[{"id":435,"date":"2026-04-01T20:04:27","date_gmt":"2026-04-01T20:04:27","guid":{"rendered":"https:\/\/blogs.clemson.edu\/ccit\/?p=435"},"modified":"2026-04-01T20:09:33","modified_gmt":"2026-04-01T20:09:33","slug":"microsoft-365-apps-now-require-2fa-when-logging-in","status":"publish","type":"post","link":"https:\/\/blogs.clemson.edu\/ccit\/2026\/04\/01\/microsoft-365-apps-now-require-2fa-when-logging-in\/","title":{"rendered":"Microsoft\u00a0365\u00a0apps now\u00a0require\u00a02FA when logging in"},"content":{"rendered":"\n<p>CCIT&nbsp;is&nbsp;expanding&nbsp;two-factor authentication&nbsp;(2FA)&nbsp;to&nbsp;Microsoft 365&nbsp;applications.&nbsp;As of Thursday, April 2, 2026, apps like&nbsp;Microsoft&nbsp;Outlook, Word and Excel may now prompt&nbsp;users&nbsp;to authenticate&nbsp;with two-factor authentication (2FA)&nbsp;after logging in with&nbsp;a&nbsp;Clemson username and password.&nbsp;This change is part of an ongoing effort to better protect Clemson accounts,&nbsp;personal&nbsp;information&nbsp;and systems from unauthorized access.&nbsp;<\/p>\n\n\n\n<p>Two-factor authentication\u00a0methods like Duo Mobile are\u00a0already widely used across many Clemson services, so most users\u00a0should be\u00a0familiar\u00a0with this process. Expanding 2FA to more applications helps provide consistent, reliable protection across\u00a0University\u00a0systems.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CCIT&nbsp;is&nbsp;expanding&nbsp;two-factor authentication&nbsp;(2FA)&nbsp;to&nbsp;Microsoft 365&nbsp;applications.&nbsp;As of Thursday, April 2, 2026, apps like&nbsp;Microsoft&nbsp;Outlook, Word and Excel may now prompt&nbsp;users&nbsp;to authenticate&nbsp;with two-factor authentication (2FA)&nbsp;after logging in with&nbsp;a&nbsp;Clemson username and password.&nbsp;This change is part of an ongoing effort to better protect Clemson accounts,&nbsp;personal&nbsp;information&nbsp;and systems from unauthorized access.&nbsp; Two-factor authentication\u00a0methods like Duo Mobile are\u00a0already widely used across many Clemson services, so [&hellip;]<\/p>\n","protected":false},"author":4202,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[128194],"tags":[],"coauthors":[128195],"class_list":["post-435","post","type-post","status-publish","format-standard","hentry","category-miscellaneous"],"fimg_url":false,"_links":{"self":[{"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/posts\/435","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/users\/4202"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/comments?post=435"}],"version-history":[{"count":0,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/posts\/435\/revisions"}],"wp:attachment":[{"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/media?parent=435"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/categories?post=435"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/tags?post=435"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/coauthors?post=435"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}},{"id":430,"date":"2026-03-23T13:31:23","date_gmt":"2026-03-23T13:31:23","guid":{"rendered":"https:\/\/blogs.clemson.edu\/ccit\/?p=430"},"modified":"2026-03-26T17:07:48","modified_gmt":"2026-03-26T17:07:48","slug":"new-email-digest-helps-review-messages-sent-to-junk","status":"publish","type":"post","link":"https:\/\/blogs.clemson.edu\/ccit\/2026\/03\/23\/new-email-digest-helps-review-messages-sent-to-junk\/","title":{"rendered":"New\u00a0email\u00a0digest helps review\u00a0messages\u00a0sent to\u00a0Junk"},"content":{"rendered":"\n<p>Beginning Friday, April 3, 2026, the Office of Information Security will introduce a new email digest to help\u00a0students, faculty and staff\u00a0identify\u00a0messages that were flagged\u00a0as spam\u00a0and moved to the Junk\u00a0Email\u00a0folder in Outlook.\u00a0<\/p>\n\n\n\n<p>This new&nbsp;digest gives users added visibility into messages that may require review. If a legitimate email was moved to&nbsp;the&nbsp;Junk&nbsp;folder, users can move it back to the Inbox directly in Outlook without&nbsp;submitting&nbsp;an IT Help ticket.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"979\" height=\"613\" src=\"https:\/\/blogs.clemson.edu\/ccit\/files\/2026\/03\/image-1.png\" alt=\"A screenshot of the Daily Email Digest email that shows spam emails received.\" class=\"wp-image-432\" srcset=\"https:\/\/blogs.clemson.edu\/ccit\/files\/2026\/03\/image-1.png 979w, https:\/\/blogs.clemson.edu\/ccit\/files\/2026\/03\/image-1-300x188.png 300w, https:\/\/blogs.clemson.edu\/ccit\/files\/2026\/03\/image-1-768x481.png 768w\" sizes=\"auto, (max-width: 979px) 100vw, 979px\" \/><\/figure>\n\n\n\n<p>This notification is separate from&nbsp;<a href=\"https:\/\/clemson.service-now.com\/csm\/en\/overview-of-microsoft-email-quarantine-system?id=kb_article_view&amp;sysparm_article=KB0010349\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft\u2019s existing&nbsp;quarantine&nbsp;emails<\/a>. Microsoft notifications apply only to&nbsp;quarantined messages, while the new Clemson digest applies to&nbsp;potential spam&nbsp;messages routed to Junk.&nbsp;<\/p>\n\n\n\n<p>Users will only receive&nbsp;this new&nbsp;digest on days when&nbsp;one or more&nbsp;messages&nbsp;have&nbsp;been moved to&nbsp;their&nbsp;Junk&nbsp;folder.&nbsp;This added notice is intended to reduce the chance that&nbsp;a&nbsp;relevant&nbsp;email is missed because it was automatically sent to&nbsp;the&nbsp;Junk&nbsp;folder.&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Beginning Friday, April 3, 2026, the Office of Information Security will introduce a new email digest to help\u00a0students, faculty and staff\u00a0identify\u00a0messages that were flagged\u00a0as spam\u00a0and moved to the Junk\u00a0Email\u00a0folder in Outlook.