<?xml version="1.0"?>
<News hasArchived="false" page="115" pageCount="242" pageSize="10" timestamp="Tue, 28 Apr 2026 07:14:36 -0400" url="https://beta.my.umbc.edu/groups/doit/posts.xml?page=115">
<NewsItem contentIssues="true" id="94009" important="false" status="posted" url="https://beta.my.umbc.edu/groups/doit/posts/94009">
<Title>RT Security Update</Title>
<Body>
<![CDATA[
    <div class="html-content"><div>Over the last 10+ years DoIT has developed nearly 200 forms for various offices across campus, providing enhanced business processing options. These forms deliver a better user experience, and a more efficient process while also allowing information to be captured in a structured manner prior to the creation of an RT ticket. </div><div><br></div><div>On the evening of 6/23/2020, DoIT applied a security enhancement to address a new issue, referred to as clickjacking, from within these forms. The goal was to provide the necessary security enhancement transparently, with no interruption to campus users. </div><div><br></div><div>The DoIT team of Collier Jones, Jacob Lutz, and Paul Riddle collaborated earlier this summer to develop the strategy to deal with this security concern. Once the strategy was determined, Jacob Lutz architected a solution that avoided a major effort of individually adjusting each form used by the community. </div><div><br></div><div>While the majority of users were not impacted after the security solution was applied, we were alerted that a few older forms reacted adversely to the change. Jacob was able to resolve the 2 incidents identified very quickly.</div><div><br></div><h5>How do RT forms and authentication work? </h5><div><br></div><div><ul><li>Authentication is enforced for all UMBC software via Single Sign On. Most campus users experience this as they log into myUMBC.</li><li>Once you have authenticated in a browser session (logged in) you are able to open up many tabs accessing various UMBC software without being prompted to log in. </li><li>If you are already logged in somewhere in a browser session with your UMBC information when initiating a RT form, you will not see any change at all. </li><li>In the past, if the RT form was the initial software to be accessed within that browser session, you would be prompted to login via the normal login prompt below.<img src="https://my3.my.umbc.edu/groups/doit/posts/94009/attachments/36174" width="70%" style="max-width: 100%; height: auto;"></li></ul></div><div>Now, however, if the RT form is the initial software to be accessed within that browser session, with the new security, you will be presented with a new Login prompt below. </div><div><br></div><div><img src="https://my3.my.umbc.edu/groups/doit/posts/94009/attachments/36175" style="max-width: 100%; height: auto;"></div><div><br></div><div>Upon clicking this Login button a new tab will be created and you will be provided with the familiar, normal login prompt below. Yes, this is an extra step, but it was the only way available to achieve security without some major rework of all your existing forms.</div><div><br></div><div><img src="https://my3.my.umbc.edu/groups/doit/posts/94009/attachments/36174" width="70%" style="max-width: 100%; height: auto;"></div><div><br></div><div><br></div><div><br></div><div>*Note that this only impacts RT forms if they are accessed prior to authentication.</div><div><br></div><div>Please <a href="https://doit.umbc.edu/request-tracker-rt/doit-myumbc-tsc/" rel="nofollow external" class="bo">submit</a> an RT ticket if you have any issues or questions. If unable to submit a ticket please contact Joe Kirby at <a href="mailto:kirby@umbc.edu" rel="nofollow external" class="bo">kirby@umbc.edu</a></div></div>
]]>
</Body>
<Summary>Over the last 10+ years DoIT has developed nearly 200 forms for various offices across campus, providing enhanced business processing options. These forms deliver a better user experience, and a...</Summary>
<AttachmentKind>Image</AttachmentKind>
<AttachmentUrl>https://assets4-beta.my.umbc.edu/system/shared/attachments/a6ec496f93c63489487b597e87c87cb0/69f0969c/news/000/094/009/889823b59e4946c262348782d54afc70/G8aDSRXw8UKvxC-DuoxJtgChjmwRSkAvO98i1ERwVzIuwGO797JMzxigtqvsg5zdS84sp_NVNbZY43azXHhwRHXhwhn5dzdB7m7nHCxflArY9U8pPA93WFsrE2AAFIf1ZefDGYVP.png?1593187817</AttachmentUrl>
<Attachments>
<Attachment kind="Image" url="https://beta.my.umbc.edu/groups/doit/posts/94009/attachments/36174"></Attachment>
<Attachment kind="Image" url="https://beta.my.umbc.edu/groups/doit/posts/94009/attachments/36175"></Attachment>
</Attachments>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/94009/guest@my.umbc.edu/09d01b0ad24ab9139f3cad1d19f1fab4/api/pixel</TrackingUrl>
<Tag>bsg</Tag>
<Tag>tt</Tag>
<Group token="doit">Division of Information Technology (DoIT)</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/doit</GroupUrl>
<AvatarUrl>https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
<AvatarUrl size="original">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/original.JPG?1727453227</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxlarge.png?1727453227</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xlarge.png?1727453227</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/large.png?1727453227</AvatarUrl>
<AvatarUrl size="medium">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/medium.png?1727453227</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/small.png?1727453227</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxsmall.png?1727453227</AvatarUrl>
<Sponsor>Division of Information Technology (DoIT)</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Fri, 26 Jun 2020 12:15:12 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="93934" important="false" status="posted" url="https://beta.my.umbc.edu/groups/doit/posts/93934">
<Title>USM to Convene Summit on Adaptive Tools for Online Courses</Title>
