ITR provides PSC students and employees with a single point of contact for PSC computer-related problems or PS-issued equipment or software questions and all password or login issues.

 

Information Technology Resources (ITR) at Prairie State College provides PSC students and employees with a single point of contact for PSC computer-related problems or PSC equipment or software questions. ITR is also the point of contact for all password or login issues.  ITR does not support non-PSC hardware or software.

Desire2Learn is D2L is activated for all enrolled students, regardless of course modality or whether or not their current courses have any components online. Additionally, all students who are enrolled at PSC have access to the Student Resource Center which is home to a number of resources about D2L, as well as other resources on campus (such as Career Success Center). 


Click here to access D2L.

 

For an overview of D2L, visit Online Learning's page.

 

If you need help with D2L, please email Online Learning at OnlineLearning@prairiestate.edu

 


The Human Resources Department handles requests for PSC Email and Pioneer Portal accounts. You must have a signed Confidentiality Statement on file with the Human Resources department prior to receiving a Pioneer Portal account.

Once the accounts are created, an email will be sent with your login name and password to your supervisor or dean’s administrative assistant. 

Email Address: Your username followed by @prairiestate.edu (Example: jdoe2356@prairiestate.edu). You do not need to include '@prairiestate.edu' when logging in.

Click here to access your email account.

All faculty are required to use the PSC email account to communicate with their students. Using your PSC Email account also ensures that you will receive email notifications directed to you (faculty, adjunct, or staff).

If you require login assistance, visit the Technology Support Center User Access form.

Prairie State College provides students with an email account via Google’s Gmail. Email is used to communicate with instructors, classmates, or others at PSC. Many instructors will not open emails from students that do not come from the ‘@students.prairiestate.edu’ account.

Student Email Address: Your username followed by @students.prairiestate.edu. (Example: jdoe2356@students.prairiestate.edu)

Click here to access your email account.

The college will only send email to your student account. So you must check it often or have it forwarded to your personal email account as described in this article: https://support.google.com/mail/answer/10957?hl=en.

If you require login assistance, visit the Technology Support Center User Access form.

Pioneer Portal is an application for students to use to check final grades, and financial aid, print a transcript, or drop and register for classes. 

All grades are submitted through Pioneer Portal. Pioneer Portal also keeps faculty up-to-date with current student roster information.

 


Prairie State College uses a single sign-on account for all users. This means that a single username and password are used for the main applications that you'll use as a student. You will be notified of your username and password, but you will be required to change your password when you log in for the first time. You will also be required to change your password at least every six months.

Username: Your username is the first initial of your first name and your full last name, possibly followed by some numbers. (Example: jdoe2356)

Password: Your default password is an 8-digit random alphanumeric code. Students will receive a letter or email that includes this information


Network: PIONEER WIFI

There is no login information needed. When you open a browser, click on Proceed to continue.


Cybersecurity

Cybersecurity is a shared responsibility, and understanding the threats we face is the first step towards a safer digital environment. By staying informed about potential threats, practicing good online habits, and reporting any suspicious activities, you contribute to our organization's overall security. Below are helpful tips to keep you and your information safe online.
student in office

Strong, Unique Passwords Matter

In an increasingly digital world, the importance of strong, unique passwords cannot be overstated. Weak or easily guessable passwords are a leading cause of data breaches and security incidents. They leave you and our institution vulnerable to cyberattacks. By creating and managing secure passwords, you not only protect your own personal information but also contribute to the overall safety and integrity of Prairie State College.
student in computer lab

In June 2023, the Information Technology Resources (ITR) team applied new password and user account cybersecurity enhancements to the PSC network.  More specifically, users are required to create more complex passwords or passphrases once the current password expires (180 days from the last reset).

 

 

All passwords will now require the following: 

  • Upper/lower case letters, 1+ number, 1+ special character
  • Password length of 10 characters or more
  • Previously-used passwords cannot be reused
  • Passwords can only be re-changed after a minimum of 3 days
  • User accounts will lockout after five failed login attempts and remain locked for 15 minutes.

  • Complexity is Key:  Your password should be a combination of upper and lower-case letters, numbers, and special characters. Avoid common words and phrases.
  • Unique for Every Account:  Reusing passwords across multiple accounts increases the risk of a breach. Each account should have its own unique password.
  • Passphrase Over Passwords:  Consider using passphrases, which are longer and more secure than traditional passwords. A passphrase can be a combination of words, making it both memorable and strong.

Personal Identification Information (PII)

As cyber threats continue to evolve, it's crucial to remain vigilant and proactive in securing your sensitive personal data. Understanding your PII information is essential. It includes sensitive data that can be used to identify you.
  • Full Name: Your complete name as it appears on legal documents.
  • Date of Birth: Your birth date, which is often used for identity verification.
  • Home Address: The physical location where you reside.
  • Email Address: Personal email used for communication and often account verification.
  • Phone Number: Mobile or landline numbers used for communication and verification.
  • Social Security Number (SSN): A unique identification number used in many countries for taxation and government services.
  • Driver's License Number: A unique number associated with your driver's license.
  • Passport Number: The unique identification number on your passport.
  • National Identification Number: Country-specific ID numbers used for various government and legal purposes.
  • Bank Account Number: Your unique bank account identification information.
  • Credit Card Number: The unique number associated with your credit card.
  • Biometric Data: Fingerprints, retinal scans, facial recognition data, etc.
  • Employment Information: Work-related data like job title, employer details, etc.
Health Information: Medical records, health insurance details, etc.

Hackers getting your information when combined can pose risks related to identity theft, fraud, and privacy breaches. It's important to protect and limit access to such information whenever possible.  Use strong, unique passwords, enable two-factor authentication, regularly update software, and be cautious with sharing PII online.

Phishing

Phishing is a deceptive practice employed by cybercriminals to trick individuals into revealing sensitive information, such as login credentials, student information, financial data, or personal information. Phishing attacks often come in various forms, making it crucial to be vigilant and informed.

Phishing attacks manifest in various ways, including:

  • Email Phishing: Attackers send deceptive emails that mimic legitimate sources, enticing recipients to click on links or download attachments that may contain malware.
  • Spear Phishing: This is a targeted form of phishing where attackers tailor their messages to specific individuals or organizations, making them appear more convincing.
  • Vishing (Voice Phishing): Scammers use phone calls to impersonate trusted entities, seeking sensitive information or convincing you to take certain actions.
  • Smishing (SMS Phishing): Phishers send fraudulent text messages to your mobile device, hoping to deceive you into taking harmful actions.
  • Pharming: Cybercriminals redirect website traffic to fraudulent, look-alike sites to steal login credentials and sensitive information.

To protect Prairie State from phishing attacks, it's essential to be able to identify suspicious emails and messages. Here are some key points to remember:

  • Check the Sender: Always verify the sender's email address. Cybercriminals often use email addresses that imitate trusted organizations but contain subtle differences.
  • Examine the Content: Look for spelling and grammatical errors, generic greetings, and unusual requests. Legitimate organizations usually communicate professionally.
  • Avoid Unsolicited Links and Attachments: Do not click on links or download attachments from unknown sources or unexpected emails. Hover over links to see the actual URL without clicking.

For more information or for login assistance, call (708) 709-7999, email helpdesk@prairiestate.edu, or visit us in the Main Building, Room 1150.