","date_gmt":"2026-04-23T20:46:32","guid":{"rendered":"https:\/\/blogs.clemson.edu\/ccit\/?p=437"},"modified":"2026-04-23T20:46:32","modified_gmt":"2026-04-23T20:46:32","slug":"microsoft-removed-copilot-from-select-microsoft-365-apps","status":"publish","type":"post","link":"https:\/\/blogs.clemson.edu\/ccit\/2026\/04\/23\/microsoft-removed-copilot-from-select-microsoft-365-apps\/","title":{"rendered":"Microsoft\u00a0removed\u00a0Copilot from select Microsoft 365 apps"},"content":{"rendered":"\n<p>Microsoft&nbsp;has&nbsp;removed in-app Copilot access from Word, Excel,&nbsp;PowerPoint&nbsp;and OneNote&nbsp;for&nbsp;institutional licenses, which includes&nbsp;Clemson.&nbsp;<\/p>\n\n\n\n<p>Copilot&nbsp;is still&nbsp;available&nbsp;for&nbsp;University&nbsp;users&nbsp;through the&nbsp;<a href=\"https:\/\/copilot.microsoft.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Copilot AI companion webpage<\/a>,&nbsp;the&nbsp;Copilot app&nbsp;and Microsoft&nbsp;Outlook and Teams.&nbsp;<\/p>\n\n\n\n<p>Clemson users with a paid Microsoft 365 Copilot license will keep full in-app Copilot access.&nbsp;The&nbsp;option&nbsp;to&nbsp;purchase&nbsp;a Copilot license will be added to the Clemson University Marketplace by May 2026.&nbsp;<\/p>\n\n\n\n<p>If you have questions, reach out to&nbsp;<a href=\"https:\/\/www.clemson.edu\/ccit\/it-help\/tech-support-program.html\" target=\"_blank\" rel=\"noreferrer noopener\">your area\u2019s IT Consultant<\/a>&nbsp;or&nbsp;<a href=\"https:\/\/www.clemson.edu\/ccit\/it-help\/\" target=\"_blank\" rel=\"noreferrer noopener\">contact CCIT<\/a>.&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft&nbsp;has&nbsp;removed in-app Copilot access from Word, Excel,&nbsp;PowerPoint&nbsp;and OneNote&nbsp;for&nbsp;institutional licenses, which includes&nbsp;Clemson.&nbsp; Copilot&nbsp;is still&nbsp;available&nbsp;for&nbsp;University&nbsp;users&nbsp;through the&nbsp;Copilot AI companion webpage,&nbsp;the&nbsp;Copilot app&nbsp;and Microsoft&nbsp;Outlook and Teams.&nbsp; Clemson users with a paid Microsoft 365 Copilot license will keep full in-app Copilot access.&nbsp;The&nbsp;option&nbsp;to&nbsp;purchase&nbsp;a Copilot license will be added to the Clemson University Marketplace by May 2026.&nbsp; If you have questions, reach out [&hellip;]<\/p>\n","protected":false},"author":4202,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[127935],"tags":[],"coauthors":[128195],"class_list":["post-437","post","type-post","status-publish","format-standard","hentry","category-notices"],"fimg_url":false,"_links":{"self":[{"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/posts\/437","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/users\/4202"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/comments?post=437"}],"version-history":[{"count":0,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/posts\/437\/revisions"}],"wp:attachment":[{"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/media?parent=437"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/categories?post=437"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/tags?post=437"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/coauthors?post=437"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}},{"id":435,"date":"2026-04-01T20:04:27","date_gmt":"2026-04-01T20:04:27","guid":{"rendered":"https:\/\/blogs.clemson.edu\/ccit\/?p=435"},"modified":"2026-04-01T20:09:33","modified_gmt":"2026-04-01T20:09:33","slug":"microsoft-365-apps-now-require-2fa-when-logging-in","status":"publish","type":"post","link":"https:\/\/blogs.clemson.edu\/ccit\/2026\/04\/01\/microsoft-365-apps-now-require-2fa-when-logging-in\/","title":{"rendered":"Microsoft\u00a0365\u00a0apps now\u00a0require\u00a02FA when logging in"},"content":{"rendered":"\n<p>CCIT&nbsp;is&nbsp;expanding&nbsp;two-factor authentication&nbsp;(2FA)&nbsp;to&nbsp;Microsoft 365&nbsp;applications.&nbsp;As of Thursday, April 2, 2026, apps like&nbsp;Microsoft&nbsp;Outlook, Word and Excel may now prompt&nbsp;users&nbsp;to authenticate&nbsp;with two-factor authentication (2FA)&nbsp;after logging in with&nbsp;a&nbsp;Clemson username and password.&nbsp;This change is part of an ongoing effort to better protect Clemson accounts,&nbsp;personal&nbsp;information&nbsp;and systems from unauthorized access.