<Tagline>Learn about the ins and outs of adaptive courseware on 7/16!</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><div>The USM Kirwan Center for Academic Innovation is hosting a day-long virtual summit to introduce participants to the ins and outs of adaptive courseware. Sessions will include lessons learned from faculty users, vendor demos, “birds of a feather” break-outs by discipline and role, and a closing plenary focused on pedagogical uses of adaptive courseware.<br></div><div><br></div><div><strong>Adaptive Tools for High-enrollment Online Courses:  Improving the COVID-19 Learning Experience for Students and Faculty</strong></div><div><em><strong>A virtual summit organized by the USM Kirwan Center for Academic Innovation</strong><br></em></div><div><strong>Thursday, July 16, 2020, 8:30 am to 4:00 pm</strong><br></div><div><strong><a href="https://www.usmd.edu/cai/adaptive-tools-high-enrollment-online-courses" title="https://www.usmd.edu/cai/adaptive-tools-high-enrollment-online-courses" rel="nofollow external" class="bo">REGISTER</a> </strong><br></div><div><br></div><div><div>Participants in the summit will have a chance to learn about an array of adaptive technologies from organizations such as Lumen Learning, Carnegie Mellon’s Online Learning Initiative (OLI), CogBooks, RealizeIt, and McGraw Hill ALEKS. Faculty users will share lessons learned about these tools and delve into how adaptive courseware has helped them to support student success.<br></div><div><br></div><div>The Summit will be geared toward high-enrollment (large lecture, multi-section) courses for which high-quality, adaptive courseware exists: General education, introductory courses in the major, and first-year experience and other transitions courses.<br></div><div><br></div><div>Event Details:  <br></div><div><ul><li>When: Thursday, July 16, 2020, 8:30 am to 4:00 pm</li><li>Where: Kirwan Center-hosted virtual meetings in Zoom</li><li>Who should attend: USM faculty, instructional designers, faculty developers, and administrators</li><li>Cost: Free to USM faculty &amp; staff</li></ul></div><div> Planned Program Highlights:  </div><div><ul><li>Opening Framing<br></li><li>Meet the Courseware: Choose from among sessions to hear faculty stories and view vendor demos based on your interests/discipline.</li><li>“Birds of a Feather” Brown Bag Lunch by disciplinary area</li><li>Closing Plenary: Using Adaptive Courseware for to Improve the Learning Experience for Students and Faculty</li></ul></div><div> Register: <a href="https://www.usmd.edu/cai/adaptive-tools-high-enrollment-online-courses" rel="nofollow external" class="bo">https://www.usmd.edu/cai/adaptive-tools-high-enrollment-online-courses</a></div></div></div>
]]>
</Body>
<Summary>The USM Kirwan Center for Academic Innovation is hosting a day-long virtual summit to introduce participants to the ins and outs of adaptive courseware. Sessions will include lessons learned from...</Summary>
<Website>https://www.usmd.edu/cai/adaptive-tools-high-enrollment-online-courses</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/93934/guest@my.umbc.edu/83f76ce96585d2c1444717014cc969c3/api/pixel</TrackingUrl>
<Tag>adaptive-courseware</Tag>
<Tag>online-learning</Tag>
<Group token="instructional-technology">Instructional Technology</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/instructional-technology</GroupUrl>
<AvatarUrl>https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/xsmall.png?1446126703</AvatarUrl>
<AvatarUrl size="original">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/original.png?1446126703</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/xxlarge.png?1446126703</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/xlarge.png?1446126703</AvatarUrl>
<AvatarUrl size="large">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/large.png?1446126703</AvatarUrl>
<AvatarUrl size="medium">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/medium.png?1446126703</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/small.png?1446126703</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/xsmall.png?1446126703</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/xxsmall.png?1446126703</AvatarUrl>
<Sponsor>Instructional Technology</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/093/934/d3a8518bb4fc0084895949fc6cf0a389/xxlarge.jpg?1592925154</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/093/934/d3a8518bb4fc0084895949fc6cf0a389/xlarge.jpg?1592925154</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/093/934/d3a8518bb4fc0084895949fc6cf0a389/large.jpg?1592925154</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/093/934/d3a8518bb4fc0084895949fc6cf0a389/medium.jpg?1592925154</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/093/934/d3a8518bb4fc0084895949fc6cf0a389/small.jpg?1592925154</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/093/934/d3a8518bb4fc0084895949fc6cf0a389/xsmall.jpg?1592925154</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/093/934/d3a8518bb4fc0084895949fc6cf0a389/xxsmall.jpg?1592925154</ThumbnailUrl>
<PawCount>3</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Tue, 23 Jun 2020 11:14:55 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="93933" important="false" status="posted" url="https://beta.my.umbc.edu/groups/doit/posts/93933">
<Title>USM Sponsoring Online Teaching Professional Development</Title>
<Tagline>Sign up now for Quality Matters workshops in July!</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><div><a href="https://www.usmd.edu/newsroom/news/2056" rel="nofollow external" class="bo">USM <em>OnTrack</em></a> has pre-purchased a pool of online teaching professional development workshops from Quality Matters (QM) on beginning to advanced topics, including designing for learner engagement, flipping the online course, setting expectations with students, active learning strategies, accessibility, and online assessment.<br></div><div> </div><div>Registration is now open for the <a href="https://drive.google.com/file/d/12g47TsHxhiF6NFeteXRhQo8oO7OTfIKh/view?usp=sharing" rel="nofollow external" class="bo">first set of workshops</a>, being offered from July 7th through July 30th (see attached list). Links to workshops after July 30th will be forthcoming in the next few weeks.<br></div><div> </div><div>Prior to <a href="https://drive.google.com/file/d/12g47TsHxhiF6NFeteXRhQo8oO7OTfIKh/view?usp=sharing" rel="nofollow external" class="bo">registering for any workshops,</a> you will need to create an account on MyQM;<a href="https://drive.google.com/file/d/108rXWS7nuPvTWySAWBOLYblCWk8VMcc3/view?usp=sharing" rel="nofollow external" class="bo">click here to access instructions for creating a MyQM account </a>(also attached).</div><div><br></div><div>There is no cost for any USM faculty or staff member to attend these workshops, but each workshop does have a 30-person limit, so please sign up as soon as possible!</div><div><br></div><div><br></div><div><br></div><div><br></div><div>QM Coordinator information:</div><div><br></div><div>Dr. Sherri Braxton - University of Maryland-Baltimore County</div><div><a href="mailto:sbraxton@umbc.edu">sbraxton@umbc.edu</a></div></div>