\u00a0 This new&nbsp;digest gives users added visibility into messages that may require review. If a legitimate email was moved to&nbsp;the&nbsp;Junk&nbsp;folder, users can move it back [&hellip;]<\/p>\n","protected":false},"author":4202,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[128194],"tags":[],"coauthors":[128195],"class_list":["post-430","post","type-post","status-publish","format-standard","hentry","category-miscellaneous"],"fimg_url":false,"_links":{"self":[{"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/posts\/430","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/users\/4202"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/comments?post=430"}],"version-history":[{"count":0,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/posts\/430\/revisions"}],"wp:attachment":[{"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/media?parent=430"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/categories?post=430"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/tags?post=430"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/coauthors?post=430"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}},{"id":429,"date":"2026-03-18T19:36:39","date_gmt":"2026-03-18T19:36:39","guid":{"rendered":"https:\/\/blogs.clemson.edu\/ccit\/?p=429"},"modified":"2026-03-18T19:36:39","modified_gmt":"2026-03-18T19:36:39","slug":"new-process-for-adding-printing-funds-in-papercut","status":"publish","type":"post","link":"https:\/\/blogs.clemson.edu\/ccit\/2026\/03\/18\/new-process-for-adding-printing-funds-in-papercut\/","title":{"rendered":"New process for adding printing funds in\u00a0PaperCut"},"content":{"rendered":"\n<p>With the upcoming\u00a0<a href=\"https:\/\/www.clemson.edu\/campus-life\/tigerone\/about\/tigerstripe.html\" target=\"_blank\" rel=\"noreferrer noopener\">end of the TigerStripe system<\/a>,\u00a0Clemson\u00a0Computing and Information\u00a0Technology (CCIT)\u00a0is\u00a0changing\u00a0the way\u00a0students add funds to their\u00a0PaperCut\u00a0printing accounts.\u00a0Students who need to add printing funds beyond their semester quota will\u00a0now\u00a0use the\u00a0TouchNet\u00a0uPay\u00a0system.\u00a0<\/p>\n\n\n\n<p>Each\u00a0student receives\u00a0a\u00a0printing quota\u00a0of $25.50\u00a0per semester\u00a0through Clemson\u2019s\u00a0PaperCut\u00a0printing\u00a0system. For most students, this quota is more than enough to cover their printing needs.\u00a0Through May 31,\u00a0PaperCut\u00a0usage\u00a0over\u00a0this quota\u00a0will continue to draw from any remaining\u00a0TigerStripe\u00a0balances.\u00a0Students who still have a\u00a0TigerStripe\u00a0balance\u00a0should\u00a0use those funds before adding money through the new system.<\/p>\n\n\n\n<p>To\u00a0add printing\u00a0funds,\u00a0log in to\u00a0the\u00a0<a href=\"https:\/\/papercut.clemson.edu\/\" target=\"_blank\" rel=\"noreferrer noopener\">PaperCut\u00a0web portal<\/a>,\u00a0click\u00a0the\u00a0Add Funds\u00a0tab,\u00a0select the amount you want to add\u00a0and\u00a0complete the steps on\u00a0the\u00a0TouchNet\u00a0uPay\u00a0payment page.\u00a0After the transaction is finished, the\u00a0PaperCut\u00a0summary page will display the user\u2019s updated\u00a0printing\u00a0balance.<\/p>\n\n\n\n<p>Unlike the\u00a0semester\u00a0printing quota, added printing funds do not reset or expire,\u00a0and\u00a0any remaining balance will stay on the account until it is used.\u00a0Because added funds are only used after the\u00a0semester\u00a0printing quota has been reached, students are encouraged to add only the amount they expect to need.<\/p>\n\n\n\n<p>This\u00a0change primarily affects\u00a0students who print\u00a0frequently\u00a0or\u00a0submit\u00a0large posters to\u00a0be plotted.<\/p>\n\n\n\n<p>Beginning April 1,\u00a0TigerStripe\u00a0will no longer accept new deposits, and the service will be\u00a0<a href=\"https:\/\/www.clemson.edu\/campus-life\/tigerone\/about\/tigerstripe.html\" target=\"_blank\" rel=\"noreferrer noopener\">fully retired on June 1, 2026<\/a>.\u00a0Learn more about the sunsetting of\u00a0the\u00a0TigerStripe\u00a0declining balance program on the\u00a0<a href=\"https:\/\/www.clemson.edu\/campus-life\/tigerone\/about\/tigerstripe.html\" target=\"_blank\" rel=\"noreferrer noopener\">TigerOne website<\/a>.\u00a0Questions about printing\u00a0and plotting\u00a0may be directed to the CCIT Support Center by emailing\u00a0<a href=\"mailto:ithelp@clemson.edu\" target=\"_blank\" rel=\"noreferrer noopener\">ithelp@clemson.edu<\/a>, chatting online on\u00a0<a href=\"https:\/\/ithelp.clemson.edu\/\" target=\"_blank\" rel=\"noreferrer noopener\">TigerHub,<\/a>\u00a0or calling\/texting (864) 656-3494.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>With the upcoming\u00a0end of the TigerStripe system,\u00a0Clemson\u00a0Computing and Information\u00a0Technology (CCIT)\u00a0is\u00a0changing\u00a0the way\u00a0students add funds to their\u00a0PaperCut\u00a0printing accounts.\u00a0Students who need to add printing funds beyond their semester quota will\u00a0now\u00a0use the\u00a0TouchNet\u00a0uPay\u00a0system.\u00a0 Each\u00a0student receives\u00a0a\u00a0printing quota\u00a0of $25.50\u00a0per semester\u00a0through Clemson\u2019s\u00a0PaperCut\u00a0printing\u00a0system. For most students, this quota is more than enough to cover their printing needs.\u00a0Through May 31,\u00a0PaperCut\u00a0usage\u00a0over\u00a0this quota\u00a0will continue to draw from [&hellip;]<\/p>\n","protected":false},"author":4202,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[127935],"tags":[],"coauthors":[128195],"class_list":["post-429","post","type-post","status-publish","format-standard","hentry","category-notices"],"fimg_url":false,"_links":{"self":[{"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/posts\/429","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/users\/4202"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/comments?post=429"}],"version-history":[{"count":0,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/posts\/429\/revisions"}],"wp:attachment":[{"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/media?parent=429"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/categories?post=429"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/tags?post=429"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/coauthors?post=429"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}},{"id":426,"date":"2026-02-26T20:34:37","date_gmt":"2026-02-26T20:34:37","guid":{"rendered":"https:\/\/blogs.clemson.edu\/ccit\/?p=426"},"modified":"2026-02-26T20:34:37","modified_gmt":"2026-02-26T20:34:37","slug":"irs-scams","status":"publish","type":"post","link":"https:\/\/blogs.clemson.edu\/ccit\/2026\/02\/26\/irs-scams\/","title":{"rendered":"IRS Scams"},"content":{"rendered":"\n<p>Because it is tax season, cybercriminals are increasing their use of Internal Revenue Service (IRS) themed scams.