<?xml version="1.0"?>
<News hasArchived="false" page="3" pageCount="5" pageSize="10" timestamp="Sun, 26 Apr 2026 14:43:04 -0400" url="https://beta.my.umbc.edu/groups/doit/posts.xml?page=3&amp;tag=security">
<NewsItem contentIssues="true" id="132445" important="false" status="posted" url="https://beta.my.umbc.edu/groups/doit/posts/132445">
<Title>Respondus Helps Curtail Cheating while Protecting Privacy</Title>
<Tagline>Supported tools to address your high stakes assessment needs</Tagline>
<Body>
<![CDATA[
    <div class="html-content">As technology continues to advance, traditional classroom practices are enhanced with technologies. In-class assessments that used to take up valuable time are often administered through Blackboard, allowing for more efficient use of class time. However, while at-home activities have their benefits, they can be compromised by various internet resources like Chegg, CourseHero, and ChatGPT, which may help students misrepresent their academic abilities.<br><br><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=87884496" rel="nofollow external" class="bo">Respondus Lockdown Browser (RLDB</a>) is a tool designed to reduce students' opportunities for academic misconduct during assessments, including high-stakes testing offered through Blackboard. The application disables a test taker's computer from performing certain actions, including taking screenshots, opening additional web pages or search engines, accessing particular network traffic, and generally restricting the opportunities for students to receive outside help. <br><br>RLDB can also operate in conjunction with <a href="https://wiki.umbc.edu/label/faq/respondus-monitor" rel="nofollow external" class="bo">Respondus Monitor</a>, which leverages an end user's computer camera and AI for real-time proctoring. Monitor can be viewed live by the instructor through a web conferencing platform, or the system records the student taking the test so the instructor can view later.<br><br>There are four simple steps to take to turn on the Lockdown Browser: <br><ol><li>Create the assessment, whether <a href="https://help.blackboard.com/Learn/Instructor/Ultra/Tests_Pools_Surveys/Create_Tests_and_Surveys" rel="nofollow external" class="bo">test</a> or <a href="https://help.blackboard.com/Learn/Instructor/Ultra/Assignments/Create_and_Edit_Assignments" rel="nofollow external" class="bo">assignment </a></li><li><a href="https://wiki.umbc.edu/x/3QKVB" rel="nofollow external" class="bo">Enable the settings</a> via the Respondus Lockdown Browser dashboard for the specific assessment</li><li>Select Respondus Lockdown Browser for the assessment</li><li>Save the settings</li></ol><br>Once enabled, the Blackboard assessment will require students to use LockDown Browser. They will need to <a href="https://wiki.umbc.edu/x/roWxBw" rel="nofollow external" class="bo">download a specific installation</a> of the Lockdown Browser that is unique to UMBC. NOTE: Despite rumors to the contrary, RLDB is not <a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=176521697" rel="nofollow external" class="bo">malware</a> and Monitor is designed to safeguard <a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=176521703" rel="nofollow external" class="bo">users' privacy</a>.<br><br>Depending on your course, students will <a href="https://wiki.umbc.edu/x/BQb9Aw" rel="nofollow external" class="bo">access the quiz directly</a> from Blackboard (Ultra) or the Lockdown Browser (Original). TIP: If your assessment requires students to write a lengthy response, the <a href="https://wiki.umbc.edu/x/8BXBBQ" rel="nofollow external" class="bo">answer window can be enlarged</a>.<br><br>Although they're not for everyone, the Respondus Tools can be <a href="https://doit.umbc.edu/news/?id=91035" rel="nofollow external" class="bo">a game-changer</a> for instructors. Both of these tools help reduce the opportunity for cheating, in much the same way one walking around their classroom keeps students' eyes on their own tests. They are not, however, panacea, as students set on circumventing measures to support academic honesty will surely always find ways around one's best laid plans even and perhaps particularly in face-to-face settings. It is important to note, though, that both of these tools are supported by the UMBC's Division of Information Technology (DoIT). <br><br>In the lead-up to mid-term season, but also throughout the year, please remember that consulting and design support from DoIT staff are only an <a href="https://rt.umbc.edu/" rel="nofollow external" class="bo">RT ticket</a> away.<br><br><br><div>~By <a href="https://doit.umbc.edu/itnm/staff/penniston/" rel="nofollow external" class="bo">Tom Penniston</a> &amp; <a href="https://doit.umbc.edu/itnm/staff/hawken/" rel="nofollow external" class="bo">Mariann Hawken</a></div><div><br></div><div><br></div><div>* <a href="https://www.freepik.com/free-vector/online-test-concept-illustration_13246756.htm#query=test&amp;position=34&amp;from_view=search&amp;track=robertav1_2_sidr" rel="nofollow external" class="bo">Image by storyset</a> on Freepik</div></div>
]]>
</Body>
<Summary>As technology continues to advance, traditional classroom practices are enhanced with technologies. In-class assessments that used to take up valuable time are often administered through...</Summary>
<Website>https://doit.umbc.edu/post/132445/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/132445/guest@my.umbc.edu/941ff5b63fcd3150c0129330278e2e5b/api/pixel</TrackingUrl>
<Tag>assessment</Tag>
<Tag>hawken</Tag>
<Tag>lockdown-browser</Tag>
<Tag>online-learning</Tag>
<Tag>penniston</Tag>
<Tag>respondus</Tag>
<Tag>respondus-monitor</Tag>
<Tag>security</Tag>
<Tag>testing</Tag>
<Group token="instructional-technology">Instructional Technology</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/instructional-technology</GroupUrl>
<AvatarUrl>https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/xsmall.png?1446126703</AvatarUrl>
<AvatarUrl size="original">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/original.png?1446126703</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/xxlarge.png?1446126703</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/xlarge.png?1446126703</AvatarUrl>
<AvatarUrl size="large">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/large.png?1446126703</AvatarUrl>
