<?xml version="1.0"?>
<News hasArchived="false" page="108" pageCount="242" pageSize="10" timestamp="Fri, 24 Apr 2026 21:50:39 -0400" url="https://beta.my.umbc.edu/groups/doit/posts.xml?page=108">
<NewsItem contentIssues="true" id="95129" important="false" status="posted" url="https://beta.my.umbc.edu/groups/doit/posts/95129">
<Title>Training on Respondus LockDown Browser &amp; Respondus Monitor</Title>
<Tagline>Learn to Deliver Online Assessments using these tools</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><table width="100%"><tbody><tr><td>LockDown Browser is a custom browser that prevents digital cheating during an online exam. Respondus Monitor is a companion application for LockDown Browser that deters cheating when students take online exams in non-proctored environments. Students use their own computers with a standard webcam to record assessment sessions.</td></tr></tbody></table><div><div><div><div><div><p><br>This comprehensive training webinar is intended for instructors who plan to use LockDown Browser and/or Respondus Monitor with online exams. The session provides a detailed demonstration of both applications, including enhancements that make Respondus Monitor even more effective and easy to use. Click on one of the dates/times provided below to register for a webinar or visit <a href="https://web.respondus.com/webinars/" rel="nofollow external" class="bo">https://web.respondus.com/webinars/</a> to register:</p><ul><li><a href="https://attendee.gotowebinar.com/register/2809868344027885071" rel="nofollow external" class="bo">Tuesday, August 25 at 1 pm ET / 10 am PT</a></li><li><a href="https://attendee.gotowebinar.com/register/7495263422958140175" rel="nofollow external" class="bo">Thursday, August 27 at 2 pm ET / 11 am PT</a></li><li><a href="https://attendee.gotowebinar.com/register/5922104176539271183" rel="nofollow external" class="bo">Tuesday, September 1 at 3 pm ET / 12 pm PT</a></li><li><a href="https://attendee.gotowebinar.com/register/2829993805344537358" rel="nofollow external" class="bo">Wednesday, September 2 at 2 pm ET / 11 am PT</a></li><li><a href="https://attendee.gotowebinar.com/register/8069819821668470800" rel="nofollow external" class="bo">Tuesday, September 8 at 12 pm ET / 9 am PT</a></li><li><a href="https://attendee.gotowebinar.com/register/7260341769117953292" rel="nofollow external" class="bo">Wednesday, September 9 at 4 pm ET / 1 pm PT</a></li><li><a href="https://attendee.gotowebinar.com/register/3759896968507802128" rel="nofollow external" class="bo">Tuesday, September 15 at 1 pm ET / 10 am PT</a></li><li><a href="https://attendee.gotowebinar.com/register/8641470980682255" rel="nofollow external" class="bo">Thursday, September 17 at 3 pm ET / 12 pm PT</a></li><li><a href="https://attendee.gotowebinar.com/register/3425174842691021068" rel="nofollow external" class="bo">Wednesday, September 23 at 2 pm ET / 11 am PT</a></li><li><a href="https://attendee.gotowebinar.com/register/1427771233347754508" rel="nofollow external" class="bo">Tuesday, September 29 at 12 pm ET / 9 am PT</a></li></ul></div></div></div></div></div></div>
]]>
</Body>
<Summary>LockDown Browser is a custom browser that prevents digital cheating during an online exam. Respondus Monitor is a companion application for LockDown Browser that deters cheating when students take...</Summary>
<Website>https://web.respondus.com/webinars/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/95129/guest@my.umbc.edu/f4f261a5ed3873eb9f40b373fc342356/api/pixel</TrackingUrl>
<Tag>online-assessment</Tag>
<Tag>online-learning</Tag>
<Tag>respondus-lockdown-browser</Tag>
<Tag>respondus-monitor</Tag>
<Group token="instructional-technology">Instructional Technology</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/instructional-technology</GroupUrl>
<AvatarUrl>https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/xsmall.png?1446126703</AvatarUrl>
<AvatarUrl size="original">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/original.png?1446126703</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/xxlarge.png?1446126703</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/xlarge.png?1446126703</AvatarUrl>
<AvatarUrl size="large">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/large.png?1446126703</AvatarUrl>
<AvatarUrl size="medium">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/medium.png?1446126703</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/small.png?1446126703</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/xsmall.png?1446126703</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/xxsmall.png?1446126703</AvatarUrl>
<Sponsor>Instructional Technology</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/095/129/e3ae496cc2d0f8d5cd1a999eb14b2af6/xxlarge.jpg?1598372190</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/095/129/e3ae496cc2d0f8d5cd1a999eb14b2af6/xlarge.jpg?1598372190</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/095/129/e3ae496cc2d0f8d5cd1a999eb14b2af6/large.jpg?1598372190</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/095/129/e3ae496cc2d0f8d5cd1a999eb14b2af6/medium.jpg?1598372190</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/095/129/e3ae496cc2d0f8d5cd1a999eb14b2af6/small.jpg?1598372190</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/095/129/e3ae496cc2d0f8d5cd1a999eb14b2af6/xsmall.jpg?1598372190</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/095/129/e3ae496cc2d0f8d5cd1a999eb14b2af6/xxsmall.jpg?1598372190</ThumbnailUrl>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Tue, 25 Aug 2020 12:17:47 -0400</PostedAt>
<EditAt>Fri, 06 Nov 2020 18:50:09 -0500</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="95113" important="false" status="posted" url="https://beta.my.umbc.edu/groups/doit/posts/95113">
<Title>USM OnTrack: New Quality Matters Fall Workshops Added!</Title>
