<?xml version="1.0"?>
<News hasArchived="false" page="109" pageCount="242" pageSize="10" timestamp="Tue, 28 Apr 2026 03:26:02 -0400" url="https://beta.my.umbc.edu/groups/doit/posts.xml?page=109">
<NewsItem contentIssues="false" id="95084" important="false" status="posted" url="https://beta.my.umbc.edu/groups/doit/posts/95084">
<Title>"Quick Response" - A UMBC Impersonation Scam</Title>
<Tagline>A Common Scam That Still Works</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>Recently DoIT has been notified that an email scammer has been trying to impersonate other UMBC staffers. The email comes from a scammer who is claiming to be someone from UMBC and has the Subject “Quick response.” An example of this phishing email can be seen below.</span></p><br><div><table><colgroup></colgroup><tbody><tr><td><p><span>From: </span><span>FORGED NAME </span><span>&lt;</span><span><a href="mailto:.umbc@gmail.com">.umbc@gmail.com</a></span><span>&gt;</span></p><p><span>Date: Thu, Aug 20, 2020</span></p><p><span>Subject: Quick response</span></p><p><span>To: </span><span>&lt;@umbc.edu</span><span>&gt;</span></p><p> </p><p><span>Available?</span></p><p> </p><p><span>--</span></p><p><span>FORGED NAME</span></p></td></tr></tbody></table></div><br><p><span>The email that is shown above is only the first email that the scammer will send to users to try and get their attention. In similar phishing emails, once the user responds  the scammers would claim that they were stuck in a meeting and ask the user if they could go to the store and buy them gift cards. </span></p><br><p><span>Even though this email is short it still shows some red flags of a phishing email. </span></p><br><ul><li><p><span>The email itself is not personalized and is very vague</span><span>. The reason for this is so that the scammer can send the email to as many people as possible.</span></p></li><li><p><span>There is a sense of urgency</span><span>. Even with this email being so short, the sense of urgency comes with the subject line of “Quick response” trying to show that they need you to respond as soon as possible.</span></p></li><li><p><span>The From email address is suspicious</span><span>. Some scammers will use addresses of the form &lt;johnsmith.</span><a href="mailto:umbc@gmail.com" rel="nofollow external" class="bo"><span>umbc@gmail.com</span></a><span>&gt;. Without a closer examination some might assume it is coming from a UMBC source while in actuality it is coming from an unknown Google mail address.</span></p></li><li><p><span>The email signature and name are meant to look legitimate</span><span>. The scammer will try to base their phishing email on that of the person they are trying to impersonate. This will include an email signature meant to look like an actual UMBC staff member’s and the sender's name being that of the person they are trying to impersonate, often a supervisor. </span></p></li></ul><br><p><span>You can find other examples of similar scams here </span><a href="https://itsecurity.umbc.edu/critical/?id=94968" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/critical/?id=94968</span></a><span> and </span><a href="https://itsecurity.umbc.edu/critical/?id=94950" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/critical/?id=94950</span></a><span> or check out the DoIT Security page main page for more updated information.</span></p><br><p><span>If you do receive this or a similar email that you suspect is a scam, please do not click on any URL or reply. Either of those actions confirms to the sender that your email address is valid. Please forward the message (with the email headers) to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>.</span></p><br><p><span>How do I forward full email headers?</span></p><p><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a></p><br><p><span>To read more articles published by DOIT visit: </span></p><p><a href="https://itsecurity.umbc.edu/critical/?tag=notice" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/critical/?tag=notice</span></a><span>. </span></p><p><a href="https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19</span></a></p></div>
]]>
</Body>
<Summary>Recently DoIT has been notified that an email scammer has been trying to impersonate other UMBC staffers. The email comes from a scammer who is claiming to be someone from UMBC and has the Subject...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/95084/guest@my.umbc.edu/9c777090fa25c9ed45f2e31e935ec17d/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777318640</AvatarUrl>
<AvatarUrl size="original">https://assets4-beta.my.umbc.edu/images/avatars/group/7/original.png?1777318640</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777318640</AvatarUrl>
<AvatarUrl size="xlarge">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777318640</AvatarUrl>
<AvatarUrl size="large">https://assets1-beta.my.umbc.edu/images/avatars/group/7/large.png?1777318640</AvatarUrl>
<AvatarUrl size="medium">https://assets1-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777318640</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/images/avatars/group/7/small.png?1777318640</AvatarUrl>
<AvatarUrl size="xsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777318640</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777318640</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 24 Aug 2020 12:19:31 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="95006" important="false" status="posted" url="https://beta.my.umbc.edu/groups/doit/posts/95006">
<Title>Account Data Breach: Truefire</Title>
<Tagline>Truefire Data Breach</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>In February 2020, the guitar tuition website TrueFire suffered a data breach. Over 600,000 individuals were affected. Information such as names, emails, addresses, account balances, and passwords were exposed. </span></p><br><p><span>Five UMBC email addresses were victims of this breach. These individuals were notified via their UMBC emails and/or their recovery emails. If you have a Truefire membership, please contact them to see if you were affected by this breach. If you have any questions or concerns email us: </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a></p><p> </p><p><span>Information about this breach was provided to Have I Been Pwned(HIBP) by </span><a href="https://dehashed.com/" rel="nofollow external" class="bo"><span>dehashed.com</span></a><span>.</span></p><br><br><p><span>More about Truefire data breach:</span></p><br><p><a href="https://guitar.com/news/industry-news/truefire-data-breach/" rel="nofollow external" class="bo"><span>https://guitar.com/news/industry-news/truefire-data-breach/https://guitar.com/news/industry-news/truefire-data-breach/</span></a></p><br><p> </p><p><span>_____________________________________________________________________________________</span></p><p><span>Receive any suspicious emails?</span></p><br><p><span>Forward it to </span><span><a href="mailto:security@umbc.edu">security@umbc.edu</a></span><span> along with the email headers. Instructions for doing so can be found at the UMBC support wiki: </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><p> </p><p><span>Need to set up a recovery email for your UMBC account?</span></p><p><span>Follow the instructions here: </span><a href="https://my3.my.umbc.edu/groups/itsecurity/posts/94776" rel="nofollow external" class="bo"><span>https://my3.my.umbc.edu/groups/itsecurity/posts/94776</span></a></p><br><p><span>Follow us on myUMBC</span><span>:</span><a href="https://my3.my.umbc.edu/groups/itsecurity" rel="nofollow external" class="bo"><span>https://my3.my.umbc.edu/groups/itsecurity</span></a></p></div>