<\/p>\n\n\n\n<p>These scams can include well-crafted phishing emails, text messages and phone calls. Cybercriminals are also using AI to create deepfakes, making their scam pitches even more believable. Other tactics include using social media to post fake content about false information, such as \u201csecret refunds\u201d.<\/p>\n\n\n\n<p>As with most of these scams, their goal is to obtain personal information from you to use in their attack. Or they may try to solicit funds directly from you.<\/p>\n\n\n\n<p>Please be aware that the IRS will never contact taxpayers directly by email, text messages or phone calls. Instead, they will contact you by letter sent through the U.S. Postal Service.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"700\" height=\"386\" src=\"https:\/\/blogs.clemson.edu\/ccit\/files\/2026\/02\/IRS-Scam.png\" alt=\"Hand holding a cell phone with text displaying on the phone saying &quot;Scam! IRS calling&quot;.\" class=\"wp-image-427\" srcset=\"https:\/\/blogs.clemson.edu\/ccit\/files\/2026\/02\/IRS-Scam.png 700w, https:\/\/blogs.clemson.edu\/ccit\/files\/2026\/02\/IRS-Scam-300x165.png 300w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Because it is tax season, cybercriminals are increasing their use of Internal Revenue Service (IRS) themed scams. These scams can include well-crafted phishing emails, text messages and phone calls. Cybercriminals are also using AI to create deepfakes, making their scam pitches even more believable. Other tactics include using social media to post fake content about [&hellip;]<\/p>\n","protected":false},"author":4254,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[127936],"tags":[],"coauthors":[128199],"class_list":["post-426","post","type-post","status-publish","format-standard","hentry","category-cybersecurity-alerts"],"fimg_url":false,"_links":{"self":[{"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/posts\/426","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/users\/4254"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/comments?post=426"}],"version-history":[{"count":0,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/posts\/426\/revisions"}],"wp:attachment":[{"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/media?parent=426"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/categories?post=426"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/tags?post=426"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/coauthors?post=426"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}},{"id":424,"date":"2026-02-25T14:43:35","date_gmt":"2026-02-25T14:43:35","guid":{"rendered":"https:\/\/blogs.clemson.edu\/ccit\/?p=424"},"modified":"2026-02-25T14:43:35","modified_gmt":"2026-02-25T14:43:35","slug":"changes-to-clemson-guest-network","status":"publish","type":"post","link":"https:\/\/blogs.clemson.edu\/ccit\/2026\/02\/25\/changes-to-clemson-guest-network\/","title":{"rendered":"Changes to Clemson Guest network"},"content":{"rendered":"\n<p>Beginning Thursday, February 26, 2026, at 4:30 p.m., the Office of Information Security will restrict access to certain apps and websites through the Clemson Guest network. The increased security measures will not impact users and devices connected to eduroam. This update is part of ongoing efforts to secure and safeguard Clemson&#8217;s networks and systems.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Beginning Thursday, February 26, 2026, at 4:30 p.m., the Office of Information Security will restrict access to certain apps and websites through the Clemson Guest network. The increased security measures will not impact users and devices connected to eduroam. This update is part of ongoing efforts to secure and safeguard Clemson&#8217;s networks and systems.<\/p>\n","protected":false},"author":4202,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[127935],"tags":[],"coauthors":[128195],"class_list":["post-424","post","type-post","status-publish","format-standard","hentry","category-notices"],"fimg_url":false,"_links":{"self":[{"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/posts\/424","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/users\/4202"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/comments?post=424"}],"version-history":[{"count":0,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/posts\/424\/revisions"}],"wp:attachment":[{"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/media?parent=424"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/categories?post=424"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/tags?post=424"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/coauthors?post=424"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}},{"id":421,"date":"2026-02-05T07:00:00","date_gmt":"2026-02-05T07:00:00","guid":{"rendered":"https:\/\/blogs.clemson.edu\/ccit\/?p=421"},"modified":"2026-01-29T16:30:25","modified_gmt":"2026-01-29T16:30:25","slug":"additional-apps-will-now-require-2fa-when-logging-in","status":"publish","type":"post","link":"https:\/\/blogs.clemson.edu\/ccit\/2026\/02\/05\/additional-apps-will-now-require-2fa-when-logging-in\/","title":{"rendered":"Additional\u00a0apps will now\u00a0require\u00a02FA\u00a0when logging in"},"content":{"rendered":"\n<p>CCIT is expanding two-factor authentication\u00a0(2FA)\u00a0to\u00a0additional\u00a0third-party\u00a0applications.