<Tagline>Sign up now for these newly added Fall workshops!</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><div><a href="https://www.usmd.edu/newsroom/news/2056" rel="nofollow external" class="bo">USM <em>OnTrack</em></a> <span>has added additional Quality Matters workshops in high-demand topics for the Fall term! </span></div><div><br></div><div><p><strong><em><span>NEW - Quality Matters Fall Workshops</span></em></strong><strong><span> </span></strong><strong><span> </span></strong></p><p><span><span><span>We are excited to announce that we have added a new set of Quality Matters workshops starting the<strong> week of September 14</strong>, targeted at providing <strong>just-in-time support for faculty</strong> teaching this fall.  Topics include active learning strategies, assessment, accessibility, and increasing engagement. Please encourage faculty to register now to secure their spot.</span><span><span> </span></span></span></span><span> </span></p><p><span><br></span></p><p><span>There is no cost for any USM faculty or staff member to attend these workshops, but each workshop does have a 30-person limit, so we encourage you to promote these as soon as possible. We will be monitoring registrations as will add additional sessions if we see high demand. </span><span> </span></p><p><strong><em><span> </span></em></strong><br></p><table><tbody><tr><td colspan="3"><p><strong><span>Week of August 24</span></strong><span> </span></p></td></tr><tr><td><p><span>Wednesday August 26, 2020 </span><span> </span></p></td><td><p><span>1:00-3:00 </span></p></td><td><p><span>Creating Accessible Word Docs </span></p></td></tr><tr><td><p><span>Thursday, August 27, 2020  </span></p></td><td><p><span>9:00-11:00  </span></p></td><td><p><span>Providing Accessible Web Content </span></p></td></tr><tr><td colspan="3"><p><strong><span>Week of September 14</span></strong><span> </span></p></td></tr><tr><td><p><span>Tuesday, September 15, 2020</span><strong><span> </span></strong></p></td><td><p><span>9:00-11:00</span><span> </span></p></td><td><p><span>Rethinking Assessments for Application &amp; Engagement</span><span> </span></p></td></tr><tr><td><p><span>Tuesday, September 15, 2020</span><strong><span> </span></strong></p></td><td><p><span>1:00-3:00</span><span> </span></p></td><td><p><span>Connecting LOs &amp; Assessments</span><span> </span></p></td></tr><tr><td><p><span>Wednesday, September 16, 2020</span><strong><span> </span></strong></p></td><td><p><span>9:00-11:00</span><span> </span></p></td><td><p><span>Active Learning Strategies</span><span> </span></p></td></tr><tr><td><p><span>Wednesday, September 16, 2020</span><strong><span> </span></strong></p></td><td><p><span>1:00-3:00</span><span> </span></p></td><td><p><span>Increasing Learning Engagement with Web 2.0 Tools</span><span> </span></p></td></tr><tr><td><p><span>Thursday, September 17, 2020</span><strong><span> </span></strong></p></td><td><p><span>9:00-11:00</span><span> </span></p></td><td><p><span>Helping Learners Track Their Progress</span><span> </span></p></td></tr><tr><td><p><span>Thursday, September 17, 2020</span><strong><span> </span></strong></p></td><td><p><span>1:00-3:00</span><span> </span></p></td><td><p><span>Creating Rubrics</span><span> </span></p></td></tr><tr><td colspan="3"><p><strong><span>Week of September 21</span></strong><span> </span></p></td></tr><tr><td><p><span>Tuesday, September 22, 2020</span><strong><span> </span></strong></p></td><td><p><span>9:00-11:00</span><span> </span></p></td><td><p><span>Captioning Videos</span><span> </span></p></td></tr><tr><td><p><span>Tuesday, September 22, 2020</span><strong><span> </span></strong></p></td><td><p><span>1:00-3:00</span><span> </span></p></td><td><p><span>Rethinking Assessments for Application &amp; Engagement</span><span> </span></p></td></tr><tr><td><p><span>Wednesday, September 23, 2020</span><strong><span> </span></strong></p></td><td><p><span>9:00-11:00</span><span> </span></p></td><td><p><span>Connecting LOs &amp; Assessments</span><span> </span></p></td></tr><tr><td><p><span>Wednesday, September 23, 2020</span><strong><span> </span></strong></p></td><td><p><span>1:00-3:00</span><span> </span></p></td><td><p><span>Active Learning Strategies</span><span> </span></p></td></tr><tr><td><p><span>Thursday, September 24, 2020</span><strong><span> </span></strong></p></td><td><p><span>9:00-11:00</span><span> </span></p></td><td><p><span>Increasing Learning Engagement with Web 2.0 Tools</span><span> </span></p></td></tr><tr><td><p><span>Thursday, September 24, 2020</span><strong><span> </span></strong></p></td><td><p><span>1:00-3:00</span><span> </span></p></td><td><p><span>Helping Learners Track Their Progress</span><span> </span></p></td></tr><tr><td colspan="3"><p><strong><span>Week of September 28</span></strong><span> </span></p></td></tr><tr><td><p><span>Tuesday, September 29, 2020</span><strong><span> </span></strong></p></td><td><p><span>9:00-11:00</span><span> </span></p></td><td><p><span>Creating Rubrics</span><span> </span></p></td></tr><tr><td><p><span>Tuesday, September 29, 2020</span><strong><span> </span></strong></p></td><td><p><span>1:00-3:00</span><span> </span></p></td><td><p><span>Captioning Videos</span><span> </span></p></td></tr><tr><td><p><span>Wednesday, September 30, 2020</span><strong><span> </span></strong></p></td><td><p><span>9:00-11:00</span><span> </span></p></td><td><p><span>Rethinking Assessments for Application &amp; Engagement</span><span> </span></p></td></tr><tr><td><p><span>Wednesday, September 30, 2020</span><strong><span> </span></strong></p></td><td><p><span>1:00-3:00</span><span> </span></p></td><td><p><span>Connecting LOs &amp; Assessments</span><span> </span></p></td></tr><tr><td><p><span>Thursday, October 1, 2020</span><strong><span> </span></strong></p></td><td><p><span>9:00-11:00</span><span> </span></p></td><td><p><span>Active Learning Strategies</span><span> </span></p></td></tr><tr><td><p><span>Thursday, October 1, 2020</span><strong><span> </span></strong></p></td><td><p><span>1:00-3:00</span><span> </span></p></td><td><p><span>Increasing Learning Engagement with Web 2.0 Tools</span><span> </span></p></td></tr></tbody></table><p><span> </span></p><p><em><span>2-Step Instructions for Self-Registering for USM OnTrack QM Workshops</span></em><span> </span><span> </span></p><ul><li><span>Step 1. Go to </span><span><a href="https://www.qmprogram.org/myqm/" rel="nofollow external" class="bo">https://www.qmprogram.org/myqm/</a></span><span> and sign in if you have a QM account or click "No, I am new here" to create an account. </span><span> </span></li><li><span>Step 2. Once signed in, click here </span><span><a href="https://www.usmd.edu/cai/register-qm-workshops" rel="nofollow external" class="bo">https://www.usmd.edu/cai/register-qm-workshops</a></span><span> for a listing of USM OnTrack QM Workshops and to register (using the corresponding link on the right side of the table). </span><span> </span></li></ul></div><div><br></div><div>There is no cost for any USM faculty or staff member to attend these workshops, but each workshop does have a 30-person limit, so please sign up as soon as possible!</div><div><br></div><div><br></div><div><br></div><div><br></div><div>QM Coordinator information:</div><div><br></div><div>Dr. Sherri Braxton - University of Maryland-Baltimore County</div><div><a href="mailto:sbraxton@umbc.edu">sbraxton@umbc.edu</a></div></div>
]]>
</Body>
<Summary>USM OnTrack has added additional Quality Matters workshops in high-demand topics for the Fall term!       NEW - Quality Matters Fall Workshops    We are excited to announce that we have added a...</Summary>