]]>
</Body>
<Summary>In February 2020, the guitar tuition website TrueFire suffered a data breach. Over 600,000 individuals were affected. Information such as names, emails, addresses, account balances, and passwords...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/95006/guest@my.umbc.edu/2158b1aafd30648876752703c2af24de/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777318640</AvatarUrl>
<AvatarUrl size="original">https://assets4-beta.my.umbc.edu/images/avatars/group/7/original.png?1777318640</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777318640</AvatarUrl>
<AvatarUrl size="xlarge">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777318640</AvatarUrl>
<AvatarUrl size="large">https://assets1-beta.my.umbc.edu/images/avatars/group/7/large.png?1777318640</AvatarUrl>
<AvatarUrl size="medium">https://assets1-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777318640</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/images/avatars/group/7/small.png?1777318640</AvatarUrl>
<AvatarUrl size="xsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777318640</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777318640</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Fri, 21 Aug 2020 12:14:19 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="94968" important="false" status="posted" url="https://beta.my.umbc.edu/groups/doit/posts/94968">
<Title>&#8220;QUICK REQUEST&#8221; UMBC Impersonation Scam</Title>
<Tagline>Another Example Of A Gift Card Scam Targeting UMBC accounts</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>The DoIT has recently been notified of a malicious actor trying to impersonate a UMBC staffer. This scammer is sending emails with the subject line “QUICK REQUEST” and asking victims if they are available with the goal of getting gift cards from the victim. An example of an email chain is shown below with the name of the From and the email signature removed for privacy reasons.</span><span><br><br></span></p><div><table><colgroup></colgroup><tbody><tr><td><p><span>From: FORGED NAME &lt;<a href="mailto:.umbc@gmail.com">.umbc@gmail.com</a>&gt;</span><span><br></span><span>Date: Aug 19, 2020, at 11:33 AM</span></p><p><span>Subject QUICK REQUEST</span></p><p><span>To :&lt;@umbc.edu&gt;</span></p><br><p><span>Available?</span></p><br><p><span>--</span></p><p><span>FORGED NAME</span></p></td></tr></tbody></table></div><br><br><div><table><colgroup></colgroup><tbody><tr><td><p><span>FORGED NAME&lt;<a href="mailto:.umbc@gmail.com">.umbc@gmail.com</a>&gt; wrote:</span><span><br><br></span></p><p><span>I’m in an impromptu meeting right now and that's why i'm contacting you through here. I should have called you, but phone is not allowed to be used during the meeting. I don't know when the meeting will be rounding up, And i want you to help me out on something very important  from a store around you and I will reimburse you back when I’m out of the meeting. Let me know if you can do this.</span></p><p><span>--</span><span><br></span><span>FORGED NAME</span></p></td></tr></tbody></table></div><br><p><span>The scammer targets a department and tries to impersonate some senior person in that department. The scammer will send emails asking the victim if they are “available.” </span></p><br><p><span>If the victim respondes, they will receive a second email asking the victim to purchase gift cards because the scammer is currently in a meeting and can’t do it themselves. Note that the second email has poor grammar and random capitalizations. This email also has a sense of urgency with the scammer claiming to be in a meeting and using words like “important” and the subject “QUICK REQUEST” all in caps.</span></p><br><p><span>Note that the sender’s address in both messages is &lt;</span><a href="mailto:.umbc@gmail.com" rel="nofollow external" class="bo"><span>.umbc@gmail.com</span></a><span>&gt;. The full email from the scammer was shortened for privacy reasons. This address allows the victim to see the “umbc” and, without close examination, to assume that the message is coming from a UMBC source when in actuality it is coming from an unknown Google mail address. The email also had an email signature which was based on that of an actual UMBC staff member.</span></p><br><p><span>If you do receive this or any other email that you suspect is a scam, please do not click on any URL or reply. Either of those actions confirms to the sender that your email address is valid. Please forward the message (with the email headers) to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>.</span></p><br><p><span>How do I forward full email headers?</span></p><p><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a></p><br><p><span>To read more articles published by DOIT visit: </span></p><p><a href="https://itsecurity.umbc.edu/critical/?tag=notice" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/critical/?tag=notice</span></a><span>. </span></p><p><a href="https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19</span></a></p></div>
]]>
</Body>
<Summary>The DoIT has recently been notified of a malicious actor trying to impersonate a UMBC staffer. This scammer is sending emails with the subject line “QUICK REQUEST” and asking victims if they are...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/94968/guest@my.umbc.edu/de8dfe20a0867f3a7563b3ebfac2f660/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777318640</AvatarUrl>
<AvatarUrl size="original">https://assets4-beta.my.umbc.edu/images/avatars/group/7/original.png?1777318640</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777318640</AvatarUrl>
<AvatarUrl size="xlarge">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777318640</AvatarUrl>
<AvatarUrl size="large">https://assets1-beta.my.umbc.edu/images/avatars/group/7/large.png?1777318640</AvatarUrl>
<AvatarUrl size="medium">https://assets1-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777318640</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/images/avatars/group/7/small.png?1777318640</AvatarUrl>
<AvatarUrl size="xsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777318640</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777318640</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Thu, 20 Aug 2020 00:01:41 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="94967" important="false" status="posted" url="https://beta.my.umbc.edu/groups/doit/posts/94967">
<Title>FA2020 Instructional Technology Update</Title>
<Body>
<![CDATA[
