Technology Services (IT)
IT services at ODU are provided by the Division of Digital Transformation and Technology. It is our mission to provide and support high-quality cost-effective computing and communications services that meet the needs of the University.
Solutions & Services
![Vials and STEM symbols](/sites/default/files/styles/horizontal_listing_view/public/images/technology-science-stock_518079112.png?h=82f92a78)
EVMS Community: Learn about the transition and integration between the technology services at EVMS and the services provided at ODU.
![Student on Computer](/sites/default/files/styles/horizontal_listing_view/public/offices/occs/img/16925__Webb_student_computing.jpg?h=fee4874d)
Students: Learn about technology you'll encounter as a student at ODU.
![technology laptop and tablet](/sites/default/files/styles/horizontal_listing_view/public/images/ipad-tablet-technology-touch.jpg?h=c6980913)
Faculty & Staff: Take advantage of technology and computing resources.
![Washington](/sites/default/files/styles/horizontal_listing_view/public/offices/cits/img/washington.jpg?h=66340ca0)
Researchers: Access powerful computing resources.
![Peninsula Center small classroom](/sites/default/files/styles/horizontal_listing_view/public/images/peninsula-center-classroom-wide.jpg?h=b949c27f)
Instructors: Enhance your classroom experience with these resources.
![Cybersecurity Fingerprint Stock](/sites/default/files/styles/horizontal_listing_view/public/col-dept/continuing-education/img/information-security-fingerprint-stock.jpg?h=9afe74b7)
Technology Services (IT)
![Cybersecurity Fingerprint Stock](/sites/default/files/styles/node_list_carousel_thumbnail/public/col-dept/continuing-education/img/information-security-fingerprint-stock.jpg?h=9afe74b7)
Attackers are using phishing attacks to gain MIDAS credentials, then attempting to log in multiple times until users inadvertently allow the DUO push prompt. Once a user accepts the DUO prompt, the attacker then has access to the account for a period of time. Report suspected phishing emails to Phishing@emeieme.com and any cybersecurity concerns to ITSHelp@emeieme.com.
![Data analysis with laptop](/sites/default/files/styles/node_list_carousel_thumbnail/public/images/data-analysis-laptop.jpeg?h=7489291a)
Contact the IT Help Desk for general technology support or to reach your department's technical support person.
![Laptop with cloud computing diagram](/sites/default/files/styles/node_list_carousel_thumbnail/public/offices/occs/img/cloud-computing.jpg?h=fa1c963e)
Microsoft Office 365 is available at no cost to all members of the ODU community in order to improve communication and collaboration across campus. Download the latest version of Office, or collaborate with others using OneDrive or OneNote.
![Cybersecurity Fingerprint Stock](/sites/default/files/styles/node_list_carousel_thumbnail/public/col-dept/continuing-education/img/information-security-fingerprint-stock.jpg?h=9afe74b7)
Attackers are using phishing attacks to gain MIDAS credentials, then attempting to log in multiple times until users inadvertently allow the DUO push prompt. Once a user accepts the DUO prompt, the attacker then has access to the account for a period of time. Report suspected phishing emails to Phishing@emeieme.com and any cybersecurity concerns to ITSHelp@emeieme.com.
![Data analysis with laptop](/sites/default/files/styles/node_list_carousel_thumbnail/public/images/data-analysis-laptop.jpeg?h=7489291a)
Contact the IT Help Desk for general technology support or to reach your department's technical support person.
![Laptop with cloud computing diagram](/sites/default/files/styles/node_list_carousel_thumbnail/public/offices/occs/img/cloud-computing.jpg?h=fa1c963e)
Microsoft Office 365 is available at no cost to all members of the ODU community in order to improve communication and collaboration across campus. Download the latest version of Office, or collaborate with others using OneDrive or OneNote.
![Cybersecurity Fingerprint Stock](/sites/default/files/styles/node_list_carousel_thumbnail/public/col-dept/continuing-education/img/information-security-fingerprint-stock.jpg?h=9afe74b7)
Attackers are using phishing attacks to gain MIDAS credentials, then attempting to log in multiple times until users inadvertently allow the DUO push prompt. Once a user accepts the DUO prompt, the attacker then has access to the account for a period of time. Report suspected phishing emails to Phishing@emeieme.com and any cybersecurity concerns to ITSHelp@emeieme.com.