<Website>https://www.usmd.edu/cai/register-qm-workshops</Website>
<AttachmentKind>Document</AttachmentKind>
<AttachmentUrl>https://assets3-beta.my.umbc.edu/system/shared/attachments/ebe6073bdbd86da9914b32684e2176af/69ec1def/news/000/095/113/f56fd81299f45d30fae410987983d000/OnlineSessionSelfRegistrationInstructionsDedicated.pdf?1598303574</AttachmentUrl>
<Attachments>
<Attachment kind="Document" url="https://beta.my.umbc.edu/groups/doit/posts/95113/attachments/36751"></Attachment>
</Attachments>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/95113/guest@my.umbc.edu/a07f520e20764d330c41f78220d7b517/api/pixel</TrackingUrl>
<Tag>online-learning</Tag>
<Tag>professional-development</Tag>
<Tag>qm</Tag>
<Tag>quality-matters</Tag>
<Tag>usm</Tag>
<Group token="instructional-technology">Instructional Technology</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/instructional-technology</GroupUrl>
<AvatarUrl>https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/xsmall.png?1446126703</AvatarUrl>
<AvatarUrl size="original">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/original.png?1446126703</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/xxlarge.png?1446126703</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/xlarge.png?1446126703</AvatarUrl>
<AvatarUrl size="large">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/large.png?1446126703</AvatarUrl>
<AvatarUrl size="medium">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/medium.png?1446126703</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/small.png?1446126703</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/xsmall.png?1446126703</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/xxsmall.png?1446126703</AvatarUrl>
<Sponsor>Instructional Technology</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/095/113/a875020a9280c7db69e73eb15d3755e4/xxlarge.jpg?1598303574</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/095/113/a875020a9280c7db69e73eb15d3755e4/xlarge.jpg?1598303574</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/095/113/a875020a9280c7db69e73eb15d3755e4/large.jpg?1598303574</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/095/113/a875020a9280c7db69e73eb15d3755e4/medium.jpg?1598303574</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/095/113/a875020a9280c7db69e73eb15d3755e4/small.jpg?1598303574</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/095/113/a875020a9280c7db69e73eb15d3755e4/xsmall.jpg?1598303574</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/095/113/a875020a9280c7db69e73eb15d3755e4/xxsmall.jpg?1598303574</ThumbnailUrl>
<PawCount>2</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Mon, 24 Aug 2020 17:14:47 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="95109" important="false" status="posted" url="https://beta.my.umbc.edu/groups/doit/posts/95109">
<Title>Phishing Email from Fake UMBC IT Desk</Title>
<Tagline>Phsihing Attack Sent To Over 1000 UMBC Accounts</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>A compromised UMBC account was used to send phishing emails to over 1200 other UMBC accounts today. These malicious emails, claiming to be from the “UMBC IT Desk,” contained a link to a fake myUMBC login page, potentially allowing the malicious actors to steal any passwords entered on the site. To prevent further malicious activity, DoIT Security has scrambled the password of the account used to send the emails.</span></p><p><span>From: &lt;name removed&gt;</span></p><p><span>Date: Mon, Aug 24, 2020 at 10:40 AM</span></p><p><span>Subject: COVID-19 Update</span></p><p><span>To:</span></p><br><br><p><span>This is the UMBC IT Desk. Kindly Update your details to avoid beinglocked out of your email account.</span></p><p><span>Follow the URLbelow to proceed to setup umbc.edu/cas-web/login/Update</span></p><p><span>IT DeskUMBC</span></p><p><span> </span></p><p><span>The link leads to this fake login page:</span></p><p><span><span><img src="https://lh4.googleusercontent.com/qESGwhhjWX4Eq5wLk8x42DzKncvfCb8MXubrCFGRovWZciOQQsHK6zJeWxyP7DN1T_md66vgViBCx9OrzF8VzKuK80L_Fa0zwPSBj7nNvnyN0GeV4NUMm96XgnZWvIoo5G-LEJkF" width="624" height="351" style="max-width: 100%; height: auto;"></span></span></p><p><span>Always check the URL before entering credentials online. Notice that this site is not in the umbc.edu domain, despite claiming to be myUMBC. In addition, you can compare it to the real login page by navigating to myUMBC without using a link to see that it does not match.</span></p><p><span>As of this writing, approximately 150 people have clicked this link. If you have entered your UMBC password after clicking the link in this phishing email, please change it to something substantively different as soon as possible. Instructions for doing so can be found here:</span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867939" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867939</span></a><span>.</span></p><p><span>If you do receive any email that you suspect is a scam, please do not click on any URL or reply. Either of those actions confirms to the sender that your email address is valid. Please forward the message (with the email headers) to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>.</span></p><p><span>How do I forward full email headers?</span></p><p><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a></p></div>
]]>
</Body>
<Summary>A compromised UMBC account was used to send phishing emails to over 1200 other UMBC accounts today. These malicious emails, claiming to be from the “UMBC IT Desk,” contained a link to a fake...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/95109/guest@my.umbc.edu/76a7aa4617da4d330558aa3e1cf11818/api/pixel</TrackingUrl>
<Tag>covid19</Tag>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets4-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777059166</AvatarUrl>
<AvatarUrl size="original">https://assets4-beta.my.umbc.edu/images/avatars/group/7/original.png?1777059166</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777059166</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777059166</AvatarUrl>
<AvatarUrl size="large">https://assets4-beta.my.umbc.edu/images/avatars/group/7/large.png?1777059166</AvatarUrl>
<AvatarUrl size="medium">https://assets4-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777059166</AvatarUrl>
<AvatarUrl size="small">https://assets4-beta.my.umbc.edu/images/avatars/group/7/small.png?1777059166</AvatarUrl>
<AvatarUrl size="xsmall">https://assets4-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777059166</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777059166</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 24 Aug 2020 16:00:48 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="95096" important="false" status="posted" url="https://beta.my.umbc.edu/groups/doit/posts/95096">