    <div class="html-content"><span><p><span>The UMBC Instructional Technology Update is provided by the </span><a href="http://umbc.edu/doit" rel="nofollow external" class="bo"><span>Division of Information Technology</span></a><span> for students, faculty and staff. If you have questions or need help, please consult the </span><a href="https://wiki.umbc.edu/display/faq/Blackboard" rel="nofollow external" class="bo"><span>Blackboard Help FAQs</span></a><span> or directly at </span><a href="http://www.umbc.edu/blackboard/help" rel="nofollow external" class="bo"><span>www.umbc.edu/blackboard/help</span></a><span>.  You can also contact the </span><a href="http://doit.umbc.edu/tsc" rel="nofollow external" class="bo"><span>Technology Support Center</span></a><span> at 410.455.3838 or </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867859" rel="nofollow external" class="bo"><span>submit an RT (Request Tracker) ticket</span></a><span> via the </span><a href="https://rt.umbc.edu/UMBC/RequestHelp.html" rel="nofollow external" class="bo"><span>myUMBC Help Menu</span></a><span> or directly at </span><a href="http://my.umbc.edu/help" rel="nofollow external" class="bo"><span>my.umbc.edu/help</span></a><span>.</span></p><p><span><strong>HEADLINES</strong></span></p><p><span>What’s New</span></p><ul><li><p><a href="https://news.umbc.edu/umbc-faculty-on-a-mission-to-prepare-robust-high-quality-online-classes-for-fall-semester/" rel="nofollow external" class="bo"><span>UMBC faculty on a mission to prepare robust, high-quality online classes for fall </span></a></p></li><li><p><a href="https://doit.umbc.edu/news/?id=94919" rel="nofollow external" class="bo"><span>New PIVOT Site Launched for Faculty Professional Development</span></a></p></li><li><p><a href="https://docs.google.com/document/d/1xWWGAR8qEzKYr7qaVHoEhvO6lyXIyn6M3M7EFZPJQgA/edit?usp=sharing" rel="nofollow external" class="bo"><span>Recommended Template Language for Inclusion in Syllabi on Blackboard for Fall 2020</span></a></p></li><li><p><a href="https://doit.umbc.edu/news/?id=93025" rel="nofollow external" class="bo"><span>New Bb Annotate refreshes inline grading tool for SU2020</span></a><span>   </span></p></li><li><p><a href="https://doit.umbc.edu/news/?tag=ultra-update" rel="nofollow external" class="bo"><span>What’s new in Ultra for FA2020?</span></a></p></li><li><p><a href="https://doit.umbc.edu/news/?id=94934" rel="nofollow external" class="bo"><span>Create a +1 strategy and support diverse learning styles</span></a><span>  </span></p></li><li><p><span><a href="https://doit.umbc.edu/news/?id=94493" rel="nofollow external" class="bo">FA2020 Courses Created in Blackboard on July 27, 2020</a></span></p></li></ul><p><span>Academic Continuity</span></p><ul><li><p><a href="https://pivot.umbc.edu/pivot-live/" rel="nofollow external" class="bo"><span>May 4-8 &amp; August 10-14 PIVOT Live webinar recordings available</span></a><span> [</span><span>my</span><span>UMBC login req’d]  </span></p></li><li><p><a href="https://doit.umbc.edu/news/?id=94858" rel="nofollow external" class="bo"><span>Refresh &amp; Expand PIVOT Knowledge with New Solo Lessons</span></a></p></li><li><p><a href="https://doit.umbc.edu/news/?id=91642" rel="nofollow external" class="bo"><span>Effective practices for managing the live virtual classroom</span></a></p></li><li><p><a href="https://doit.umbc.edu/news/?id=91035" rel="nofollow external" class="bo"><span>Using Respondus Tools to Address Integrity of Online Tests</span></a></p></li><li><p><span><a href="https://doit.umbc.edu/news/?id=91804" rel="nofollow external" class="bo">UMBC Online: By the Numbers</a></span></p></li></ul><p><span>Training &amp; Professional Development (</span><a href="https://my3.my.umbc.edu/groups/instructional-technology/events" rel="nofollow external" class="bo"><span>view all events</span></a><span>)</span></p><ul><li><p><a href="https://my3.my.umbc.edu/groups/instructional-technology/events?mode=upcoming&amp;tag=start-of-semester-sprint" rel="nofollow external" class="bo"><span>Start of Semester Faculty Sprint</span></a><span>: August 21</span></p></li><li><p><a href="https://my3.my.umbc.edu/groups/instructional-technology/events?mode=upcoming&amp;tag=essentials" rel="nofollow external" class="bo"><span>Essentials Series</span></a><span>: VoiceThread, Panopto, Bb Original </span></p></li><li><p><a href="https://my3.my.umbc.edu/groups/instructional-technology/events?mode=upcoming&amp;tag=skill-builder" rel="nofollow external" class="bo"><span>Skill Builder Series</span></a><span>: Collaborate, Ultra</span></p></li><li><p><a href="https://my3.my.umbc.edu/groups/instructional-technology/events?mode=upcoming&amp;tag=webex" rel="nofollow external" class="bo"><span>Webex</span></a><span> (Basics, Advanced, Teams, Events) &amp; </span><a href="https://my3.my.umbc.edu/groups/instructional-technology/events?mode=upcoming&amp;tag=vde" rel="nofollow external" class="bo"><span>Virtual Desktop Environment</span></a><span> </span></p></li></ul><p><span>Other DoIT News</span></p><ul><li><a href="https://doit.umbc.edu/news/?id=94812" rel="nofollow external" class="bo"><span>DoIT offers start of semester student technology sprints</span></a><span> </span></li><li><a href="https://doit.umbc.edu/news/?id=94318" rel="nofollow external" class="bo"><span>USM sponsoring access to virtual lab environment</span></a><span> - No cost to students!</span></li><li><a href="https://doit.umbc.edu/news/?id=94746" rel="nofollow external" class="bo"><span>Free 3-day conference on virtual labs for Online STEM </span></a><span>(Aug 19-21)</span></li><li><a href="https://doit.umbc.edu/news/?id=94259" rel="nofollow external" class="bo"><span>Tips for online purchasing during COVID-19</span></a><span> </span></li><li><a href="https://doit.umbc.edu/news/?id=93552" rel="nofollow external" class="bo"><span>Protecting sensitive data during telework</span></a></li></ul><p><span>As always, if you have any questions, please consider the following options:</span></p><ul><li><p><a href="https://doit.umbc.edu/itnm/academic-continuity/" rel="nofollow external" class="bo"><span>Academic Continuity</span></a><span> | </span><a href="https://fdc.umbc.edu/resources/keep-on-teaching/" rel="nofollow external" class="bo"><span>Keep On Teaching</span></a><span> | </span><a href="https://doit.umbc.edu/students" rel="nofollow external" class="bo"><span>Student Technology Resources</span></a><span> </span></p></li><li><p><a href="http://www.umbc.edu/faq" rel="nofollow external" class="bo"><span>Check our extensive FAQ collection</span></a><span> </span></p></li><ul><li><p><a href="https://wiki.umbc.edu/x/LohnB" rel="nofollow external" class="bo"><span>What’s new in Ultra?</span></a><span> | </span><a href="https://wiki.umbc.edu/x/bwrSAQ" rel="nofollow external" class="bo"><span>Known Issues</span></a><span> </span></p></li></ul><li><p><a href="http://my.umbc.edu/go/request-help" rel="nofollow external" class="bo"><span>Open a ticket via RT</span></a></p></li><li><p><span>Follow the </span><a href="http://my.umbc.edu/groups/instructional-technology" rel="nofollow external" class="bo"><span>Instructional Technology</span></a><span> &amp; </span><a href="http://my.umbc.edu/groups/doit" rel="nofollow external" class="bo"><span>DoIT</span></a><span> myUMBC groups</span></p></li><li><p><a href="http://doit.umbc.edu/itnm/staff/" rel="nofollow external" class="bo"><span>Request a consult</span></a><span> with instructional technology staff</span></p></li></ul><br><span>Keep up with Ultra: </span><a href="https://my.umbc.edu/go/ultra" rel="nofollow external" class="bo"><span>umbc.edu/go/ultra</span></a></span></div>
]]>
</Body>
<Summary>The UMBC Instructional Technology Update is provided by the Division of Information Technology for students, faculty and staff. If you have questions or need help, please consult the Blackboard...</Summary>
<Website>https://my3.my.umbc.edu/groups/doit/posts/94967</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/94967/guest@my.umbc.edu/40c73c40df9c07908b78f967280bb975/api/pixel</TrackingUrl>
<Tag>doit-news</Tag>
<Tag>fa2020</Tag>
<Tag>instructional-technology</Tag>
<Tag>update</Tag>
<Group token="doit">Division of Information Technology (DoIT)</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/doit</GroupUrl>
<AvatarUrl>https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
<AvatarUrl size="original">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/original.JPG?1727453227</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxlarge.png?1727453227</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xlarge.png?1727453227</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/large.png?1727453227</AvatarUrl>