<AvatarUrl size="medium">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/medium.png?1446126703</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/small.png?1446126703</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/xsmall.png?1446126703</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/xxsmall.png?1446126703</AvatarUrl>
<Sponsor>Instructional Technology</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/132/445/efb7edc144b2683a51095303e734afc3/xxlarge.jpg?1680904692</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/132/445/efb7edc144b2683a51095303e734afc3/xlarge.jpg?1680904692</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/132/445/efb7edc144b2683a51095303e734afc3/large.jpg?1680904692</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/132/445/efb7edc144b2683a51095303e734afc3/medium.jpg?1680904692</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/132/445/efb7edc144b2683a51095303e734afc3/small.jpg?1680904692</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/132/445/efb7edc144b2683a51095303e734afc3/xsmall.jpg?1680904692</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/132/445/efb7edc144b2683a51095303e734afc3/xxsmall.jpg?1680904692</ThumbnailUrl>
<PawCount>4</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 10 Apr 2023 08:57:38 -0400</PostedAt>
<EditAt>Mon, 10 Apr 2023 08:59:08 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="79553" important="false" status="posted" url="https://beta.my.umbc.edu/groups/doit/posts/79553">
<Title>Cybersecurity Awareness Month</Title>
<Body>
<![CDATA[
    <div class="html-content"><span><p><a href="https://youtu.be/ytLeXK8y9GU" rel="nofollow external" class="bo"><img src="https://lh6.googleusercontent.com/JoE3kvXS9wvYE-j5WhUyELJgSChyb6o_GTaDF93XFJVDwZgSP8EEYnADAVmfqh__nPxn81uMDzVBzPUKaLUKSJ34Cz5z2qGQGNY5ODI7n9vj01dCte9lj4262ENFvBV7rr9j8u8K" width="372" height="252" style="max-width: 100%; height: auto;"></a></p><p><span><span>To The UMBC Community,</span></span></p><p><span>October is Cybersecurity Awareness Month, but in reality, we all need to be vigilant 24/7, 365 days a year. As such, I encourage you to watch this brief (under 2 min) </span><a href="https://youtu.be/ytLeXK8y9GU" rel="nofollow external" class="bo"><span>video public service announcement</span></a><span>.</span></p><p><span>Now, I want to challenge you: how careful are you about phishing emails? Do you know what phishing is? If in doubt, check out our </span><a href="https://doit.umbc.edu/umbc-phishing-and-spam-faqs/" rel="nofollow external" class="bo"><span>FAQs</span></a><span> about this and other IT security issues. Use the rest of this month to educate yourself. </span></p><p><span>If you have questions or want to learn more, visit the </span><a href="http://doit.umbc.edu/security" rel="nofollow external" class="bo"><span>DoIT security website</span></a><span>. You can even forward suspicious emails or IT security concerns to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>.</span></p><p><span>Sincerely,</span></p><p><span><a href="https://doit.umbc.edu/about/vp-cio/" rel="nofollow external" class="bo">Jack Suess</a></span></p><p><span>Vice President and Chief Information Officer</span></p><p><span>UMBC Division of Information Technology (DoIT)</span></p><div><span><br></span></div></span></div>
]]>
</Body>
<Summary>To The UMBC Community,  October is Cybersecurity Awareness Month, but in reality, we all need to be vigilant 24/7, 365 days a year. As such, I encourage you to watch this brief (under 2 min) video...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/79553/guest@my.umbc.edu/a33f5e8bc90aba5d4f9b34e80ba25d26/api/pixel</TrackingUrl>
<Tag>security</Tag>
<Group token="doit">Division of Information Technology (DoIT)</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/doit</GroupUrl>
<AvatarUrl>https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
<AvatarUrl size="original">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/original.JPG?1727453227</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxlarge.png?1727453227</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xlarge.png?1727453227</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/large.png?1727453227</AvatarUrl>
<AvatarUrl size="medium">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/medium.png?1727453227</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/small.png?1727453227</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxsmall.png?1727453227</AvatarUrl>
<Sponsor>Division of Information Technology (DoIT)</Sponsor>
<PawCount>2</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Wed, 17 Oct 2018 15:09:25 -0400</PostedAt>
<EditAt>Wed, 17 Oct 2018 15:19:10 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="76919" important="false" status="posted" url="https://beta.my.umbc.edu/groups/doit/posts/76919">
<Title>How Undergraduate Admissions Migrated to Duo</Title>
<Tagline>Tips for ensuring a smooth migration</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><span><p><span><strong>Andrew Gribben</strong> (pictured at right), Specialist in Undergraduate Admissions and Orientation, recently helped assist his colleagues in switching to Duo two-factor authentication as part of </span><a href="https://doit.umbc.edu/news/?id=76035" rel="nofollow external" class="bo"><span>DoIT’s upcoming two-factor authentication requirement</span></a><span> for faculty and staff with Peoplesoft access above “self-service” functions such as timesheets, etravel requests, etc. </span></p><p><span>Andrew demoed Duo during a staff meeting including having someone sign up in real time. He helped ease the transition to Duo by making himself available to walk staff through the sign-up process, as well as, answer any of their questions. When asked about what helped his group the most, Andrew says he targeted those who were skeptical or concerned before the rollout to the entire group. "This helped ensure a smoother process overall." </span></p><p><span>To help make sure your office’s rollout goes smoothly, Andrew and DoIT recommend the including the following to help your department’s rollout go smoothly:</span></p><ul><li><p><span>Demo Duo live to show not only how it works but how to sign up.</span></p></li><li><p><span>Leverage the </span><a href="https://my.umbc.edu/go/duo" rel="nofollow external" class="bo"><span>Duo FAQ</span></a><span> collection to help users</span></p></li><li><p><span>Send out email reminders encouraging users to sign up.