<Title>Blackboard Predict to be Sunset</Title>
<Tagline>And rolling out a new model that helps students earlier!</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><span><p><span>Blackboard Predict (BB Predict) is a subscription-based predictive model designed to identify students at risk of receiving a grade of D or F in a course.  UMBC has a long partnership with Blackboard and had an active advisory role in the development of this tool.  While the product produced was high quality, it has been lightly used (although more recently DoIT has </span><a href="https://doit.umbc.edu/news/?id=65634" rel="nofollow external" class="bo"><span>partnered</span></a><span> with individual faculty and staff to explore ways to use it as part of our student success efforts and as a complement to our First Year Intervention Alert Program).  </span></p><p><span>Given current usage and financial constraints, we have made the decision to sunset BB Predict and will not renew our subscription.</span></p><p><span>One factor that limited the usefulness of BB Predict to improve student success through better early alerts is simple.  The model’s predictions only become precise enough to use with confidence at the semester's midpoint and are not “early enough.”  Recognizing that the earlier at-risk students can be identified with precision, the more time we have to help them and the greater the likelihood of their success, the Data Science Team within DoIT and supported by the Provost’s office constructed our own model, now called UMBC Predict.  The team’s goal was to increase the precision of the model’s estimates earlier in the semester, in this case, </span><span>four weeks</span><span> from the first day of classes, to allow for greater opportunities for students to seek assistance or change their approach to the class, and for these changes or assistance to have an impact.</span></p><p><span>UMBC Predict does not attempt to replicate the model and platform of our vendor partner.  The strategy employed by the Data Science Team was to focus on fewer courses in the initial stages of the work.  In particular, the team focused on courses with elevated DFW rates, large numbers of students, and importantly, courses where instructors make relatively heavy use of our learning management system (Blackboard) to engage students and to record assignments and grades throughout the semester.  It has always been true that instructors’ use of the learning management system provides valuable information to students about their progress in the course, but it is also the case that these interactions provide important information that the predictive model can use to sharpen predictions at an earlier point in the semester.</span></p><p><span>A second important factor underlying our decision to sunset BB Predict is pragmatic and necessary.  With the current pandemic and its associated negative effects upon the state budget, reducing our expenditure on a subscription-based model in favor of an internal model with equivalent or better performance for certain courses allows us to maintain our support for students while freeing up resources to support people and programs.</span></p><p><span>UMBC Predict is already being integrated into department-level enhanced early alert programs on a pilot basis.  This term, faculty in the Mathematics and Statistics Department and the Dean’s Office in the College of Mathematical and Natural Sciences plan to partner with DoIT and the Analytics and Business Intelligence Group to use targeted communications to students who may be at risk after four weeks.  The communication, delivered over the course instructor’s signature, encourages students to take advantage of their office hours along with other tips developed by the Academic Success Center to improve students’ chances of success both in the course and at UMBC.</span></p><div><span><br></span></div></span></div>
]]>
</Body>
<Summary>Blackboard Predict (BB Predict) is a subscription-based predictive model designed to identify students at risk of receiving a grade of D or F in a course.  UMBC has a long partnership with...</Summary>
<Website>https://doit.umbc.edu/Analytics/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/95096/guest@my.umbc.edu/3c818c79de1545627e54d5378c7cfca9/api/pixel</TrackingUrl>
<Tag>analytics</Tag>
<Group token="doit">Division of Information Technology (DoIT)</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/doit</GroupUrl>
<AvatarUrl>https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
<AvatarUrl size="original">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/original.JPG?1727453227</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxlarge.png?1727453227</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xlarge.png?1727453227</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/large.png?1727453227</AvatarUrl>
<AvatarUrl size="medium">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/medium.png?1727453227</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/small.png?1727453227</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxsmall.png?1727453227</AvatarUrl>
<Sponsor>Division of Information Technology (DoIT)</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/095/096/631da9a10d488745677cc1bf1b321960/xxlarge.jpg?1598291938</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/095/096/631da9a10d488745677cc1bf1b321960/xlarge.jpg?1598291938</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/095/096/631da9a10d488745677cc1bf1b321960/large.jpg?1598291938</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/095/096/631da9a10d488745677cc1bf1b321960/medium.jpg?1598291938</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/095/096/631da9a10d488745677cc1bf1b321960/small.jpg?1598291938</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/095/096/631da9a10d488745677cc1bf1b321960/xsmall.jpg?1598291938</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/095/096/631da9a10d488745677cc1bf1b321960/xxsmall.jpg?1598291938</ThumbnailUrl>
<PawCount>4</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 24 Aug 2020 13:59:56 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="95090" important="false" status="posted" url="https://beta.my.umbc.edu/groups/doit/posts/95090">
<Title>Account data breach: Zoosk (2020)</Title>