]]>
</Body>
<Summary>USM OnTrack has pre-purchased a pool of online teaching professional development workshops from Quality Matters (QM) on beginning to advanced topics, including designing for learner engagement,...</Summary>
<Website>https://www.usmd.edu/newsroom/news/2056</Website>
<AttachmentKind>Document</AttachmentKind>
<AttachmentUrl>https://assets2-beta.my.umbc.edu/system/shared/attachments/19d7f4130e82e8823078fe9c13515c3b/69f0969c/news/000/093/933/52bd90a3be645143af3c4ad082803269/USM OnTrack QM Live! Web Conferencing Workshop Schedule - Registration Links as of 062220.xlsx?1592923528</AttachmentUrl>
<Attachments>
<Attachment kind="Document" url="https://beta.my.umbc.edu/groups/doit/posts/93933/attachments/36155"></Attachment>
<Attachment kind="Document" url="https://beta.my.umbc.edu/groups/doit/posts/93933/attachments/36156"></Attachment>
</Attachments>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/93933/guest@my.umbc.edu/8f33ce4265521dace582d9940d816bb8/api/pixel</TrackingUrl>
<Tag>online</Tag>
<Tag>qm</Tag>
<Tag>quality-matters</Tag>
<Group token="instructional-technology">Instructional Technology</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/instructional-technology</GroupUrl>
<AvatarUrl>https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/xsmall.png?1446126703</AvatarUrl>
<AvatarUrl size="original">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/original.png?1446126703</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/xxlarge.png?1446126703</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/xlarge.png?1446126703</AvatarUrl>
<AvatarUrl size="large">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/large.png?1446126703</AvatarUrl>
<AvatarUrl size="medium">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/medium.png?1446126703</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/small.png?1446126703</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/xsmall.png?1446126703</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/xxsmall.png?1446126703</AvatarUrl>
<Sponsor>Instructional Technology</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/093/933/78fa1b4c07f8922f9f348794f59e0db3/xxlarge.jpg?1592923714</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/093/933/78fa1b4c07f8922f9f348794f59e0db3/xlarge.jpg?1592923714</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/093/933/78fa1b4c07f8922f9f348794f59e0db3/large.jpg?1592923714</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/093/933/78fa1b4c07f8922f9f348794f59e0db3/medium.jpg?1592923714</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/093/933/78fa1b4c07f8922f9f348794f59e0db3/small.jpg?1592923714</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/093/933/78fa1b4c07f8922f9f348794f59e0db3/xsmall.jpg?1592923714</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/093/933/78fa1b4c07f8922f9f348794f59e0db3/xxsmall.jpg?1592923714</ThumbnailUrl>
<PawCount>3</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 23 Jun 2020 10:49:42 -0400</PostedAt>
<EditAt>Tue, 23 Jun 2020 11:17:58 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="false" id="93891" important="false" status="posted" url="https://beta.my.umbc.edu/groups/doit/posts/93891">
<Title>How to Spot a Scam</Title>
<Tagline>Follow the Three Golden Rules</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>Scammers are always inventing new ways to exploit people. However, some of the basic tactics don’t change much. The Cybercrime Support Network (CSN), in partnership with Google, has set up the ScamSpotter web site (<a href="https://scamspotter.org/">https://scamspotter.org/</a>) . Scam Spotter lists Three Golden Rules for spotting a scam.</span></p><br><ol><li><p><span><strong>Slow Down</strong>: If any organization is rushing you to act fast, this is a red flag. Take your time to get more information. Do not rush.</span></p></li><li><p><span><strong>Spot check</strong>: Utilize the internet, search for that organization online. If you get unexpected calls, unhang up, then search to verify the phone number.</span></p></li><li><p><span><strong>Stop, Don’t Send</strong>: Scammers are always demanding payment on the spot, A trustworthy organization would not ask you to send your credit card over texts, phone calls or emails. Scammers love gift cards. Do not send any gift cards to anyone, who you have not verified or know.</span></p></li></ol><br><p><span>If you receive email and are not sure whether it’s a scam, please send  the complete headers to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>.   The UMBC guide to displaying complete email headers can be found at: <br></span></p><p><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span> </span></p><br><br><p><span>Source: </span><a href="https://scamspotter.org/scams" rel="nofollow external" class="bo"><span>https://scamspotter.org/scams</span></a></p></div>
]]>
</Body>
<Summary>Scammers are always inventing new ways to exploit people. However, some of the basic tactics don’t change much. The Cybercrime Support Network (CSN), in partnership with Google, has set up the...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/93891/guest@my.umbc.edu/cbdccb6751f92b391d8803891110e11e/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777368069</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/images/avatars/group/7/original.png?1777368069</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777368069</AvatarUrl>
