It appears that your browser does not support JavaScript. We use JavaScript on our website to display some information. Please use a browser that supports JavaScript.

About Us

Midwestern State University's Information Technology department is located on our Wichita Falls campus, in the Memorial Building. We provide the following services:
  • Account creation, maintenance, and deletion
  • Audio/Visual Equipment, Setup, Recordings
  • Classroom Technology Quotes, Installation, Support
  • Computer/Printing Lab Management
  • Course Evaluations
  • Data Backup, Storage, Reporting and Recovery
  • Digital Signage
  • Hard Drive Removal
  • Hardware Quotes, Installation, Support
  • Infrastructure
  • Laptop Updates and Repairs (MSU property)
  • Login Assistance 
  • Office technology Installation, Moves, Support
  • Portal Login
  • Software Vetting, Quotes, Installation, Support
  • Telecommunications Services
  • Third Party Application Support
  • Wired and Wireless Infrastructure

Other helpful links:

Project TypeNameCompletion TimeframeProgress Notes
Current Projects
ADA IT ComplianceSpring/Summer 2017/Fall 2017Ongoing
CRM Graduate StudiesSummer/Fall 2017Ongoing
Information Security ProgramFall 2017/Spring 2018Ongoing
Degree WorksSpring 2018In progress
TimeClocks PlusFall 2017Pilot in progress
TRAQS - TRSFall 2017Implemented
Looking GlassSummer/Fall 2017
Ellucian Solutions ManagerFall 2017Complete
Banner8 to Banner9Spring/Summer 2018On schedule
Domain Name ChangeFall 2018Ongoing
Facilities Services TrackIT License and ServerFall 2017Installed
Wepa Printing PilotFall 2017Kiosks available for use
Handshake IntegrationFall 2017
Capital Projects
Mass CommunicationSpring/Summer 2017Complete
Fain Fine ArtsSummer/Fall 2017Complete
Flower MoundFall 2017On schedule
Health SciencesFall 2018On schedule
LibraryFall 2018On schedule
IT HEAF
Computer Lab UpgradesSpring/Summer 2017Complete
Lab Server and AD UpgradeSpring/Summer 2017Complete
Classroom TechnologySummer 2017Complete
Wi-Fi Upgrades and ReplacementsSummer/Fall 2017Complete
Switch ReplacementsSummer/Fall 2017Ongoing
Computer Lifecycle ReplacementFall 2017/Spring 2018Ongoing - Process being drafted
Electronic SignaturesFall 2017

Known Issues
  • Petya Ransomware attack - Tuesday, June 27, 2017

    MSU IT would like to make all MSUnet users aware of another ransomware attack currently underway.   So far, systems in Spain, France, Ukraine, and Russia have been taken hostage and threat intelligence agencies report that it is expected to go world-wide rather quickly.  The ransomware, named Petya, purportedly utilizes the Eternal Blue tools leaked from the US National Security Agency by a hacking group known as The Shadow Brokers. 

     

    The ransomware delivered in this attack presents a message like the one shown below to infected users.Petya Ransomware
    If you are presented with a message like the example shown above, turn off your computer immediately and call Information Technology at 4278.

    To help IT help you protect your digital resources please remember your training and watch for the following red flags when dealing with unexpected or unknown email:
    1. Were you expecting the email? If not take a much more critical view of opening the message and reach out to the purported sender to validate the message before clicking links or opening attachments.
    2. Inspect all aspects of the email. Mouse over the links without clicking them and if the link looks odd reach out to the purported sender to validate the message before clicking links or opening attachments.

As faculty and staff of Midwestern State University, it is up to all of us to help prevent successful cyber-attacks by maintaining vigilance in our online activity.

  • WannaCry Ransomware attack - Friday, May 12, 2017

    MSU IT would like to make all MSUnet users aware of a worldwide ransomware attack currently underway. So far over 45 thousand attacks have been reported by the SANS Internet Storm Center and infections have been seen in 74 different countries. The attacks purportedly utilize tools leaked from the US National Security Agency by a hacking group known as The Shadow Brokers.

    The ransomware delivered in this attack presents a message like the one shown below to infected users.
    WannaCry Ransomware Example
    If you are presented with a message like the example shown above, turn off your computer immediately and call Information Technology at 4278.

    To help IT help you protect your digital resources please remember your training and watch for the following red flags when dealing with unexpected or unknown email:
    1. Were you expecting the email? If not take a much more critical view of opening the message and reach out to the purported sender to validate the message before clicking links or opening attachments.
    2. Inspect all aspects of the email. Mouse over the links without clicking them and if the link looks odd reach out to the purported sender to validate the message before clicking links or opening attachments.
  • Spora Ransomware - Thursday, May 4, 2017

    The unfortunate user who is attacked by this ransomware is presented with a ransom screen that is similar to the examples shown below and once a user is presented with one of these messages the damage has already been done. All the data on your computer at this point are most likely irretrievable.

    Spora Example
    This ransomware goes by the name Spora and is a professionally coded product that seems to have been developed by an especially well prepared team of Russian cyber criminals. Spora can sit idle on your system and can detonate the malicious payload even when you are not connected to the Internet.

    Spora is delivered in a variety of ways but predominantly by phishing emails that lure a recipient into clicking a dangerous link or opening a malicious attachment.

    To help IT help you protect your digital resources please remember your training and watch for the following red flags when dealing with unexpected or unknown email:
    1. Were you expecting the email? If not take a much more critical view of opening the message and reach out to the purported sender to validate the message before clicking links or opening attachments.
    2. Inspect all aspects of the email. Mouse over the links without clicking them and if the link looks odd reach out to the purported sender to validate the message before clicking links or opening attachments.
  • Google Docs phishing incident - Wednesday, May 3, 2017

    Accounts from public email services such as Yahoo, Google, and Outlook.com that have been compromised are being used to send emails similar to the example shown below:
    Google Docs Attack
    If you receive such an email, please forward it to phishingreports@mwsu.edu and then delete it immediately. The “Open in Docs” link leads to a malicious site hosted in the public Google hosting environment. Google has been made aware of this scheme and is working to shut it down.

Supported Hardware and Software

At this time, MSU Information Technology does not work on any hardware not owned by Midwestern State University.

Supported Hardware
Dell Optiplex 390Dell Optiplex 390
Dell Latitude Exx10
  • E6510, E6410, etc.
Dell Latitude 6410
Mac products
  • Must support Yosemite or newer
Mac DesktopMacbook Air

Supported Software
A list of our currently supported software is available upon request.

Students may access Microsoft Office 365 for free through the Microsoft website at the Office 365 for Students site.

About Information Security

Information Security works closely with Information Technology and other administrative areas to ensure the safety of data and resources, including Personally Identifiable Information. MSU Information Security provides the following services:

  • Compliance
  • Data Classification
  • Hardware Disposal
  • IT Risk Assesment
  • Phishing Archive
  • Resources for Security
  • Security Awareness Training
  • Tools and Tips

Visit our Information Security site here: MSU Information Security