<AvatarUrl size="medium">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/medium.png?1727453227</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/small.png?1727453227</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxsmall.png?1727453227</AvatarUrl>
<Sponsor>Division of Information Technology (DoIT)</Sponsor>
<PawCount>2</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Wed, 19 Aug 2020 21:22:28 -0400</PostedAt>
<EditAt>Tue, 08 Mar 2022 16:17:55 -0500</EditAt>
</NewsItem>

<NewsItem contentIssues="false" id="94950" important="false" status="posted" url="https://beta.my.umbc.edu/groups/doit/posts/94950">
<Title>&#8220;TASK&#8221; UMBC Impersonation Scam</Title>
<Tagline>An E-mail Exchange With A Scammer</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>Recently the DoIT has been notified of a malicious actor trying to impersonate a UMBC staffer. The phishing email has the subject line “TASK” and a chain of emails from the scammer can be seen below. The example has had the name and email address of the victim removed for privacy reasons.</span><span><br><br></span></p><div><table><colgroup></colgroup><tbody><tr><td><p><span>From: </span><span>FORGED NAME </span><span> &lt;</span><span><a href="mailto:executiveoffice76@gmail.com">executiveoffice76@gmail.com</a></span><span>&gt;</span></p><p><span>Date: Thu, Aug 13, 2020 at 10:35 AM</span></p><p><span>Subject: TASK</span></p><p><span>To: &lt;</span><span>@umbc.edu</span><span>&gt;</span></p><br><p><span>Hello,</span></p><p> </p><p><span>Confirm your availability? Need you to handle a quick request. Get back to me as soon as you can.</span></p><p> </p><p><span>Thanks.</span></p><p><span>FORGED NAME</span></p></td></tr></tbody></table></div><br><div><table><colgroup></colgroup><tbody><tr><td><p><span>From: </span><span>FORGED NAME </span><span> &lt;</span><a href="mailto:executiveoffice76@gmail.com" rel="nofollow external" class="bo"><span>executiveoffice76@gmail.com</span></a><span>&gt;</span><span><br><br></span></p><p><span>How are you doing? Presently in a meeting. How fast can you get some cards from a nearby store? They are needed shortly. Get back to me as soon as you can</span></p><br><p><span>Sincerely,</span></p></td></tr></tbody></table></div><br><div><table><colgroup></colgroup><tbody><tr><td><p><span>From: </span><span>FORGED NAME </span><span> &lt;</span><span><a href="mailto:executiveoffice76@gmail.com">executiveoffice76@gmail.com</a></span><span>&gt;</span><span><br></span><span><br></span><span>Need steam gift cards 5 of them in 100$ denominations. Make sure you keep the receipt for proper documentation and reimbursement purposes.  When you get them scratch off the code panel, then take clear pictures of them and attach them here.</span></p><br><p><span>Sorry for the inconvenience.</span></p></td></tr></tbody></table></div><p><span><br></span><span>First the malicious actor sends an email asking if the user is available to help them. Note that in the first email there is a  sense of urgency as well as a lack of personalization to the recipient. These can be red flags of a phishing email.</span></p><br><p><span>In the second email, the scammer asks the user if they could run out to the store and get some gift cards for a meeting that the scammer is currently in. The text continues to foster a sense of urgency using words like “fast” and “quickly”.</span></p><br><p><span>In the  last email the scammer asks the user for five one hundred dollar Steam gift cards. Steam gift cards are used on Steam, a video game digital distribution service. The scammer will ask the user to send them a copy of the codes on the back of the gift cards.</span><span><br></span><span><br></span><span>If you do receive this or a similar email that you suspect is a scam, please do not click on any URL or reply. Either of those actions confirms to the sender that your email address is valid. Please forward the message (with the email headers) to <a href="mailto:security@umbc.edu">security@umbc.edu</a>.</span></p><br><p><span>How do I forward full email headers?</span></p><p><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a></p><br><p><span>To read more articles published by DOIT visit: </span></p><p><a href="https://itsecurity.umbc.edu/critical/?tag=notice" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/critical/?tag=notice</span></a><span>. </span></p><p><a href="https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19</span></a></p></div>
]]>
</Body>
<Summary>Recently the DoIT has been notified of a malicious actor trying to impersonate a UMBC staffer. The phishing email has the subject line “TASK” and a chain of emails from the scammer can be seen...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/94950/guest@my.umbc.edu/c64a265daac1a82114ea6975fde1ecd3/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777318640</AvatarUrl>
<AvatarUrl size="original">https://assets4-beta.my.umbc.edu/images/avatars/group/7/original.png?1777318640</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777318640</AvatarUrl>
<AvatarUrl size="xlarge">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777318640</AvatarUrl>
<AvatarUrl size="large">https://assets1-beta.my.umbc.edu/images/avatars/group/7/large.png?1777318640</AvatarUrl>
<AvatarUrl size="medium">https://assets1-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777318640</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/images/avatars/group/7/small.png?1777318640</AvatarUrl>
<AvatarUrl size="xsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777318640</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777318640</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 18 Aug 2020 18:00:36 -0400</PostedAt>
<EditAt>Tue, 18 Aug 2020 18:00:46 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="94949" important="false" status="posted" url="https://beta.my.umbc.edu/groups/doit/posts/94949">
<Title>Office 365 phishing via malicious OAuth apps</Title>
<Tagline>You Can Be Tricked Into Giving Access To Your Files</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>During the pandemic, Microsoft has seen a rise in phishing campaigns. One such campaign uses the Office 365 phishing via malicious OAuth apps. The phishing attack attempts to trick individuals into giving a malicious Office 365 app permission to their legitimate Office 365 account.</span></p><br><p><span>Open Authentication(OAuth) is an open standard protocol which allows users to give websites and applications access to their information without the use of a password or username. Popular sites that use OAuth include Google, Twitter etc.</span></p><br><p><span>When granting such access, you may see something like this:</span></p><br><p><span><span><img src="https://lh5.googleusercontent.com/O39hD-enEia9P7snkYUor3iZTsk38MWaLVwso35W2t99OQXmCvic8hXl5nvCy6bQEad1hV8ZhEpZj9vMneKtUaVhVL2oa4H6VYe4F8ndEp0gSjiVMxRzDGtNJfKNxBCc65EQ5e9D" width="337" height="344" style="max-width: 100%; height: auto;"></span></span></p><br><br><p><span>Once the malicious Office 365 app is linked to your Office 365 account, the hackers can access your private information and any other sensitive data stored on your Office365 account. This malicious Office 365 app asks for permissions which include but are not limited to:</span></p><ul><li><p><span>Reading your contacts.</span></p></li><li><p><span>Reading your mail.</span></p></li><li><p><span>Reading all OneNote notebooks that you can access. </span></p></li><li><p><span>Reading and writing to your mailbox settings.</span></p></li><li><p><span>Having full access to all files you have access to.</span></p></li></ul><br><p><span>Microsoft has taken legal actions against 6 domains that store the malicious Office 365 applications.