Category Archives: Security

Don’t be tricked by gift card scammers

Michigan Tech and other universities have seen an increase in gift card scams. These scams have become more and more common on campus.

What the scam sequence might look like:

  1. You receive a message that appears to be from a coworker or associate.
  2. The message asks if you are available to do something for the sender.
  3. By replying, you will likely receive a second message.
  4. This one will claim that the sender is busy and can only be contacted by email.
  5. The sender (scammer) will ask you to do something for them. (This often includes purchasing gift cards or initiating a wire transfer for the scammer).

As with phishing, you are your best advocate; be diligent and protect yourself. Make sure to look at the sender’s email address. If it seems suspicious, it probably is. When in doubt, reach out to Michigan Tech IT.

We can help. If you have any questions, contact us at it-help@mtu.edu or call 7-1111.


Tips on using Duo

Michigan Tech faculty and staff may access their 2019 Open Enrollment through MyMichiganTech or Banweb. We want to remind you that Duo Two-Step is used for this access. Below are some tips for using Duo. We also have more information about Duo in our Knowledge Base.

Setting up multiple devices

We recommend that you set up a secondary device in case you need to authenticate and don’t have your primary device handy. Some popular combinations our IT staff uses are:

  • Mobile device/office phone
  • Mobile device/home phone
  • Mobile device/token generator

Generate a security code with your mobile app

Trying to authenticate with your mobile device without cell service? No problem. Duo’s Mobile app acts as a token generator and can generate a one-time security code even if you have no cell service or WiFi. Just click the arrow icon on the right to generate a one-time security code.

click the arrow and Duo will generate a security code without cell service

Remember me

For your convenience, you can select Remember me for 30 days when logging in on your personal device and Duo will remember and not ask to authenticate for 30 days on that device.

check the remember me for 30 days for Duo to remember your device

More questions on Duo? We can help. Contact us at it-help@mtu.edu or 7-1111.


Cyber Security Careers—Michigan Tech Alumni

This week’s theme for National Cyber Security Awareness Month is “Educating for a Career in Cyber Security.” We wanted to take this opportunity to acknowledge and highlight Michigan Tech Alumni who have gone on to focus their careers in Cyber Security.

Carolyn RowlandCarolyn Rowland graduated in 1992 with a BS in Scientific and Technical Communications / CS option. She spent a few years working in the Metallurgical and Materials Engineering Department at Michigan Tech as a Unix System Administrator until she moved to Maryland to work at NIST as a Unix System Administrator with a focus on IT security. She has since become the IT Security Officer for the Engineering Laboratory at NIST while also leading a team of system administrators and software developers who specialize in software and systems security. She is also President of the Board of Directors for USENIX, which organizes two security-focused conferences annually: USENIX Security (research and academia) and Enigma (industry).


Jon Welters, Michigan Tech Alumni, at NASAJon Welters graduated from the Computer Networking and Systems Administration program in 2010. His senior project was analyzing virtualization technologies. While attending Michigan Tech, Jon took part in internships at both NASA and Los Alamos National Laboratory. After spending several years as a government contractor supporting digital forensics and incident response, Jon now serves as the Deputy Chief Information Security Officer at NASA Langley Research Center.


Justin Store, IT Security Architect at Michigan TechJustin Store graduated from the Computer Networking and System Administration program in 2011. His senior project involved studying mobile device security, ethical hacking, and penetration testing. After spending several years performing network and system administration, security auditing, and security consulting for Upper Peninsula credit unions, he now works for Michigan Tech as an IT Security Architect where he focuses on security engineering, auditing security controls, incident response, and forensics.