Posts Tagged ‘infosec’
Personalized Scams
Cyber criminals continue to come up with new and creative ways to fool people. A new type of scam is gaining popularity— personalized scams. Cyber criminals find or purchase information about millions of people, then use that information to personalize their attacks. Below we show you how these scams work and walk you through a common example. The more you know about these scams, the easier it is for you to spot and stop them.
Cybersecurity Awareness Month – Online Safety Tips
National Cybersecurity Awareness Month is commemorating its 15th year this October. This nationwide effort is sponsored by the Department of Homeland Security to provide education about cyber threats and offer tips and best practices concerning how to stay safe online. The University of Mississippi Office of Information Technology remains committed to protecting information through the […]
Additional Authentication Process Required for SAP Users Beginning October 17
On Wednesday, October 17, The Office of Information Technology (IT) will apply additional security measures to enhance the protection of our services and defend against cyber attacks. Effective on that date, it will be necessary to establish a Virtual Private Network (VPN) connection prior to accessing the SAP GUI. What to Do? For SAP users, IT suggests […]
Be Aware of Job Scams
There is no shortage of fake jobs. Employment scams are commonly designed to steal your personal information, credentials, and money. Many of these schemes involve virtual assistant, secret shopper, or similar work-at-home positions, often along with receipt of fake checks. The scammers typically try to build trust over several different communications (including social media, calls, […]
Modern Authentication for Office 365
On January 8, 2018, IT system administrators will make a change to the employee email system to enable “modern authentication” in Office 365. Modern authentication includes a sign-in method that replaces the Windows security dialog box normally seen when prompted for credentials in Office applications such as Outlook. It is more than just a different […]
Critical Security Update for Apple Devices
On Oct. 31, 2017, Apple released a set of updates for Mac computers, iOS devices (iPads and iPhones), Apple TVs, and Apple Watches. These updates contain a critical fix necessary to ensure your security when connecting to wireless networks. *The Office of Information Technology (IT) recommends, in the strongest possible terms, that you install these […]
Easy-to-Use Data Protection with Hardware Encryption Devices
Those who deal with sensitive data must take special care when storing files on removable media such as USB flash drives. Encryption is best way to protect this data from accidental disclosure – it makes files indecipherable to unauthorized users. The UM Box service provides encryption both in transit and at-rest. Cloud storage is not […]
Email Encryption in Office 365
The UM Office of Information Technology is now providing an email encryption service. This is available to everyone with an @olemiss.edu email address. Email, even when encrypted, is not an appropriate medium for transmitting many types of data. Any data protected by FERPA (student identification, grades, etc.), HIPPA (personally identifiable medical information), GLBA (credit and […]
New Procedure for Servers Containing Sensitive Data
Cybersecurity has become one of the hot topics in the state and national discourse and is the responsibility of all University administrators of information technology, particularly those responsible for sensitive data. Governor Bryant recently signed House Bill 999, codified as Miss. Code Ann. § 25-53-201 (2017), which establishes an enterprise security program for entities of […]
One-time Setup, Two-factor Authentication
Employees and others with @olemiss.edu email addresses will soon need to have their phones handy. The university’s Office 365 accounts are transitioning to two-factor authentication. I.T. is enabling this change as part of our security assessment with the goal of limiting hacked accounts.