<?xml version="1.0"?>
<News hasArchived="false" page="82" pageCount="242" pageSize="10" timestamp="Thu, 23 Apr 2026 16:13:22 -0400" url="https://beta.my.umbc.edu/groups/doit/posts.xml?page=82">
<NewsItem contentIssues="false" id="112310" important="false" status="posted" url="https://beta.my.umbc.edu/groups/doit/posts/112310">
<Title>Account data breach: Nitro</Title>
<Tagline>Digital Document Service Breached</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>In September 2020, a Portable Document Format(PDF) file and digital document service, Nitro, suffered a data breach. This breach contained data for approximately 78 million customers and was exposed online. The customer information included names, passwords and the titles of documents. No financial information was leaked.</span></p><br><p><span> 1,440 UMBC accounts were victims of this breach. The victims are being notified via their UMBC emails and/or their alternate emails. If you have a Nitro account, please contact them to see if you have been affected by this breach. To see if you were involved in any other breach, visit: </span><a href="https://haveibeenpwned.com/" rel="nofollow external" class="bo"><span>https://haveibeenpwned.com/</span></a><span>.</span></p><br><br><p><span>More about Nitro data breach:</span></p><p><span><a href="https://infosec.berry.edu/2021/01/19/data-breach-notification-nitro-pdf/#:~:text=In%20September%20of%202020%20there%20was%20a%20breach,or%20vikings.berry.edu%20email%20address%20">https://infosec.berry.edu/2021/01/19/data-breach-notification-nitro-pdf/#:~:text=In%20September%20of%202020%20there%20was%20a%20breach,or%20vikings.berry.edu%20email%20address%20</a> included%20in%20the%20 breach.</span></p><br><br><p><span>If you have any questions or concerns, email us at: </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>.</span></p><br><p><span>Information about this breach was provided to us by Have I Been Pwned(HIBP). </span></p><p> </p><p><span>______________________________________________________________________________________________________________________________________</span></p><p><span>Receive any suspicious emails?</span></p><p><span>Forward it to </span><span><a href="mailto:security@umbc.edu">security@umbc.edu</a></span><span> along with the email headers. For instructions, visit: </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><br><p><span>Follow us on myUMBC:</span><a href="https://my3.my.umbc.edu/groups/itsecurity" rel="nofollow external" class="bo"><span>https://my3.my.umbc.edu/groups/itsecurity</span></a><span>.</span></p></div>
]]>
</Body>
<Summary>In September 2020, a Portable Document Format(PDF) file and digital document service, Nitro, suffered a data breach. This breach contained data for approximately 78 million customers and was...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/112310/guest@my.umbc.edu/b015eeb17b697f9414e770c24f4ad2a9/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1776949508</AvatarUrl>
<AvatarUrl size="original">https://assets2-beta.my.umbc.edu/images/avatars/group/7/original.png?1776949508</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1776949508</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1776949508</AvatarUrl>
<AvatarUrl size="large">https://assets4-beta.my.umbc.edu/images/avatars/group/7/large.png?1776949508</AvatarUrl>
<AvatarUrl size="medium">https://assets2-beta.my.umbc.edu/images/avatars/group/7/medium.png?1776949508</AvatarUrl>
<AvatarUrl size="small">https://assets1-beta.my.umbc.edu/images/avatars/group/7/small.png?1776949508</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1776949508</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1776949508</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 14 Sep 2021 16:04:20 -0400</PostedAt>
<EditAt>Tue, 14 Sep 2021 16:05:04 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="false" id="112308" important="false" status="posted" url="https://beta.my.umbc.edu/groups/doit/posts/112308">
<Title>Account data breach: Romwe</Title>