</span></p><p><span>However, you can check the apps and services that you have given consent to access your Office 365</span></p><p><span>information.</span></p><br><p><span>To disable these permissions:</span></p><ol><li><p><span>Visit: </span><a href="https://account.live.com/consent/Manage?uaid=a11edb2059b64ae499fce9f494c2f53f" rel="nofollow external" class="bo"><span>https://account.live.com/consent/Manage?uaid=a11edb2059b64ae499fce9f494c2f53f</span></a></p></li><li><p><span>Click </span><span>Edit</span></p></li><li><p><span>Click </span><span>Remove these permissions</span></p></li></ol><br><br><br><p><span>Source: </span><a href="https://www.bleepingcomputer.com/news/security/microsoft-warns-of-office-365-phishing-via-malicious-oauth-apps/" rel="nofollow external" class="bo"><span>https://www.bleepingcomputer.com/news/security/microsoft-warns-of-office-365-phishing-via-malicious-oauth-apps/</span></a></p><br><p><a href="https://www.bleepingcomputer.com/news/security/phishing-attack-hijacks-office-365-accounts-using-oauth-apps/" rel="nofollow external" class="bo"><span>https://www.bleepingcomputer.com/news/security/phishing-attack-hijacks-office-365-accounts-using-oauth-apps/</span></a></p><br><p><span>_________________________________________________________________________</span></p><p><span>Receive any suspicious emails?</span></p><br><p><span>Forward it to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span> along with the email headers. Instructions for doing so can be found at the UMBC support wiki: </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><br><p><span>Follow us on myUMBC:</span><a href="https://my3.my.umbc.edu/groups/itsecurity" rel="nofollow external" class="bo"><span>https://my3.my.umbc.edu/groups/itsecurity</span></a></p></div>
]]>
</Body>
<Summary>During the pandemic, Microsoft has seen a rise in phishing campaigns. One such campaign uses the Office 365 phishing via malicious OAuth apps. The phishing attack attempts to trick individuals...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/94949/guest@my.umbc.edu/96be352428497fca5b322b002ebca635/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777318640</AvatarUrl>
<AvatarUrl size="original">https://assets4-beta.my.umbc.edu/images/avatars/group/7/original.png?1777318640</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777318640</AvatarUrl>
<AvatarUrl size="xlarge">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777318640</AvatarUrl>
<AvatarUrl size="large">https://assets1-beta.my.umbc.edu/images/avatars/group/7/large.png?1777318640</AvatarUrl>
<AvatarUrl size="medium">https://assets1-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777318640</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/images/avatars/group/7/small.png?1777318640</AvatarUrl>
<AvatarUrl size="xsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777318640</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777318640</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 18 Aug 2020 17:53:04 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="94934" important="false" status="posted" url="https://beta.my.umbc.edu/groups/doit/posts/94934">
<Title>Create a +1 strategy and support diverse learning styles</Title>
<Tagline>Find, fix, or create accessible content for all learners</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><span><p><span>Does your course offer students multiple ways to consume content, complete activities, and demonstrate learning? Accessible course content is good content, as the saying goes, but how can you offer multiple modalities that meet the needs of diverse learners?</span></p><p><span>The framework to support this practice is </span><a href="http://udlguidelines.cast.org/?utm_medium=web&amp;utm_campaign=none&amp;utm_source=cast-about-udl" rel="nofollow external" class="bo"><span>Universal Design for Learning</span></a><span> (UDL). At its core, UDL is about providing all learners with experiences that include multiple ways to engage, represent, and express. It is about intentional and proactive steps faculty take to create an accessible course for everyone. </span></p><p><span>These steps often begin with identifying one more option for students, what </span><a href="https://wvupressonline.com/node/757" rel="nofollow external" class="bo"><span>Tobin and Behling</span></a><span> (2018) call a +1 strategy. Ultimately, what is one more way students can engage with content, complete an activity, or show what they know?</span></p><p><span>You can develop a +1 strategy by considering these questions: </span></p><ul><li><p><span>Where do students tend to ask lots of questions? </span></p></li><li><p><span>Where do students often get things wrong on quizzes or tests? </span></p></li><li><p><span>Where do you almost always need to re-teach or explain things in a different way? </span></p></li></ul><p><span>The answers can help you develop the framework for meaningful enhancements each semester. You can develop a +1 strategy by starting where you are. You may focus on enhancing course content options first, then expand learning activities or assessments. </span></p><p><span>Some +1 ideas for expanding content choices beyond reading text include: </span></p><ul><li><p><span>Chunk content into smaller videos, with captions (and transcripts if possible)</span></p></li><li><p><span>Offer podcasts for those who are auditory learners</span></p></li><li><p><span>Create evergreen content; that is, it can be repurposed from one semester to another</span></p></li></ul><p><span>Some +1 ideas for offering students multiple ways to demonstrate knowledge or proficiency include: </span></p><ul><li><p><span>Journaling or blogging</span></p></li><li><p><span>Creating a video</span></p></li><li><p><span>Creating a multimedia presentation</span></p></li><li><p><span>Writing a paper </span></p></li></ul><p><span>As you create a +1 strategy, consider </span><a href="https://wiki.umbc.edu/display/faq/Ally" rel="nofollow external" class="bo"><span>Blackboard Ally</span></a><span> -- a tool that provides alternative formats students can download in order to access course information in a format they need or want. </span><span>Students who are prone to eye strain might prefer to download an HTML or ePub format of text for easier reading on a mobile device, or because they want options to copy, paste, search, or highlight passages of text. </span><span>Students who are auditory learners find listening more helpful than reading and can download an audio format of text. Other alternative formats include electronic braille and </span><a href="https://www.beelinereader.com/" rel="nofollow external" class="bo"><span>BeeLine Reader.</span></a><span> </span></p><p><span>Alternative formats aren't just for a select group of students: They benefit everyone in your quest to design accessible course content. </span></p><p><span>As always, if you have any questions, please consider the following options:</span></p><ul><li><p><a href="https://doit.umbc.edu/itnm/academic-continuity/" rel="nofollow external" class="bo"><span>Academic Continuity</span></a><span> | </span><a href="https://fdc.umbc.edu/resources/keep-on-teaching/" rel="nofollow external" class="bo"><span>Keep On Teaching</span></a><span> | </span><a href="https://doit.umbc.edu/students" rel="nofollow external" class="bo"><span>Student Technology Resources</span></a></p></li><li><p><a href="http://www.umbc.edu/faq" rel="nofollow external" class="bo"><span>Check our extensive FAQ collection</span></a><span> </span></p></li><ul><li><p><a href="https://wiki.umbc.edu/x/LohnB" rel="nofollow external" class="bo"><span>What’s new in Ultra?</span></a><span> | </span><a href="https://wiki.umbc.edu/x/bwrSAQ" rel="nofollow external" class="bo"><span>Known Issues</span></a><span> </span></p></li></ul><li><p><a href="http://my.umbc.edu/go/request-help" rel="nofollow external" class="bo"><span>Open a ticket via RT</span></a></p></li><li><p><span>Follow the </span><a href="http://my.umbc.edu/groups/instructional-technology" rel="nofollow external" class="bo"><span>Instructional Technology</span></a><span> &amp; </span><a href="http://my.umbc.edu/groups/doit" rel="nofollow external" class="bo"><span>DoIT</span></a><span> myUMBC groups</span></p></li><li><p><a href="http://doit.umbc.edu/itnm/staff/" rel="nofollow external" class="bo"><span>Request a consult</span></a><span> with instructional technology sta</span><span>ff</span></p></li></ul></span></div>