&nbsp;<\/p>\n\n\n\n<p>Two-factor authentication\u00a0methods like Duo Mobile are\u00a0already widely used across many Clemson services, so most users\u00a0should be\u00a0familiar\u00a0with this process. Expanding 2FA to more applications helps provide consistent, reliable protection across\u00a0University\u00a0systems.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CCIT&nbsp;is&nbsp;expanding&nbsp;two-factor authentication&nbsp;(2FA)&nbsp;to&nbsp;Microsoft 365&nbsp;applications.&nbsp;As of Thursday, April 2, 2026, apps like&nbsp;Microsoft&nbsp;Outlook, Word and Excel may now prompt&nbsp;users&nbsp;to authenticate&nbsp;with two-factor authentication (2FA)&nbsp;after logging in with&nbsp;a&nbsp;Clemson username and password.&nbsp;This change is part of an ongoing effort to better protect Clemson accounts,&nbsp;personal&nbsp;information&nbsp;and systems from unauthorized access.&nbsp; Two-factor authentication\u00a0methods like Duo Mobile are\u00a0already widely used across many Clemson services, so [&hellip;]<\/p>\n","protected":false},"author":4202,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[128194],"tags":[],"coauthors":[128195],"class_list":["post-435","post","type-post","status-publish","format-standard","hentry","category-miscellaneous"],"fimg_url":false,"_links":{"self":[{"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/posts\/435","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/users\/4202"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/comments?post=435"}],"version-history":[{"count":0,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/posts\/435\/revisions"}],"wp:attachment":[{"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/media?parent=435"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/categories?post=435"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/tags?post=435"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/coauthors?post=435"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}},{"id":430,"date":"2026-03-23T13:31:23","date_gmt":"2026-03-23T13:31:23","guid":{"rendered":"https:\/\/blogs.clemson.edu\/ccit\/?p=430"},"modified":"2026-03-26T17:07:48","modified_gmt":"2026-03-26T17:07:48","slug":"new-email-digest-helps-review-messages-sent-to-junk","status":"publish","type":"post","link":"https:\/\/blogs.clemson.edu\/ccit\/2026\/03\/23\/new-email-digest-helps-review-messages-sent-to-junk\/","title":{"rendered":"New\u00a0email\u00a0digest helps review\u00a0messages\u00a0sent to\u00a0Junk"},"content":{"rendered":"\n<p>Beginning Friday, April 3, 2026, the Office of Information Security will introduce a new email digest to help\u00a0students, faculty and staff\u00a0identify\u00a0messages that were flagged\u00a0as spam\u00a0and moved to the Junk\u00a0Email\u00a0folder in Outlook.\u00a0<\/p>\n\n\n\n<p>This new&nbsp;digest gives users added visibility into messages that may require review. If a legitimate email was moved to&nbsp;the&nbsp;Junk&nbsp;folder, users can move it back to the Inbox directly in Outlook without&nbsp;submitting&nbsp;an IT Help ticket.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"979\" height=\"613\" src=\"https:\/\/blogs.clemson.edu\/ccit\/files\/2026\/03\/image-1.png\" alt=\"A screenshot of the Daily Email Digest email that shows spam emails received.\" class=\"wp-image-432\" srcset=\"https:\/\/blogs.clemson.edu\/ccit\/files\/2026\/03\/image-1.png 979w, https:\/\/blogs.clemson.edu\/ccit\/files\/2026\/03\/image-1-300x188.png 300w, https:\/\/blogs.clemson.edu\/ccit\/files\/2026\/03\/image-1-768x481.png 768w\" sizes=\"auto, (max-width: 979px) 100vw, 979px\" \/><\/figure>\n\n\n\n<p>This notification is separate from&nbsp;<a href=\"https:\/\/clemson.service-now.com\/csm\/en\/overview-of-microsoft-email-quarantine-system?id=kb_article_view&amp;sysparm_article=KB0010349\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft\u2019s existing&nbsp;quarantine&nbsp;emails<\/a>. Microsoft notifications apply only to&nbsp;quarantined messages, while the new Clemson digest applies to&nbsp;potential spam&nbsp;messages routed to Junk.&nbsp;<\/p>\n\n\n\n<p>Users will only receive&nbsp;this new&nbsp;digest on days when&nbsp;one or more&nbsp;messages&nbsp;have&nbsp;been moved to&nbsp;their&nbsp;Junk&nbsp;folder.&nbsp;This added notice is intended to reduce the chance that&nbsp;a&nbsp;relevant&nbsp;email is missed because it was automatically sent to&nbsp;the&nbsp;Junk&nbsp;folder.