<Tagline>Online Fashion Site Breached</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>In June 2018, an online fashion website, Romwe, suffered a data breach. This breach has data for approximately 20 million customers. The data was sold online. The customer information includes names, email addresses, IP addresses, physical addresses, phone numbers, and passwords. No financial information was leaked.</span></p><br><p><span>229  UMBC accounts were potential victims of this breach. The victims are being notified via their UMBC emails and/or their alternate emails. If you have a Romwe account, please contact them to see if you have been affected by this breach. To see if you were involved in any other breach visit:</span><a href="https://haveibeenpwned.com/" rel="nofollow external" class="bo"><span>https://haveibeenpwned.com/</span></a><span>.</span></p><br><br><p><span>More about Romwe data breach:</span></p><p><span><a href="https://us.romwe.com/datasecurityFAQs-a-1039.html?SASSource=cjunction&amp;affiliateID=100357191_5250933&amp;url_from=cj.com&amp;cjevent=dd0a33c1077f11ec804300290a82b82d">https://us.romwe.com/datasecurityFAQs-a-1039.html?SASSource=cjunction&amp;affiliateID=100357191_5250933&amp;url_from=cj.com&amp;cjevent=dd0a33c1077f11ec804300290a82b82d</a></span></p><br><br><br><p><span>If you have any questions or concerns, email us at:</span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>.</span></p><br><p><span>Information about this breach was provided to us by Have I Been Pwned(HIBP). </span></p><p> </p><p><span>______________________________________________________________________________________________________________________________________</span></p><p><span>Receive any suspicious emails?</span></p><p><span>Forward it to </span><span><a href="mailto:security@umbc.edu">security@umbc.edu</a></span><span> along with the email headers. For instructions, visit: </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><br><p><span>Follow us on myUMBC:</span><a href="https://my3.my.umbc.edu/groups/itsecurity" rel="nofollow external" class="bo"><span>https://my3.my.umbc.edu/groups/itsecurit</span></a><span>y.</span></p></div>
]]>
</Body>
<Summary>In June 2018, an online fashion website, Romwe, suffered a data breach. This breach has data for approximately 20 million customers. The data was sold online. The customer information includes...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/112308/guest@my.umbc.edu/685d281e225088a2a9a529d5cdcfb79b/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1776949508</AvatarUrl>
<AvatarUrl size="original">https://assets2-beta.my.umbc.edu/images/avatars/group/7/original.png?1776949508</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1776949508</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1776949508</AvatarUrl>
<AvatarUrl size="large">https://assets4-beta.my.umbc.edu/images/avatars/group/7/large.png?1776949508</AvatarUrl>
<AvatarUrl size="medium">https://assets2-beta.my.umbc.edu/images/avatars/group/7/medium.png?1776949508</AvatarUrl>
<AvatarUrl size="small">https://assets1-beta.my.umbc.edu/images/avatars/group/7/small.png?1776949508</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1776949508</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1776949508</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 14 Sep 2021 16:00:50 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="112307" important="false" status="posted" url="https://beta.my.umbc.edu/groups/doit/posts/112307">
<Title>Vendor Breaches and Account Compromises</Title>
<Tagline>Password Stopped Working?  This Might Be Why.</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><h3><span>Vendor Breaches and Account Compromises</span></h3><br><p><span>Internet vendors will, at times, suffer data breaches.  Sometimes the service will attempt to contact it’s account holders and other times it won’t.  Often, after some time has passed, the malicious actors who stole the original data or others who have acquired it in the meantime will release it publicly.  UMBC’s Division of Information Technology (DoIT) subscribes to a service called HaveIBeenPwned which looks for such public releases and searches them for email addresses ending in @umbc.edu.</span></p><br><p><span>For example, if you registered for a member’s discount card with Giant Food or signed-up for online banking and entered your email address as </span><a href="mailto:myname@umbc.edu" rel="nofollow external" class="bo"><span>myname@umbc.edu</span></a><span>,  DoIT may receive notification if a publicly released breach included that email address.  