\u00a0Some apps that did not previously require\u00a02FA may now prompt\u00a0users\u00a0to authenticate\u00a0after logging in with\u00a0a\u00a0Clemson username and password.\u00a0This change is part of an ongoing effort to better protect Clemson accounts, personal\u00a0information\u00a0and\u00a0systems from unauthorized access.<\/p>\n\n\n\n<p>Two-factor authentication\u00a0methods like Duo Mobile are\u00a0already widely used across many Clemson services, so most users\u00a0should be\u00a0familiar\u00a0with this process. Expanding 2FA to more applications helps provide consistent, reliable protection across\u00a0University\u00a0systems.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CCIT is expanding two-factor authentication\u00a0(2FA)\u00a0to\u00a0additional\u00a0third-party\u00a0applications.\u00a0Some apps that did not previously require\u00a02FA may now prompt\u00a0users\u00a0to authenticate\u00a0after logging in with\u00a0a\u00a0Clemson username and password.\u00a0This change is part of an ongoing effort to better protect Clemson accounts, personal\u00a0information\u00a0and\u00a0systems from unauthorized access. Two-factor authentication\u00a0methods like Duo Mobile are\u00a0already widely used across many Clemson services, so most users\u00a0should be\u00a0familiar\u00a0with this process. [&hellip;]<\/p>\n","protected":false},"author":3766,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[128194],"tags":[],"coauthors":[128200],"class_list":["post-421","post","type-post","status-publish","format-standard","hentry","category-miscellaneous"],"fimg_url":false,"_links":{"self":[{"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/posts\/421","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/users\/3766"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/comments?post=421"}],"version-history":[{"count":0,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/posts\/421\/revisions"}],"wp:attachment":[{"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/media?parent=421"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/categories?post=421"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/tags?post=421"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/coauthors?post=421"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}},{"id":356,"date":"2026-01-26T10:30:00","date_gmt":"2026-01-26T10:30:00","guid":{"rendered":"https:\/\/blogs.clemson.edu\/ccit\/?p=356"},"modified":"2026-01-27T15:37:34","modified_gmt":"2026-01-27T15:37:34","slug":"ccit-this-week-welcome-back-tigers-our-gis-fundamentals-workshop-series-returns-register-for-hpc-day-on-september-26","status":"publish","type":"post","link":"https:\/\/blogs.clemson.edu\/ccit\/2026\/01\/26\/ccit-this-week-welcome-back-tigers-our-gis-fundamentals-workshop-series-returns-register-for-hpc-day-on-september-26\/","title":{"rendered":"CCIT This Week: Update your Duo Mobile app before Feb. 2; beware of &#8220;browser in the browser&#8221; tricks; learn a new skill with Percipio"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Week of January 26, 2025<\/h2>\n\n\n\n<div class=\"wp-block-columns are-vertically-aligned-center is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"940\" height=\"788\" src=\"https:\/\/blogs.clemson.edu\/ccit\/files\/2025\/03\/2-1.png\" alt=\"\" class=\"wp-image-306\" srcset=\"https:\/\/blogs.clemson.edu\/ccit\/files\/2025\/03\/2-1.png 940w, https:\/\/blogs.clemson.edu\/ccit\/files\/2025\/03\/2-1-300x251.png 300w, https:\/\/blogs.clemson.edu\/ccit\/files\/2025\/03\/2-1-768x644.png 768w\" sizes=\"auto, (max-width: 940px) 100vw, 940px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\">\n<p><em>Welcome to CCIT This Week, where we give you a rundown of news, events, tips and more. Follow us on social media&nbsp;for information and timely updates. <\/em><\/p>\n\n\n\n<ul class=\"wp-block-social-links is-content-justification-center is-layout-flex wp-container-core-social-links-is-layout-16018d1d wp-block-social-links-is-layout-flex\"><li class=\"wp-social-link wp-social-link-instagram  wp-block-social-link\"><a href=\"https:\/\/www.instagram.com\/ccit_clemson\/\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M12,4.622c2.403,0,2.688,0.009,3.637,0.052c0.877,0.04,1.354,0.187,1.671,0.31c0.42,0.163,0.72,0.358,1.035,0.673 c0.315,0.315,0.51,0.615,0.673,1.035c0.123,0.317,0.27,0.794,0.31,1.671c0.043,0.949,0.052,1.234,0.052,3.637 s-0.009,2.688-0.052,3.637c-0.04,0.877-0.187,1.354-0.31,1.671c-0.163,0.42-0.358,0.72-0.673,1.035 c-0.315,0.315-0.615,0.51-1.035,0.673c-0.317,0.123-0.794,0.27-1.671,0.31c-0.949,0.043-1.233,0.052-3.637,0.052 s-2.688-0.009-3.637-0.052c-0.877-0.04-1.354-0.187-1.671-0.31c-0.42-0.163-0.72-0.358-1.035-0.673 c-0.315-0.315-0.51-0.615-0.673-1.035c-0.123-0.317-0.27-0.794-0.31-1.671C4.631,14.688,4.622,14.403,4.622,12 s0.009-2.688,0.052-3.637c0.04-0.877,0.187-1.354,0.31-1.671c0.163-0.42,0.358-0.72,0.673-1.035 c0.315-0.315,0.615-0.51,1.035-0.673c0.317-0.123,0.794-0.27,1.671-0.31C9.312,4.631,9.597,4.622,12,4.622 M12,3 C9.556,3,9.249,3.01,8.289,3.054C7.331,3.098,6.677,3.25,6.105,3.472C5.513,3.702,5.011,4.01,4.511,4.511 c-0.5,0.5-0.808,1.002-1.038,1.594C3.25,6.677,3.098,7.331,3.054,8.289C3.01,9.249,3,9.556,3,12c0,2.444,0.01,2.751,0.054,3.711 c0.044,0.958,0.196,1.612,0.418,2.185c0.23,0.592,0.538,1.094,1.038,1.594c0.5,0.5,1.002,0.808,1.594,1.038 c0.572,0.222,1.227,0.375,2.185,0.418C9.249,20.99,9.556,21,12,21s2.751-0.01,3.711-0.054c0.958-0.044,1.612-0.196,2.185-0.418 c0.592-0.23,1.094-0.538,1.594-1.038c0.5-0.5,0.808-1.002,1.038-1.594c0.222-0.572,0.375-1.227,0.418-2.185 C20.99,14.751,21,14.444,21,12s-0.01-2.751-0.054-3.711c-0.044-0.958-0.196-1.612-0.418-2.185c-0.23-0.592-0.538-1.094-1.038-1.594 c-0.5-0.5-1.002-0.808-1.594-1.038c-0.572-0.222-1.227-0.375-2.185-0.418C14.751,3.01,14.444,3,12,3L12,3z M12,7.378 c-2.552,0-4.622,2.069-4.622,4.622S9.448,16.622,12,16.622s4.622-2.069,4.622-4.622S14.552,7.378,12,7.378z M12,15 c-1.657,0-3-1.343-3-3s1.343-3,3-3s3,1.343,3,3S13.657,15,12,15z M16.804,6.116c-0.596,0-1.08,0.484-1.08,1.08 