&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Beginning Friday, April 3, 2026, the Office of Information Security will introduce a new email digest to help\u00a0students, faculty and staff\u00a0identify\u00a0messages that were flagged\u00a0as spam\u00a0and moved to the Junk\u00a0Email\u00a0folder in Outlook.\u00a0 This new&nbsp;digest gives users added visibility into messages that may require review. If a legitimate email was moved to&nbsp;the&nbsp;Junk&nbsp;folder, users can move it back [&hellip;]<\/p>\n","protected":false},"author":4202,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[128194],"tags":[],"coauthors":[128195],"class_list":["post-430","post","type-post","status-publish","format-standard","hentry","category-miscellaneous"],"fimg_url":false,"_links":{"self":[{"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/posts\/430","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/users\/4202"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/comments?post=430"}],"version-history":[{"count":0,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/posts\/430\/revisions"}],"wp:attachment":[{"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/media?parent=430"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/categories?post=430"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/tags?post=430"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/coauthors?post=430"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}},{"id":429,"date":"2026-03-18T19:36:39","date_gmt":"2026-03-18T19:36:39","guid":{"rendered":"https:\/\/blogs.clemson.edu\/ccit\/?p=429"},"modified":"2026-03-18T19:36:39","modified_gmt":"2026-03-18T19:36:39","slug":"new-process-for-adding-printing-funds-in-papercut","status":"publish","type":"post","link":"https:\/\/blogs.clemson.edu\/ccit\/2026\/03\/18\/new-process-for-adding-printing-funds-in-papercut\/","title":{"rendered":"New process for adding printing funds in\u00a0PaperCut"},"content":{"rendered":"\n<p>With the upcoming\u00a0<a href=\"https:\/\/www.clemson.edu\/campus-life\/tigerone\/about\/tigerstripe.html\" target=\"_blank\" rel=\"noreferrer noopener\">end of the TigerStripe system<\/a>,\u00a0Clemson\u00a0Computing and Information\u00a0Technology (CCIT)\u00a0is\u00a0changing\u00a0the way\u00a0students add funds to their\u00a0PaperCut\u00a0printing accounts.\u00a0Students who need to add printing funds beyond their semester quota will\u00a0now\u00a0use the\u00a0TouchNet\u00a0uPay\u00a0system.\u00a0<\/p>\n\n\n\n<p>Each\u00a0student receives\u00a0a\u00a0printing quota\u00a0of $25.50\u00a0per semester\u00a0through Clemson\u2019s\u00a0PaperCut\u00a0printing\u00a0system. For most students, this quota is more than enough to cover their printing needs.\u00a0Through May 31,\u00a0PaperCut\u00a0usage\u00a0over\u00a0this quota\u00a0will continue to draw from any remaining\u00a0TigerStripe\u00a0balances.\u00a0Students who still have a\u00a0TigerStripe\u00a0balance\u00a0should\u00a0use those funds before adding money through the new system.<\/p>\n\n\n\n<p>To\u00a0add printing\u00a0funds,\u00a0log in to\u00a0the\u00a0<a href=\"https:\/\/papercut.clemson.edu\/\" target=\"_blank\" rel=\"noreferrer noopener\">PaperCut\u00a0web portal<\/a>,\u00a0click\u00a0the\u00a0Add Funds\u00a0tab,\u00a0select the amount you want to add\u00a0and\u00a0complete the steps on\u00a0the\u00a0TouchNet\u00a0uPay\u00a0payment page.\u00a0After the transaction is finished, the\u00a0PaperCut\u00a0summary page will display the user\u2019s updated\u00a0printing\u00a0balance.<\/p>\n\n\n\n<p>Unlike the\u00a0semester\u00a0printing quota, added printing funds do not reset or expire,\u00a0and\u00a0any remaining balance will stay on the account until it is used.\u00a0Because added funds are only used after the\u00a0semester\u00a0printing quota has been reached, students are encouraged to add only the amount they expect to need.<\/p>\n\n\n\n<p>This\u00a0change primarily affects\u00a0students who print\u00a0frequently\u00a0or\u00a0submit\u00a0large posters to\u00a0be plotted.<\/p>\n\n\n\n<p>Beginning April 1,\u00a0TigerStripe\u00a0will no longer accept new deposits, and the service will be\u00a0<a href=\"https:\/\/www.clemson.edu\/campus-life\/tigerone\/about\/tigerstripe.html\" target=\"_blank\" rel=\"noreferrer noopener\">fully retired on June 1, 2026<\/a>.