Security & Safe Computing Updates

3 years 2 weeks ago

What is Identity Theft?  Identity theft happens when a criminal steals information about you and uses that information to commit fraud, such as requesting unemployment benefits, tax refunds, or a new loan or credit card in your name. If you don’t take precautions, you may end up paying for products or services that you didn’t buy and dealing with the stress and financial heartache that follows identity theft.

Read more at https://www.sans.org/security-awareness-training/resources/identity-theft

3 years 1 month ago

Have I Been Hacked? No matter how secure you are, sooner or later you may have an accident and become "hacked". Below are clues you might have been hacked and if so, what to do.  See https://www.sans.org/security-awareness-training/resources/what-do-when-hacked for more information.

3 years 2 months ago

To create a secure home network, you need to start by securing your Wi-Fi access point (sometimes called a Wi-Fi router). This is the device that controls who and what can connect to your home network. Here are five simple steps to securing your home Wi-Fi to create a far more secure home network for you and your family.

  1. Change the admin password
  2. Create a network password
  3. Apply firmware updates
  4. Activate a guest network
  5. Use secure DNS filtering

Read the details in the SANS OUCH! newsletter at https://www.sans.org/security-awareness-training/resources/securing-wi-fi-home

3 years 2 months ago

On the morning of Tuesday, January 12th, Information Technology will be implementing the Duo Multi-Factor Authentication (MFA) system for UNI's Google suite of tools, known as Google Workspace (formerly G Suite for Education). After this time, you will be required to use your Duo second factor (smart phone app, call to your UNI office phone, SMS text message, etc) to authenticate to UNI's Google Workspace tools.

Some other things to keep in mind:

  • This change will only affect those who are already provisioned for Duo MFA. This will include UNI employees, student employees, and any students who need to provide direct deposit information for their financial aid award.
  • Currently configured smart phones, tablets, and third-party email clients like Thunderbird should not be affected until the next time you need to enter your CatID username and password (this is typically once a year when it expires and you need to create a new one).
  • You should be able to utilize the “remember me” check box at the bottom of any Duo prompt to be remembered for 30 days (this is browser and device specific).
  • Google Drive File Stream, an application that might be installed on your UN-owned and managed computer, requires a specific workaround at this time in order to login and be able to get through the Duo MFA prompt. See THIS document for instructions on how to do that.

If you have questions about MFA, or have trouble navigating the Duo MFA prompts, you can visit mfa.uni.edu to find self help resources or submit a ticket using Service Hub by signing in to servicehub.uni.edu​.

3 years 3 months ago

Trying to securely make the most of today’s technology can be overwhelming for almost all of us, but it can be especially challenging for family members not as used to or as familiar with technology. Therefore, we wanted to share some key steps to help secure family members who may be struggling with technology and might misunderstand the risks that come with using it. Read more at https://www.sans.org/security-awareness-training/resources/securing-generation-gap

3 years 4 months ago

While online holiday shopping is nothing new, more of us will be avoiding the malls and brick-and-mortar stores this year — which opens up big opportunities for cybercriminals. This, along with COVID-19, is expected to anchor most of the scam and phishing lures in circulation this season.  Read more at https://threatpost.com/online-holiday-shopping-phishing/161412/

3 years 4 months ago

A common misconception about cyber attackers is that they use only highly advanced tools and techniques to hack into peoples’ computers or accounts. Cyber attackers have learned that the easiest ways to steal your information, hack your accounts, or infect your systems is by simply tricking you into doing it for them using a technique called social engineering. Read more on this month's OUCH! newsletter from SANS, https://www.sans.org/security-awareness-training/resources/social-engineering-attacks

3 years 5 months ago

For those that are leery about clicking links in email messages, here's another path to the UNI 2020 NCSAM scavenger hunt. Check back often as new questions will be posted several times per week. Answers to questions from earlier in the month are available here.

3 years 7 months ago

The "Are you available" scam is still alive and kicking. If you receive such a message, even though the display name is a well-known campus name, check the actual email address of the sender. It's likely to be a gmail.com account incorporating the impersonated UNI person into the username portion of the address. Don't be fooled! Mark the message as spam and move on to the next message in your inbox.

If you do interact with the imposter, you'll be asked to buy a large quantity of untraceable gift cards with a promise of reimbursement. That won't happen and you'll be out the money you spent and also filing a police report for the fraud you experienced.

3 years 7 months ago

With so many of us now working from home, you are most likely finding yourself remotely connecting with your co-workers using virtual conferencing solutions like Zoom, Slack, or Microsoft Teams. Your family members - perhaps even your children – may also be using these same technologies to connect with friends or for remote learning. Regardless of why you are connecting, here are key steps you can take to make the most of these technologies safely and securely. 

Pages

  • ITTC 36
  • (319) 273-5555
  • Service Hub