This does NOT automatically mean that your UMBC account was compromised.  If you use a different password on your Giant account than you use on your UMBC account, then your UMBC account is still secure.</span></p><br><p><span>If DoIT determines that your UMBC account has been compromised (or if we are unable to determine that it hasn’t), your password will be replaced with a random string of text.  You will also receive email in your Password Reset Email account (</span><span>not</span><span> your primary UMBC account) notifying you of the password change. </span></p><br><p><span>DoIT has no way of knowing what the new randomized password is, but you can recover access to your account by going to the MyUMBC login page and selecting “Forgot your password?” (see image below).  You will then need to answer the security questions you set up for your account.  After answering correctly, a link will be sent to your designated Password Reset Email account.  If you have trouble with this, the Technology Support Center (</span><a href="https://doit.umbc.edu/tsc/" rel="nofollow external" class="bo"><span>https://doit.umbc.edu/tsc/</span></a><span>, 410-455-3838) can assist you.</span></p><br><p><span><span><img src="https://lh4.googleusercontent.com/AwjNsPp6Wp1hTCCQ4VNlBRrzrc8eAz98vDyNJ2ME5mz-raFZcLk39DeQXLuwtSXE_WRoOXCs2-XBVMo_1OBYz_1LTA4ePeS5_dwbskmQxhb7KACOLDE0yDkDlKcOl9tnAAi6E-5S=s0" width="541" height="470" style="max-width: 100%; height: auto;"></span></span></p><br><br></div>
]]>
</Body>
<Summary>Vendor Breaches and Account Compromises   Internet vendors will, at times, suffer data breaches.  Sometimes the service will attempt to contact it’s account holders and other times it won’t. ...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/112307/guest@my.umbc.edu/40987f9cf2e4f4b975569be2b32010ef/api/pixel</TrackingUrl>
<Tag>learn</Tag>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1776949508</AvatarUrl>
<AvatarUrl size="original">https://assets2-beta.my.umbc.edu/images/avatars/group/7/original.png?1776949508</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1776949508</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1776949508</AvatarUrl>
<AvatarUrl size="large">https://assets4-beta.my.umbc.edu/images/avatars/group/7/large.png?1776949508</AvatarUrl>
<AvatarUrl size="medium">https://assets2-beta.my.umbc.edu/images/avatars/group/7/medium.png?1776949508</AvatarUrl>
<AvatarUrl size="small">https://assets1-beta.my.umbc.edu/images/avatars/group/7/small.png?1776949508</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1776949508</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1776949508</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 14 Sep 2021 15:54:43 -0400</PostedAt>
<EditAt>Mon, 01 Nov 2021 16:44:36 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="false" id="112272" important="false" status="posted" url="https://beta.my.umbc.edu/groups/doit/posts/112272">
<Title>Hybrid Workplace Training Series: Docusign</Title>
<Body>
<![CDATA[
    <div class="html-content"><p><span>Working remotely during the
    pandemic required the workforce to constantly adapt work processes and
    procedures and we all learned a great deal in this process. With a gradual
    return to campus and hybrid work we will need to continue to upskill in order
    to evolve as the nature of our work and our workplace evolves. The Hybrid
    Workplace series offers staff training in the available productivity and
    collaboration tools that will help contribute to individual and shared success
    in our new normal.</span></p><p><strong><em>TRAINING VIDEO:</em></strong> <a href="https://umbc.hosted.panopto.com/Panopto/Pages/Viewer.aspx?id=981738c9-52c3-4c34-9df2-ad8300eec1cc" rel="nofollow external" class="bo">Docusign Session  - Hybrid Workplace Training Series</a></p><p></p><p><span><span>Docusign is a tool that allows employees to
    initiate a document to collect relevant data, digitally sign and follow a
    workflow that replaces paper form completion and routing.  There is no
    need to print or scan and it is mobile friendly.</span></span><span><span> </span></span></p>
    