\u00a0Learn more about the sunsetting of\u00a0the\u00a0TigerStripe\u00a0declining balance program on the\u00a0<a href=\"https:\/\/www.clemson.edu\/campus-life\/tigerone\/about\/tigerstripe.html\" target=\"_blank\" rel=\"noreferrer noopener\">TigerOne website<\/a>.\u00a0Questions about printing\u00a0and plotting\u00a0may be directed to the CCIT Support Center by emailing\u00a0<a href=\"mailto:ithelp@clemson.edu\" target=\"_blank\" rel=\"noreferrer noopener\">ithelp@clemson.edu<\/a>, chatting online on\u00a0<a href=\"https:\/\/ithelp.clemson.edu\/\" target=\"_blank\" rel=\"noreferrer noopener\">TigerHub,<\/a>\u00a0or calling\/texting (864) 656-3494.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>With the upcoming\u00a0end of the TigerStripe system,\u00a0Clemson\u00a0Computing and Information\u00a0Technology (CCIT)\u00a0is\u00a0changing\u00a0the way\u00a0students add funds to their\u00a0PaperCut\u00a0printing accounts.\u00a0Students who need to add printing funds beyond their semester quota will\u00a0now\u00a0use the\u00a0TouchNet\u00a0uPay\u00a0system.\u00a0 Each\u00a0student receives\u00a0a\u00a0printing quota\u00a0of $25.50\u00a0per semester\u00a0through Clemson\u2019s\u00a0PaperCut\u00a0printing\u00a0system. For most students, this quota is more than enough to cover their printing needs.\u00a0Through May 31,\u00a0PaperCut\u00a0usage\u00a0over\u00a0this quota\u00a0will continue to draw from [&hellip;]<\/p>\n","protected":false},"author":4202,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[127935],"tags":[],"coauthors":[128195],"class_list":["post-429","post","type-post","status-publish","format-standard","hentry","category-notices"],"fimg_url":false,"_links":{"self":[{"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/posts\/429","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/users\/4202"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/comments?post=429"}],"version-history":[{"count":0,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/posts\/429\/revisions"}],"wp:attachment":[{"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/media?parent=429"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/categories?post=429"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/tags?post=429"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/coauthors?post=429"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}},{"id":426,"date":"2026-02-26T20:34:37","date_gmt":"2026-02-26T20:34:37","guid":{"rendered":"https:\/\/blogs.clemson.edu\/ccit\/?p=426"},"modified":"2026-02-26T20:34:37","modified_gmt":"2026-02-26T20:34:37","slug":"irs-scams","status":"publish","type":"post","link":"https:\/\/blogs.clemson.edu\/ccit\/2026\/02\/26\/irs-scams\/","title":{"rendered":"IRS Scams"},"content":{"rendered":"\n<p>Because it is tax season, cybercriminals are increasing their use of Internal Revenue Service (IRS) themed scams.<\/p>\n\n\n\n<p>These scams can include well-crafted phishing emails, text messages and phone calls. Cybercriminals are also using AI to create deepfakes, making their scam pitches even more believable. Other tactics include using social media to post fake content about false information, such as \u201csecret refunds\u201d.<\/p>\n\n\n\n<p>As with most of these scams, their goal is to obtain personal information from you to use in their attack. Or they may try to solicit funds directly from you.<\/p>\n\n\n\n<p>Please be aware that the IRS will never contact taxpayers directly by email, text messages or phone calls. Instead, they will contact you by letter sent through the U.S. Postal Service.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"700\" height=\"386\" src=\"https:\/\/blogs.clemson.edu\/ccit\/files\/2026\/02\/IRS-Scam.png\" alt=\"Hand holding a cell phone with text displaying on the phone saying &quot;Scam! IRS calling&quot;.