]]>
</Body>
<Summary>Does your course offer students multiple ways to consume content, complete activities, and demonstrate learning? Accessible course content is good content, as the saying goes, but how can you...</Summary>
<Website>https://my3.my.umbc.edu/groups/instructional-technology/posts/94934</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/94934/guest@my.umbc.edu/898da8103b29fe745ff562b06e95ceba/api/pixel</TrackingUrl>
<Tag>accessibility</Tag>
<Tag>accessible-content</Tag>
<Tag>online-learning</Tag>
<Tag>universal-design</Tag>
<Group token="instructional-technology">Instructional Technology</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/instructional-technology</GroupUrl>
<AvatarUrl>https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/xsmall.png?1446126703</AvatarUrl>
<AvatarUrl size="original">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/original.png?1446126703</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/xxlarge.png?1446126703</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/xlarge.png?1446126703</AvatarUrl>
<AvatarUrl size="large">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/large.png?1446126703</AvatarUrl>
<AvatarUrl size="medium">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/medium.png?1446126703</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/small.png?1446126703</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/xsmall.png?1446126703</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/xxsmall.png?1446126703</AvatarUrl>
<Sponsor>Instructional Technology</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/094/934/0d30ac741c522999433f251d5a5887ac/xxlarge.jpg?1597766376</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/094/934/0d30ac741c522999433f251d5a5887ac/xlarge.jpg?1597766376</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/094/934/0d30ac741c522999433f251d5a5887ac/large.jpg?1597766376</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/094/934/0d30ac741c522999433f251d5a5887ac/medium.jpg?1597766376</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/094/934/0d30ac741c522999433f251d5a5887ac/small.jpg?1597766376</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/094/934/0d30ac741c522999433f251d5a5887ac/xsmall.jpg?1597766376</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/094/934/0d30ac741c522999433f251d5a5887ac/xxsmall.jpg?1597766376</ThumbnailUrl>
<PawCount>2</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 18 Aug 2020 12:01:17 -0400</PostedAt>
<EditAt>Tue, 18 Aug 2020 12:38:14 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="94919" important="false" status="posted" url="https://beta.my.umbc.edu/groups/doit/posts/94919">
<Title>New PIVOT Site Launched for Faculty Professional Development</Title>
<Tagline>Access PIVOT Live Webinar Recordings, PIVOT Solo and More!</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><span><div>Instructional Technology has launched a <a href="https://pivot.umbc.edu/" rel="nofollow external" class="bo">new site devoted to the Planning Instructional Variety for Online Teaching (PIVOT) programs</a>: <a href="http://pivot.umbc.edu/" rel="nofollow external" class="bo">pivot.umbc.edu</a>.</div><div><br></div><div><div><div><span><p><span>Now available to the campus community and beyond, </span><a href="https://pivot.umbc.edu/pivot-solo/" rel="nofollow external" class="bo"><span>PIVOT Solo</span></a><span> contains lessons on five key topics including course organization, active learning, community building, assessment, and supporting students. PIVOT Solo is designed to be a flexible, self-directed experience, allowing faculty to determine what knowledge they want to refresh or enhance. </span><span>It is important to note that completion of any or all of PIVOT Solo </span><span>will not </span><span>result in eligibility for the professional development stipend that accompanies participation in <a href="https://pivot.umbc.edu/pivot-live/" rel="nofollow external" class="bo">PIVOT Live</a> and PIVOT+.</span></p><p><span>The recordings from the </span><a href="https://pivot.umbc.edu/pivot-live/" rel="nofollow external" class="bo"><span>PIVOT Live</span></a><span>  5 hour webinar series are also available; these are the recordings of the live sessions that can be viewed in their entirety to meet the requirements of the Hrabowski stipend for adjunct faculty.</span></p><p><span>Additionally, faculty can <a href="https://pivot.umbc.edu/training/recording-archives/" rel="nofollow external" class="bo">access recordings of previous training sessions on a number of instructional technologies topics and tools</a> in our recording archives including Blackboard, Collaborate, Panopto, and VoiceThread.</span></p><p><span>Finally, faculty may want to take advantage of the <a href="https://pivot.umbc.edu/course-design/course-workload-estimator/" rel="nofollow external" class="bo">Course Workload Estimator</a>, which will assist in determining how long it may take a student to complete various course activities, and the many other resources we've provided on the site to help support their online course development and delivery.</span></p><p>Check out this new professional development resource today!</p></span></div></div></div></span></div>
]]>
</Body>
<Summary>Instructional Technology has launched a new site devoted to the Planning Instructional Variety for Online Teaching (PIVOT) programs: pivot.umbc.edu.        Now available to the campus community...</Summary>
<Website>https://pivot.umbc.edu</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/94919/guest@my.umbc.edu/ea38bfe1bb1d021018653ce5f2dbd202/api/pixel</TrackingUrl>
<Tag>online-learning</Tag>
<Tag>online-teaching</Tag>
<Tag>pivot</Tag>
<Group token="instructional-technology">Instructional Technology</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/instructional-technology</GroupUrl>
<AvatarUrl>https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/xsmall.png?1446126703</AvatarUrl>
<AvatarUrl size="original">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/original.png?1446126703</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/xxlarge.png?1446126703</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/xlarge.png?1446126703</AvatarUrl>
<AvatarUrl size="large">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/large.png?1446126703</AvatarUrl>
<AvatarUrl size="medium">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/medium.png?1446126703</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/small.png?1446126703</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/xsmall.png?1446126703</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/xxsmall.png?1446126703</AvatarUrl>