    <p><span><span><strong><em>Course objectives:</em></strong></span></span><span></span></p>
    
    <p><span><span>·<span>        
    </span></span></span><span><span>Docusign uses (Single Use &amp;
    Templates)</span></span><span></span></p>
    
    <p><span><span>·<span>        
    </span></span></span><span><span>Docusign framework (Webform,
    Docusign Dashboard &amp; Email Notifications)</span></span><span></span></p>
    
    <p><span><span>·<span>        
    </span></span></span><span><span>Docusign portal as a dashboard
    (Quick views &amp; filters, docusign status and form review)</span></span><span></span></p>
    
    <p><span><span>·<span>        
    </span></span></span><span><span>Docusign Do’s and Don’ts (Finish
    Later, Decline to sign, Corrections, etc.)</span></span><span></span></p>
    
    <p><span><span>·<span>        
    </span></span></span><span><span>Initiate a DocuSign document</span></span><span></span></p>
    
    <p><span><span>·<span>        
    </span></span></span><span><span>Download a DocuSign document</span></span><span></span></p>
    
    <p><span><span>·<span>        
    </span></span></span><span><span>Advanced Features Overview
    (Overview for a future session)</span></span><span></span></p>
    
    <p>Check out additional sessions from the <strong><span><a href="https://umbc.hosted.panopto.com/Panopto/Pages/Sessions/List.aspx#folderID=%221933dbc5-4cf0-479f-80a1-ad8000ea8412%22" rel="nofollow external" class="bo">Hybrid Workplace Training Series on demand</a> </span></strong></p>
    
    <p><strong><em>Foundations of the Hybrid Workplace. The series includes the
    following sessions:</em></strong></p>
    
    <blockquote><p><span><span>·<span>      </span><span>  </span></span></span>Webex: Messaging and Calling</p><p><span><span>·<span>        
    </span></span></span>Webex Meetings</p><p><span><span>·<span>        
    </span></span></span>Gmail &amp; Calendar</p><p><span><span>·<span>        
    </span></span></span>Google Docs</p><p><span><span>·<span>        
    </span></span></span>Google Sheets </p><p><span><span>·<span>        
    </span></span></span>Google Slides</p></blockquote><p></p>
    
    <p></p>
    
    <p></p>
    
    <p></p>
    
    <p></p>
    
    <p></p>
    
    <p><span><strong><em>Strategic Planning for the Hybrid Workplace. <span>The series includes the following sessions:</span></em></strong></span></p>
    
    <blockquote><p><span><span>·<span>        
    </span></span></span>Webex: Messaging and Calling</p><p><span><span>·<span>        
    </span></span></span>Webex Meetings</p><p><span><span>·<span>        
    </span></span></span>Facilitating Hybrid Meetings</p><p><span><span>·<span>        
    </span></span></span>Leading Hybrid Teams</p><p><span><span>·<span>        
    </span></span></span>Surveys with Google Forms/Qualtrics</p><p><span><span>·<span>        
    </span></span></span>Docusign</p></blockquote><p></p>
    