<Tagline>Credentials Breach Report</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>In January 2020, Zoosk 2020, an online dating service, suffered a data breach. This breach contained 24 million users data that was posted online. The user information includes dates of birth, drinking habits, education levels, email addresses, ethnicities, family structure, genders, geographic locations, income levels, names, nicknames, physical attributes, political views, relationship statuses, religions, sexual orientations,and smoking habits. While the passwords posted were not valid for access to UMBC accounts, we suggest you change your UMBC password as a safety precaution.</span></p><br><p><span>76 UMBC accounts were victims of this breach. The victims are being notified via their UMBC emails and/or their alternate emails. If you have a Zoosk (2020) account, please contact them to see if you have been affected by this breach. To see if you were involved in any other breach visit: </span><a href="https://haveibeenpwned.com/" rel="nofollow external" class="bo"><span>https://haveibeenpwned.com/</span></a><span>.</span></p><br><br><p><span>More about Zoosk(2020) data breach:</span></p><p><a href="https://grahamcluley.com/zoosk-hacking/" rel="nofollow external" class="bo"><span>https://grahamcluley.com/zoosk-hacking/</span></a></p><br><p><a href="https://www.justice4you.com/blog/zoosk-data-breach.html#:~:text=According%20to%20the%20notice%2C%20an%20unauthorized%20party%20breached,by%20email%2C%20including%20more%20than%20560%2C000%20California%20residents." rel="nofollow external" class="bo"><span>https://www.justice4you.com/blog/zoosk-data-breach.html#:~:text=According%20to%20the%20notice%2C%20an%20unauthorized%20party%20breached,by%20email%2C%20including%20more%20than%20560%2C000%20California%20residents.</span></a></p><br><p><span>If you have any questions or concerns email us: </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span> </span></p><br><p><span>Information about this breach was provided to us by Have I Been Pwned(HIBP). </span></p><p> </p><p><span>_____________________________________________________________________________________</span></p><p><span>Receive any suspicious emails?</span></p><br><p><span>Forward it to </span><span><a href="mailto:security@umbc.edu">security@umbc.edu</a></span><span> along with the email headers. Instructions for doing so can be found at the UMBC support wiki: </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><p> </p><p><span>Need to set up a recovery email for your UMBC account?</span></p><p><span>Follow the instructions here: </span><a href="https://my3.my.umbc.edu/groups/itsecurity/posts/94776" rel="nofollow external" class="bo"><span>https://my3.my.umbc.edu/groups/itsecurity/posts/94776</span></a></p><br><p><span>Follow us on myUMBC</span><span>:</span><a href="https://my3.my.umbc.edu/groups/itsecurity" rel="nofollow external" class="bo"><span>https://my3.my.umbc.edu/groups/itsecurity</span></a></p></div>
]]>
</Body>
<Summary>In January 2020, Zoosk 2020, an online dating service, suffered a data breach. This breach contained 24 million users data that was posted online. The user information includes dates of birth,...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/95090/guest@my.umbc.edu/e19d02e85d33f6e43f12987559f2f8a4/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets4-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777059166</AvatarUrl>
<AvatarUrl size="original">https://assets4-beta.my.umbc.edu/images/avatars/group/7/original.png?1777059166</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777059166</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777059166</AvatarUrl>
<AvatarUrl size="large">https://assets4-beta.my.umbc.edu/images/avatars/group/7/large.png?1777059166</AvatarUrl>
<AvatarUrl size="medium">https://assets4-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777059166</AvatarUrl>
<AvatarUrl size="small">https://assets4-beta.my.umbc.edu/images/avatars/group/7/small.png?1777059166</AvatarUrl>
<AvatarUrl size="xsmall">https://assets4-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777059166</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777059166</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 24 Aug 2020 13:00:41 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="95089" important="false" status="posted" url="https://beta.my.umbc.edu/groups/doit/posts/95089">
<Title>Account data breach: Drizly</Title>
<Tagline>Credentials Breach Report</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>In July 2020, an online alcohol delivery service, Drizly, suffered a data breach. This breach contained 2.5 million customers data that was sold online, and then posted on a hacking forum. The customer information includes names, email addresses, IP addresses, physical addresses, date of birth, phone numbers, and passwords. No financial information was leaked.</span></p><br><p><span>106 UMBC accounts were victims of this breach. The victims are being notified via their UMBC emails and/or their alternate emails. If you have a Drizly account, please contact them to see if you have been affected by this breach. To see if you were involved in any other breach visit: </span><a href="https://haveibeenpwned.com/" rel="nofollow external" class="bo"><span>https://haveibeenpwned.com/</span></a><span>.</span></p><br><br><p><span>More about Drizly data breach:</span></p><p><a href="https://techcrunch.com/2020/07/28/drizly-data-breach/" rel="nofollow external" class="bo"><span>https://techcrunch.com/2020/07/28/drizly-data-breach/</span></a></p><br><p><a href="https://www.forbes.com/sites/katedingwall/2020/07/29/alcohol-e-commerce-giant-drizly-hit-with-huge-data-breach/#63b0d40b5a96" rel="nofollow external" class="bo"><span>https://www.forbes.com/sites/katedingwall/2020/07/29/alcohol-e-commerce-giant-drizly-hit-with-huge-data-breach/#63b0d40b5a96</span></a></p><br><p><span>If you have any questions or concerns email us: </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span> </span></p><br><p><span>Information about this breach was provided to us by Have I Been Pwned(HIBP). </span></p><p> </p><p><span>_____________________________________________________________________________________</span></p><p><span>Receive any suspicious emails?</span></p><br><p><span>Forward it to </span><span><a href="mailto:security@umbc.edu">security@umbc.edu</a></span><span> along with the email headers. Instructions for doing so can be found at the UMBC support wiki: </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><p> </p><p><span>Need to set up a recovery email for your UMBC account?</span></p><p><span>Follow the instructions here: </span><a href="https://my3.my.umbc.edu/groups/itsecurity/posts/94776" rel="nofollow external" class="bo"><span>https://my3.my.umbc.edu/groups/itsecurity/posts/94776</span></a></p><br><span>Follow us on myUMBC</span><span>:</span><a href="https://my3.my.umbc.edu/groups/itsecurity" rel="nofollow external" class="bo"><span>https://my3.my.umbc.edu/groups/itsecurity</span></a></div>
]]>
</Body>