\" class=\"wp-image-427\" srcset=\"https:\/\/blogs.clemson.edu\/ccit\/files\/2026\/02\/IRS-Scam.png 700w, https:\/\/blogs.clemson.edu\/ccit\/files\/2026\/02\/IRS-Scam-300x165.png 300w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Because it is tax season, cybercriminals are increasing their use of Internal Revenue Service (IRS) themed scams. These scams can include well-crafted phishing emails, text messages and phone calls. Cybercriminals are also using AI to create deepfakes, making their scam pitches even more believable. Other tactics include using social media to post fake content about [&hellip;]<\/p>\n","protected":false},"author":4254,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[127936],"tags":[],"coauthors":[128199],"class_list":["post-426","post","type-post","status-publish","format-standard","hentry","category-cybersecurity-alerts"],"fimg_url":false,"_links":{"self":[{"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/posts\/426","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/users\/4254"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/comments?post=426"}],"version-history":[{"count":0,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/posts\/426\/revisions"}],"wp:attachment":[{"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/media?parent=426"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/categories?post=426"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/tags?post=426"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/coauthors?post=426"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}},{"id":424,"date":"2026-02-25T14:43:35","date_gmt":"2026-02-25T14:43:35","guid":{"rendered":"https:\/\/blogs.clemson.edu\/ccit\/?p=424"},"modified":"2026-02-25T14:43:35","modified_gmt":"2026-02-25T14:43:35","slug":"changes-to-clemson-guest-network","status":"publish","type":"post","link":"https:\/\/blogs.clemson.edu\/ccit\/2026\/02\/25\/changes-to-clemson-guest-network\/","title":{"rendered":"Changes to Clemson Guest network"},"content":{"rendered":"\n<p>Beginning Thursday, February 26, 2026, at 4:30 p.m., the Office of Information Security will restrict access to certain apps and websites through the Clemson Guest network. The increased security measures will not impact users and devices connected to eduroam. This update is part of ongoing efforts to secure and safeguard Clemson&#8217;s networks and systems.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Beginning Thursday, February 26, 2026, at 4:30 p.m., the Office of Information Security will restrict access to certain apps and websites through the Clemson Guest network. The increased security measures will not impact users and devices connected to eduroam. This update is part of ongoing efforts to secure and safeguard Clemson&#8217;s networks and systems.<\/p>\n","protected":false},"author":4202,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[127935],"tags":[],"coauthors":[128195],"class_list":["post-424","post","type-post","status-publish","format-standard","hentry","category-notices"],"fimg_url":false,"_links":{"self":[{"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/posts\/424","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/users\/4202"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/comments?post=424"}],"version-history":[{"count":0,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/posts\/424\/revisions"}],"wp:attachment":[{"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/media?parent=424"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/categories?post=424"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/tags?post=424"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/coauthors?post=424"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}},{"id":421,"date":"2026-02-05T07:00:00","date_gmt":"2026-02-05T07:00:00","guid":{"rendered":"https:\/\/blogs.clemson.edu\/ccit\/?p=421"},"modified":"2026-01-29T16:30:25","modified_gmt":"2026-01-29T16:30:25","slug":"additional-apps-will-now-require-2fa-when-logging-in","status":"publish","type":"post","link":"https:\/\/blogs.clemson.edu\/ccit\/2026\/02\/05\/additional-apps-will-now-require-2fa-when-logging-in\/","title":{"rendered":"Additional\u00a0apps will now\u00a0require\u00a02FA\u00a0when logging in"},"content":{"rendered":"\n<p>CCIT is expanding two-factor authentication\u00a0(2FA)\u00a0to\u00a0additional\u00a0third-party\u00a0applications.\u00a0Some apps that did not previously require\u00a02FA may now prompt\u00a0users\u00a0to authenticate\u00a0after logging in with\u00a0a\u00a0Clemson username and password.\u00a0This change is part of an ongoing effort to better protect Clemson accounts, personal\u00a0information\u00a0and\u00a0systems from unauthorized access.