    <p></p>
    
    <p></p>
    
    <p></p>
    
    <p></p>
    
    <p></p></div>
]]>
</Body>
<Summary>Working remotely during the pandemic required the workforce to constantly adapt work processes and procedures and we all learned a great deal in this process. With a gradual return to campus and...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/112272/guest@my.umbc.edu/50088af0581e8ecf327282ec4b097ae2/api/pixel</TrackingUrl>
<Group token="docusign">DocuSign</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/docusign</GroupUrl>
<AvatarUrl>https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/001/319/63ea969223a3dc6eec7c5f3699d43f31/xsmall.png?1720464532</AvatarUrl>
<AvatarUrl size="original">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/001/319/63ea969223a3dc6eec7c5f3699d43f31/original.png?1720464532</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/001/319/63ea969223a3dc6eec7c5f3699d43f31/xxlarge.png?1720464532</AvatarUrl>
<AvatarUrl size="xlarge">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/319/63ea969223a3dc6eec7c5f3699d43f31/xlarge.png?1720464532</AvatarUrl>
<AvatarUrl size="large">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/001/319/63ea969223a3dc6eec7c5f3699d43f31/large.png?1720464532</AvatarUrl>
<AvatarUrl size="medium">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/319/63ea969223a3dc6eec7c5f3699d43f31/medium.png?1720464532</AvatarUrl>
<AvatarUrl size="small">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/001/319/63ea969223a3dc6eec7c5f3699d43f31/small.png?1720464532</AvatarUrl>
<AvatarUrl size="xsmall">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/001/319/63ea969223a3dc6eec7c5f3699d43f31/xsmall.png?1720464532</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/319/63ea969223a3dc6eec7c5f3699d43f31/xxsmall.png?1720464532</AvatarUrl>
<Sponsor>DocuSign</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Tue, 14 Sep 2021 09:12:45 -0400</PostedAt>
<EditAt>Tue, 14 Sep 2021 09:15:45 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="112267" important="false" status="posted" url="https://beta.my.umbc.edu/groups/doit/posts/112267">
<Title>Phishing Alert: President Freeman A. Hrabowski impersonator</Title>
<Tagline>This Is Not Dr. Hrabowski!</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><br><p><span>Recently, DOIT received an email from a compromised account at North Central Kansas Technical College(NCKTC) impersonating Dr Hrabowski. The email consisted of a Microsoft word document titled “EVALUATION FORM.” Below is a copy of the email. We removed the name of the NCKTC user and the To field for privacy reasons.</span></p><br><br><br><div><table><colgroup></colgroup><tbody><tr><td><p><span>From: NCKTC member’s name &lt;<a href="mailto:userID@ncktc.edu">userID@ncktc.edu</a>&gt;</span></p><p><span>Date: Wed, Aug 25, 2021 at 12:00 PM</span></p><p><span>Subject: NCKTC member name shared "EVALUATION FORM" with you.</span></p><p><span>To: </span></p><br><p><span><span><img src="https://lh4.googleusercontent.com/gxKZJLBmXeNRA9AxGaSwu6ljZsXoDQNyRrskyNQIhO2Adn3LWj1rIlV4PvOYeT7x3gBA-DpPdvlDW07g_FBkngsXazBSngRtRvemm2uljcjprzUEu35-91T0UTrFUFI6JOUOPgi6=s0" width="610" height="312" style="max-width: 100%; height: auto;"></span></span></p></td></tr></tbody></table></div><br><p><span>The link for the email will take you to the EVALUATION FORM document. See below to look inside the Word docs. </span></p><br><div><table><colgroup></colgroup><tbody><tr><td><p><span><span><img src="https://lh5.googleusercontent.com/lmVx6LKFKxRlJR31r9FoBsS3P2KEhG4UeZajeNjeO85w6g_Oo987-1nIkcWd3M5rgKVZ_hqTVaYTMy4CZsjYJzwHcsZKE6snjkPQGO6vhj-oIhUdyHRz5eJVyOMZ-S6umLU3gQsz=s0" width="610" height="309" style="max-width: 100%; height: auto;"></span></span></p></td></tr></tbody></table></div><br><p><span>This link will ask you to sign in to your Microsoft account to view a file/form that the compromised account shared on One Drive. </span><span>DO NOT CLICK ON ANY OF THE LINKS IN THE EMAIL OR THE DOCS. </span><span>However, if you have done so already, please contact us immediately at</span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>. </span></p><br><p><span>A lot of phishing emails contain a link that asks the recipients to sign into their accounts. Whenever you receive such emails, always try and verify with the senders on an entirely different email if you know them. Feel free to always send the message to us to validate the email.</span></p><br><p><span>For more information about phishing, visit:</span><span><a href="https://itsecurity.umbc.edu/critical/?id=98136">https://itsecurity.umbc.edu/critical/?id=98136</a>.</span></p><br><p><span>If you have received any message similar to the one listed above, please forward it with its headers to</span><a href="mailto:Security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>. For instructions, visit: </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><br><p><span>______________________________________________________________________________________________________________________________________</span></p><p><span>Receive any suspicious emails?</span></p><p><span>Forward it to </span><span><a href="mailto:security@umbc.edu">security@umbc.edu</a></span><span> along with the email headers. For instructions, visit: </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><br><p><span>Follow us on myUMBC:</span><a href="https://my3.my.umbc.edu/groups/itsecurity" rel="nofollow external" class="bo"><span>https://my3.my.umbc.edu/groups/itsecurity</span></a><span>.</span></p><br><br><br><br><br><br><br><br></div>