<Summary>In July 2020, an online alcohol delivery service, Drizly, suffered a data breach. This breach contained 2.5 million customers data that was sold online, and then posted on a hacking forum. The...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/95089/guest@my.umbc.edu/89316cd852a70895cf563be575901740/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets4-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777059166</AvatarUrl>
<AvatarUrl size="original">https://assets4-beta.my.umbc.edu/images/avatars/group/7/original.png?1777059166</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777059166</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777059166</AvatarUrl>
<AvatarUrl size="large">https://assets4-beta.my.umbc.edu/images/avatars/group/7/large.png?1777059166</AvatarUrl>
<AvatarUrl size="medium">https://assets4-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777059166</AvatarUrl>
<AvatarUrl size="small">https://assets4-beta.my.umbc.edu/images/avatars/group/7/small.png?1777059166</AvatarUrl>
<AvatarUrl size="xsmall">https://assets4-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777059166</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777059166</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 24 Aug 2020 12:27:41 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="95088" important="false" status="posted" url="https://beta.my.umbc.edu/groups/doit/posts/95088">
<Title>Account Data Breach: Havenly</Title>
<Tagline>Credentials Breach Report</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>In June 2020, Havenly, an interior design website, suffered a data breach. Approximately 1.4 million members' personal information was exposed. This data includes names, email, phone numbers, addresses and passwords stored as SHA-1 hashes. This information was shared on an online hacking community. </span></p><br><p><span>28 UMBC accounts were affected by this breach. The victims have been notified via their UMBC emails and/or their alternate emails. If you have a Havenly account, please contact them to see if you have been affected by this breach.</span></p><br><p><span>More about Heavenly data breach:</span></p><p><a href="https://www.bleepingcomputer.com/news/security/hacker-leaks-386-million-user-records-from-18-companies-for-free/" rel="nofollow external" class="bo"><span>https://www.bleepingcomputer.com/news/security/hacker-leaks-386-million-user-records-from-18-companies-for-free/</span></a><span> </span></p><br><p><span>If you have any questions or concerns email us: </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span> </span></p><br><p><span>Information about this breach was provided to us by Have I Been Pwned(HIBP).</span></p><br><p> </p><p><span>_____________________________________________________________________________________</span></p><p><span>Receive any suspicious emails?</span></p><br><p><span>Forward it to </span><span><a href="mailto:security@umbc.edu">security@umbc.edu</a></span><span> along with the email headers. Instructions for doing so can be found at the UMBC support wiki: </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><p> </p><p><span>Need to set up a recovery email for your UMBC account?</span></p><p><span>Follow the instructions here: </span><a href="https://my3.my.umbc.edu/groups/itsecurity/posts/94776" rel="nofollow external" class="bo"><span>https://my3.my.umbc.edu/groups/itsecurity/posts/94776</span></a></p><br><p><span>Follow us on myUMBC</span><span>:</span><a href="https://my3.my.umbc.edu/groups/itsecurity" rel="nofollow external" class="bo"><span>https://my3.my.umbc.edu/groups/itsecurity</span></a></p></div>
]]>
</Body>
<Summary>In June 2020, Havenly, an interior design website, suffered a data breach. Approximately 1.4 million members' personal information was exposed. This data includes names, email, phone numbers,...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/95088/guest@my.umbc.edu/37cde20daa1e1e214e861b07e9f048a8/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets4-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777059166</AvatarUrl>
<AvatarUrl size="original">https://assets4-beta.my.umbc.edu/images/avatars/group/7/original.png?1777059166</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777059166</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777059166</AvatarUrl>
<AvatarUrl size="large">https://assets4-beta.my.umbc.edu/images/avatars/group/7/large.png?1777059166</AvatarUrl>
<AvatarUrl size="medium">https://assets4-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777059166</AvatarUrl>
<AvatarUrl size="small">https://assets4-beta.my.umbc.edu/images/avatars/group/7/small.png?1777059166</AvatarUrl>
<AvatarUrl size="xsmall">https://assets4-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777059166</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777059166</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 24 Aug 2020 12:25:16 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="95087" important="false" status="posted" url="https://beta.my.umbc.edu/groups/doit/posts/95087">
<Title>Account Data Breach: Promo</Title>
<Tagline>Credentials Breach Report</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>In June 2020, a marketing video creator website, Promo, suffered a data breach. 22 million users' personal information was leaked on an online hacking forum. This data includes names, email, gender, IP addresses and passwords stored as SHA-256 hashes. This information was shared on an online hacking community. </span></p><br><p><span>34 UMBC accounts were affected by this breach. The victims have been notified via their UMBC emails and/or their alternate emails. If you have a Promo account, please contact them to see if you have been affected by this breach. Also visit </span><a href="https://haveibeenpwned.com/" rel="nofollow external" class="bo"><span>https://haveibeenpwned.com/</span></a><span> to see if you were involved in any other breach.</span></p><br><p><span>More about Promo data breach:</span></p><p><a href="https://support.promo.com/en/articles/4276475-promo-data-breach-faq" rel="nofollow external" class="bo"><span>https://support.promo.com/en/articles/4276475-promo-data-breach-faq</span></a><span> </span></p><br><p><a href="https://www.bleepingcomputer.com/news/security/promocom-discloses-data-breach-after-22m-user-records-leaked-online/#:~:text=Promo.com%2C%20an%20Israeli-based%20marketing%20video%20creation%20site%2C%20has,networks%20such%20as%20Facebook%2C%20Instagram%2C%20Twitter%2C%20and%20LinkedIn." rel="nofollow external" class="bo"><span>https://www.bleepingcomputer.com/news/security/promocom-discloses-data-breach-after-22m-user-records-leaked-online/#:~:text=Promo.com%2C%20an%20Israeli-based%20marketing%20video%20creation%20site%2C%20has,networks%20such%20as%20Facebook%2C%20Instagram%2C%20Twitter%2C%20and%20LinkedIn.