s0.484,1.08,1.08,1.08c0.596,0,1.08-0.484,1.08-1.08S17.401,6.116,16.804,6.116z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">Instagram<\/span><\/a><\/li>\n\n<li class=\"wp-social-link wp-social-link-facebook  wp-block-social-link\"><a href=\"https:\/\/www.facebook.com\/clemsonIT\/\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M12 2C6.5 2 2 6.5 2 12c0 5 3.7 9.1 8.4 9.9v-7H7.9V12h2.5V9.8c0-2.5 1.5-3.9 3.8-3.9 1.1 0 2.2.2 2.2.2v2.5h-1.3c-1.2 0-1.6.8-1.6 1.6V12h2.8l-.4 2.9h-2.3v7C18.3 21.1 22 17 22 12c0-5.5-4.5-10-10-10z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">Facebook<\/span><\/a><\/li>\n\n<li class=\"wp-social-link wp-social-link-x  wp-block-social-link\"><a href=\"https:\/\/x.com\/clemsonit\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M13.982 10.622 20.54 3h-1.554l-5.693 6.618L8.745 3H3.5l6.876 10.007L3.5 21h1.554l6.012-6.989L15.868 21h5.245l-7.131-10.378Zm-2.128 2.474-.697-.997-5.543-7.93H8l4.474 6.4.697.996 5.815 8.318h-2.387l-4.745-6.787Z\" \/><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">X<\/span><\/a><\/li>\n\n<li class=\"wp-social-link wp-social-link-chain  wp-block-social-link\"><a href=\"https:\/\/www.clemson.edu\/ccit\/\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M15.6,7.2H14v1.5h1.6c2,0,3.7,1.7,3.7,3.7s-1.7,3.7-3.7,3.7H14v1.5h1.6c2.8,0,5.2-2.3,5.2-5.2,0-2.9-2.3-5.2-5.2-5.2zM4.7,12.4c0-2,1.7-3.7,3.7-3.7H10V7.2H8.4c-2.9,0-5.2,2.3-5.2,5.2,0,2.9,2.3,5.2,5.2,5.2H10v-1.5H8.4c-2,0-3.7-1.7-3.7-3.7zm4.6.9h5.3v-1.5H9.3v1.5z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">Link<\/span><\/a><\/li><\/ul>\n<\/div>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">News<\/h2>\n\n\n\n<p><strong>After February 2, the Duo Mobile app will not work for users who have not updated to version 4.85 or newer. <\/strong>Students, faculty and staff should ensure their app is up-to-date to avoid losing access to Clemson systems. Instructions to update your Duo Mobile app are available on the CCIT blog.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-right is-layout-flex wp-container-core-buttons-is-layout-765c4724 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-text-color has-background has-link-color has-text-align-right has-custom-font-size wp-element-button\" href=\"https:\/\/blogs.clemson.edu\/ccit\/2026\/01\/21\/keep-duo-mobile-app-updated-to-maintain-access-to-clemson-systems\/\" style=\"border-radius:0px;color:#2e1a47;background-color:#f8f5ff;font-size:16px\"><strong><em>Learn how to update your Duo Mobile app &gt;&gt;<\/em><\/strong><\/a><\/div>\n<\/div>\n\n\n\n<p><br><strong>There has been an increase in cybercriminals using the Browser in the Browser (BitB) trick to steal login and password information.<\/strong> This trick has become more common on social media platforms such as Facebook and Instagram, but it can be used in any environment that uses a login page.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-right is-layout-flex wp-container-core-buttons-is-layout-765c4724 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-text-color has-background has-link-color has-text-align-right has-custom-font-size wp-element-button\" href=\"https:\/\/blogs.clemson.edu\/ccit\/2026\/01\/20\/bitb-trick\/\" style=\"border-radius:0px;color:#2e1a47;background-color:#f8f5ff;font-size:16px\"><strong><em>Learn how to spot this trick &gt;&gt;<\/em><\/strong><\/a><\/div>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">Events<\/h2>\n\n\n\n<p><strong>Research, Computing and Data will host workshops this semester!<\/strong> Join the RCD team and expand your knowledge of high-performance computing and research resources available to you. The next workshop is &#8220;Introduction to Nextflow&#8221; on Tuesday, January 27 at 11 a.m. Registration is required; open to all Palmetto users.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-right is-layout-flex wp-container-core-buttons-is-layout-765c4724 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-text-color has-background has-link-color has-text-align-right has-custom-font-size wp-element-button\" href=\"https:\/\/docs.rcd.clemson.edu\/training\/schedule\/\" style=\"border-radius:0px;color:#2e1a47;background-color:#f8f5ff;font-size:16px\"><strong><em>View the full schedule and register online &gt;&gt;<\/em><\/strong><\/a><\/div>\n<\/div>\n\n\n\n<p><strong>The popular GIS Fundamentals Workshop Series continues this week!<\/strong> This&nbsp;6-workshop series held on Friday mornings is streamlined to cover the GIS fundamentals; no prior experience is necessary. In-person sessions began January 16 or join online sessions starting February 27. Note: Attendance at the first two workshops is mandatory to participate in the remaining sessions.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-right is-layout-flex wp-container-core-buttons-is-layout-765c4724 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-text-color has-background has-link-color has-text-align-right has-custom-font-size wp-element-button\" href=\"https:\/\/www.clemsongis.org\/engineering-and-environmental-gis-s\" style=\"border-radius:0px;color:#2e1a47;background-color:#f8f5ff;font-size:16px\"><strong><em>Learn more on the Clemson GIS website &gt;&gt;<\/em><\/strong><\/a><\/div>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">January Tech Tip<\/h2>\n\n\n\n<p><strong>A great New Year\u2019s resolution: learn a new skill!<\/strong> Clemson faculty and staff have free access to Percipio, which offers thousands of courses, books, audiobooks and more to boost your professional development in a wide range of topics.