<\/p>\n\n\n\n<p>Two-factor authentication\u00a0methods like Duo Mobile are\u00a0already widely used across many Clemson services, so most users\u00a0should be\u00a0familiar\u00a0with this process. Expanding 2FA to more applications helps provide consistent, reliable protection across\u00a0University\u00a0systems.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CCIT is expanding two-factor authentication\u00a0(2FA)\u00a0to\u00a0additional\u00a0third-party\u00a0applications.\u00a0Some apps that did not previously require\u00a02FA may now prompt\u00a0users\u00a0to authenticate\u00a0after logging in with\u00a0a\u00a0Clemson username and password.\u00a0This change is part of an ongoing effort to better protect Clemson accounts, personal\u00a0information\u00a0and\u00a0systems from unauthorized access. Two-factor authentication\u00a0methods like Duo Mobile are\u00a0already widely used across many Clemson services, so most users\u00a0should be\u00a0familiar\u00a0with this process. [&hellip;]<\/p>\n","protected":false},"author":3766,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[128194],"tags":[],"coauthors":[128200],"class_list":["post-421","post","type-post","status-publish","format-standard","hentry","category-miscellaneous"],"fimg_url":false,"_links":{"self":[{"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/posts\/421","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/users\/3766"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/comments?post=421"}],"version-history":[{"count":0,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/posts\/421\/revisions"}],"wp:attachment":[{"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/media?parent=421"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/categories?post=421"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/tags?post=421"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/coauthors?post=421"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}},{"id":356,"date":"2026-01-26T10:30:00","date_gmt":"2026-01-26T10:30:00","guid":{"rendered":"https:\/\/blogs.clemson.edu\/ccit\/?p=356"},"modified":"2026-01-27T15:37:34","modified_gmt":"2026-01-27T15:37:34","slug":"ccit-this-week-welcome-back-tigers-our-gis-fundamentals-workshop-series-returns-register-for-hpc-day-on-september-26","status":"publish","type":"post","link":"https:\/\/blogs.clemson.edu\/ccit\/2026\/01\/26\/ccit-this-week-welcome-back-tigers-our-gis-fundamentals-workshop-series-returns-register-for-hpc-day-on-september-26\/","title":{"rendered":"CCIT This Week: Update your Duo Mobile app before Feb. 2; beware of &#8220;browser in the browser&#8221; tricks; learn a new skill with Percipio"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Week of January 26, 2025<\/h2>\n\n\n\n<div class=\"wp-block-columns are-vertically-aligned-center is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"940\" height=\"788\" src=\"https:\/\/blogs.clemson.edu\/ccit\/files\/2025\/03\/2-1.png\" alt=\"\" class=\"wp-image-306\" srcset=\"https:\/\/blogs.clemson.edu\/ccit\/files\/2025\/03\/2-1.png 940w, https:\/\/blogs.clemson.edu\/ccit\/files\/2025\/03\/2-1-300x251.png 300w, https:\/\/blogs.clemson.edu\/ccit\/files\/2025\/03\/2-1-768x644.png 768w\" sizes=\"auto, (max-width: 940px) 100vw, 940px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\">\n<p><em>Welcome to CCIT This Week, where we give you a rundown of news, events, tips and more. Follow us on social media&nbsp;for information and timely updates. <\/em><\/p>\n\n\n\n<ul class=\"wp-block-social-links is-content-justification-center is-layout-flex wp-container-core-social-links-is-layout-16018d1d wp-block-social-links-is-layout-flex\"><li class=\"wp-social-link wp-social-link-instagram  wp-block-social-link\"><a href=\"https:\/\/www.instagram.com\/ccit_clemson\/\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M12,4.622c2.403,0,2.688,0.009,3.637,0.052c0.877,0.04,1.354,0.187,1.671,0.31c0.42,0.163,0.72,0.358,1.035,0.673 c0.315,0.315,0.51,0.615,0.673,1.035c0.123,0.317,0.27,0.794,0.31,1.671c0.043,0.949,0.052,1.234,0.052,3.637 s-0.009,2.688-0.052,3.637c-0.04,0.877-0.187,1.354-0.31,1.671c-0.163,0.42-0.358,0.72-0.673,1.035 c-0.315,0.315-0.615,0.51-1.035,0.673c-0.317,0.123-0.794,0.27-1.671,0.31c-0.949,0.043-1.233,0.052-3.637,0.052 s-2.688-0.009-3.637-0.052c-0.877-0.04-1.354-0.187-1.671-0.31c-0.42-0.163-0.72-0.358-1.035-0.673 