</span></a></p><br><br><p><span>If you have any questions or concerns email us: </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span> </span></p><br><p><span>Information about this breach was provided to us by Have I Been Pwned(HIBP). </span></p><p> </p><p><span>_____________________________________________________________________________________</span></p><p><span>Receive any suspicious emails?</span></p><br><p><span>Forward it to </span><span><a href="mailto:security@umbc.edu">security@umbc.edu</a></span><span> along with the email headers. Instructions for doing so can be found at the UMBC support wiki: </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><p> </p><p><span>Need to set up a recovery email for your UMBC account?</span></p><p><span>Follow the instructions here: </span><a href="https://my3.my.umbc.edu/groups/itsecurity/posts/94776" rel="nofollow external" class="bo"><span>https://my3.my.umbc.edu/groups/itsecurity/posts/94776</span></a></p><br><p><span>Follow us on myUMBC</span><span>:</span><a href="https://my3.my.umbc.edu/groups/itsecurity" rel="nofollow external" class="bo"><span>https://my3.my.umbc.edu/groups/itsecurity</span></a></p></div>
]]>
</Body>
<Summary>In June 2020, a marketing video creator website, Promo, suffered a data breach. 22 million users' personal information was leaked on an online hacking forum. This data includes names, email,...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/95087/guest@my.umbc.edu/9b440e99fda3d256ddc3796c3a64a556/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets4-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777059166</AvatarUrl>
<AvatarUrl size="original">https://assets4-beta.my.umbc.edu/images/avatars/group/7/original.png?1777059166</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777059166</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777059166</AvatarUrl>
<AvatarUrl size="large">https://assets4-beta.my.umbc.edu/images/avatars/group/7/large.png?1777059166</AvatarUrl>
<AvatarUrl size="medium">https://assets4-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777059166</AvatarUrl>
<AvatarUrl size="small">https://assets4-beta.my.umbc.edu/images/avatars/group/7/small.png?1777059166</AvatarUrl>
<AvatarUrl size="xsmall">https://assets4-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777059166</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777059166</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 24 Aug 2020 12:24:27 -0400</PostedAt>
<EditAt>Mon, 24 Aug 2020 12:25:39 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="false" id="95086" important="false" status="posted" url="https://beta.my.umbc.edu/groups/doit/posts/95086">
<Title>Account Data breach: ProctorU</Title>
<Tagline>Credentials Breach Report</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>In June 2020, ProctorU, an online examination service, suffered a data breach. Over 444K user records were exposed and posted to an online hacking community. These records contain names, emails, physical addresses, phone numbers and passwords.</span></p><br><p><span>36</span><span>UMBC accounts were affected by this breach. The victims have been notified via their UMBC emails and/or their alternate emails. If you have a ProctorU account, please contact them to see if you have been affected by this breach. To see if you were involved in any other breach visit: </span><a href="https://haveibeenpwned.com/" rel="nofollow external" class="bo"><span>https://haveibeenpwned.com/</span></a><span>.</span></p><br><p><span>More about ProctorU data breach:</span></p><p><a href="https://www.smh.com.au/national/hackers-hit-university-online-exam-tool-20200806-p55j6h.html" rel="nofollow external" class="bo"><span>https://www.smh.com.au/national/hackers-hit-university-online-exam-tool-20200806-p55j6h.html</span></a></p><br><p><a href="https://www.bleepingcomputer.com/news/security/proctoru-confirms-data-breach-after-database-leaked-online/" rel="nofollow external" class="bo"><span>https://www.bleepingcomputer.com/news/security/proctoru-confirms-data-breach-after-database-leaked-online/</span></a></p><br><p><span>If you have any questions or concerns email us: </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span> </span></p><br><p><span>Information about this breach was provided to us by Have I Been Pwned(HIBP). </span></p><p> </p><p><span>_____________________________________________________________________________________</span></p><p><span>Receive any suspicious emails?</span></p><br><p><span>Forward it to </span><span><a href="mailto:security@umbc.edu">security@umbc.edu</a></span><span> along with the email headers. Instructions for doing so can be found at the UMBC support wiki: </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><p> </p><p><span>Need to set up a recovery email for your UMBC account?</span></p><p><span>Follow the instructions here: </span><a href="https://my3.my.umbc.edu/groups/itsecurity/posts/94776" rel="nofollow external" class="bo"><span>https://my3.my.umbc.edu/groups/itsecurity/posts/94776</span></a></p><br><p><span>Follow us on myUMBC</span><span>:</span><a href="https://my3.my.umbc.edu/groups/itsecurity" rel="nofollow external" class="bo"><span>https://my3.my.umbc.edu/groups/itsecurity</span></a></p></div>
]]>
</Body>
<Summary>In June 2020, ProctorU, an online examination service, suffered a data breach. Over 444K user records were exposed and posted to an online hacking community. These records contain names, emails,...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/95086/guest@my.umbc.edu/00f49b7a650a2111ae6eca31a0576d38/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets4-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777059166</AvatarUrl>
<AvatarUrl size="original">https://assets4-beta.my.umbc.edu/images/avatars/group/7/original.png?1777059166</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777059166</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777059166</AvatarUrl>
<AvatarUrl size="large">https://assets4-beta.my.umbc.edu/images/avatars/group/7/large.png?1777059166</AvatarUrl>
<AvatarUrl size="medium">https://assets4-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777059166</AvatarUrl>
<AvatarUrl size="small">https://assets4-beta.my.umbc.edu/images/avatars/group/7/small.png?1777059166</AvatarUrl>
<AvatarUrl size="xsmall">https://assets4-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777059166</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777059166</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 24 Aug 2020 12:21:59 -0400</PostedAt>
<EditAt>Mon, 24 Aug 2020 12:26:02 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="95085" important="false" status="posted" url="https://beta.my.umbc.edu/groups/doit/posts/95085">