<AvatarUrl size="xlarge">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777368069</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/images/avatars/group/7/large.png?1777368069</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777368069</AvatarUrl>
<AvatarUrl size="small">https://assets1-beta.my.umbc.edu/images/avatars/group/7/small.png?1777368069</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777368069</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777368069</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Fri, 19 Jun 2020 14:07:25 -0400</PostedAt>
<EditAt>Fri, 19 Jun 2020 14:12:38 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="false" id="93883" important="false" status="posted" url="https://beta.my.umbc.edu/groups/doit/posts/93883">
<Title>How to Spot a Scam</Title>
<Tagline>Follow the Three Golden Rules</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>Scammers are always inventing new ways to exploit people. However, some of the basic tactics don’t change much. The Cybercrime Support Network (CSN), in partnership with Google, has set up the ScamSpotter web site (<a href="https://scamspotter.org/">https://scamspotter.org/</a>) . Scam Spotter lists Three Golden Rules for spotting a scam.</span></p><br><ol><li><p><span>Slow Down: If any organization is rushing you to act fast, this is a red flag. Take your time to get more information. Do not rush.</span></p></li><li><p><span>Spot check: Utilize the internet, search for that organization online. If you get unexpected calls, unhang up, then search to verify the phone number.</span></p></li><li><p><span>Stop, Don’t Send. Scammers are always demanding payment on the spot, A trustworthy organization would not ask you to send your credit card over texts, phone calls or emails. Scammers love gift cards. Do not send any gift cards to anyone, who you have not verified or know.</span></p></li></ol><br><p><span>If you receive email and are not sure whether it’s a scam, please send  the complete headers to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>.   The UMBC guide to displaying complete email headers can be found at: <br></span></p><p><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span> </span></p><br><br><p><span>Source: </span><a href="https://scamspotter.org/scams" rel="nofollow external" class="bo"><span>https://scamspotter.org/scams</span></a></p></div>
]]>
</Body>
<Summary>Scammers are always inventing new ways to exploit people. However, some of the basic tactics don’t change much. The Cybercrime Support Network (CSN), in partnership with Google, has set up the...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/93883/guest@my.umbc.edu/e37265d9704e2160094c095237743956/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Tag>students</Tag>
<Group token="doit">Division of Information Technology (DoIT)</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/doit</GroupUrl>
<AvatarUrl>https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
<AvatarUrl size="original">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/original.JPG?1727453227</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxlarge.png?1727453227</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xlarge.png?1727453227</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/large.png?1727453227</AvatarUrl>
<AvatarUrl size="medium">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/medium.png?1727453227</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/small.png?1727453227</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxsmall.png?1727453227</AvatarUrl>
<Sponsor>Division of Information Technology (DoIT)</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Fri, 19 Jun 2020 12:25:25 -0400</PostedAt>
<EditAt>Thu, 13 Aug 2020 04:06:44 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="false" id="93877" important="false" status="posted" url="https://beta.my.umbc.edu/groups/doit/posts/93877">
<Title>IRS Warning of COVID-19 Scams</Title>
<Tagline>Financial Scammers Taking Advantage Of COVID-19 Uncertainty</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>With COVID-19 present in our day to day lives, malicious actors are taking this opportunity to scam people out of their personal and financial information. Recently the IRS Criminal Investigation Division (IRS-CI) has noticed various campaigns targeting Economic Impact Payments as well as other COVID-19 related scams.</span></p><br><p><span>The IRS-CI warns that some of these scams will offer more money from the government or even faster check delivery if the reader shares personal information and pays a small “processing fee.”  The IRS warns that there are no shortcuts for stimulus checks. Malicious actors have also been trying to convince people to “apply” for a second stimulus check. According to a Forbes article, as of right now, there is currently no second stimulus check in the works. </span></p><p><span><br></span><span>Malicious actors are also setting up fake charities soliciting donations for individuals, groups and areas affected by COVID-19. Some malicious actors are even offering the chance to invest in companies working on a vaccine, promising that the “company” will dramatically increase in value as a result. Some are even selling fake products like at-home test kits, fake cures, vaccines, pills and giving advice on unproven treatments. </span><span><br><br></span></p><p><span>They also warn of phishing campaigns being sent out either through text or emails. These campaigns are using keywords like “Corona Virus,” “COVID-19,” and “Stimulus.” For these campaigns the IRS-CI says the malicious actors' targets are people's personal and financial information.</span></p><br><p><span>If you do receive any email that you suspect is a scam, please do not click on any URL or reply. Either of those actions confirms to the sender that your email address is valid. Please forward the message (with the email headers) to <a href="mailto:security@umbc.edu">security@umbc.edu</a>.</span></p><br><p><span>How do I forward full email headers?</span></p><p><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a></p><br><p><span>For more information, please check out: </span></p><p><a href="https://www.irs.gov/newsroom/irs-warns-against-covid-19-fraud-other-financial-schemes" rel="nofollow external" class="bo"><span>https://www.irs.gov/newsroom/irs-warns-against-covid-19-fraud-other-financial-schemes</span></a></p><p><a href="https://www.forbes.com/sites/kellyphillipserb/2020/06/08/irs-warns-on-covid-19-scams-involving-stimulus-checks-fake-cures--more/#67cdbd937a98" rel="nofollow external" class="bo"><span>https://www.forbes.com/sites/kellyphillipserb/2020/06/08/irs-warns-on-covid-19-scams-involving-stimulus-checks-fake-cures--more/#67cdbd937a98</span></a></p></div>