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-right is-layout-flex wp-container-core-buttons-is-layout-765c4724 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-text-color has-background has-link-color has-custom-font-size wp-element-button\" href=\"http:\/\/clemson.percipio.com\/\" style=\"border-radius:0px;color:#2e1a47;background-color:#f8f5ff;font-size:16px\"><strong><em>Log in to Percipio using your Clemson username &gt;&gt;<\/em><\/strong><\/a><\/div>\n<\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Week of January 26, 2025 Welcome to CCIT This Week, where we give you a rundown of news, events, tips and more. Follow us on social media&nbsp;for information and timely updates. News After February 2, the Duo Mobile app will not work for users who have not updated to version 4.85 or newer. Students, faculty [&hellip;]<\/p>\n","protected":false},"author":3766,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[128194],"tags":[],"coauthors":[128200],"class_list":["post-356","post","type-post","status-publish","format-standard","hentry","category-miscellaneous"],"fimg_url":false,"_links":{"self":[{"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/posts\/356","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/users\/3766"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/comments?post=356"}],"version-history":[{"count":0,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/posts\/356\/revisions"}],"wp:attachment":[{"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/media?parent=356"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/categories?post=356"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/tags?post=356"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/coauthors?post=356"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}},{"id":418,"date":"2026-01-21T08:00:00","date_gmt":"2026-01-21T08:00:00","guid":{"rendered":"https:\/\/blogs.clemson.edu\/ccit\/?p=418"},"modified":"2026-01-21T00:49:10","modified_gmt":"2026-01-21T00:49:10","slug":"keep-duo-mobile-app-updated-to-maintain-access-to-clemson-systems","status":"publish","type":"post","link":"https:\/\/blogs.clemson.edu\/ccit\/2026\/01\/21\/keep-duo-mobile-app-updated-to-maintain-access-to-clemson-systems\/","title":{"rendered":"Keep Duo Mobile app updated to\u00a0maintain\u00a0access\u00a0to Clemson systems\u00a0"},"content":{"rendered":"\n<p>Clemson University uses the Duo Mobile two-factor authentication (2FA) app to ensure security and privacy of\u00a0University\u00a0information and systems. Beginning February 2,\u00a0Duo is ending support for older versions of\u00a0the\u00a0Duo Mobile\u00a0app\u00a0to improve security and performance. After\u00a0this date, versions of the\u00a0Duo Mobile app\u00a0earlier than version 4.85 will not work to access\u00a0Clemson University\u00a0systems\u00a0that require 2FA.\u00a0<\/p>\n\n\n\n<p>Any app that\u00a0is\u00a0not updated by\u00a0February 2\u00a0will lose the ability to\u00a0authenticate\u00a0and\u00a0users\u00a0will\u00a0be locked out of Clemson services\u00a0such as Canvas,\u00a0iROAR, VPN and Kronos.\u00a0<\/p>\n\n\n\n<p>To continue accessing\u00a0Clemson\u00a0systems that require 2FA,\u00a0faculty, staff and students\u00a0must update the Duo Mobile app or set up an alternate\u00a0authentication method.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What to do:<\/h2>\n\n\n\n<ol start=\"1\" class=\"wp-block-list\">\n<li>Check your device.\u00a0Phone must meet these\u00a0minimum\u00a0requirements to support the latest version of Duo Mobile:\n<ul class=\"wp-block-list\">\n<li>Apple devices:\u00a0Go to Settings &gt; General &gt; About &gt; iOS Version.\u00a0Verify\u00a0iOS 16\u00a0or\u00a0higher.<\/li>\n\n\n\n<li>Android devices:\u00a0Go to Settings &gt; About Phone &gt; Android Version. Verify\u00a0Android 11\u00a0or\u00a0higher.\u00a0<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Update\u00a0the\u00a0Duo Mobile\u00a0app.\u00a0\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/apps.apple.com\/us\/app\/duo-mobile\/id422663827\" target=\"_blank\" rel=\"noreferrer noopener\">Duo Mobile on the Apple App Store<\/a>\u00a0<\/li>\n\n\n\n<li><a href=\"https:\/\/play.google.com\/store\/apps\/details?id=com.duosecurity.duomobile\" target=\"_blank\" rel=\"noreferrer noopener\">Duo Mobile on the Google Play Store<\/a>\u00a0<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n\n\n\n<ol start=\"2\" class=\"wp-block-list\"><\/ol>\n\n\n\n<ol start=\"1\" class=\"wp-block-list\"><\/ol>\n\n\n\n<ol start=\"2\" class=\"wp-block-list\"><\/ol>\n\n\n\n<p>If&nbsp;a&nbsp;phone&nbsp;can&#8217;t&nbsp;upgrade to&nbsp;at least&nbsp;iOS 16 or Android 11,&nbsp;other&nbsp;options are:&nbsp;<\/p>\n\n\n\n<ol start=\"1\" class=\"wp-block-list\">\n<li>Using\u00a0another smartphone or tablet that meets requirements for Duo Mobile.\u00a0<\/li>\n\n\n\n<li>Contacting\u00a0the\u00a0<a href=\"https:\/\/www.clemson.edu\/ccit\/it-help\/\" target=\"_blank\" rel=\"noreferrer noopener\">CCIT Support Center<\/a>\u00a0to\u00a0discuss\u00a0and set up\u00a0other authentication options such as:\u00a0\n<ul class=\"wp-block-list\">\n<li>Platform authenticators\u00a0like\u00a0Windows Hello or Apple\u00a0TouchID\u00a0<\/li>\n\n\n\n<li>Passkeys in password managers\u00a0like\u00a0Keeper, 1Password or Google Password Manager\u00a0<\/li>\n\n\n\n<li>Hardware token\u00a0($20\u00a0cost)\u00a0<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n\n\n\n<ol start=\"2\" class=\"wp-block-list\"><\/ol>\n\n\n\n<ol start=\"1\" class=\"wp-block-list\"><\/ol>\n\n\n\n<ol start=\"2\" class=\"wp-block-list\"><\/ol>\n\n\n\n<ol start=\"3\" class=\"wp-block-list\"><\/ol>\n\n\n\n<p>Updating now ensures uninterrupted access to Clemson systems.&nbsp;&nbsp;<\/p>\n\n\n\n<p>If\u00a0faculty,\u00a0staff\u00a0or students\u00a0have questions,\u00a0need help\u00a0updating\u00a0or\u00a0their device cannot be upgraded,\u00a0visit\u00a0the <a href=\"https:\/\/www.clemson.edu\/ccit\/it-help\/\" target=\"_blank\" rel=\"noreferrer noopener\">CCIT Support Center<\/a>\u00a0on the second floor of Cooper Library, email <a href=\"mailto:ithelp@clemson.edu\">ithelp@clemson.edu<\/a>\u00a0or call\u00a0(864) 656-3494.\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Clemson University uses the Duo Mobile two-factor authentication (2FA) app to ensure security and privacy of\u00a0University\u00a0information and systems. Beginning February 2,\u00a0Duo is ending support for older versions of\u00a0the\u00a0Duo Mobile\u00a0app\u00a0to improve security and performance. After\u00a0this date, versions of the\u00a0Duo Mobile app\u00a0earlier than version 4.85 will not work to access\u00a0Clemson University\u00a0systems\u00a0that require 2FA.