c-0.315-0.315-0.51-0.615-0.673-1.035c-0.123-0.317-0.27-0.794-0.31-1.671C4.631,14.688,4.622,14.403,4.622,12 s0.009-2.688,0.052-3.637c0.04-0.877,0.187-1.354,0.31-1.671c0.163-0.42,0.358-0.72,0.673-1.035 c0.315-0.315,0.615-0.51,1.035-0.673c0.317-0.123,0.794-0.27,1.671-0.31C9.312,4.631,9.597,4.622,12,4.622 M12,3 C9.556,3,9.249,3.01,8.289,3.054C7.331,3.098,6.677,3.25,6.105,3.472C5.513,3.702,5.011,4.01,4.511,4.511 c-0.5,0.5-0.808,1.002-1.038,1.594C3.25,6.677,3.098,7.331,3.054,8.289C3.01,9.249,3,9.556,3,12c0,2.444,0.01,2.751,0.054,3.711 c0.044,0.958,0.196,1.612,0.418,2.185c0.23,0.592,0.538,1.094,1.038,1.594c0.5,0.5,1.002,0.808,1.594,1.038 c0.572,0.222,1.227,0.375,2.185,0.418C9.249,20.99,9.556,21,12,21s2.751-0.01,3.711-0.054c0.958-0.044,1.612-0.196,2.185-0.418 c0.592-0.23,1.094-0.538,1.594-1.038c0.5-0.5,0.808-1.002,1.038-1.594c0.222-0.572,0.375-1.227,0.418-2.185 C20.99,14.751,21,14.444,21,12s-0.01-2.751-0.054-3.711c-0.044-0.958-0.196-1.612-0.418-2.185c-0.23-0.592-0.538-1.094-1.038-1.594 c-0.5-0.5-1.002-0.808-1.594-1.038c-0.572-0.222-1.227-0.375-2.185-0.418C14.751,3.01,14.444,3,12,3L12,3z M12,7.378 c-2.552,0-4.622,2.069-4.622,4.622S9.448,16.622,12,16.622s4.622-2.069,4.622-4.622S14.552,7.378,12,7.378z M12,15 c-1.657,0-3-1.343-3-3s1.343-3,3-3s3,1.343,3,3S13.657,15,12,15z M16.804,6.116c-0.596,0-1.08,0.484-1.08,1.08 s0.484,1.08,1.08,1.08c0.596,0,1.08-0.484,1.08-1.08S17.401,6.116,16.804,6.116z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">Instagram<\/span><\/a><\/li>\n\n<li class=\"wp-social-link wp-social-link-facebook  wp-block-social-link\"><a href=\"https:\/\/www.facebook.com\/clemsonIT\/\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M12 2C6.5 2 2 6.5 2 12c0 5 3.7 9.1 8.4 9.9v-7H7.9V12h2.5V9.8c0-2.5 1.5-3.9 3.8-3.9 1.1 0 2.2.2 2.2.2v2.5h-1.3c-1.2 0-1.6.8-1.6 1.6V12h2.8l-.4 2.9h-2.3v7C18.3 21.1 22 17 22 12c0-5.5-4.5-10-10-10z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">Facebook<\/span><\/a><\/li>\n\n<li class=\"wp-social-link wp-social-link-x  wp-block-social-link\"><a href=\"https:\/\/x.com\/clemsonit\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M13.982 10.622 20.54 3h-1.554l-5.693 6.618L8.745 3H3.5l6.876 10.007L3.5 21h1.554l6.012-6.989L15.868 21h5.245l-7.131-10.378Zm-2.128 2.474-.697-.997-5.543-7.93H8l4.474 6.4.697.996 5.815 8.318h-2.387l-4.745-6.787Z\" \/><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">X<\/span><\/a><\/li>\n\n<li class=\"wp-social-link wp-social-link-chain  wp-block-social-link\"><a href=\"https:\/\/www.clemson.edu\/ccit\/\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M15.6,7.2H14v1.5h1.6c2,0,3.7,1.7,3.7,3.7s-1.7,3.7-3.7,3.7H14v1.5h1.6c2.8,0,5.2-2.3,5.2-5.2,0-2.9-2.3-5.2-5.2-5.2zM4.7,12.4c0-2,1.7-3.7,3.7-3.7H10V7.2H8.4c-2.9,0-5.2,2.3-5.2,5.2,0,2.9,2.3,5.2,5.2,5.2H10v-1.5H8.4c-2,0-3.7-1.7-3.7-3.7zm4.6.9h5.3v-1.5H9.3v1.5z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">Link<\/span><\/a><\/li><\/ul>\n<\/div>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">News<\/h2>\n\n\n\n<p><strong>After February 2, the Duo Mobile app will not work for users who have not updated to version 4.85 or newer. <\/strong>Students, faculty and staff should ensure their app is up-to-date to avoid losing access to Clemson systems. Instructions to update your Duo Mobile app are available on the CCIT blog.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-right is-layout-flex wp-container-core-buttons-is-layout-765c4724 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-text-color has-background has-link-color has-text-align-right has-custom-font-size wp-element-button\" href=\"https:\/\/blogs.clemson.edu\/ccit\/2026\/01\/21\/keep-duo-mobile-app-updated-to-maintain-access-to-clemson-systems\/\" style=\"border-radius:0px;color:#2e1a47;background-color:#f8f5ff;font-size:16px\"><strong><em>Learn how to update your Duo Mobile app &gt;&gt;<\/em><\/strong><\/a><\/div>\n<\/div>\n\n\n\n<p><br><strong>There has been an increase in cybercriminals using the Browser in the Browser (BitB) trick to steal login and password information.<\/strong> This trick has become more common on social media platforms such as Facebook and Instagram, but it can be used in any environment that uses a login page.