]]>
</Body>
<Summary>With COVID-19 present in our day to day lives, malicious actors are taking this opportunity to scam people out of their personal and financial information. Recently the IRS Criminal Investigation...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/93877/guest@my.umbc.edu/1ab03c667e38e69440aee5210dae2cc9/api/pixel</TrackingUrl>
<Tag>covid19</Tag>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777368069</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/images/avatars/group/7/original.png?1777368069</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777368069</AvatarUrl>
<AvatarUrl size="xlarge">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777368069</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/images/avatars/group/7/large.png?1777368069</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777368069</AvatarUrl>
<AvatarUrl size="small">https://assets1-beta.my.umbc.edu/images/avatars/group/7/small.png?1777368069</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777368069</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777368069</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Fri, 19 Jun 2020 10:22:15 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="93808" important="false" status="posted" url="https://beta.my.umbc.edu/groups/doit/posts/93808">
<Title>Fake Virus Alert Scam</Title>
<Tagline>Scareware doesn&#8217;t just exploit panic, it creates panic</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>You are working from home, web browser open to whatever resources you need to write a paper, prepare a class, review a budget, or whatever else you need to get your job done.  Suddenly a window you didn’t ask for appears on your screen.  It may look sort of like a normal security product or perhaps it is flashing red and yellow.  There may even be - no kidding - sirens.   The message seared into your eyes tells you that your computer is </span><span>infected</span><span>with viruses, possibly hundreds of them.  The message says your data may be stolen, or erased, or both.  The message tells you that it is </span><span>urgent </span><span>that you click a link to buy and download an antivirus product and/or call a phone number where you will be able to buy a support contract (they just need your bank’s routing number and your account number and they will take care of the details).  If you try to close this window, it wither won’t close or gets replaced by more such windows.  In any case, the message is telling you that the most important thing for you to do immediately is to </span><span>panic</span><span>.  The pop-up window is doing it’s very best to get you to act without asking any questions.</span></p><br><p><span>This type of malware has become quite common and falls into a class called ‘scareware’.  The goal is to get you to act without thinking about what you’re doing.  If the window won’t go away, turn your computer off and then back on.  Some scareware is attached to your browser and will only reappear when you start whichever browser you were using before.  Other scareware is installed as a program and may reappear when your computer restarts.  It can be extremely annoying, but the real threat is the link and/or phone number that you are asked to use to fix the problem. DO NOT CLICK THE LINK AND/OR DO NOT CALL THE NUMBER.  </span></p><br><p><span>General Rule:  </span><span>Anything, windows, email, articles, etc. that you see on your computer that seems to be trying to induce panic, is probably trying to do just that.  Stay calm and think, don’t click!</span></p><br><br><br><p><span>Here are some references where you can find out more:</span></p><br><ul><li><p><a href="https://www.aarp.org/money/scams-fraud/info-2019/tech-support.html" rel="nofollow external" class="bo"><span>https://www.aarp.org/money/scams-fraud/info-2019/tech-support.html</span></a></p></li><li><p><u><a href="You%20are%20working%20from%20home,%20your%20web%20browser%20open%20to%20whatever%20resources%20you%20need%20to%20write%20a%20paper,%20prepare%20a%20class,%20review%20a%20budget,%20or%20whatever%20else%20you%20need%20to%20get%20your%20job%20done.%20%20Suddenly%20a%20window%20you%20didn%E2%80%99t%20ask%20for%20appears%20on%20your%20screen.%20%20It%20may%20look%20sort%20of%20like%20a%20normal%20security%20product%20or%20perhaps%20it%20is%20flashing%20red%20and%20yellow.%20%20There%20may%20even%20be%20-%20no%20kidding%20-%20sirens.%20%20%20The%20message%20seared%20into%20your%20eyes%20tells%20you%20that%20your%20computer%20is%20infected%20with%20viruses.%20%20Possibly%20hundreds%20of%20them.%20%20The%20message%20says%20your%20data%20may%20be%20stolen,%20or%20erased,%20or%20both.%20%20The%20message%20tells%20you%20that%20it%20is%20urgent%20that%20you%20click%20a%20link%20to%20buy%20and%20download%20an%20antivirus%20product%20and/or%20call%20a%20phone%20number%20where%20you%20will%20be%20able%20to%20buy%20a%20support%20contract%20(they%20just%20need%20your%20bank%E2%80%99s%20routing%20number%20and%20your%20account%20number%20and%20they%20will%20take%20care%20of%20the%20details).%20%20If%20you%20try%20to%20close%20this%20window,%20it%20wither%20won%E2%80%99t%20close%20or%20gets%20replaced%20by%20more%20such%20windows.%20%20In%20any%20case,%20the%20message%20is%20telling%20you%20that%20the%20most%20important%20thing%20for%20you%20to%20do%20immediately%20is%20to%20panic.%20%20The%20pop-up%20window%20is%20doing%20it%E2%80%99s%20very%20best%20to%20get%20you%20to%20act%20without%20asking%20any%20questions.