<Title>Microsoft SharePoint Phishing Scam</Title>
<Tagline>A Scam Targeting Microsoft SharePoint Users</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>Malicious actors are using Covid-19 and current economic conditions to exploit victims with new phishing scams. The article linked below talks about two similar phishing scams. One scam claims to be giving the user a bonus while mimicking a Microsoft SharePoint notification. The other attempts to spoof a Microsoft Planner email notification. Both scams are trying to steal the user’s Microsoft login credentials. </span></p><br><p><span>“Summer Bonus” Phishing Scam</span></p><br><p><span>The scammer sends an email that looks like a legitimate Microsoft SharePoint notification. The email offers what looks like a bonus for the month while also having an “open” button to display an explanatory file. An example of this email is shown below.</span></p><br><div><table><colgroup></colgroup><tbody><tr><td><p><span><span><img src="https://lh6.googleusercontent.com/zpGReAPSZiSRNJQ_35ZnLTRLFk1y7FppGEXMd9ijXbyR9XwRyZpWlIJaoqAJ78fu0q4fXb7-_nR9RgLUmjsZH_7XpuchopERN2ZViG3tHs54W4qfvVbwFtPADMVnVWdwzvpR1Qd8" width="610" height="527" style="max-width: 100%; height: auto;"></span></span></p></td></tr></tbody></table></div><br><p><span>If the victim clicks on the “open” button they will be brought to a website that looks very similar to a Microsoft login page. A closer look reveals that this is not a link to a Microsoft login page but to an AppSpot site created by the scammers. Appspot.com is a cloud computing platform for developing and hosting web applications in Google-managed data centers.</span></p><br><p><span>If the victim enters their login credentials into the fake Microsoft login page, their account would be compromised.</span></p><br><p><span>Microsoft Planner Phishing Scam</span></p><br><p><span>Similar to the “Summer Bonus” scam, this Microsoft Planner Phishing Scam uses an email that tries to spoof a Microsoft Planner notification. As in the “Summer Bonus” scam, it has a button but this one says “Open in Microsoft Planner” and will take you to a fake Microsoft login page. An example of this email is shown below.</span></p><p><span> </span></p><div><table><colgroup></colgroup><tbody><tr><td><p><span><span><img src="https://lh5.googleusercontent.com/CXJUnqd9G1yL7OP-dLc7__wnmI5KZ7WtUpY95ZF5ooHBLVWdDMwQ4CwzvJ_06MeWYwPpPyxv0Y3XX2PAzArgpEhnO668nD3zHUHEWKkVgaq-SZUC60rPoywdkIVbhjIz9nT54TnM" width="610" height="524" style="max-width: 100%; height: auto;"></span></span></p></td></tr></tbody></table></div><br><p><span>As with the previous scam, if the victim enters their login credentials into the fake Microsoft login page, their account would be compromised.</span></p><br><p><span>To avoid these scams, make sure the site you land on after clicking the button is really a Microsoft domain. If the site is a login for Microsoft then the URL should direct your browser to a legitimate Microsoft domain.</span></p><br><p><span>Even before clicking any buttons, look at the From address in the headers. </span><span>The scammer’s display name makes it appear as if it belongs to the targeted company. The headers can show if the From email address itself is spoofed and who is actually sending the email to you. </span></p><br><p><span>Always remember that if it feels “too good to be true”, then it is probably too good to be true. It is also good practice to check with a supervisor before responding to any unsolicited requests for credentials or logins that appear to come from your employer.</span></p><br><p><span>If you do receive any email that you suspect is a scam, please do not click on any URL or reply. Either of those actions confirms to the sender that your email address is valid. Please forward the message (with the email headers) to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>.</span></p><br><p><span>How do I forward full email headers?</span></p><p><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a></p><br><p><span>The images and the original article can be found here. Please check it out for more information: </span></p><p><a href="https://www.area1security.com/blog/july-bonus-microsoft-spear-phishing/?utm_medium=email&amp;utm_source=blast&amp;utm_term=na&amp;utm_content=na&amp;utm_campaign=2020-Q3-Email-Blast-Spot-Campaign&amp;mkt_tok=eyJpIjoiWVdKbE1HVXlOakkzWVRWaiIsInQiOiJFWnFFZVYxYXBuTFpcLytrc1hzNkFodUZ1XC9CbWRPcUROYmhMWlM0NisyZmo3K0cybFFyY0xmMnhYXC9lYUIzMit2UXZGYzFPTURmTSt2Z1cxRDkxOTladFUwVGl5Wmczd2FmZWFvSkRZZm9iN0FVZGh0TGs2b2FlazhaSFU0ZWhzbSJ9" rel="nofollow external" class="bo"><span>https://www.area1security.com/blog/july-bonus-microsoft-spear-phishing/?utm_medium=email&amp;utm_source=blast&amp;utm_term=na&amp;utm_content=na&amp;utm_campaign=2020-Q3-Email-Blast-Spot-Campaign&amp;mkt_tok=eyJpIjoiWVdKbE1HVXlOakkzWVRWaiIsInQiOiJFWnFFZVYxYXBuTFpcLytrc1hzNkFodUZ1XC9CbWRPcUROYmhMWlM0NisyZmo3K0cybFFyY0xmMnhYXC9lYUIzMit2UXZGYzFPTURmTSt2Z1cxRDkxOTladFUwVGl5Wmczd2FmZWFvSkRZZm9iN0FVZGh0TGs2b2FlazhaSFU0ZWhzbSJ9</span></a></p><br><p><span>To read more articles published by DoIT visit: </span></p><p><a href="https://itsecurity.umbc.edu/critical/?tag=notice" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/critical/?tag=notice</span></a><span>. </span></p><p><a href="https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19</span></a></p></div>
]]>
</Body>
<Summary>Malicious actors are using Covid-19 and current economic conditions to exploit victims with new phishing scams. The article linked below talks about two similar phishing scams. One scam claims to...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/95085/guest@my.umbc.edu/b71f97a748a34795397c539c4c6983f8/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets4-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777059166</AvatarUrl>
<AvatarUrl size="original">https://assets4-beta.my.umbc.edu/images/avatars/group/7/original.png?1777059166</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777059166</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777059166</AvatarUrl>
<AvatarUrl size="large">https://assets4-beta.my.umbc.edu/images/avatars/group/7/large.png?1777059166</AvatarUrl>
<AvatarUrl size="medium">https://assets4-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777059166</AvatarUrl>
<AvatarUrl size="small">https://assets4-beta.my.umbc.edu/images/avatars/group/7/small.png?1777059166</AvatarUrl>
<AvatarUrl size="xsmall">https://assets4-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777059166</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777059166</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 24 Aug 2020 12:20:48 -0400</PostedAt>
<EditAt>Mon, 24 Aug 2020 12:26:24 -0400</EditAt>
</NewsItem>

</News>
