AJU’s Campus Technology Department (CTD) strives to integrate the latest information technology. By bringing together many systems and products we provide a uniquely tailored experience. This enhances the learning process of our students and the productivity of our staff.
Campus Technology Department
323-205-5060
supportxoverture.com (support[at]xoverture[dot]com)
-
Email
AJU Email
American Jewish University utilizes Outlook as our primary email service. Students should have already received information on initial setup and access.
- Online access: http://www.outlook.com/aju.edu
- Password Recovery: Email supportXoverture.com (support[at]Xoverture[dot]com) for assistance.
AJU Email Policy
-
Wireless Access
Connecting to Wireless Internet at American Jewish University
If you have an AJU Email Address
- Click to view available wireless networks (This will vary by device and operating system, on a laptop the icon should be located in the taskbar. On a smartphone or tablet, wireless networks should be under settings).
- Once you connect you will be redirected to a log-in page, enter your user name (same as your email address without "@aju.edu"), and your password.
If you are a guest visiting the University
- Click to view available wireless networks (This will vary by device and operating system, on a laptop the icon should be located in the taskbar. On a smartphone or tablet wireless networks should be under settings).
- Look for wireless name “AJU-Guest”
- Once you connect to AJU-Guest, you will be directed to log-in page as shown in the picture above.
- Enter access Code as ajuguest
- Login, and it should connect you to the wifi
-
Digital Research Access
Digital Research database available online for AJU Faculty and Students. Please follow the link in order to use the library database: www.aju.edu/ostrow-academic-library/research-databases.
All the links on the database page are accessible using the AJU email and password.
-
Email Phishing and Digital Security
Best Practices to Avoid Phishing: Protecting Your Digital Security
At American Jewish University, we prioritize your digital security and want to ensure that you are well-informed about phishing and how to stay safe online. A phishing attempt is a fraudulent email where scammers try to obtain sensitive information by masquerading as trustworthy sources. We urge all students and faculty to be vigilant and follow these best practices to avoid falling victim to phishing attacks:
- Be wary of suspicious emails: Take a moment to assess incoming emails before clicking any links, images, attachments, or replying to the message. Look out for these red flags that may indicate a phishing attempt:
- Requests for personal information: Legitimate organizations rarely ask for sensitive data via email, and even less frequently when it is an unprompted or unsolicited request.
- Urgency or threats: Phishers often create a sense of urgency or embarrassment to pressure you into acting without thinking. Take your time when an email comes across with these tones and always get a second opinion if you’re not sure an email is legitimate.
- Poor grammar or spelling mistakes: Professional emails are generally well-written and proofread. Grammatical errors or a lack of addressing you by the correct name, title, or position can be an easy way to identify a phishing email.
- Suspicious email addresses: Check the sender's email address for any abnormalities or inconsistencies. The sender’s name may be presented as someone you know, but a closer look at the email address can identify a phishing attempt for what it is with an unknown or seemingly random address.
- Examine hyperlinks carefully: Phishers often include deceptive links in their emails. Before clicking on any link, hover your mouse over it to reveal the underlying URL.
- Watch out for these warning signs:
- Misspelled or altered website addresses. Phishers may manipulate URLs to mimic legitimate websites, sometimes adding or changing a single number or letter.
- Unusual domain names. Be cautious of websites that use different domain names compared to the genuine organization.
- Unexpected redirects. If a link unexpectedly takes you to a different website, it could be a phishing attempt.
- Watch out for these warning signs:
- Think before you share personal information: Legitimate organizations typically have secure methods for collecting sensitive data. Avoid providing personal information, such as passwords, social security numbers, or financial details, via email or unsecured websites.
- Keep your software up to date: Ensure that your computer, smartphone, and other devices have the latest security updates installed. Regularly update your operating system, web browser, and antivirus software to protect against known vulnerabilities that phishers may exploit.
- Enable two-factor authentication (2FA): Whenever possible, enable 2FA for your online accounts. This adds an extra layer of security by requiring a second form of verification, such as a unique code sent to your mobile device.
What Do I Do?
If you suspect you have interacted with a phishing email:
- Do not panic. It's important to remain calm and take swift action.
- Report the incident: If you received the phishing email to your AJU email address, forward the suspicious email to support [at] xoverture.com, our IT support team. They will investigate the issue and provide guidance on the necessary steps to take.
- Change your passwords: If you have shared your log in credentials, change your passwords for all relevant accounts immediately. Always use strong, unique passwords that combine uppercase and lowercase letters, numbers, and symbols.
Remember, staying vigilant and informed is crucial in safeguarding your personal information online. By following these best practices, you can help create a safer digital environment within our university community.
If you have any further questions or concerns regarding phishing or digital security, don't hesitate to reach out to our IT support team at support [at] xoverture.com. We are here to assist you.
- Be wary of suspicious emails: Take a moment to assess incoming emails before clicking any links, images, attachments, or replying to the message. Look out for these red flags that may indicate a phishing attempt:
-
Help Desk
The campus technology department provides assistance to the campus community utilizing an online ticketing system. Visit this link for more information: https://www.aju.edu/current-students/helpdesk.