%20%20This%20type%20of%20malware%20has%20become%20quite%20common%20and%20falls%20into%20a%20class%20called%20%E2%80%98scareware%E2%80%99.%20%20The%20goal%20is%20to%20get%20you%20to%20act%20without%20thinking%20about%20what%20you%E2%80%99re%20doing.%20%20If%20the%20window%20won%E2%80%99t%20go%20away,%20turn%20your%20computer%20off%20and%20then%20back%20on.%20%20Some%20scareware%20is%20attached%20to%20your%20browser%20and%20will%20only%20reappear%20when%20you%20start%20whichever%20browser%20you%20were%20using%20before.%20%20Other%20scareware%20is%20installed%20as%20a%20program%20and%20may%20reappear%20when%20your%20computer%20restarts.%20%20It%20can%20be%20extremely%20annoying,%20but%20the%20real%20threat%20is%20the%20link%20and/or%20phone%20number%20that%20you%20are%20asked%20to%20use%20to%20fix%20the%20problem.%20DO%20NOT%20CLICK%20THE%20LINK%20AND/OR%20DO%20NOT%20CALL%20THE%20NUMBER.%20%20%20%20General%20Rule:%20%20Anything,%20windows,%20email,%20articles,%20etc.%20that%20you%20see%20on%20your%20computer%20that%20seems%20to%20be%20trying%20to%20induce%20panic,%20is%20probably%20trying%20to%20do%20just%20that.%20%20Stay%20calm%20and%20think,%20don%E2%80%99t%20click!%20%20%20%20Here%20are%20some%20references%20where%20you%20can%20find%20out%20more:%20%20https://www.aarp.org/money/scams-fraud/info-2019/tech-support.html%20https://www.consumer.ftc.gov/articles/how-spot-avoid-and-report-tech-support-scams%20https://www.businessknowhow.com/security/scareware.htm%20https://computing.which.co.uk/hc/en-gb/articles/207101035-How-to-spot-a-fake-virus-alert" rel="nofollow external" class="bo"><span>https://www.consumer.ftc.gov/articles/how-spot-avoid-and-report-tech-support-scams</span></a></u></p></li><li><p><a href="https://www.businessknowhow.com/security/scareware.htm" rel="nofollow external" class="bo"><span>https://www.businessknowhow.com/security/scareware.htm</span></a></p></li><li><p><a href="https://computing.which.co.uk/hc/en-gb/articles/207101035-How-to-spot-a-fake-virus-alert" rel="nofollow external" class="bo"><span>https://computing.which.co.uk/hc/en-gb/articles/207101035-How-to-spot-a-fake-virus-alert</span></a></p></li></ul></div>
]]>
</Body>
<Summary>You are working from home, web browser open to whatever resources you need to write a paper, prepare a class, review a budget, or whatever else you need to get your job done.  Suddenly a window...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/93808/guest@my.umbc.edu/a7505e6af92d587a3543ef14fb368572/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777368069</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/images/avatars/group/7/original.png?1777368069</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777368069</AvatarUrl>
<AvatarUrl size="xlarge">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777368069</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/images/avatars/group/7/large.png?1777368069</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777368069</AvatarUrl>
<AvatarUrl size="small">https://assets1-beta.my.umbc.edu/images/avatars/group/7/small.png?1777368069</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777368069</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777368069</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 15 Jun 2020 16:25:51 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="93744" important="false" status="posted" url="https://beta.my.umbc.edu/groups/doit/posts/93744">
<Title>Blackboard Offers Free Virtual Conference July 21-22</Title>
<Tagline>Follow BbWorld 20 via live streaming sessions &amp; recordings</Tagline>
<Body>
<![CDATA[
    <div class="html-content">Once a year Blackboard hosts <a href="http://www.bbworld.com/" rel="nofollow external" class="bo">the BbWorld conference</a> over several days for faculty, students, administrators, instructional technology specialists, training professionals, developers, and system administrators. Due to COVID-19, the BbWorld 2020 conference was rescheduled for a virtual platform on July 21-22.<div><br></div><div><strong><a href="https://bbworld.com/register/" rel="nofollow external" class="bo">Registration is now open</a> for this free virtual event. </strong>Sessions will be offered from 6 AM to 11 PM to support a global audience. Themes include new models of teaching &amp; learning, accessibility &amp; inclusivity, student engagement, and the impact of COVID-19 on education. The conference will feature interactive breakout sessions, experiential discovery hall, and a virtual partner exhibit.</div><div><br></div><div><span>Although the full schedule is not yet posted, this year's BbWorld features two sessions from Instructional Technology staff:</span></div><div><ul><li>“Hacking Ultra: Innovating &amp; Redesigning Original Courses” </li><li>“Preparing your GO (Go Online) Kit for Learning Continuity”</li></ul></div><div><span>Most sessions will be recorded. </span><span>Once registered, d</span><span>ownload the mobile app for <a href="https://apps.apple.com/ae/app/bbworld-devcon/id1109532911" rel="nofollow external" class="bo">iOS</a> or <a href="https://play.google.com/store/apps/details?id=me.doubledutch.xlzhd.bbworlddevcon&amp;hl=en_US" rel="nofollow external" class="bo">Android</a> to get access to session handouts and slide decks. </span><span>During the BbWorld conference, follow social media via Twitter hashtag </span><a href="https://twitter.com/hashtag/bbworld20" rel="nofollow external" class="bo">#BbWorld20</a><span>.</span></div><div><span><br></span></div><div><em>The technical side of Bb World, known as DevCon, is scheduled for July 6-20. Targeted primarily to developers, system admins, and analytics specialists, DevCon is also free this year.</em></div></div>
]]>
</Body>
<Summary>Once a year Blackboard hosts the BbWorld conference over several days for faculty, students, administrators, instructional technology specialists, training professionals, developers, and system...</Summary>
<Website>https://my3.my.umbc.edu/groups/instructional-technology/posts/93744</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/93744/guest@my.umbc.edu/b664d6e881dcee0904da45e4ada4ae07/api/pixel</TrackingUrl>
<Tag>bbworld</Tag>
<Tag>bbworld-live</Tag>