</span></p></li><li><p><span>Be available to offer 1 on 1 support to staff if necessary.</span></p></li></ul><p><span>Once again, DoIT strongly encourages all faculty and staff to enable Duo 2FA now, but all employees with PeopleSoft access will be </span><a href="https://doit.umbc.edu/news/?id=76035" rel="nofollow external" class="bo"><span>required</span></a><span> to do so (staff by 12/31/18, faculty by 9/1/19). After these dates, DoIT will automatically enroll required employees into Duo. DoIT will also provide a “count-down” weekly reminder 90 days before the relevant deadline.</span></p><p><a href="https://wiki.umbc.edu/x/_oAaAw" rel="nofollow external" class="bo"><span>Click here</span></a><span> to learn how to activate Duo today.</span></p><p><a href="https://wiki.umbc.edu/x/GIAaAw" rel="nofollow external" class="bo"><span>Additional information about Duo two-factor authentication</span></a><span> is available in the FAQs.</span></p><p><span>If you have further questions, please contact the </span><a href="http://doit.umbc.edu/tsc" rel="nofollow external" class="bo"><span>Technology Support Center</span></a><span> by either submitting a support request at </span><a href="http://my.umbc.edu/help" rel="nofollow external" class="bo"><span>my.umbc.edu/help</span></a><span> or calling (410) 455-3838.</span></p></span><br></div>
]]>
</Body>
<Summary>Andrew Gribben (pictured at right), Specialist in Undergraduate Admissions and Orientation, recently helped assist his colleagues in switching to Duo two-factor authentication as part of DoIT’s...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/76919/guest@my.umbc.edu/8715586629ab7507812a10c55b3112c7/api/pixel</TrackingUrl>
<Tag>duo</Tag>
<Tag>security</Tag>
<Tag>success</Tag>
<Group token="doit">Division of Information Technology (DoIT)</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/doit</GroupUrl>
<AvatarUrl>https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
<AvatarUrl size="original">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/original.JPG?1727453227</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxlarge.png?1727453227</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xlarge.png?1727453227</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/large.png?1727453227</AvatarUrl>
<AvatarUrl size="medium">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/medium.png?1727453227</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/small.png?1727453227</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxsmall.png?1727453227</AvatarUrl>
<Sponsor>Division of Information Technology (DoIT)</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/076/919/9c735fc149a49f81f9ab1d9d4caeffb6/xxlarge.jpg?1527607580</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/076/919/9c735fc149a49f81f9ab1d9d4caeffb6/xlarge.jpg?1527607580</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/076/919/9c735fc149a49f81f9ab1d9d4caeffb6/large.jpg?1527607580</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/076/919/9c735fc149a49f81f9ab1d9d4caeffb6/medium.jpg?1527607580</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/076/919/9c735fc149a49f81f9ab1d9d4caeffb6/small.jpg?1527607580</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/076/919/9c735fc149a49f81f9ab1d9d4caeffb6/xsmall.jpg?1527607580</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/076/919/9c735fc149a49f81f9ab1d9d4caeffb6/xxsmall.jpg?1527607580</ThumbnailUrl>
<PawCount>5</PawCount>
<CommentCount>3</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 29 May 2018 11:27:36 -0400</PostedAt>
<EditAt>Wed, 30 Jan 2019 09:54:17 -0500</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="76035" important="false" status="posted" url="https://beta.my.umbc.edu/groups/doit/posts/76035">
<Title>Employees with PS Access Required to Use 2 Factor Login</Title>
<Tagline>Staff by 12/31/18, Faculty by 9/30/19</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><span><p><span><strong>UPDATE: To get past the start of Fall 2019, faculty with PS access will be required to upgrade to Duo by 9/30/19.</strong></span></p><p><span>As part of </span><a href="https://doit.umbc.edu/security" rel="nofollow external" class="bo"><span>ongoing efforts</span></a><span> to keep the campus safe online, the Division of Information Technology (DoIT) has partnered with Duo Security for </span><a href="https://wiki.umbc.edu/x/GIAaAw" rel="nofollow external" class="bo"><span>2-factor authentication</span></a><span> (2FA), which DoIT staff have used for several years. Given UMBC employees’ </span><a href="https://doit.umbc.edu/news/?id=61700" rel="nofollow external" class="bo"><span>obligation</span></a><span> to protect sensitive, personally identifiable information, </span><span>all UMBC staff members with access to Peoplesoft (PS) will be required to use Duo by the end of the year 2018. All faculty members with Peoplesoft access will be required to do so by Fall 2019. </span><span>This will apply to any online UMBC service requiring a login, except for current, “self-service” functions such as timesheets, etravel requests, etc. </span></p><p><span>Duo </span><a href="https://wiki.umbc.edu/x/GIAaAw" rel="nofollow external" class="bo"><span>2-factor authentication</span></a><span> (2FA) greatly increases the security of your account by adding an extra layer of protection to the login procedure. With Duo 2FA, your account will require you to have a second-factor device physically unique to you, such as a smartphone, your office phone, or even a tablet in your possession to log in. When you log in, your second-factor device will prompt you to approve your online login. Without approval from your second-factor device, any fraudulent attempts to log into your account are denied, thus preventing anyone who shouldn't have access to your account from getting to your data.</span></p><p><span>However, you don't need to have PS access or even wait until the various deadlines to get started! In fact, DoIT strongly encourages </span><span>all</span><span> faculty and staff to enable Duo 2FA now. Required employees who choose not to enable Duo 2FA by the deadlines above will be automatically enrolled on those dates. DoIT will also provide a “count-down” weekly reminder 90 days before the relevant deadline.