\u00a0 Any app that\u00a0is\u00a0not updated [&hellip;]<\/p>\n","protected":false},"author":4202,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[127935],"tags":[],"coauthors":[128195],"class_list":["post-418","post","type-post","status-publish","format-standard","hentry","category-notices"],"fimg_url":false,"_links":{"self":[{"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/posts\/418","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/users\/4202"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/comments?post=418"}],"version-history":[{"count":0,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/posts\/418\/revisions"}],"wp:attachment":[{"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/media?parent=418"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/categories?post=418"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/tags?post=418"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/coauthors?post=418"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}},{"id":414,"date":"2026-01-20T16:28:59","date_gmt":"2026-01-20T16:28:59","guid":{"rendered":"https:\/\/blogs.clemson.edu\/ccit\/?p=414"},"modified":"2026-01-20T23:36:04","modified_gmt":"2026-01-20T23:36:04","slug":"bitb-trick","status":"publish","type":"post","link":"https:\/\/blogs.clemson.edu\/ccit\/2026\/01\/20\/bitb-trick\/","title":{"rendered":"Browser in the Browser (BitB) Trick"},"content":{"rendered":"\n<p>There has been an increase in cybercriminals using the Browser in the Browser (BitB) trick to steal login and password information. This trick has become more common on social media platforms such as Facebook and Instagram, but it can be used in any environment that uses a login page.<\/p>\n\n\n\n<p>The BitB trick uses hidden code to create a fake pop-up looking window in your browser with a login prompt. Because the fake pop-up is entirely generated, it can include a convincing-looking address bar at the top that displays correct domain names. This trick can easily fool users who are looking at the URL before entering their credentials. For example, the BitB trick could be showing what looks like a pop-up window for a Google login and include the correct google.com address as well as all of the correct graphics and formatting. After entering your credentials, the user may even be redirected and logged into the official website. But through this process, the cybercriminal also collected and saved the user\u2019s login and password information, which they can use themselves later. Most login pages are static single pages and do not typically have their login screen in a pop-up window. One of the best ways to spot this BitB trick is that the pop-up window cannot be moved outside of the original main browser window.<br><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"700\" height=\"386\" src=\"https:\/\/blogs.clemson.edu\/ccit\/files\/2026\/01\/BitB-trick.png\" alt=\"Image showing a pop-up window contained within a browser window and informational text saying &quot;Can't move pop-up outside of window&quot;\" class=\"wp-image-415\" srcset=\"https:\/\/blogs.clemson.edu\/ccit\/files\/2026\/01\/BitB-trick.png 700w, https:\/\/blogs.clemson.edu\/ccit\/files\/2026\/01\/BitB-trick-300x165.png 300w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>Ways to Avoid the BitB trick:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>For logging into any account, don\u2019t trust a button, page link or email link.<br>Instead, navigate to the site\u2019s official website URL in a separate browser tab to login.<br><br><\/li>\n\n\n\n<li>If you are prompted to enter credentials into a login pop-up window, first check to see if the pop-up window can move outside of the browser window. Essential for the BitB trick, are iframes, which are connected to the underlying browser window and cannot be pulled outside it.<br><br><\/li>\n\n\n\n<li>It is also recommended to use Two Factor Authentication on any account, when available, to give you an extra layer of protection.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>There has been an increase in cybercriminals using the Browser in the Browser (BitB) trick to steal login and password information. This trick has become more common on social media platforms such as Facebook and Instagram, but it can be used in any environment that uses a login page. The BitB trick uses hidden code [&hellip;]<\/p>\n","protected":false},"author":4254,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[127936],"tags":[],"coauthors":[128199],"class_list":["post-414","post","type-post","status-publish","format-standard","hentry","category-cybersecurity-alerts"],"fimg_url":false,"_links":{"self":[{"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/posts\/414","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/users\/4254"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/comments?post=414"}],"version-history":[{"count":0,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/posts\/414\/revisions"}],"wp:attachment":[{"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/media?parent=414"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/categories?post=414"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/tags?post=414"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/coauthors?post=414"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}},{"id":340,"date":"2025-12-02T17:06:01","date_gmt":"2025-12-02T17:06:01","guid":{"rendered":"https:\/\/blogs.clemson.edu\/ccit\/?p=340"},"modified":"2025-12-02T17:08:17","modified_gmt":"2025-12-02T17:08:17","slug":"do-i-keep-my-email-and-other-tech-questions-from-graduating-tigers-3","status":"publish","type":"post","link":"https:\/\/blogs.clemson.edu\/ccit\/2025\/12\/02\/do-i-keep-my-email-and-other-tech-questions-from-graduating-tigers-3\/","title":{"rendered":"\u201cDo I Keep My Email?