Students Updates

3 years 1 week ago

Mobile devices, such as tablets, smartphones, and smartwatches, have become one of the primary technologies we use in both our personal and professional lives. What makes these devices so powerful are the thousands of apps we can choose from. These apps enable us to be more productive, communicate and share with others, train and educate, or just have more fun. Here are steps you can take to securely use and make the most of today’s mobile apps. Read them at https://www.sans.org/newsletters/ouch/securely-using-mobile-apps/

3 years 1 month ago

Vishing is to your phone as phishing is to your email account. Vishers may use either voice or SMS (text messages) to target you. They do this because there is less protection for your phone than for your UNI email account. Read the SANS OUCH! page at https://www.sans.org/newsletters/ouch/vishing/ for details and advice.

3 years 2 months ago

 

Google Workspace logo

 

In an announcement earlier this calendar year, Google notified their education customers that they are changing the rules regarding storage for their Google Workspace for Education product line to no longer include unlimited storage space. Although Google has traditionally offered unlimited storage for free to its education customers, this model has become unsustainable with the rapid acceleration in growth of stored data. In July of 2022, Google will shift from unlimited storage to a pooled storage model for Google Workspace for Education customers.

This shift in strategy by Google means that UNI will need to reduce it’s overall storage consumption across Gmail, Google Drive (both My Drive and Shared Drives), and Google Photos in the Uni.edu Google domain prior to the July 2022 deadline. Information Technology (IT) is working closely with Google to ensure we have the tools and resources necessary to help us make this transition as smooth as possible.

IT will be communicating soon with users across campus who are using significantly more storage as compared to the average in our domain to understand their needs and work with them to clean up old and unneeded files and data. IT will continue to share information and answer questions as this project progresses. In the meantime, if you’re interested in seeing how much storage you’re using with your UNI Google account, or to find out how to reduce your overall storage usage, you can review this knowledge base article.

 

 

3 years 2 months ago

A W2 tax email scam is circulating in the U.S. using Typeform, a popular software that specializes in online surveys and form building. The campaign is aimed at harvesting victims’ email account credentials, researchers said.

According to Armorblox, the campaign also bypasses native Google Workspace email security filters in the victims it examined.

“The email impersonated an automated file-sharing communication from OneDrive, informing victims that they had received a file,” researchers explained in an analysis on Tuesday. “The email was sent from a Hotmail ID and was titled ‘RE: Home Loan,’ followed by a reference number and the date, making it seem like the email was part of an ongoing conversation to lend it more legitimacy.”

To read the complete article see:

https://threatpost.com/tax-phish-google-workspace-email-security/165376/ 

See also:

https://www.armorblox.com/blog/blox-tales-w2-tax-scam-using-typeform/

3 years 2 months ago

The [US] Internal Revenue Service (IRS) is warning of ongoing phishing attacks impersonating the IRS and targeting educational institutions. The attacks use tax refund payment baits and mainly focus on universities' staff and students with .edu email addresses.

3 years 3 months ago

What is Identity Theft?  Identity theft happens when a criminal steals information about you and uses that information to commit fraud, such as requesting unemployment benefits, tax refunds, or a new loan or credit card in your name. If you don’t take precautions, you may end up paying for products or services that you didn’t buy and dealing with the stress and financial heartache that follows identity theft.

Read more at https://www.sans.org/security-awareness-training/resources/identity-theft

3 years 4 months ago

Have I Been Hacked? No matter how secure you are, sooner or later you may have an accident and become "hacked". Below are clues you might have been hacked and if so, what to do.  See https://www.sans.org/security-awareness-training/resources/what-do-when-hacked for more information.

3 years 5 months ago

To create a secure home network, you need to start by securing your Wi-Fi access point (sometimes called a Wi-Fi router). This is the device that controls who and what can connect to your home network. Here are five simple steps to securing your home Wi-Fi to create a far more secure home network for you and your family.

  1. Change the admin password
  2. Create a network password
  3. Apply firmware updates
  4. Activate a guest network
  5. Use secure DNS filtering

Read the details in the SANS OUCH! newsletter at https://www.sans.org/security-awareness-training/resources/securing-wi-fi-home

3 years 6 months ago

Trying to securely make the most of today’s technology can be overwhelming for almost all of us, but it can be especially challenging for family members not as used to or as familiar with technology. Therefore, we wanted to share some key steps to help secure family members who may be struggling with technology and might misunderstand the risks that come with using it. Read more at https://www.sans.org/security-awareness-training/resources/securing-generation-gap

3 years 7 months ago

While online holiday shopping is nothing new, more of us will be avoiding the malls and brick-and-mortar stores this year — which opens up big opportunities for cybercriminals. This, along with COVID-19, is expected to anchor most of the scam and phishing lures in circulation this season.  Read more at https://threatpost.com/online-holiday-shopping-phishing/161412/

Pages

  • ITTC 36
  • (319) 273-5555
  • Service Hub