</span></p><p><span>Note: DoIT presented this planned rollout at the March 27 </span><span><a href="https://provost.umbc.edu/additional_resources/it-steering-committee/" rel="nofollow external" class="bo">IT Steering Committee</a>,</span><span> March 29 at </span><span><a href="https://doit.umbc.edu/events/?id=58269" rel="nofollow external" class="bo">TechFest</a>,</span><span> at the Faculty Senate Computer Policy Committee (CPC) on April 25, and will do so at Professional Staff Senate (PSS) meeting before the end of the term as well. </span></p><p><a href="https://wiki.umbc.edu/x/_oAaAw" rel="nofollow external" class="bo"><span>Click here</span></a><span> to learn how to activate Duo today.</span></p><p><a href="https://wiki.umbc.edu/x/GIAaAw" rel="nofollow external" class="bo"><span>Additional information about Duo two-factor authentication</span></a><span> is available in the FAQs.</span></p><p><span>If you have further questions, please contact the Technology Support Center by either submitting a support request at </span><a href="http://my.umbc.edu/help" rel="nofollow external" class="bo"><span>my.umbc.edu/help</span></a><span> or calling (410) 455-3838.</span></p></span></div>
]]>
</Body>
<Summary>UPDATE: To get past the start of Fall 2019, faculty with PS access will be required to upgrade to Duo by 9/30/19.  As part of ongoing efforts to keep the campus safe online, the Division of...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/76035/guest@my.umbc.edu/e17365bcf09f23ea60057f85a4453b68/api/pixel</TrackingUrl>
<Tag>bsg</Tag>
<Tag>duo</Tag>
<Tag>security</Tag>
<Group token="doit">Division of Information Technology (DoIT)</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/doit</GroupUrl>
<AvatarUrl>https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
<AvatarUrl size="original">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/original.JPG?1727453227</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxlarge.png?1727453227</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xlarge.png?1727453227</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/large.png?1727453227</AvatarUrl>
<AvatarUrl size="medium">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/medium.png?1727453227</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/small.png?1727453227</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxsmall.png?1727453227</AvatarUrl>
<Sponsor>Division of Information Technology (DoIT)</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/076/035/9ed3e8a69f9a5ac9d0294cab2fae923d/xxlarge.jpg?1524662466</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/076/035/9ed3e8a69f9a5ac9d0294cab2fae923d/xlarge.jpg?1524662466</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/076/035/9ed3e8a69f9a5ac9d0294cab2fae923d/large.jpg?1524662466</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/076/035/9ed3e8a69f9a5ac9d0294cab2fae923d/medium.jpg?1524662466</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/076/035/9ed3e8a69f9a5ac9d0294cab2fae923d/small.jpg?1524662466</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/076/035/9ed3e8a69f9a5ac9d0294cab2fae923d/xsmall.jpg?1524662466</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/076/035/9ed3e8a69f9a5ac9d0294cab2fae923d/xxsmall.jpg?1524662466</ThumbnailUrl>
<PawCount>4</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Wed, 25 Apr 2018 09:22:14 -0400</PostedAt>
<EditAt>Wed, 08 May 2019 22:42:20 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="false" id="73058" important="false" status="posted" url="https://beta.my.umbc.edu/groups/doit/posts/73058">
<Title>Meltdown and Spectre</Title>
<Tagline>DoIT is Monitoring and Addressing Meltdown and Spectre</Tagline>
<Body>
<![CDATA[
    <div class="html-content">As many of you have likely seen in the news, two new vulnerabilities have recently been announced.  The vulnerabilities have been named Spectre and Meltdown.  <br><br>These vulnerabilities are related to weaknesses in the way that most modern computer processors operate, and most computing devices are impacted.  At this point, there are no known incidents where the vulnerability has been exploited, and no known malware, based on the vulnerability,  is known to exist.  DoIT security staff are monitoring local and national security groups to make sure that we address any threats as they develop.<br><br>Given that most computing devices are impacted by these issues, many operating system vendors are developing software updates to address the vulnerabilities.  In order to ensure that the updates themselves do not cause any issues, DoIT will test the updates as they become available.  Once we have verified that the updates are safe, we will work with the community to apply the updates as appropriate.  <br><br>As always, if you have any IT security questions or concerns, please contact the DoIT Security Department at <a href="mailto:security@umbc.edu">security@umbc.edu</a>.<br><br>Mark Cather<br>UMBC Chief Security Officer<br></div>
]]>
</Body>
<Summary>As many of you have likely seen in the news, two new vulnerabilities have recently been announced.  The vulnerabilities have been named Spectre and Meltdown.    These vulnerabilities are related...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/73058/guest@my.umbc.edu/375a61e9a980078bc5fd37640104d778/api/pixel</TrackingUrl>
<Tag>security</Tag>
<Group token="doit">Division of Information Technology (DoIT)</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/doit</GroupUrl>
<AvatarUrl>https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
<AvatarUrl size="original">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/original.JPG?1727453227</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxlarge.png?1727453227</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xlarge.png?1727453227</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/large.png?1727453227</AvatarUrl>
<AvatarUrl size="medium">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/medium.png?1727453227</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/small.png?1727453227</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxsmall.png?1727453227</AvatarUrl>
<Sponsor>Division of Information Technology (DoIT)</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Fri, 05 Jan 2018 23:43:18 -0500</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="61366" important="false" status="posted" url="https://beta.my.umbc.edu/groups/doit/posts/61366">
