Information Security Updates

11 months 3 weeks ago

QR codes are everywhere: you can see them on posters and leaflets, ATM screens, price tags and merchandise, historical buildings and monuments. People use them to share information, promote various online resources, pay for their goodies, and pass verification. And yet you don’t see lots of QR codes in email: users often read messages on their phones without any other device handy for scanning. As such, most letters come with ordinary hyperlinks instead. Nevertheless, the attackers increasingly turn to QR codes delivered through email. Read more at https://securelist.com/qr-codes-in-phishing/110676/

1 year 2 weeks ago

It’s clear that users remain a key target for threat actors looking to gain a foothold in corporate systems. In the past, businesses have placed the onus on users – expecting them to know what to look out for and identify phishing attacks – but with techniques becoming more convincing, a new approach is needed. Read more at https://www.infosecurity-magazine.com/blogs/how-can-users-stay-protected/

1 year 1 month ago

UNI IT has chosen Bitwarden as its licensed partner for an enterprise password manager. Bitwarden also offers free accounts that should be more that adequate for most uses. Migration from other password managers is generally available and documented on Bitwarden's website.  For more on password managers in general, see https://www.sans.org/newsletters/ouch/power-password-managers/

1 year 2 months ago

Phone call scams are sometimes preferred by bad actors because they provide a direct connection between the bad actor and the potential victim. Guidance to protect yourself can be found at https://www.sans.org/newsletters/ouch/stop-phone-call-scams/

1 year 3 months ago

Your financial accounts are a primary target for cyber-criminals. You have money, and they will do anything to steal it. By financial accounts, we mean not only your checking or savings accounts, but also investments, retirement, and online payment accounts like PayPal. Fortunately, with some simple, fundamental steps, you can protect yourself.  Read the details at  https://www.sans.org/newsletters/ouch/securing-financial-accounts/

1 year 4 months ago

As QR codes continue to be heavily used by legitimate organizations—from Super Bowl advertisements to enforcing parking fees and fines, scammers have crept in to abuse the very technology for their nefarious purposes. The rest of the story is here: https://www.bleepingcomputer.com/news/security/qr-codes-used-in-fake-parking-tickets-surveys-to-steal-your-money/

1 year 4 months ago

AI: What is It and Why Should I Care?

Artificial Intelligence (AI) describes systems programmed to think and respond like humans. In fact, we asked the AI solution ChatGPT that very question and got this response. https://www.sans.org/newsletters/ouch/artificial-intelligence/

1 year 6 months ago

Duo accounts that have not used a phone call or SMS passcode since the first of the year will have those methods removed from their Duo account later this week. Duo Push via the Duo mobile app remains the primary and best way for users to interact with UNI's multi-factor authentication solution. Those that are actively using phone calls or SMS for authentication may continue to do so for now.

1 year 7 months ago

Duo is migrating from their long-used iframe authentication window to what they have chosen to call the Universal Prompt. When and how we migrate is up to us but there is a deadline of March 30, 2024 when the iframe method will no longer be available.

We are planning to take our first step in this migration this coming Wednesday, February 1. Only logins to Microsoft 365 resources will be affected on Feb 1. There will be several differences that you may see:

  • The appearance of the Duo prompt.  See the guide page link below for samples.
  • The way in which Duo will prompt for your second factor, i.e., a Push may happen automatically if that is the most secure method available for your account. 
    • If you need to interact differently with Duo for a login, cancel the first choice used and click "Other options" to choose a different method.
    • The method that you use for that application will become the default method for your next use of that same application.
    • If you need to change that default, cancel the request, click "Other options", and choose your new default method.

If you have questions about this change or the options available to you, please contact the Service Desk at 319-273-5555.

 All details and information about Duo's Universal Prompt may be found at https://guide.duo.com/universal-prompt

1 year 8 months ago

We took a break during the pandemic but the Phishing Education project is returning this spring. With the help of our vendor, realistic phishing messages will be sent to faculty and staff over the coming months. No punitive action will result from this exercise. All individual results will be kept private although large scale results and trends may be shared with appropriate partners. The sole purpose of the project is to educate the community and provide examples of things to watch for in real-life phishing messages.

Pages

  • ITTC 36
  • (319) 273-5555
  • Service Hub