<Sponsor>Instructional Technology</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/094/919/4918092780cf95a57d15ba6fba25db7f/xxlarge.jpg?1597713835</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/094/919/4918092780cf95a57d15ba6fba25db7f/xlarge.jpg?1597713835</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/094/919/4918092780cf95a57d15ba6fba25db7f/large.jpg?1597713835</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/094/919/4918092780cf95a57d15ba6fba25db7f/medium.jpg?1597713835</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/094/919/4918092780cf95a57d15ba6fba25db7f/small.jpg?1597713835</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/094/919/4918092780cf95a57d15ba6fba25db7f/xsmall.jpg?1597713835</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/094/919/4918092780cf95a57d15ba6fba25db7f/xxsmall.jpg?1597713835</ThumbnailUrl>
<PawCount>2</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 17 Aug 2020 21:30:42 -0400</PostedAt>
<EditAt>Mon, 17 Aug 2020 22:45:08 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="94918" important="false" status="posted" url="https://beta.my.umbc.edu/groups/doit/posts/94918">
<Title>USM OnTrack: New Quality Matters Workshops Added!</Title>
<Tagline>Sign up now for these August workshops!</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><div><a href="https://www.usmd.edu/newsroom/news/2056" rel="nofollow external" class="bo">USM <em>OnTrack</em></a> <span>has added additional Quality Matters workshops in high-demand topics for the coming weeks. </span></div><div><br></div><div><p><strong><em><span>Upcoming Quality Matters Workshops</span></em></strong><strong><span> </span></strong><strong><span> </span></strong></p><p><span>USM <em>OnTrack</em> has pre-purchased a pool of online teaching professional development workshops from Quality Matters on beginning to advanced topics, including designing for learner engagement, flipping the online course, setting expectations with students, active learning strategies, accessibility, and online assessment. There is no cost for any USM faculty or staff member to attend these workshops, but each workshop does have a 30-person limit, so we encourage you to promote these as soon as possible. We will be monitoring registrations as will add additional sessions if we see high demand. </span><span> </span></p><p><span>  </span><span> </span></p><p><span>Below are the workshop titles for the final two weeks, along with registration information.  </span><em><span>NOTE: We have added a number of additional sessions for high-demand topics; please encourage faculty to come back to our web page to see if a session that was previously full is now available. </span></em><em><span> </span></em></p><table><tbody><tr><td colspan="3"><p><strong><span>Week of August 17 </span></strong><strong><span> </span></strong></p></td></tr><tr><td><p><span>Monday, August 17, 2020 (<strong>NEW</strong>!) </span><span> </span></p></td><td><p><span>9:00-11:00 </span><span> </span></p></td><td><p><span>Rethinking Assessments for Application and Engagement </span><span> </span></p></td></tr><tr><td><p><span>Monday, August 17, 2020 (<strong>NEW</strong>!) </span><span> </span></p></td><td><p><span>1:00-3:00 </span><span> </span></p></td><td><p><span>Rethinking Assessments for Application and Engagement </span><span> </span></p></td></tr><tr><td><p><span>Tuesday, August 18, 2020 </span><span> </span></p></td><td><p><span>9:00-11:00 </span><span> </span></p></td><td><p><span>Flipped Approach for Synchronous Online </span><span> </span></p></td></tr><tr><td><p><span>Tuesday, August 18, 2020 </span><span> </span></p></td><td><p><span>1:00-3:00 </span><span> </span></p></td><td><p><span>Setting Expectations and Learner Support: Helping Learners be Successful </span><span> </span></p></td></tr><tr><td><p><span>Wednesday, August 19, 2020 </span><span> </span></p></td><td><p><span>9:00-11:00 </span><span> </span></p></td><td><p><span>Communicating New Policies for Online Courses </span><span> </span></p></td></tr><tr><td><p><span>Wednesday, August 19, 2020 (<strong>NEW</strong>!) </span><span> </span></p></td><td><p><span>1:00-3:00 </span><span> </span></p></td><td><p><span>Creating Discussion Board Rubrics </span><span> </span></p></td></tr><tr><td><p><span>Thursday, August 20, 2020 </span><span> </span></p></td><td><p><span>1:00-3:00 </span><span> </span></p></td><td><p><span>Creating Discussion Board Rubrics </span><span> </span></p></td></tr><tr><td colspan="3"><p><strong><span>Week of August 24</span></strong><span> </span></p></td></tr><tr><td><p><span>Wednesday August 26, 2020 </span><span> </span></p></td><td><p><span>1:00-3:00 </span></p></td><td><p><span>Creating Accessible Word Docs </span></p></td></tr><tr><td><p><span>Thursday, August 27, 2020  </span></p></td><td><p><span>9:00-11:00  </span></p></td><td><p><span>Providing Accessible Web Content </span></p></td></tr></tbody></table><p><span> </span></p><p><em><span>2-Step Instructions for Self-Registering for USM OnTrack QM Workshops</span></em><span> </span><span> </span></p><ul><li><span>Step 1. Go to </span><span><a href="https://www.qmprogram.org/myqm/" rel="nofollow external" class="bo">https://www.qmprogram.org/myqm/</a></span><span> and sign in if you have a QM account or click "No, I am new here" to create an account. </span><span> </span></li><li><span>Step 2. Once signed in, click here </span><span><a href="https://www.usmd.edu/cai/register-qm-workshops" rel="nofollow external" class="bo">https://www.usmd.edu/cai/register-qm-workshops</a></span><span> for a listing of USM OnTrack QM Workshops and to register (using the corresponding link on the right side of the table). </span><span> </span></li></ul></div><div><br></div><div>There is no cost for any USM faculty or staff member to attend these workshops, but each workshop does have a 30-person limit, so please sign up as soon as possible!</div><div><br></div><div><br></div><div><br></div><div><br></div><div>QM Coordinator information:</div><div><br></div><div>Dr. Sherri Braxton - University of Maryland-Baltimore County</div><div><a href="mailto:sbraxton@umbc.edu">sbraxton@umbc.edu</a></div></div>
]]>
</Body>
<Summary>USM OnTrack has added additional Quality Matters workshops in high-demand topics for the coming weeks.       Upcoming Quality Matters Workshops    USM OnTrack has pre-purchased a pool of online...</Summary>
<Website>https://www.usmd.edu/cai/register-qm-workshops</Website>
<AttachmentKind>Document</AttachmentKind>
<AttachmentUrl>https://assets3-beta.my.umbc.edu/system/shared/attachments/62ff3542a6a80b4974ce10cc6542ec1c/69f0610b/news/000/094/918/06b9554696791e906aaea89352794839/OnlineSessionSelfRegistrationInstructionsDedicated.pdf?1597713459</AttachmentUrl>
<Attachments>
<Attachment kind="Document" url="https://beta.my.umbc.edu/groups/doit/posts/94918/attachments/36683"></Attachment>
</Attachments>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/94918/guest@my.umbc.edu/cedb525f5ca624f97d7efecae6a5c449/api/pixel</TrackingUrl>
<Tag>online-learning</Tag>
<Tag>professional-development</Tag>
<Tag>qm</Tag>
<Tag>quality-matters</Tag>
<Tag>usm</Tag>
<Group token="instructional-technology">Instructional Technology</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/instructional-technology</GroupUrl>
<AvatarUrl>https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/xsmall.png?1446126703</AvatarUrl>
<AvatarUrl size="original">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/original.png?1446126703</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/xxlarge.png?1446126703</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/xlarge.png?1446126703</AvatarUrl>
<AvatarUrl size="large">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/large.png?1446126703</AvatarUrl>
