Articles relating to email systems which are user facing.
-
Mimecast
Learn about GCTS' email security software and how it impacts you
-
Open Shared Mailbox: Outlook Webmail
-
Open Shared Mailbox or Calendar: Outlook for Mac
-
Open Shared Mailbox: Outlook Mobile
-
Multi-Factor Authentication
-
The Text of my Email Messages is Larger or Smaller than Normal
-
How do I add my GCTS email to my phone, tablet, or other device?
The easiest and most secure way to add your Gordon-Conwell email to your mobile device is to install the Outlook app from your device’s App Store or Google Play Store and simply log into Outlook with your gordonconwell.edu email address and password. This is the method we recommend and support. Apple App Store Google Play Store On your personal computer, you can use the Outlook desktop app (see this article for how to install Microsoft Office) or Outlook webmail in your browser. If you want to add your Gordon-Conwell email to your device’s built-in mail application, please follow the steps below but note: IT do not have the resources to troubleshoot individual devices’ mail applications. You are welcome to seek out online troubleshooting resources for your device. If you are having trouble with your device’s mail application, please use Outlook instead (see above). Select Exchange or Microsoft Exchange (not Outlook) as the account type. Although our email uses the Outlook platform, it is technically a Microsoft Exchange organizational account, not a Microsoft Outlook account. If/when asked whether to configure manually or sign in, please select sign in. If/when asked for the account type, select work or school account (not a personal or Microsoft account). Log in with your gordonconwell.edu email and password. All the mail settings will populate automatically, so that you don’t have to manually enter any server information.
-
Tips for Identifying Spam
This article has some tips for identifying spam mail. While our staff and faculty undergo security training via Mimecast which further outlines security risks, these are the basics of identifying spam emails. NO legitimate email will EVER ask for your username/password/personal information. That information is stored in the databases of the institutions. Never give out your username or password to an email address. Just because you know the sender does not mean you can trust the email. Many email addresses are either hijacked or spoofed [spoofing is the process of pretending to be an email sent from one email address when in reality it is sent from a different address.] If there is anything suspicious about an email sent by somebody you know, compose a new email (do not hit reply) and verify the authenticity of the email. Beware of emails that attempt to scare or intimidate you into responding. Legitimate emails will abide by professional courtesy. Many spam frauds use fear to keep you from thinking rationally.