Skip to main content
Skip to main content

IT Security Bulletin

Current Issue (August 2016)

IT Security Bulletin

The IT Security Bulletin is sent on a quarterly basis (semiannually to students) or as needed to inform the WKU community of IT security issues and best practices.  If you have any questions, please contact IT Support via one of the methods listed at

Securing the Human

WKU now has SANS Securing the Human (StH) training available to all faculty, staff, and student employees.  StH training can be beneficial to any WKU employee that is required to use a computer.  To find out more about the training, visit

Incident Response

Do you know how to report an IT security incident? For example, you responded to a phish or you suspect one of your accounts or systems has been compromised?  Check out the new button on the IT Security web site at

Incident Report Button

Use this new form if you need to report an IT security incident.  It is important to report IT security incidents as soon as possible in order for them to be investigated in a timely manner.


Phishing scams continue to be a security threat to WKU as well as other organizations.  WKU IT will never ask you for your password.  A lot of recent phishing attempts appear to be from WKU IT warning you that your mailbox is being moved, has been compromised, or is full.  Please forward any email that you think may be a phishing attempt to

You can learn more about phishing scams at

Phish Bowl

A new website has been created by WKU IT with recent examples of phishing emails.  We call it the “phish bowl.”

Phish Bowl Example

The Phish Bowl and the IT Twitter account (@WKUIT) publish the most recent known examples of phishing affecting WKU email and TopperMail.  Check out the Phish Bowl often for updates.

Network Security

In order to enhance network security for the WKU campus, we are now blocking incoming connections to residence hall and WKU-WIRELESS networks that originate from the Internet.  The vast majority of people on campus, even those in residence halls, will not notice this change.  Essentially, we are making the network at like your home router, which also blocks this type of traffic by default.  If you have questions, please contact the IT Helpdesk.

University Policy

All users of WKU Information Technology resources, including but not limited to WKU employees and students, are required to read and understand WKU’s IT policies.  Failure to understand and abide by these policies could not only result in disciplinary action but could expose the University or you to various liabilities.  IT policies, like technology in general, evolve over time, so it is a good idea to review them regularly for changes.  Please see the IT policy web site for more information:

Note: documents in Portable Document Format (PDF) require Adobe Acrobat Reader 5.0 or higher to view,
download Adobe Acrobat Reader.

Note: documents in Quicktime Movie format [MOV] require Apple Quicktime,
download quicktime.

 Last Modified 1/23/18