<Tag>blackboard</Tag>
<Tag>conferences</Tag>
<Group token="instructional-technology">Instructional Technology</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/instructional-technology</GroupUrl>
<AvatarUrl>https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/xsmall.png?1446126703</AvatarUrl>
<AvatarUrl size="original">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/original.png?1446126703</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/xxlarge.png?1446126703</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/xlarge.png?1446126703</AvatarUrl>
<AvatarUrl size="large">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/large.png?1446126703</AvatarUrl>
<AvatarUrl size="medium">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/medium.png?1446126703</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/small.png?1446126703</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/xsmall.png?1446126703</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/xxsmall.png?1446126703</AvatarUrl>
<Sponsor>Instructional Technology</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/093/744/3750ca1490724cf77e0e9888c50874f3/xxlarge.jpg?1591874471</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/093/744/3750ca1490724cf77e0e9888c50874f3/xlarge.jpg?1591874471</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/093/744/3750ca1490724cf77e0e9888c50874f3/large.jpg?1591874471</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/093/744/3750ca1490724cf77e0e9888c50874f3/medium.jpg?1591874471</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/093/744/3750ca1490724cf77e0e9888c50874f3/small.jpg?1591874471</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/093/744/3750ca1490724cf77e0e9888c50874f3/xsmall.jpg?1591874471</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/093/744/3750ca1490724cf77e0e9888c50874f3/xxsmall.jpg?1591874471</ThumbnailUrl>
<PawCount>3</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Thu, 11 Jun 2020 07:41:12 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="93743" important="false" status="posted" url="https://beta.my.umbc.edu/groups/doit/posts/93743">
<Title>How to Spot a Job Scam</Title>
<Tagline>Scammers Are Sill Exploiting The Pandemic</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>With Covid-19 causing many Americans to file for unemployment, many people are looking for jobs.  Some malicious actors are taking advantage of them by creating new job scams. Here is a list of tips from Forbes to help spot potential job scams.</span></p><br><ul><li><p><span>Malicious actors will use keywords when describing a job such as “work-from-home”, “work-at-home”, “quick money”, or even “unlimited earning potential”. A legitimate job will usually use keywords along the lines of “remote work”, “virtual work” or “telecommute job”.</span></p></li><li><p><span>Descriptions and emails for scam jobs will usually have grammatical or spelling errors, while legitimate jobs will not have major errors.</span></p></li><li><p><span>A malicious actor will want to hire very quickly, they may include keywords like “immediate hire” in the description and any communication will feel urgent. A legitimate job will usually take some time as they want to hire the right people.</span></p></li><li><p><span>If the job description seems “too good to be true” then it probably is.</span></p></li><li><p><span>Scam jobs are known for asking for an upfront fee for things like applications, background checks, employee processing or even uniforms. They could also request personal information prior to completing the hiring process. A legitimate job will only request information like tax documents after agreeing to the terms of hire.</span></p></li><li><p><span>A malicious actor will request to communicate through email or even chat rooms like Google Hangout. Their emails might even try to mimic the real company’s emails. Even if a legitimate job will contact you through websites like LinkedIn.  They will not hire someone without having a phone or video conference interview.</span></p></li></ul><br><p><span>The key to quick scams is urgency.  The scammer doesn’t want you to stop and think, and </span><span>certainly</span><span> not to ask questions.  If you are urged to act immediately and told that you will lose a good opportunity or that something bad will happen if you delay, be suspicious.  </span></p><br><p><span>Lack of business details is another warning flag. If someone offers you a job without giving you a phone number, street address, or a link to their business to check out, be suspicious.</span><span><br></span><span><br></span><span>If the message tells you that your name was provided by UMBC, but asks you to reply from your personal email, ask yourself why they don’t want to use the UMBC email address they just used to contact you.  If you see something inconsistent, be suspicious.</span></p><p><span><br></span><span>If you do receive any email that you suspect is a scam, please do not click on any URL or reply. Either of those actions confirms to the sender that your email address is valid. Please forward the message (with the email headers) to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span> and delete the message.</span></p><br><br><p><span>How do I forward full email headers?</span></p><p><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span> </span></p><br><br><p><span>For more information, please check out:</span></p><p><a href="https://www.forbes.com/sites/ashleystahl/2020/05/11/job-hunting-scams-amid-covid-19-pandemic/#57724b253c57" rel="nofollow external" class="bo"><span>https://www.forbes.com/sites/ashleystahl/2020/05/11/job-hunting-scams-amid-covid-19-pandemic/#57724b253c57</span></a></p></div>
]]>
</Body>
<Summary>With Covid-19 causing many Americans to file for unemployment, many people are looking for jobs.  Some malicious actors are taking advantage of them by creating new job scams. Here is a list of...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/93743/guest@my.umbc.edu/887e86dc64d75cf47997e6125abf6b46/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777368069</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/images/avatars/group/7/original.png?1777368069</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777368069</AvatarUrl>
