- Connecting to the Internet
- Registering Your Devices
- Guest Wifi Access
- Network Safety and Security
- VPN (Virtual Private Network)
- Internet Security Threats
- Information Security and Acceptable Use of Technology Policy (log in with your Carthage credentials)
Connecting to the Internet
Carthage provides wifi coverage to residence halls and most other campus locations. Wired ethernet connections are also provided in each room.
CONNECTING USING WIRELESS (WIFI)
To connect using wifi, look for the wireless network (SSID) Carthage-Open or Carthage-Secure. Both are safe and operate at the same speeds; Carthage-Secure offers an added layer of encryption, but isn’t always compatible with every device, so use whichever one works for you. There are no passwords for our network; however, once your device connects to the selected wireless network, it must be registered in order to work. Instructions for device registration are shown below.
CONNECTING THROUGH A WIRED CONNECTION (ETHERNET)
If you want a faster, more reliable connection, or if your device does not support wifi, there is one active ethernet jack in each residence hall room. Please look for the yellow jack or the one in the upper left-hand corner of your wall plate, depending on the location. Please provide your own ethernet cable as well as a USB to ethernet adapter if needed.
Registering Your Devices
When you arrive on campus each of your devices needs to be registered to connect to the Carthage network and the internet. How you register your device will depend on whether the device has a browser. In order to register, you must know your Carthage username and password. If you forgot your password, go to the Password Manager to reset it.
REGISTERING DEVICES WITH BROWSERS
If your device has a built-in browser, first connect to wifi or a wired connection, then open your browser to any web address. You should be immediately sent to the registration page. Check the box to accept the “Acceptable Use Policy,” and then enter your Carthage username and password. Registrations are valid for 180 days. Once you have registered your device, you can use the internet on campus.
REGISTERING DEVICES WITHOUT BROWSERS
If your device does not have a browser, you will need to register it manually using another computer or device that already has network access. If you are trying to connect a Chromecast please consult this guide. If you are still having trouble, please send an email to firstname.lastname@example.org.
- Follow these steps:
- Visit the Carthage Network Access form (connect.carthage.edu)
- Read the “Acceptable Use Policy” and click the box next to “I accept the terms.”
- Log in with your Carthage username and password
- Click “Log in.”
- On the next screen you will need to supply your MAC address and your device type. The MAC address needs to be entered in the following format: XX:XX:XX:XX:XX:XX. (Find the MAC address for your device)
- Select your device type from the dropdown menu. If you do not see the appropriate device type choose “Other.”
- Click “Register.” Registrations are valid for 180 days.
- Restart the device you just registered.
- You may check the status of your device registration here.
Checking the registration status of your devices
Users may check the registration status of their devices at this website: https://connect.carthage.edu/status. On this page, click the box next to “I accept the terms” and enter your Carthage username and password. You should see a list of the devices you have currently registered for use on the Carthage network.
Guest Wifi Access
SODEXO, SECURITY, BARNES & NOBLE
Employees that work on the Carthage campus but aren’t employed by the College may access the wifi network using Guest Access. If an employee of one of the above departments would like access to the wifi on a more permanent basis, they may request that through their supervisor. The employee’s supervisor should then contact Human Resources to talk about provisioning contract employees as Carthage employees.
CAMP AND CONFERENCE GUESTS
People visiting the Carthage campus for a fixed amount of time may connect to the wifi network using Guest Access. Users may request further services during a camp or conference (wifi or printing access) via Kevin Slonac, the Director of Conferences and Manager of the TARC (email@example.com).
Users without an @carthage.edu email address: You must sign in to the campus wifi as a guest user. Open a browser and follow the directions on the form to request guest wifi access on your personal device on campus. Consult this page for further information on connecting as a guest.
Please contact the Hedberg Library Information Desk (262-551-5950 or email firstname.lastname@example.org) if you need assistance.
Network Safety and Security
Cybercrime has been increasing exponentially in the last few years and it can harm you personally, professionally, and due to your privileged access to college date, your action or inaction can also impact students and the College. Good security is everyone’s responsibility. Library and Information Services wants to provide tools and resources for all members of the Carthage Community to take responsibility for IT Security.
Take a look at LIS’ Information Security presentations below for more information.
- Information Security Part 1: Best Practices
- Information Security Part 2: Information Security at Carthage
- Security Awareness Questionnaire (make sure you are logged in to your Carthage Google Apps account)
Educate yourself on how to identify and avoid phishing attacks
Carthage occasionally will be targeted in phishing attacks, that will attempt to obtain access to users’ accounts. Phishing attacks can steal, alter, or destroy your data. They may introduce viruses, adware, spyware, or ransomware to your computer or device. They may obtain your password or other data for malicious use. Phishing attackers may pose as a reputable entity and may be convincing (the emails may have company logos, legitimate phone numbers, links to actual company websites, or email signatures of actual people you know). They may use scare tactics that come from emails, phone calls, text messages, or abandoned flash drives.