<Title>Email Survey / Mystery Shopper Scams</Title>
<Tagline>Once you wire the money to the thief, it's gone.</Tagline>
<Body>
<![CDATA[
    <div class="html-content">We have received multiple complaints about people receiving fraudulent job offer emails from con-artists.  In some of the job offers, the con-artist offers to pay $200 for completing testing and survey assignments.  Some of the fraudulent messages offer the job of "Detective/Undercover Mystery Shopper".  <u><strong><br><br>These job offers are a scam.</strong></u><br><br>The way that the scam works is as follows:<br><ul><li>The con-artist will contact you via email and ask you if you are interested in participating in a survey or job assignment.  </li><li>If you reply that you are interested, the con-artist will mail you a check for an amount of money, ask you to deposit the money in your bank account, and immediately wire all but $200 of the money back to them.  </li><li>Once you wire the money out to the con-artist, the con-artist will have your money and you will no longer hear from them. </li><li>A few days later, your bank will tell you that the check has bounced and take the money back. You are then left with the loss of the money that you wired out and no way to reach the con-artist.<br></li></ul><p><u><strong>If you have received one of these messages, do not wire the money to the con-artist.  As soon as you wire the money to the con-artist, the money is gone.  Just stop responding to the con-artist.</strong></u></p><p><u><strong><br>If you are a victim and have sent money to the con-artists, please file a criminal complaint with the FBI Internet Crime Complaint Center.  They can be reached at the following web address:  <a href="https://www.ic3.gov/complaint/default.aspx">https://www.ic3.gov/complaint/default.aspx</a><br></strong></u></p><p><br><u></u></p><p>Mark Cather / UMBC Chief Information Security Officer</p><p><br></p></div>
]]>
</Body>
<Summary>We have received multiple complaints about people receiving fraudulent job offer emails from con-artists.  In some of the job offers, the con-artist offers to pay $200 for completing testing and...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/61366/guest@my.umbc.edu/74f61d9049bb3b1886bfcaf750c555d4/api/pixel</TrackingUrl>
<Tag>security</Tag>
<Group token="doit">Division of Information Technology (DoIT)</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/doit</GroupUrl>
<AvatarUrl>https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
<AvatarUrl size="original">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/original.JPG?1727453227</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxlarge.png?1727453227</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xlarge.png?1727453227</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/large.png?1727453227</AvatarUrl>
<AvatarUrl size="medium">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/medium.png?1727453227</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/small.png?1727453227</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxsmall.png?1727453227</AvatarUrl>
<Sponsor>Division of Information Technology (DoIT)</Sponsor>
<PawCount>3</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Fri, 05 Aug 2016 23:20:23 -0400</PostedAt>
<EditAt>Sat, 06 Aug 2016 23:42:12 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="59957" important="false" status="posted" url="https://beta.my.umbc.edu/groups/doit/posts/59957">
<Title>Why You Should Be Using Eduroam</Title>
<Tagline>Benefits include one time login, security, and availability</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=31199051" rel="nofollow external" class="bo"><span>Eduroam</span></a><span> is a global Wi-Fi network that provides encrypted traffic for any device you use and features a </span><a href="https://wiki.umbc.edu/x/oQIxAg" rel="nofollow external" class="bo"><span>one time setup process</span></a><span> that can be used on any campus that supports eduroam, not just UMBC. You can check out a </span><a href="http://www.youtube.com/watch?v=TVCmcMZS3uA&amp;feature=player_embedded" rel="nofollow external" class="bo"><span>video by the Eduroam community</span></a><span> on an overview of how it works. </span><span> </span><span>Eduroam is supported on </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=31199055" rel="nofollow external" class="bo"><span>Mac OS X</span></a><span>, </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=31199052" rel="nofollow external" class="bo"><span>Windows</span></a><span>, </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=31199057" rel="nofollow external" class="bo"><span>Linux</span></a><span>, </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=30541701" rel="nofollow external" class="bo"><span>iOS</span></a><span>, and </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=61703890" rel="nofollow external" class="bo"><span>Android</span></a><span>.</span></span><div><span><span><br></span></span></div><div><span><span>Here are 3 reasons why you should be using eduroam instead of UMBC Campus:</span></span></div><div><span><span><br></span></span></div><div><span><span>1. </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=30541701" rel="nofollow external" class="bo"><span>Quick and easy</span></a><span>: Damian Doyle, Director of Enterprise Infrastructure and Support, thinks eduroam is great for everyone. When asked about the main advantages, he said “eduroam can remember your login information allowing your device to automatically connect to the wireless network.” Setup for eduroam usually takes less than 5 minutes and once set up, your computer will automatically join to the network when on campus. </span></span></div><div><span><span><br></span></span></div><div><span><span>Remember when setting up to use your entire username, so instead of ‘damian’ in the username field, you would use </span><span><a href="mailto:damian@umbc.edu" rel="nofollow external" class="bo">damian@umbc.edu</a></span></span></div><div><span><br></span></div><div><img src="http://my.umbc.edu/groups/doit/posts/59957/attachments/20530" style="max-width: 100%; height: auto;"></div><div><span><span>Example of logging into Eduroam on Mac OS X. Make sure to include the @umbc.edu part in the username field.