\u201d And Other Tech Questions From Graduating Tigers"},"content":{"rendered":"\n<p>Graduation is an exciting time for every Tiger, but it unfortunately does mean a change to some of the software and services you\u2019ve grown accustomed to during your time at Clemson. Luckily, with a few minutes of review, you can prepare your technology and data for graduation.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Frequently Asked Questions<\/h2>\n\n\n\n<p><strong>Do I keep my Clemson Google account?<\/strong><\/p>\n\n\n\n<p>Graduates will have access to their Clemson Google account for one year following graduation. Please note that forwarding of your @clemson.edu email address will cease soon after your username is deactivated. We suggest updating your contacts or accounts to use a different email address so you don\u2019t lose anything when your account is closed.<\/p>\n\n\n\n<p>We recommend you move your Google Drive files to another cloud storage service or personal Google Drive account in preparation for the closure of your Clemson Google account after one year. You can use Google Takeout (<a href=\"https:\/\/takeout.google.com\/\">takeout.google.com<\/a>) to export your Google account data if you wish to store it elsewhere, or you can use the transfer service (<a href=\"https:\/\/takeout.google.com\/transfer\">takeout.google.com\/transfer<\/a>) if you plan to move it to another Google account.<\/p>\n\n\n\n<p><strong>What about the files in my other cloud storage accounts?<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Your access to Box and OneDrive will end one year after graduation. We recommend that you download your files from those accounts as soon as possible, so you don\u2019t forget about them.&nbsp;<\/li>\n\n\n\n<li>Any files you create and manage in CUapps (Citrix) are stored on your U: drive (also called Home Directory). You will have access to your U: drive for one year after graduation, so be sure to download those files before you lose them. The\u00a0<a href=\"https:\/\/clemson.service-now.com\/csm\/en\/how-to-move-files-from-u-drive-to-your-computer-s-hard-drive?id=kb_article&amp;sysparm_article=KB0010527\">CCIT Knowledge Base contains instructions<\/a>\u00a0to access your U: drive for macOS and Windows.<\/li>\n\n\n\n<li>If you use the Palmetto Cluster or any of Clemson\u2019s research computing storage, we recommend you download your data from there as well. For research computing assistance, contact&nbsp;<a href=\"mailto:ithelp@clemson.edu?subject=Palmetto:%20Transferring%20Data\">Research Computing and Data<\/a>.<\/li>\n<\/ul>\n\n\n\n<p><strong>What software do I keep?<\/strong><\/p>\n\n\n\n<p>Once you graduate, you will no longer qualify to reinstall Clemson\u2019s site-licensed software.&nbsp;&nbsp;Access to the Adobe Creative Cloud will be disabled upon graduation as well. Make sure to save copies of your Adobe files, projects and assets, or use these&nbsp;<a href=\"https:\/\/helpx.adobe.com\/enterprise\/kb\/transfer-assets.html\">instructions from Adobe<\/a>&nbsp;on how to transfer your assets to a new Adobe profile.&nbsp;<\/p>\n\n\n\n<p><strong>Can I download my submitted Canvas assignments?<\/strong><\/p>\n\n\n\n<p>Yes. Visit our\u00a0<a href=\"https:\/\/clemson.service-now.com\/csm\/en\/how-to-download-submitted-assignments-from-canvas?id=kb_article&amp;sysparm_article=KB0010446\">CCIT Knowledge Base for step-by-step instructions<\/a>.<\/p>\n\n\n\n<p><strong>Is there anything else I should do?<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Save a copy of your unofficial transcript after final grades are submitted. After your Username is deactivated, you will no longer be able to access your unofficial transcript\u2014we suggest you save a copy sooner rather than later. After your Username is deactivated, you will have to request an official copy for a fee, as directed by the Registrar\u2019s&nbsp;<a href=\"http:\/\/www.registrar.clemson.edu\/html\/transcript.htm\">transcripts page<\/a>.<\/li>\n\n\n\n<li>Save a copy of your tax records. After your Username is deactivated, you will no longer be able to access iRoar for your billing information. If your account is deactivated and you need to get these records, contact CCIT at (864) 656-3494.<\/li>\n<\/ul>\n\n\n\n<p>If you have any questions or need assistance, please contact CCIT Support by calling\/texting (864) 656-3494, emailing&nbsp;<a href=\"mailto:ITHELP@clemson.edu\">ITHELP@clemson.edu<\/a>&nbsp;or starting a chat by clicking the orange chat box on this page.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Graduation is an exciting time for every Tiger, but it unfortunately does mean a change to some of the software and services you\u2019ve grown accustomed to during your time at Clemson. Luckily, with a few minutes of review, you can prepare your technology and data for graduation. Frequently Asked Questions Do I keep my Clemson [&hellip;]<\/p>\n","protected":false},"author":4202,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[128194],"tags":[],"coauthors":[128195],"class_list":["post-340","post","type-post","status-publish","format-standard","hentry","category-miscellaneous"],"fimg_url":false,"_links":{"self":[{"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/posts\/340","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/users\/4202"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/comments?post=340"}],"version-history":[{"count":0,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/posts\/340\/revisions"}],"wp:attachment":[{"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/media?parent=340"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/categories?post=340"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/tags?post=340"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/blogs.clemson.edu\/ccit\/wp-json\/wp\/v2\/coauthors?post=340"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}]