It appears that your browser does not support JavaScript. We use JavaScript on our website to display some information. Please use a browser that supports JavaScript.

About Us

Midwestern State University's Information Technology department is located on our Wichita Falls campus, in the Memorial Building. We provide the following services:
  • Audio/Visual Services
  • Classroom/Distance Learning
  • Computer Lab Management
  • Course Evaluations
  • Data Backup
  • Data Center
  • Data Recovery
  • Digital Signage
  • Distance Learning
  • Email and Calendar
  • Equipment Moves
  • Faculty/Staff Accounts
  • Hard Drive Removal
  • Hardware Installation
  • Hardware Quotes
  • Hardware Support
  • Infrastructure
  • Internet Native Banner
  • Laptop Updates
  • Login Assistance
  • Podium Support
  • Portal Login
  • Printing
  • Projector Support
  • Reporting
  • Software Installation
  • Software Quotes
  • Software Support
  • Student Accounts
  • Survey Tools
  • Telephone Services
  • Third Party Application Support
  • Wired Networks
  • Wireless Networks

Other helpful links:

Project TypeNameCompletion Timeframe
Current Projects
ADA IT ComplianceSpring/Summer 2017
CRM Graduate StudiesSpring/Summer 2017
Information Security ProgramSpring/Summer/Fall 2017
Degree WorksSummer/Fall 2017
TimeClocks PlusSummer/Fall 2017
TRAQS - TRSSummer/Fall 2017
Application NavigationSummer/Fall 2017
Looking GlassSummer/Fall 2017
Ellucian Solutions ManagerFall 2017
Banner8 to Banner9Spring/Summer 2018
Domain Name ChangeFall 2018
Capital Projects
Mass CommunicationSpring/Summer 2017
Fain Fine ArtsSummer/Fall 2017
Flower MoundFall 2017
Health SciencesFall 2018
LibraryFall 2018
IT HEAF
Computer Lab UpgradesSpring/Summer 2017
Lab Server and AD UpgradeSpring/Summer 2017
Classroom TechnologySummer 2017
Digital Signage (Visix)Summer 2017
Wi-Fi Upgrades and ReplacementsSummer 2017
Switch ReplacementsSummer 2017

Known Issues
  • Petya Ransomware attack - Tuesday, June 27, 2017

    MSU IT would like to make all MSUnet users aware of another ransomware attack currently underway.   So far, systems in Spain, France, Ukraine, and Russia have been taken hostage and threat intelligence agencies report that it is expected to go world-wide rather quickly.  The ransomware, named Petya, purportedly utilizes the Eternal Blue tools leaked from the US National Security Agency by a hacking group known as The Shadow Brokers. 

     

    The ransomware delivered in this attack presents a message like the one shown below to infected users.Petya Ransomware
    If you are presented with a message like the example shown above, turn off your computer immediately and call Information Technology at 4278.

    To help IT help you protect your digital resources please remember your training and watch for the following red flags when dealing with unexpected or unknown email:
    1. Were you expecting the email? If not take a much more critical view of opening the message and reach out to the purported sender to validate the message before clicking links or opening attachments.
    2. Inspect all aspects of the email. Mouse over the links without clicking them and if the link looks odd reach out to the purported sender to validate the message before clicking links or opening attachments.

As faculty and staff of Midwestern State University, it is up to all of us to help prevent successful cyber-attacks by maintaining vigilance in our online activity.

  • WannaCry Ransomware attack - Friday, May 12, 2017

    MSU IT would like to make all MSUnet users aware of a worldwide ransomware attack currently underway. So far over 45 thousand attacks have been reported by the SANS Internet Storm Center and infections have been seen in 74 different countries. The attacks purportedly utilize tools leaked from the US National Security Agency by a hacking group known as The Shadow Brokers.

    The ransomware delivered in this attack presents a message like the one shown below to infected users.
    WannaCry Ransomware Example
    If you are presented with a message like the example shown above, turn off your computer immediately and call Information Technology at 4278.

    To help IT help you protect your digital resources please remember your training and watch for the following red flags when dealing with unexpected or unknown email:
    1. Were you expecting the email? If not take a much more critical view of opening the message and reach out to the purported sender to validate the message before clicking links or opening attachments.
    2. Inspect all aspects of the email. Mouse over the links without clicking them and if the link looks odd reach out to the purported sender to validate the message before clicking links or opening attachments.
  • Spora Ransomware - Thursday, May 4, 2017

    The unfortunate user who is attacked by this ransomware is presented with a ransom screen that is similar to the examples shown below and once a user is presented with one of these messages the damage has already been done. All the data on your computer at this point are most likely irretrievable.

    Spora Example
    This ransomware goes by the name Spora and is a professionally coded product that seems to have been developed by an especially well prepared team of Russian cyber criminals. Spora can sit idle on your system and can detonate the malicious payload even when you are not connected to the Internet.

    Spora is delivered in a variety of ways but predominantly by phishing emails that lure a recipient into clicking a dangerous link or opening a malicious attachment.

    To help IT help you protect your digital resources please remember your training and watch for the following red flags when dealing with unexpected or unknown email:
    1. Were you expecting the email? If not take a much more critical view of opening the message and reach out to the purported sender to validate the message before clicking links or opening attachments.
    2. Inspect all aspects of the email. Mouse over the links without clicking them and if the link looks odd reach out to the purported sender to validate the message before clicking links or opening attachments.
  • Google Docs phishing incident - Wednesday, May 3, 2017

    Accounts from public email services such as Yahoo, Google, and Outlook.com that have been compromised are being used to send emails similar to the example shown below:
    Google Docs Attack
    If you receive such an email, please forward it to phishingreports@mwsu.edu and then delete it immediately. The “Open in Docs” link leads to a malicious site hosted in the public Google hosting environment. Google has been made aware of this scheme and is working to shut it down.

Planned Outages
There are currently no planned outages to report.


About Information Security

Information Security works closely with Information Technology and other administrative areas to ensure the safety of data and resources, including Personally Identifiable Information. MSU Information Security provides the following services:

  • Compliance
  • Data Classification
  • Hardware Disposal
  • IT Risk Assesment
  • Phishing Archive
  • Resources for Security
  • Security Awareness Training
  • Tools and Tips

Visit our Information Security site here: MSU Information Security