</span></span></div><div><br></div><div>2. <a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=31199051" rel="nofollow external" class="bo"><span>Security</span></a><span>: Eduroam provides a higher level of security than conventional, unencrypted wireless. When using eduroam, all traffic between their devices and the wireless access point is encrypted using WPA2 providing another reason everyone should switch to eduroam sooner rather than later.   </span></div><div><span><br></span></div><div><span>3. </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=30542257" rel="nofollow external" class="bo"><span>Availability</span></a><span>: Originally developed in Europe, eduroam also supports people in higher education using wireless networks at other higher education institutions. Eduroam has expanded beyond the 1900 institutions using it in Europe to include over 30 countries such as Australia, Canada, and the United States. So any UMBC student, faculty or staff member traveling abroad can use their UMBC email address and password to access WiFi around the world. In Maryland, UMCP, Loyola, University of Baltimore, and JHU have implemented eduroam and you can use their WiFi when visiting those campus.</span></div><div><span><br></span></div><div><span><span><p><span>Connecting to eduroam is fairly straightforward, but if you require more assistance you can check out </span><span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=36766369" rel="nofollow external" class="bo">DoITs extensive FAQs on eduroam</a>.</span></p><div><br></div></span></span></div><div><span><br></span></div></div>
]]>
</Body>
<Summary>Eduroam is a global Wi-Fi network that provides encrypted traffic for any device you use and features a one time setup process that can be used on any campus that supports eduroam, not just UMBC....</Summary>
<Website>https://wiki.umbc.edu/pages/viewpage.action?pageId=36766369</Website>
<AttachmentKind>Image</AttachmentKind>
<AttachmentUrl>https://assets2-beta.my.umbc.edu/system/shared/attachments/c119c1dc26a9f97f21837b93e8269702/69ee5cbb/news/000/059/957/2a960e2c4cf05b146eadfb3fc72b6665/Mac Eduroam Login .jpeg?1462472766</AttachmentUrl>
<Attachments>
<Attachment kind="Image" url="https://beta.my.umbc.edu/groups/doit/posts/59957/attachments/20530"></Attachment>
</Attachments>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/59957/guest@my.umbc.edu/c81b8f1e343c2188e8dfe4c27f12d98b/api/pixel</TrackingUrl>
<Tag>doit</Tag>
<Tag>eduroam</Tag>
<Tag>security</Tag>
<Tag>wireless</Tag>
<Group token="doit">Division of Information Technology (DoIT)</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/doit</GroupUrl>
<AvatarUrl>https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
<AvatarUrl size="original">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/original.JPG?1727453227</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxlarge.png?1727453227</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xlarge.png?1727453227</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/large.png?1727453227</AvatarUrl>
<AvatarUrl size="medium">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/medium.png?1727453227</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/small.png?1727453227</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxsmall.png?1727453227</AvatarUrl>
<Sponsor>Division of Information Technology (DoIT)</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/059/957/71f2f6270bee686af15cad76ceed6273/xxlarge.jpg?1462472569</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/059/957/71f2f6270bee686af15cad76ceed6273/xlarge.jpg?1462472569</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/059/957/71f2f6270bee686af15cad76ceed6273/large.jpg?1462472569</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/059/957/71f2f6270bee686af15cad76ceed6273/medium.jpg?1462472569</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/059/957/71f2f6270bee686af15cad76ceed6273/small.jpg?1462472569</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/059/957/71f2f6270bee686af15cad76ceed6273/xsmall.jpg?1462472569</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/059/957/71f2f6270bee686af15cad76ceed6273/xxsmall.jpg?1462472569</ThumbnailUrl>
<PawCount>10</PawCount>
<CommentCount>5</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Thu, 05 May 2016 14:29:48 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="59380" important="false" status="posted" url="https://beta.my.umbc.edu/groups/doit/posts/59380">
<Title>Critical Vulnerability in Adobe Flash Affects Most Machines</Title>
<Body>
<![CDATA[
    <div class="html-content">A few days ago a critical vulnerability was announced within Adobe Flash Player that allows a machine to become infected with ransomware through a web browser. Ransomware is a type of malicious software that will encrypt files on your system and then require payment in return for giving you access back to these files. If you ever infected with this type of software you should submit a ticket through <a href="http://my.umbc.edu/help" rel="nofollow external" class="bo">myUMBC Help</a> or contact the <a href="http://doit.umbc.edu/tsc" rel="nofollow external" class="bo">Technology Support Center</a> (TSC) at x5-3838 immediately. <div><br></div><div>In response to this DoIT has pushed an update out to all Windows PCs that are in active directory patching the vulnerability. </div><div><br></div><div>We strongly encourage all Apple, Linux and non active directory Windows users to apply the patch Adobe released to protect your machine against this bug. </div><div><br></div><div>For instructions on how to patch your browser, please visit adobe's help page:</div><div><br></div><div><a href="https://helpx.adobe.com/flash-player.html" rel="nofollow external" class="bo">https://helpx.adobe.com/flash-player.html</a></div><div><br></div><div>For more information about the vulnerability please visit the link below:</div><div><br></div><div><a href="http://www.groovypost.com/news/adobe-flash-emergency-flash-player-patch/" rel="nofollow external" class="bo">http://www.groovypost.com/news/adobe-flash-emergency-flash-player-patch/</a></div><div><br></div><div>If you have any questions please feel free to email me directly or contact the TSC at x5-3838 or submit a ticket through <a href="http://my.umbc.edu/help/request" rel="nofollow external" class="bo">http://my.umbc.edu/help/request</a></div><div><br></div><div>Thank You, </div><div><br></div><div>Damian Doyle</div><div>--</div><div>Director of Enterprise Infrastructure</div><div>DoIT - UMBC</div><div><a href="mailto:damian@umbc.edu">damian@umbc.edu</a></div></div>
