Skip to main content

Wyomissing Area School District

Inspiring Excellence, One Spartan at at Time

Communications and Information Technology

Information Technology & Communications Staff

Scott Arnst Chief Information Officer Ext. 1150
Susan Kroninger Admin Asst Ext. 1140
Alexander Gabryluk Network Systems Engineer Ext. 1155
Susan Lackman Technology Support Specialist II Ext. 1151
Kristina Newton Technical Support Specialist I Ext. 2117
Zachary Myers Technical Support Specialist I Ext. 1154
Jacob Dianna IT Intern  
Maikel Samaan IT Intern  
     
Meghan Tierney Communications Coordinator Ext. 2223

 

 

Employee Tech Tips

  • We highly recommend utilizing the USB-C adapter and the HDMI cable provided by the I.T. Department to project movies and YouTube videos. Utilizing HDMI will make your viewing experience much more smooth and seamless when compared to playing videos using AirPlay. AirPlay is best used when projecting slideshows, websites, or other materials that do not include video. 


    The procedure is to connect using HDMI is explained below:


    1. Begin by plugging in your HDMI cable to the wall jack in your classroom.
    2. Next, plug the HDMI cable into the your USB-C adapter.
    3. Next, plug the USB-C adapter into your laptop.
    4. Switch the source on your Projector or TV to the HDMI cable from your Apple TV.
            a. WHEC Classroom - please select HDMI input #1
            b. WREC Classroom - please select HDMI input #1
            c. JSHS Classroom- please select HDMI input #1
    5. If the media doesn't project immediately, open system preferences:
            a. Start by searching for Displays
            b. Next, click on Arrange
            c. Next, hold down option and then drag the monitor image unto the other monitor image to mirror the content of your laptop.
    6. When you are done displaying your resource or content via HDMI. Simply unplug the USB-C adapter and reset your projector or TV input to the original choice for your Apple TV.

  • Need to know if students can access a specific internet based resource?  Please use the SpartanIT wireless network (SSID) to experience a secure and student policy-compliant connection.  This will allow you to test the internet based resource before you attempt to use it with students.  

     

  • There are numerous issues that we see daily that can be fixed by performing a quick restart / shut down of your computer. Some of these issues include printing, AirPlay, trouble opening files, and problems with email. Your laptop will function much better the more you shut down / restart. Not only will you have better performance, but you will reduce interruptions in class-teaching time. We recommend shutting down every Friday before you leave for the weekend.

     

    Instructions:

    Begin by performing a spotlight search on your computer.
     – This is done by pressing command and spacebar simultaneously. 

     

    In the spotlight search, type “Terminal.”
     – Then click on the terminal application.
     – Once in terminal, simply type, “uptime,” and click return.

    A terminal window displays system uptime information, highlighting 78 days since the last restart.

     

    To shut down / restart your computer completely, click the apple logo in the top left of your screen. Then click “Shut Down,” or “Restart.”

  • You may sometimes be prompted that your print job is “Holding for Authentication” (See below for an example).

    A screenshot shows a print queue with a document titled 'Meerkat - Wikipedia'.

     

    To solve this issue, simply click the resume button next to the job. 

    When the print authorization box opens, enter your laptop password and check “Remember this password in my keychain”. 

    A computer screen prompts for a printer name and password.

  • Several times monthly, we conduct phishing simulations to assess and strengthen our organization’s cybersecurity awareness. These simulations help employees recognize and appropriately respond to potential phishing attempts, reducing the risk of security breaches caused by social engineering attacks. By regularly testing and training our team, we aim to maintain a strong security culture and ensure compliance with industry best practices.

    When you fail a simulation you are expected to complete the assigned training.  Additional Vector Training may be assigned if necessitated.

     

  • To protect our systems, data, and your accounts, we use Multi-Factor Authentication (MFA) — an essential cybersecurity measure.

    MFA adds an extra layer of protection by requiring two or more forms of identity verification before granting access. For example, logging in might require:

    1. Something you know (like your password), and

    2. Something you have (like a phone or authentication app).

    Even if a hacker gets your password, they can’t access your account without the second factor.

    This helps:

    • Prevent unauthorized access

    • Protect sensitive company and customer data

    • Reduce risk from phishing and password leaks

    Cyber threats are constantly evolving, and MFA is one of the most effective ways we can keep our digital environment secure.

    If you need help with MFA please use the link below:

    MFA Help Request

Current Projects

  • A modern, dark blue office phone with a touchscreen display.

  • Overhead view of a dark blue laptop with the keyboard visible.