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-right is-layout-flex wp-container-core-buttons-is-layout-765c4724 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-text-color has-background has-link-color has-text-align-right has-custom-font-size wp-element-button\" href=\"https:\/\/blogs.clemson.edu\/ccit\/2026\/01\/20\/bitb-trick\/\" style=\"border-radius:0px;color:#2e1a47;background-color:#f8f5ff;font-size:16px\"><strong><em>Learn how to spot this trick &gt;&gt;<\/em><\/strong><\/a><\/div>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">Events<\/h2>\n\n\n\n<p><strong>Research, Computing and Data will host workshops this semester!<\/strong> Join the RCD team and expand your knowledge of high-performance computing and research resources available to you. The next workshop is &#8220;Introduction to Nextflow&#8221; on Tuesday, January 27 at 11 a.m. Registration is required; open to all Palmetto users.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-right is-layout-flex wp-container-core-buttons-is-layout-765c4724 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-text-color has-background has-link-color has-text-align-right has-custom-font-size wp-element-button\" href=\"https:\/\/docs.rcd.clemson.edu\/training\/schedule\/\" style=\"border-radius:0px;color:#2e1a47;background-color:#f8f5ff;font-size:16px\"><strong><em>View the full schedule and register online &gt;&gt;<\/em><\/strong><\/a><\/div>\n<\/div>\n\n\n\n<p><strong>The popular GIS Fundamentals Workshop Series continues this week!<\/strong> This&nbsp;6-workshop series held on Friday mornings is streamlined to cover the GIS fundamentals; no prior experience is necessary. In-person sessions began January 16 or join online sessions starting February 27. Note: Attendance at the first two workshops is mandatory to participate in the remaining sessions.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-right is-layout-flex wp-container-core-buttons-is-layout-765c4724 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-text-color has-background has-link-color has-text-align-right has-custom-font-size wp-element-button\" href=\"https:\/\/www.clemsongis.org\/engineering-and-environmental-gis-s\" style=\"border-radius:0px;color:#2e1a47;background-color:#f8f5ff;font-size:16px\"><strong><em>Learn more on the Clemson GIS website &gt;&gt;<\/em><\/strong><\/a><\/div>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">January Tech Tip<\/h2>\n\n\n\n<p><strong>A great New Year\u2019s resolution: learn a new skill!<\/strong> Clemson faculty and staff have free access to Percipio, which offers thousands of courses, books, audiobooks and more to boost your professional development in a wide range of topics.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-right is-layout-flex wp-container-core-buttons-is-layout-765c4724 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-text-color has-background has-link-color has-custom-font-size wp-element-button\" href=\"http:\/\/clemson.percipio.com\/\" style=\"border-radius:0px;color:#2e1a47;background-color:#f8f5ff;font-size:16px\"><strong><em>Log in to Percipio using your Clemson username &gt;&gt;<\/em><\/strong><\/a><\/div>\n<\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Week of January 26, 2025 Welcome to CCIT This Week, where we give you a rundown of news, events, tips and more. Follow us on social media&nbsp;for information and timely updates. News After February 2, the Duo Mobile app will not work for users who have not updated to version 4.85 or newer. Students, faculty [&hellip;]<\/p>\n","protected":false},"author":3766,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[128194],"tags":[],"coauthors":[128200],"class_list":["post-356","post","type-post","status-publish","format-standard","hentry","category-miscellaneous"],"fimg_url":false,"_links":{"self":[{"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/posts\/356","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/users\/3766"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/comments?post=356"}],"version-history":[{"count":0,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/posts\/356\/revisions"}],"wp:attachment":[{"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/media?parent=356"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/categories?post=356"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/tags?post=356"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/coauthors?post=356"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}]