]]>
</Body>
<Summary>A few days ago a critical vulnerability was announced within Adobe Flash Player that allows a machine to become infected with ransomware through a web browser. Ransomware is a type of malicious...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/59380/guest@my.umbc.edu/b7197d8269285d9f9383d5e31374b98f/api/pixel</TrackingUrl>
<Tag>adobe</Tag>
<Tag>patching</Tag>
<Tag>security</Tag>
<Tag>software</Tag>
<Group token="doit">Division of Information Technology (DoIT)</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/doit</GroupUrl>
<AvatarUrl>https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
<AvatarUrl size="original">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/original.JPG?1727453227</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxlarge.png?1727453227</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xlarge.png?1727453227</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/large.png?1727453227</AvatarUrl>
<AvatarUrl size="medium">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/medium.png?1727453227</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/small.png?1727453227</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxsmall.png?1727453227</AvatarUrl>
<Sponsor>Division of Information Technology (DoIT)</Sponsor>
<PawCount>3</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Thu, 14 Apr 2016 09:29:58 -0400</PostedAt>
<EditAt>Fri, 15 Apr 2016 05:36:56 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="false" id="58761" important="false" status="posted" url="https://beta.my.umbc.edu/groups/doit/posts/58761">
<Title>Phishing:  Don&#8217;t Be Our Weak Link</Title>
<Tagline>Attacks are Becoming More Targeted.  What should people do?</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><span><p><span>Phishing attacks have been a problem for many years.  Typically, hackers have sent messages asking members of our community to click on a link or reply to an email message with a password.  Their goal has always been to trick our community members into giving them access to our accounts and information.  Sometimes, they have pretended to be DoIT and sent messages to ask for your password or to tell you that there is a problem with your UMBC account.  </span></p><p><span>Recently, the hackers have expanded their efforts and sent messages as people around our campus.  They have been looking up the names and titles of UMBC community members on the Internet and then using that person’s name and title to request information.  They try to choose a name or title that the community would trust.  As examples, during recent attempts, they have requested information about how to wire money out of the campus and get people to send checks to outside addresses.  They have also requested that people send them files containing the social security numbers of community members.  In some cases, they have also impersonated UMBC vendors.  In each of these examples, they have tried to make their phishing messages appear to come from a person that the campus would trust.</span></p><p><span>The hackers are motivated by money and resources and will continue to try to get to our accounts, information, and resources.  The only thing that can stop them is the UMBC community working together to block their attempts.  Here are some questions that DoIT frequently receives and the answers.  </span></p><p><span>1. What information can’t I send in email?</span></p><p><span>No one should ever send passwords or confidential information in an email message.</span><span>  </span></p><p><span>C</span><span>onfidential information includes social security numbers, driver’s license numbers, passport numbers, and financial account numbers.  This information is classified as confidential information under the policies of UMBC, the University System of Maryland, and the State of Maryland.  Passwords and confidential information can </span><span>never</span><span> be sent through email.  This includes the body of an email message and as an attachment to a message.  For in depth information about our data classifications and use, please see the following two links:</span></p><p><a href="http://www.umbc.edu/policies/pdfs/X-1.00.07%20Sensitive%20Information.pdf" rel="nofollow external" class="bo"><span>UMBC Policy on the Definition and Classification of Sensitive Information</span></a></p><p><span><a href="https://docs.google.com/document/d/1Yj49OMeHHQEj_gazOumzVPbsjE5hGa6m82RFBSG5H_8/edit" rel="nofollow external" class="bo">UMBC Data Use Guidelines</a></span></p><p><span>2. Will DoIT ever ask for my password?</span></p><p><span>No.  In fact, DoIT doesn’t know (and has no reason to know) your password.  The only person who should ever know your password is you.  If DoIT needs to assist you with your password, we can help you to reset your password, but DoIT still won’t need to know your password.  To help us maintain the privacy of your password, please make sure you have your </span><a href="https://wiki.umbc.edu/x/hIAc" rel="nofollow external" class="bo"><span>account security questions enabled</span></a><span> -- and make sure you know the answers.  Please also ensure that you have an </span><a href="https://wiki.umbc.edu/x/tIAc" rel="nofollow external" class="bo"><span>alternate email address</span></a><span> registered with UMBC.  If DoIT needs to send you a link to reset your password, we will send it to the secondary email address that we have associated with your account.</span></p><p><span>3. What should I do if I receive a suspicious message?  </span></p><p><span>If you think that the message is asking you to do something that seems unusual, look up the phone number of the person the message is from in the UMBC directory, call the person, and ask them if they really sent the message.  Do not call a person back at a phone number that is listed in the suspicious email message.  The phishing message may include the phone number of the hacker.  For example, if you get a message saying that there is a problem with your computer account and you aren’t sure if it’s a real message, please call the DoIT Technology Support Center (410-455-3838) and ask if it’s a real message.  