Sorry, we were unable to find this news article.
DCU Pulse VPN Service
Posted by [ISS] Niall Spollen on 26 September 2018 10:46 AM



The Cisco VPN client that you are currently using has reached the end of life and is being replaced with the new DCU Pulse VPN.

All users of the existing DCU VPN service will need to install the new Pulse VPN client to ensure continued remote access to the DCU network.




The new Pulse VPN is future proofed and is available to install on handheld devices such as iPads, iPhones, and Android devices.

To view instructions on how to download and install the new Pulse VPN, please visit:

DCU Pulse VPN 

If you encounter any issues while installing the Pulse VPN client, we would ask you to submit a ticket with as many details as possible so we can assist you with the process.

Thank you for your cooperation.

Read more »

The Use Of USB Keys
Posted by [ISS] Niall Spollen on 26 September 2018 10:43 AM
The use of USB keys
In light of the recent General Data Protection Regulation that came into force on the 25th May, there is an onus on us all to ensure that University and personal data is transferred and stored appropriately. 
It is University policy that all data on mobile devices must be encrypted and the use of USB keys to transfer or store “sensitive personal data” is prohibited. 
Under GDPR, “sensitive personal data” is a specific set of “special categories” that must be treated with extra security. 
Special categories:
  • Personal data revealing racial or ethnic origin.
  • Political opinions.
  • Religious or philosophical beliefs.
  • Trade union membership.
  • The processing of genetic data.
  • Biometric data for the purpose of uniquely identifying a natural person.
  • Data concerning health.
  • Data concerning a natural person’s sex life or sexual orientation.
ISS recommends that you use centrally provided systems and services for the storing and sharing of such data. 

Read more »

New Student Information
Posted by [ISS] Niall Spollen on 26 September 2018 10:40 AM

New Student Information

Information Systems Services have student support desks on all DCU campuses.

Check out our website for all your IT needs:

  1.  Student Apps - Find all your college IT applications in one place, Exam Past papers, Exam Timetables,
  2.  Eduroam - log in with your DCU username and password to connect and access Eduroam worldwide,
  3.  Personal Laptop Maintenance — Install Microsoft Security Essentials, Malwarebytes 
  4.  Loop - DCU’s Virtual Learning Environment (VLE), Course lecture notes, Upload & submit assignments,
  5.  DCU Apps - Unlimited cloud storage with DCU Google Drive to back up all your data, access anywhere,
  6.  DCU Apps - DCU student email, access from anywhere with your DCU username and password,
  7.  Timetable — Search timetables by Programme, Location, Module, Assignment due dates,
  8.  Student Computer Labs — Desktop computers available in multiple locations, no booking required,
  9.  Laptop Loans - Laptops available to loan in both Glasnevin and St Patricks campuses,
  10.  Printing & Photocopying - Print and copy from multiple locations, scan to email and USB stick & printing from your laptop,

Read more »

Information Systems Services - Security Notice
Posted by [ISS] Niall Spollen on 23 June 2017 03:37 PM

ISS Security Notice:

To keep your software updated and the DCU network/connected devices safe from malicious viruses please shutdown your PC at the end of the working day. If you have any concerns or queries please log a ticket with our servicedesk or call ext. 5007.

Read more »

How to spot a Phishing eMail.
Posted by [ISS] Niall Spollen on 23 June 2017 03:33 PM

Phishing emails come in all shapes and sizes, but fortunately, there are some "tells" you can look for to help spot potential scams.


1. It just doesn't look right. ls there something a little off with the emails? Too good to be true? Trust your instincts if they tell you to be suspicious.

2. Generic salutations. Instead of directly addressing you, phishing emails often use generic salutations like "Dear Customer." Using impersonal salutations saves the cyber criminals time so they can maximise their number of potential victims.

3. Links to official-looking sites asking you to enter sensitive data. These spoofed sites are often very convincing, so before revealing personal information or confidential data examine the site to make sure it's real.

4. Unexpected emails that use specific information about you. Information like job title, previous employment, or personal interests can be gleaned from social networking sites like LinkedIn and then used to make a phishing email more convincing. 

5. Unnerving phrases. Thieves often use phrases meant to scare you (such as saying your account has been breached) to trick you into acting without thinking, and in doing so revealing information you ordinarily would not.

6. Poor grammar or spelling. This is often a dead giveaway. An unusual syntax is also a sign that something is wrong.

7. A sense of urgency. For example: "If you don't respond within 12 hours, your account will be closed." By convincing you the clock is ticking, thieves hope you'll make a mistake.

8. "You've won the grand prize!" These phishing emails are common but easy to spot. A similar, trickier variation is asking you to complete a survey (thus giving up your personal information) in return for a prize.

9. "Verify your account." These messages spoof real emails asking you to verify your account with a site or organisation. Always question why you're being asked to verify - there's a good chance it's a scam.

10. Cybersquatting. Often cyber criminals will purchase and "squat" on website names that are similar to an official website in the hopes that users go to the wrong site, such as vs. Always take a moment to check out the URL before entering your personal information.


An example of a Phishing eMail from a bank to a DCU eMail a/c 

Read more »

Information on Phishing eMails
Posted by [ISS] Niall Spollen on 04 May 2017 12:50 PM

What is a Phishing eMail?

A phishing email tries to trick you into revealing personal information by appearing to be from a legitimate source. If you receive a suspicious message, do not provide the information requested. Please be advised that DCU will never ask you for your log in details by email.

We've included some tips to help you recognise phishing and keep your personal details secure.

Think before you click.

Pay close attention to sign-in screens.

Cyber criminals can use links in emails, tweets, posts and online advertisements to direct you to fake sign-in screens, where they can steal your password. Only sign in to your account when you are certain you visited the real site directly. Check the Internet address to be sure.

How can I recognise phishing?

You should always be wary of any message that asks for your personal information or messages that refer you to a web page asking for personal information. If you receive this type of message, especially from a source claiming to be DCU, please don't provide the information requested. DCU will never send unsolicited messages asking for your password or personal information, or messages containing executable attachments.

Messages or websites phishing for information might ask you to enter:

  • Usernames and passwords
  • PPS numbers
  • Bank account numbers
  • PINs (Personal Identification Numbers)
  • Full credit card numbers
  • Your mother’s maiden name
  • Your birthday

What should I do when I see a phishing scam?

Most importantly, never reply to suspicious emails, tweets, or posts with your personal or financial information. Also, don’t fill out forms or sign-in screens that link from these messages.

Most email providers, including DCU Apps, allow you to report suspicious emails and phishing scams. To report phishing in DCU Apps, click the drop-down arrow next to “Reply” and select “Report phishing.”

 Select the blue button on the bottom; Report Phishing Message to finish the process.

I provided my personal details in response to a phishing email, what should I do?
In this case please contact ISS and we can advise on the best course of action.


Read more »