During your new employee orientation, this information will guide you on what technology is available and who to contact when you need help.
Email and Collaboration
W-Exchange
W-Exchange is the required secure means for conducting University business. See our W-Exchange guides for instructions on using W-Exchange, including how to set up your mobile device to receive an email.
Microsoft Office 365
Microsoft Office 365 provides desktop versions of Microsoft Office for both PC and Mac to Western Michigan University students, faculty, and staff at no cost. Office 365 also provides access to mobile Office apps as well as cloud-based, online collaboration tools. These include OneDrive for Business, Word Online, Excel Online, PowerPoint Online, and OneNote Online.
G Suite (Google Apps for Education)
G Suite (Google Apps for Education) provides cloud-based, online collaboration tools from Google's suite of apps. These include Google Drive, Calendar, Contacts, Hangouts, Sites, and many others. Google Apps at WMU does not include Gmail as W-Exchange is still used as the University's email system.
Security best practices
- All new employees are required to complete SANS Securing the Human online IT security training. Training will be assigned and emails sent to you near the first of the month following your new employee orientation. You will have 60 days to complete the training. A reminder will be sent 30 days after training was assigned.
- Never give your Bronco NetID/password combination to anyone. The IT Help Desk will never ask you for your password via an email message or over the phone.
- Never accept someone else's Bronco NetID/password combination. Knowing someone else's password may make you a person of interest in the event of a security incident.
- Don't use the same password for all systems, especially for encrypted files. The WMU Password Guidelines provide details on how to establish strong passwords.
- Delete old data, especially information that includes social security numbers. Paper copies should be shredded.
- Delete "temporary" files on your computer. These include file attachments opened in email and download files. If these files contain restricted/confidential information, they should be immediately removed or encrypted.
- Keep personal data separate from University data.
- If you have access to protected health information, know and follow the special policies that apply: wmich.edu/it/rules/datasecurity
- These “Best Practices” apply to both electronic and paper records.
What’s Next?
- Review the websites listed in this article.
- Contact your College or Department IT Representative or LAN Manager