This also applies to any messages that might appear to come from Human Resources, Finance, Financial Aid, or any other department.  If the message seems strange, trust your instincts, look up the correct phone number for the person, and call to verify the message.</span></p><p><span>4.  What should I do with a message that I have determined is a phishing message?</span></p><p><span>F</span><span>orward it to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span> with “</span><a href="https://wiki.umbc.edu/x/woAc" rel="nofollow external" class="bo"><span>full headers</span></a><span>” and as much information as you can.  DoIT will review the messages that you forward, verify that they are phishing messages, and take steps to try and protect the rest of the community.</span></p><p><span>Once you forward any phishing messages to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>, please delete the messages, and very importantly, never click on the links in a phishing message.  Just by clicking on the link in a phishing message, you may download a malicious program onto your computer.  </span></p><p><span>5. Who do I contact if I have additional questions?</span></p><p><span>As a starting point, the following links may provide assistance. </span></p><ul><li><p><span>UMBC “</span><a href="https://wiki.umbc.edu/x/HwMxAg" rel="nofollow external" class="bo"><span>Phishing &amp; Spam</span></a><span>” FAQ Collection</span></p></li><li><p><a href="http://www.apwg.org/resources/overview/" rel="nofollow external" class="bo"><span>Anti-Phishing Work Group</span></a><span> (non-UMBC consortium of institutions fighting phishing)</span></p></li></ul><span>You can also contact the DoIT Technology Support Center at 410-455-3838 or send any security questions and problems to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>.</span></span><div><span><span><br></span></span></div><div><span><span>Mark Cather</span></span></div><div><span><span>UMBC Chief Information Security Officer</span></span></div></div>
]]>
</Body>
<Summary>Phishing attacks have been a problem for many years.  Typically, hackers have sent messages asking members of our community to click on a link or reply to an email message with a password.  Their...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/58761/guest@my.umbc.edu/8784b21688c7f7cf99ee3161bba99a98/api/pixel</TrackingUrl>
<Tag>security</Tag>
<Group token="doit">Division of Information Technology (DoIT)</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/doit</GroupUrl>
<AvatarUrl>https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
<AvatarUrl size="original">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/original.JPG?1727453227</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxlarge.png?1727453227</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xlarge.png?1727453227</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/large.png?1727453227</AvatarUrl>
<AvatarUrl size="medium">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/medium.png?1727453227</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/small.png?1727453227</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxsmall.png?1727453227</AvatarUrl>
<Sponsor>Division of Information Technology (DoIT)</Sponsor>
<PawCount>8</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Wed, 23 Mar 2016 14:56:02 -0400</PostedAt>
<EditAt>Fri, 25 Mar 2016 11:44:22 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="false" id="54016" important="true" status="posted" url="https://beta.my.umbc.edu/groups/doit/posts/54016">
<Title>Review of DoIT Communications</Title>
<Tagline>Notification by DoIT Student Worker Was a Mistake</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><span><p><span>To The UMBC Campus Community,</span></p><p><span>Recently a DoIT student employee contacted members of the campus that they may have a number of files on their computers containing personally identifiable information (PII).  This information may include social security numbers (SSNs), credit card numbers, passport numbers or bank account numbers.  </span></p><p><span>While this was a legitimate email, it was sent out mistakenly by a grad student working in our cyber security group.</span></p><p><span>We apologize for the alarm this has caused and we have used this incident to review how we keep the campus informed of the important work we are doing. We will be sharing our plans with the campus community once we have had this process reviewed by our shared governance committees and the VPs and Deans.</span></p><p><span>If you have continued questions or concerns, or would like to discuss this further, please feel free to reach out to our Chief Information Security Officer, Mark Cather at <a href="mailto:mark.cather@umbc.edu">mark.cather@umbc.edu</a>.</span></p><p><span>Sincerely,</span></p><p><span>Jack Suess</span></p><p><span>VP of IT and Chief Information Officer</span></p><span>UMBC Division of Information Technology</span></span></div>
]]>
</Body>
<Summary>To The UMBC Campus Community,  Recently a DoIT student employee contacted members of the campus that they may have a number of files on their computers containing personally identifiable...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/54016/guest@my.umbc.edu/0ca8e15bda37e3724d6959f386c9e317/api/pixel</TrackingUrl>
<Tag>security</Tag>
<Group token="doit">Division of Information Technology (DoIT)</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/doit</GroupUrl>
<AvatarUrl>https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
<AvatarUrl size="original">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/original.JPG?1727453227</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxlarge.png?1727453227</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xlarge.png?1727453227</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/large.png?1727453227</AvatarUrl>
<AvatarUrl size="medium">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/medium.png?1727453227</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/small.png?1727453227</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxsmall.png?1727453227</AvatarUrl>
<Sponsor>Division of Information Technology (DoIT)</Sponsor>
<PawCount>4</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Thu, 10 Sep 2015 19:18:55 -0400</PostedAt>
<EditAt>Fri, 25 Mar 2016 12:17:01 -0400</EditAt>
</NewsItem>

</News>