<AvatarUrl size="xlarge">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777368069</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/images/avatars/group/7/large.png?1777368069</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777368069</AvatarUrl>
<AvatarUrl size="small">https://assets1-beta.my.umbc.edu/images/avatars/group/7/small.png?1777368069</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777368069</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777368069</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Wed, 10 Jun 2020 19:52:47 -0400</PostedAt>
<EditAt>Wed, 10 Jun 2020 19:56:52 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="false" id="93655" important="false" status="posted" url="https://beta.my.umbc.edu/groups/doit/posts/93655">
<Title>Protect UMBC - Ransomware Attacks Still Active</Title>
<Tagline>Your Own Computer Held Hostage</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>Many of us lived our lives, at least in part, through computers even before telework and distance learning became the norm.  You may use your computer for writing reports, designing presentations, tracking budgets, email, banking, checking medical records, filing your taxes, and dozens of other necessary work and life-related chores.  Now, suppose someone took your computer and demanded a hundred dollars for its return.  Suppose someone took all the computers in your office or university away and demanded thousands of dollars for their return.  This is what ransomware does.  </span></p><br><p><span>Just to be clear, no one shows up, grabs the computer, and runs out the door.  During a ransomware attack, the computer is still there.  The data on the computer, however, all the email, documents, spreadsheets, bookmarks and whatever else you have stored on it is unusable.  It has been encrypted, and you don’t know the password. The data is, for all intents and purposes, gone.</span></p><br><p><span>Ransomware will leave your computer just functional enough to pop a ransom note up on the screen.  The note directs the victim to pay a specified amount in cryptocurrency in return for the password.  The payment will be effectively untraceable. Like most ransom situations, you have no assurance beyond the word of obvious criminals that you will get that password, or even that they have it.  Two departments at Michigan State University were struck with ransomware around last Memorial Day and have announced the ransom will not be paid. </span></p><br><p><span>Ransomware is delivered in the same way as other malware.  It usually gets a foothold when a computer user opens infected email, clicks on a malicious link, or installs software from an untrusted source.  It is just as likely to strike any computer as any other malicious program.</span></p><br><p><span>Updating your computer regularly with security patches and installing anti-virus protection is always a good idea.  The absolute best defense against ransomware, is to make a backup.  If you have recent copies of your files stored somewhere </span><span>other</span><span> than on your computer, you can restore all your data if ransomware hits.  You don’t need to backup all the information on the computer, just the information that is important and irreproducible.  Documents, pictures, address lists, etc. can all be backed up, either to removable media such as a USB thumb drive or an external drive, or to cloud storage.   Microsoft and Apple have both tried to make automatic backup to cloud storage as easy as possible (see Resources below).  There are other options such as Box storage with Box Sync.</span></p><br><p><span>IMPORTANT</span><span>:  If you are working from home using data belonging to UMBC, there may be restrictions on where that data can be stored.  </span><span>Check with the Division of Information Technology (</span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>) to find out what options are available.  It is essential that backups of sensitive data be protected and not breached.  </span></p><h3><span>Resources</span></h3><br><p><span>Windows Backup to Microsoft OneDrive</span></p><p><a href="https://www.microsoft.com/en-us/microsoft-365/onedrive/pc-cloud-backup" rel="nofollow external" class="bo"><span>https://www.microsoft.com/en-us/microsoft-365/onedrive/pc-cloud-backup</span></a></p><br><p><span>Macintosh Backup to iCloud</span></p><p><a href="https://support.apple.com/en-us/HT204025" rel="nofollow external" class="bo"><span>https://support.apple.com/en-us/HT204025</span></a></p><br><br><br><p><span>For more information:</span></p><br><p><a href="https://www.insidehighered.com/quicktakes/2020/06/04/michigan-state-refuses-pay-ransom-hackers" rel="nofollow external" class="bo"><span>https://www.insidehighered.com/quicktakes/2020/06/04/michigan-state-refuses-pay-ransom-hackers</span></a></p></div>
]]>
</Body>
<Summary>Many of us lived our lives, at least in part, through computers even before telework and distance learning became the norm.  You may use your computer for writing reports, designing presentations,...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/93655/guest@my.umbc.edu/bc9ab72cb5b67dc4a73792313df79f1f/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777368069</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/images/avatars/group/7/original.png?1777368069</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1777368069</AvatarUrl>
<AvatarUrl size="xlarge">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1777368069</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/images/avatars/group/7/large.png?1777368069</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/images/avatars/group/7/medium.png?1777368069</AvatarUrl>
<AvatarUrl size="small">https://assets1-beta.my.umbc.edu/images/avatars/group/7/small.png?1777368069</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1777368069</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1777368069</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 08 Jun 2020 10:28:17 -0400</PostedAt>
</NewsItem>

</News>
