Dashboard

All systems are operational.

  • Office

    Last updated 2020-12-14 11:08:38

    Operational
  • PC's

    Last updated 2019-01-15 11:45:27

    Operational
  • Windows 10

    Last updated 2019-01-15 11:45:59

    Operational
  • Internet: Adams, City Hub, HP, Basford, Haydn Road, Nottingham One

    Last updated 2025-02-10 10:13:47

    Operational
  • Internet: Highfields, Stapleford, London Road, Ruddington

    Last updated 2023-11-20 15:57:04

    Operational
  • Network

    Last updated 2023-11-21 09:57:34

    Operational
  • WiFi

    Last updated 2021-03-18 21:32:19

    Operational
  • MFD Printing

    Last updated 2022-08-10 13:15:13

    Operational
  • Manage Engine

    Last updated 2021-05-07 12:49:56

    Operational

    The ITSM tool used to log IT issues to the service desk

  • Office 365

    Last updated 2021-04-16 12:43:36

    Operational

    Office 365

  • RDS Access

    Last updated 2021-05-14 13:37:02

    Operational

    RDS - Remote Desktop Services

  • College Reporting

    Last updated 2022-02-16 15:49:23

    Operational

    College Reporting

  • VPN

    Last updated 2025-04-11 14:04:18

    Operational
  • OneDrive

    Last updated 2019-06-26 11:54:49

    Operational

    Microsoft OneDrive

  • CRM

    Last updated 2020-08-11 09:05:30

    Operational

    Nottingham College CRM

  • Network Drives

    Last updated 2022-10-14 06:20:50

    Operational

    College Network Drives

  • ECOM

    Last updated 2019-11-26 13:14:06

    Operational

    Staff Purchasing System - Finance Owned

  • (Office 365) Email

    Last updated 2020-10-12 06:35:24

    Operational
  • StaffNet

    Last updated 2022-01-10 08:26:14

    Operational
  • Exams

    Last updated 2020-12-03 14:59:57

    Operational
  • e-track

    Last updated 2019-04-03 10:52:31

    Operational
  • EBS

    Last updated 2021-09-30 09:17:49

    Operational
  • ebs:ontrack live

    Last updated 2020-10-15 06:26:40

    Operational
  • e-ILP

    Last updated 2019-07-02 11:07:04

    Operational
  • ForSkills

    Last updated 2018-10-10 13:37:27

    Operational
  • Interact

    Last updated 2018-10-10 13:37:27

    Operational

    Student Virtual Learning Environment (VLE)

    View Details
  • LMS

    Last updated 2018-10-10 13:37:27

    Operational

    Library Management System

  • MyPC

    Last updated 2020-10-12 06:35:32

    Operational

    Library PC Booking System

  • Student Track

    Last updated 2019-07-02 11:07:07

    Operational
  • StudentNet

    Last updated 2019-12-06 14:43:33

    Operational

    Nottingham College student intranet.

    View Details
  • Desk Phones

    Last updated 2023-11-21 16:03:58

    Operational

    Cisco IP Desk Phones

Past Incidents

4 years ago —
Fixed
4 years ago —

Colleagues today have reported a suspicious email which seemed to originate from within the organisation but in fact contains a malicious link/attachment.

Today's email shows that criminal hacking methods are increasingly sophisticated and hard to spot. As a general rule, you should do all you can to verify the legitimacy of the sender first, and the authenticity of any links or attachments second.

DO NOT CLICK LINKS OR OPEN ATTACHMENTS. A good way of determining whether something is legitimate is to make contact with the sender to confirm they have sent you an email. If the sender is outside the organisation attempt to make contact with them to confirm the email and what to expect with any links or documents included. If you are not expecting an email with links/attachments, it's best not to open or click on anything until you are sure.

A good tip is to hover over a link, without clicking on it. The real web address will display. Generally you will be able to spot if something isn't right. • Large companies like Apple (and most other organizations) don’t use variations on their web address for email addresses. So if something looks like it is from a large known organisation check the standard email layout against the one you've received. • The domain name may be different than that of the sender, or it isn’t one associated with a legitimate company. Instead of .com or .org at the end of a URL, you might see .ro, .cn, or .ru indicating a site is based in Romania, China, or Russia for example. • A common company name may be used, but there is a misspelling, ex. microsotf.com.

If you come across anything suspicious please contact ICT support straight away. In the case of the email today, or security systems were able to detect the rogue attachment and prevent people from accessing it. this shows that our systems and processes underpinning our cyber security strategy are working.