Information Technology Updates
The [US] Internal Revenue Service (IRS) is warning of ongoing phishing attacks impersonating the IRS and targeting educational institutions. The attacks use tax refund payment baits and mainly focus on universities' staff and students with .edu email addresses.
- The rest of the story: https://www.bleepingcomputer.com/news/security/scammers-target-universities-in-ongoing-irs-phishing-attacks/
- IRS warning: https://www.irs.gov/newsroom/irs-warns-university-students-and-staff-of-impersonation-email-scam
- Researcher's blog: https://abnormalsecurity.com/blog/irs-impersonation/
What is Identity Theft? Identity theft happens when a criminal steals information about you and uses that information to commit fraud, such as requesting unemployment benefits, tax refunds, or a new loan or credit card in your name. If you don’t take precautions, you may end up paying for products or services that you didn’t buy and dealing with the stress and financial heartache that follows identity theft.
Have I Been Hacked? No matter how secure you are, sooner or later you may have an accident and become "hacked". Below are clues you might have been hacked and if so, what to do. See https://www.sans.org/security-awareness-training/resources/what-do-when-hacked for more information.
To create a secure home network, you need to start by securing your Wi-Fi access point (sometimes called a Wi-Fi router). This is the device that controls who and what can connect to your home network. Here are five simple steps to securing your home Wi-Fi to create a far more secure home network for you and your family.
- Change the admin password
- Create a network password
- Apply firmware updates
- Activate a guest network
- Use secure DNS filtering
Read the details in the SANS OUCH! newsletter at https://www.sans.org/security-awareness-training/resources/securing-wi-fi-home
On the morning of Tuesday, January 12th, Information Technology will be implementing the Duo Multi-Factor Authentication (MFA) system for UNI's Google suite of tools, known as Google Workspace (formerly G Suite for Education). After this time, you will be required to use your Duo second factor (smart phone app, call to your UNI office phone, SMS text message, etc) to authenticate to UNI's Google Workspace tools.
Some other things to keep in mind:
- This change will only affect those who are already provisioned for Duo MFA. This will include UNI employees, student employees, and any students who need to provide direct deposit information for their financial aid award.
- Currently configured smart phones, tablets, and third-party email clients like Thunderbird should not be affected until the next time you need to enter your CatID username and password (this is typically once a year when it expires and you need to create a new one).
- You should be able to utilize the “remember me” check box at the bottom of any Duo prompt to be remembered for 30 days (this is browser and device specific).
- Google Drive File Stream, an application that might be installed on your UN-owned and managed computer, requires a specific workaround at this time in order to login and be able to get through the Duo MFA prompt. See THIS document for instructions on how to do that.
If you have questions about MFA, or have trouble navigating the Duo MFA prompts, you can visit mfa.uni.edu to find self help resources or submit a ticket using Service Hub by signing in to servicehub.uni.edu.
Trying to securely make the most of today’s technology can be overwhelming for almost all of us, but it can be especially challenging for family members not as used to or as familiar with technology. Therefore, we wanted to share some key steps to help secure family members who may be struggling with technology and might misunderstand the risks that come with using it. Read more at https://www.sans.org/security-awareness-training/resources/securing-generation-gap
While online holiday shopping is nothing new, more of us will be avoiding the malls and brick-and-mortar stores this year — which opens up big opportunities for cybercriminals. This, along with COVID-19, is expected to anchor most of the scam and phishing lures in circulation this season. Read more at https://threatpost.com/online-holiday-shopping-phishing/161412/
A common misconception about cyber attackers is that they use only highly advanced tools and techniques to hack into peoples’ computers or accounts. Cyber attackers have learned that the easiest ways to steal your information, hack your accounts, or infect your systems is by simply tricking you into doing it for them using a technique called social engineering. Read more on this month's OUCH! newsletter from SANS, https://www.sans.org/security-awareness-training/resources/social-engineering-attacks
Information Technology is reviewing wireless networking coverage on campus in an effort to make sure all classrooms and office spaces are sufficiently covered. If you are aware of a space on campus that may lack the needed wireless coverage, please let IT know by submitting a servicehub request for a wireless coverage review. IT intends to completely upgrade the campus wireless network in the next 3 years (1/3 each year).