To protect yourself, be suspicious. Watch for messages with spelling or grammatical errors. Beware of messages urging you to take action - asking you to send sensitive information, clicking a link, or downloading an attachment. Keep an eye out for emails from people you don’t know, or people making odd requests or asking you provide information. Check the sender’s email address to make sure it is legitimate. If it is from someone you know, ask if they really sent it.
When using public computers, never use the “stay signed in” offer. Don’t let the browser remember your passwords. Be sure to sign out of any accounts; don’t just close the browser window. Clear your browsing and download history, delete cookies and passwords.
Secure Your Devices
- Have a strong password/passcode on all of your devices.
- Ensure software is up-to-date. Turn on automatic updates where possible.
- Lock your device when you walk away from it.
- Encrypt internal and external storage drives.
- Physically secure your devices in your work area to reduce theft.
For more information on securing specific devices, visit our FAQ at https://albert.carthage.edu and search for the following articles:
Use Strong Password Management Practices
- Don’t tell the truth: Don’t use information about yourself or your life that could be looked up, including the names of your pets, your hometown, the name of your spouse or partner, etc.
- Don’t make sense: There is no reason for your password to make sense. Passwords that make sense are easier to predict, which makes them easier to crack.
- Avoid predictable phrases: Avoid using quotes or names of characters from pop culture. Use a password/passphrase that is 12 or more characters in length and has a combination of upper- and lowercase letters, numbers, and symbols. The more characters, the harder your password is to hack.
- Avoid obvious punctuation: Replace the letter “o” with zeros, the letter “a” with @, etc.
- Never have multiple accounts with the same password: If one account is compromised, the other will be compromised as well.
- Treat important accounts with extra care: Use separate browsers for work and play. Clear your browser history before logging in to an important account.
- Don’t write down your password and store them near your computer.
- Don’t let browsers store passwords for you.
Enable Multi-Factor Authentication
Carthage requires 2-factor authentication (also called 2-step verification or multi-factor authentication) for all Carthage faculty and staff Google Apps accounts. Multi-factor authentication requires the user to have both the correct account password AND access to a specific telephone or mobile device, making it much harder for a cyber attacker to use a lost or stolen password to access your account. Logging in to your account requires you have something you know and something you have.
- Why you need 2-step verification
- How it works
- How to enable 2-step verification in my Carthage gmail account
Limit Use of Public Wi-Fi
- Be skeptical of all public wifi (especially wifi accounts called TWCWiFi, attwifi, and Free Wi-Fi; hackers know these are common wifi accounts so they will disguise unsafe accounts with these names).
- Check the authenticity of public wifi before connecting: Ask the owner of the hotspot for the correct network name and password.
- Read the terms and conditions carefully before you agree.
- If utilizing public wifi, avoid using sites that transmit personal or sensitive information (such as email, banking, shopping, etc.)
- Utilize a secure VPN connection when on public wifi.
- “Forget” the network on your device when you are done with it.
- Turn of wi-fi when you are not actively using it.
- Choose encrypted networks/password-protected (secure) networks when possible.
This website provides a good summary of the above information.
Secure Carthage Data
In addition to our need to protect Carthage student, parents, staff, faculty, and the College from data insecurities, we have growing legal and contractual requirements to adhere to. Many federal mandates now require policies, procedures, and breach disclosures related to cyber security. The Carthage IT Security and Acceptable Use of Technology Policy was defined to clearly communicate these cyber security expectations and meet the requirement for a formal security policy.
- All Carthage data must be stored in LIS-approved applications or LIS-approved storage drives.
- G Suite for Education(i.e. Gmail, Google Drive, Google Apps) is the only authorized cloud data repository for individual or team storage of unstructured data.
- If temporary local copies of data are needed, they must be uploaded to an LIS-approved storage drive on a periodic basis to minimize the risk of loss.
- You must use a password-protected screen saver if you deal with confidential data.
VPN (Virtual Private Network)
VPN, or Virtual Private Network, is a technology that creates a safe and encrypted connection over a less secure network, such as the Internet. LIS offers VPN services to Carthage staff and faculty who require it to perform their job duties. The typical use case for VPN is a need to access enterprise systems (CX, JX, OnBase, etc….) from off-campus. Beyond that, each VPN request is considered on a case-by-case basis. Permissions for VPN can be requested by your supervisor by sending an email to email@example.com.
Carthage’s VPN service utilizes two-factor authentication (2FA) when authenticating to provide an extra layer of protection. 2FA requires you to both know something (a password) and have something (typically a smartphone to receive a ‘push notification’). 2FA is currently provided through Duo. Information pertaining to VPN and 2FA may be found here.
If you require VPN services but do not have access to a smartphone, 2FA can be achieved with a Duo hardware token. Hardware tokens provide randomly generated one-time codes. Your supervisor may request a hardware token on your behalf by sending an email to firstname.lastname@example.org. If you plan on requesting a hardware token, please consider the following:
- LIS will provide an initial hardware token to your department at no cost.
- LIS will replace tokens when the battery dies.
- Your department will be charged $20 to replace lost/stolen/broken tokens.
- Tokens are to be returned to LIS when an employee leaves or no longer requires VPN services.