Purchase Network Registration
Purchase Network Registration
In order to access the Purchase College campus network, you will first need to register your computer as well as any other devices you wish to use (e.g. smartphones, routers, and gaming consoles) through the page http://connect.purchase.edu.
Once you get to the page http://connect.purchase.edu you would login using your Purchase username (e.g. john.doe) and email password. Next, two options will appear, either to register the device you are using right now or to register another device. If you happen to be registering a router, there is a link there called "need help with a router" which should provide some helpful tips.
If you see a gray X symbol on your screen when trying to connect to your wireless router, please try unplugging the power and Ethernet cables from the router. Wait about 30 seconds, and plug the cables back in. If this does not resolve the problem, please contact CTS.
Clicking either register this device or register another device will result in being prompted to enter the MAC address, device type, and your cellphone number. There is a link at the bottom of the page called Where is my MAC Address? in case you need assistance in finding that. When all fields are filled out, hit the Register button at the bottom of the page. It may take several seconds for the system to identify and then register your device. If successful, you will receive an email confirmation.
If you click the link at the top of the page called My Devices you can see a list of the devices currently registered to you. The About link at the top provides some explanation on why the system is in place, how it works, and how to contact CTS in case of any problems or to provide feedback.
The new Purchase College Device Registration System allows you to identify your devices to our network. We also STRONGLY recommend that you ensure that your computer has all of the latest security updates from your Operating System vendor. We also STRONGLY recommend that you ensure your anti-virus software is up to date.
Keeping your system updated reduces the likelihood that you will fall victim to identity theft, of the computer catching a virus that can disrupt network service, and the possibility of the computer being placed in quarantine if we do detect malware.
The most effective way to protect yourself - and the College Community - is to keep your operating system and your anti-virus software up to date. Vendors release regular security patches for their software to close vulnerabilities as they are discovered. We strongly recommend that you maintain your protection by enabling automatic updates in your Windows or Mac operating system and your anti-virus software. The College provides free Windows and Mac anti-virus software. Just visit the Downloads page for more information.
Please see the excepts below from http://www.vmware.com/files/pdf/solutions/VMware-Importance-of-Patching-Non-Microsoft-Applications-WP-EN.pdf regarding the importance of keeping applications up to date:
Third-Party Applications Seen as Biggest Security Risk
Contrary to popular belief, Apple leads the pack when it comes to the number of security vulnerabilities, ahead of both Microsoft and Adobe. The number of reported vulnerabilities in major commercial software products is accelerating. Perhaps more important, though, is the fact that third-party applications now account for the vast majority of flaws on most computers. In addition, although Apple products have the highest number of vulnerabilities, Microsoft, Adobe, Mozilla and Oracle are right in the mix, as well.
Gartner and the Importance of Patching Third-Party Software
“IT organizations must strive for continuous improvement in vulnerability detection and rapid security patch management, especially in often overlooked non-Microsoft components that are Web-facing. Unpatched vulnerabilities are the primary infection method of targeted and mass-propagation threats. Deployment of non-Microsoft patches is often significantly slower and less organized. All Internet-based applications, especially browsers and browser plug-ins (i.e., Adobe and Apple QuickTime), should be a top patching priority.”
SANS Institute: Top Cyber Security Risks: Client-Side Software Is Primary Attack Vector
In September 2009, the SANS Institute indicated that unpatched client applications are the number one security threat. “Waves of targeted email attacks, often called spear phishing, are exploiting client-side vulnerabilities in commonly used programs such as Adobe Reader, Apple QuickTime, Adobe Flash and Microsoft Office. This is the primary initial infection vector used to compromise computers that have Internet access. Those same client side vulnerabilities are exploited by attackers when users visit infected websites.”
If you have any questions or problems, feel free to contact CTS through the CTS Work Order System or by calling (914) 251-6465.
Email Password Reset (Student)
Email Password Reset (Faculty/Staff)
Mon-Thur 8am-9:45pm, Fri 8am-6:45pm
When classes are not in session:
(basement of Social Sciences Bldg)
Tel (914) 251-6465