Wireless network change – new wireless network certificate

On December 5, 2019, there will be a new certificate for our eduroam and Michigan Tech wireless networks. In some cases, it will only be necessary to trust the new certificate to connect, while others will need to follow additional instructions after accepting the new certificate.

Each device (Windows, Mac, Android, iOS) will show a different prompt, and will display “login.mtu.edu” for the name of the new certificate. Some devices may need to have the old network profile removed in order to connect. Use the following instructions for your operating system:

Installing the eduroam CAT installer

Starting in the Fall of 2020, the MichiganTech wireless network will be replaced by eduroam. We recommend that you install and begin using eduroam now to avoid needing to do so in the Fall.

Instructions for installing the eduroam CAT installer are below:

If you have any questions or need additional assistance, we can help. Contact IT at it-help@mtu.edu or call 906-487-1111.

VCash Login Screen

Starting Friday, December 6, you will see a new VCASH login screen that resembles Windows 10. The navigation bar at the bottom of the screen will also appear similar to Windows 10. 

Old Login Screen and start menu/taskbar:

Old login screenOld menu









New Login Screen and start menu/taskbar:
New login screen









These changes are from an upgrade to your VCASH server. No changes are being made to the VCASH home screen or the links on the page.

Get Smart! Mitigating Risks in Connected Devices

Connected devices shown in house with person standing next to the datacenter

Smart/IoT devices may be the panacea for consumer convenience. Do you want to know and change the temperature of your house or even your fridge remotely? There’s an app for that. Such devices also raise extreme privacy concerns about the data collected about you. Devices can track or discern details about your life based on usage and interaction. And that data could potentially be aggregated with data coming from other smart devices, painting a fairly robust and accurate profile of you and your life. My fitness-tracking device serves as my wake-up alarm. Not only does it track the time that I set for the alarm, it also tracks my interaction when I shut it off. Maybe your coffee maker tracks when you start the brew (mine doesn’t because I’m Coffee Old School). My car tracks what time I start it, how far I drive it, and the GPS location where I park it. These data points are provided to me as the consumer but are also presumably stored by the device provider. It’s only 9:00 a.m. and my smart world already has collected or observed several key privacy factoids about me. And where data exist, risk to data exposure also exists.

Devices geared toward consumers will continue to push convenience over privacy, and consumers will continue to call for greater connectivity and convenience. That means more connected devices and ongoing evolution for more information, interaction, integration, and automation. It’s no longer a question of whether your home devices should be connected. Instead, we need to proactively assess the risks of such connectivity. When those risks are greater than our threshold risk tolerance, we need to take steps to minimize those risks.

Take the following steps to protect yourself when you start using a new device:

  • When you bring home a new consumer device, check to see if it’s transmitting. Ask whether you need that device to be connected. What are the advantages of having your fridge broadcast the whereabouts of your cheese? Is the potential to activate remote maintenance with the device provider important to you? Do you want to interact with that device remotely? Then by all means, keep that connection. If you don’t need the maintenance options or to monitor or interact with the device remotely, turn off the device’s connectivity.
  • Periodically scan your networks to make sure you know and manage what’s online. If you want devices to be connected, be proactive. Find out how they connect; how devices are patched; what the default security settings are; and what data are collected and how/when/where the data are transmitted. Protect your home wireless network(s) with strong password management, active maintenance practices, and vigilance.
  • Use the same cybersecurity hygiene on your smart devices that you use on your computer. While it may be revolutionary that your car is now essentially a computer on wheels, it’s still just a computer. You don’t have to become a cybersecurity expert, but you may want to find a few trusted sources of security advice for consumers.

It’s time to get smart about your devices, manage them appropriately, and reap the rewards of their convenience.

word cloud of connected information