<AvatarUrl size="medium">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/medium.png?1446126703</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/small.png?1446126703</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/xsmall.png?1446126703</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/xxsmall.png?1446126703</AvatarUrl>
<Sponsor>Instructional Technology</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/094/918/b92d510e1e852b5ec57d5e5f0c39c3e7/xxlarge.jpg?1597713459</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/094/918/b92d510e1e852b5ec57d5e5f0c39c3e7/xlarge.jpg?1597713459</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/094/918/b92d510e1e852b5ec57d5e5f0c39c3e7/large.jpg?1597713459</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/094/918/b92d510e1e852b5ec57d5e5f0c39c3e7/medium.jpg?1597713459</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/094/918/b92d510e1e852b5ec57d5e5f0c39c3e7/small.jpg?1597713459</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/094/918/b92d510e1e852b5ec57d5e5f0c39c3e7/xsmall.jpg?1597713459</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/094/918/b92d510e1e852b5ec57d5e5f0c39c3e7/xxsmall.jpg?1597713459</ThumbnailUrl>
<PawCount>2</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Mon, 17 Aug 2020 21:20:37 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="94913" important="false" status="posted" url="https://beta.my.umbc.edu/groups/doit/posts/94913">
<Title>Phishing Email Used To Deploy Malware - CISA Report</Title>
<Tagline>The Latest Attack On Your Computer</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>According to an article by the Cybersecurity and Infrastructure Security Agency (CISA), there has been a recent phishing email campaign trying to deploy malware onto victims' devices. This malware will allow the malicious actor to steal files, capture keystrokes, take screenshots, and execute arbitrary code on infected devices.</span></p><br><p><span>This campaign works by sending out emails containing a Microsoft Word document. This document will have an application macro hidden within it to deploy the malware onto the victim's device. This malicious macro code can change font color from light gray to black (to trick victims into enabling content), check whether the Windows operating system is 32 or 64-bit, and construct and execute a command line to download additional files.</span></p><br><p><span>Once the malware is installed onto the victim's device, the malicious actor has many different techniques available to exploit the targeted system. Among these are:</span></p><ul><li><p><span>Collect user information from the infected device, for example their IP addresses, username and file data.</span></p></li><li><p><span>Create shortcuts named Anti virus service.lnk in an attempt to hide as a legitimate file.</span></p></li><li><p><span>Capture keystrokes.</span></p></li><li><p><span>Take a snapshot of the current processes state of the user's machine.</span></p></li><li><p><span>Use PowerShell to download and execute different versions of the malware.</span></p></li><li><p><span>Execute arbitrary code on the infected device.</span></p></li><li><p><span>Delete files.</span></p></li><li><p><span>Gather the operating system version, architecture information, connected drives, hostname, and the computer name. Also has been able to get a snapshot of the current system state of the targets machine.</span></p></li><li><p><span>Download and execute files on the victim's machine.</span></p></li><li><p><span>Take screenshots of the victim's machine.</span></p></li><li><p><span>Steal data from the victim's clipboard.</span></p></li><li><p><span>Drop a Windows shortcut into the victim's startup folder and/or just onto the machine.</span></p></li><li><p><span>Steal profile credential information from Firefox, Chrome, and Opera.</span></p></li></ul><br><p><span>For more information on what the malware can do, a link to the article can be found below. The article also lists some tips for victims and administrators to strengthen their security.</span></p><br><ul><li><p><span>Maintain up-to-date antivirus software.</span></p></li><li><p><span>Keep your operating system up to date.</span></p></li><li><p><span>If possible either disable file and printer sharing services. If you have to have this enabled, use strong passwords or Active Directory authentication.</span></p></li><li><p><span>Do not add victims to the local administrator group unless required.</span></p></li><li><p><span>Keep and enforce strong passwords.</span></p></li><li><p><span>Exercise caution when opening email attachments, even if the attachment is expected and the sender appears to be known.</span></p></li><li><p><span>Make sure you have your firewall up to date and enabled.</span></p></li><li><p><span>Disable unnecessary services on workstations and servers.</span></p></li><li><p><span>Scan for and remove suspicious email attachments.</span></p></li><li><p><span>Exercise caution when using removable media, for example USBs and CDs.</span></p></li><li><p><span>Scan any file that you download before using it.</span></p></li></ul><br><p><span>If you do receive any email that you suspect is a scam, please do not click on any URL or reply. Either of those actions confirms to the sender that your email address is valid. Please do not download any attachments from a suspicious email as that could put your device at risk. Please forward the message (with the email headers) to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>.</span></p><br><p><span>How do I forward full email headers?</span></p><p><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a></p><br><p><span>For more information on this topic, please check out: </span></p><p><a href="https://us-cert.cisa.gov/ncas/alerts/aa20-227a" rel="nofollow external" class="bo"><span>https://us-cert.cisa.gov/ncas/alerts/aa20-227a</span></a></p><br><p><span>To read more articles published by DOIT visit: </span></p><p><a href="https://itsecurity.umbc.edu/critical/?tag=notice" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/critical/?tag=notice</span></a><span>. </span></p><p><a href="https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19" rel="nofollow external" class="bo"><span>https://itsecurity.umbc.edu/home/covid-19-news/?tag=covid19</span></a></p></div>
]]>
</Body>
<Summary>According to an article by the Cybersecurity and Infrastructure Security Agency (CISA), there has been a recent phishing email campaign trying to deploy malware onto victims' devices. This malware...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/94913/guest@my.umbc.edu/7e2c7f513f67fae4045cd2a636be62f5/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777318640</AvatarUrl>
<AvatarUrl size="original">https://assets4-beta.my.umbc.edu/images/avatars/group/7/original.png?1777318640</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777318640</AvatarUrl>
<AvatarUrl size="xlarge">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777318640</AvatarUrl>
<AvatarUrl size="large">https://assets1-beta.my.umbc.edu/images/avatars/group/7/large.png?1777318640</AvatarUrl>
<AvatarUrl size="medium">https://assets1-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777318640</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/images/avatars/group/7/small.png?1777318640</AvatarUrl>
<AvatarUrl size="xsmall">https://assets1-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777318640</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777318640</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 17 Aug 2020 16:54:59 -0400</PostedAt>
</NewsItem>

</News>