]]>
</Body>
<Summary>Recently, DOIT received an email from a compromised account at North Central Kansas Technical College(NCKTC) impersonating Dr Hrabowski. The email consisted of a Microsoft word document titled...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/112267/guest@my.umbc.edu/5d2ed9704c24bfcbe9a7381192490342/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1776949508</AvatarUrl>
<AvatarUrl size="original">https://assets2-beta.my.umbc.edu/images/avatars/group/7/original.png?1776949508</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1776949508</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1776949508</AvatarUrl>
<AvatarUrl size="large">https://assets4-beta.my.umbc.edu/images/avatars/group/7/large.png?1776949508</AvatarUrl>
<AvatarUrl size="medium">https://assets2-beta.my.umbc.edu/images/avatars/group/7/medium.png?1776949508</AvatarUrl>
<AvatarUrl size="small">https://assets1-beta.my.umbc.edu/images/avatars/group/7/small.png?1776949508</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1776949508</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1776949508</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 13 Sep 2021 18:28:49 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="112255" important="false" status="posted" url="https://beta.my.umbc.edu/groups/doit/posts/112255">
<Title>Email marketing and the User-Agent-String</Title>
<Tagline>When What Looks Like Phishing Is Just Spam</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>Recently, DOIT received multiple reports of suspicious messages about student loans from email addresses with the format &lt;emails@alert###.info&gt;. The recipients of these messages marked them as phishing, but on careful investigation, we realised that these were legitimate. We therefore classified these messages as spam instead of phishing. </span></p><br><p><span>According to Phishing.org, “[</span><span>p]hishing is a cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.</span><span>” A third party company, CollegeLoans, sent these messages on behalf of these loan companies. Therefore, they are not malicious or criminal; instead, they are commercial. </span></p><br><p><span>Nonetheless, you might not have subscribed to receive these messages; hence they are spam. According to Cisco.com, “[</span><span>s]pam is unsolicited and unwanted junk email sent out in bulk to an indiscriminate recipient list. Typically, ...sent for commercial purposes.”</span><span> These emails are advertisements. They target university students since people in this demographic may need help covering tuition costs. </span></p><br><p><span>As mentioned earlier, these loan messages or advertisements originated from the third party company, </span><span>CollegeLoan. This company is located in Puerto Rico. When you click on the link in the email, they will earn a commission whether or not you apply for the loans.</span><span> It is business. It’s email marketing. </span></p><br><p><span>CollegeLoans sends out links on behalf of the following companies:</span></p><ul><li><p><span>Sallie Mae Smart Student Loan</span></p></li><li><p><span>Discover Undergraduate Loan</span></p></li><li><p><span>Credible Student Loan</span></p></li><li><p><span>Earnest Student Loan</span></p></li><li><p><span>College Ave Student Loan</span></p></li><li><p><span>CommonBond Student Loan</span></p></li></ul><br><p><span>We were also suspicious because clicking the link might take the reader to Amazon.com rather than the advertised site.  Among the information webservers can collect when you click is something called a User-Agent-String.  This string helps the website determine the version of the browser you are using in order to avoid trying to perform advanced functions on old browsers.   Bad actors may use this feature to hide from browsers commonly used to analyze malicious sites. However, we determined that the link is not malicious. </span></p><br><p><span>We are not sure of the reason that CollegeLoans chose to use browser detection. However, it is not uncommon for developers/companies to add this feature to their code/applications. According to  MDN web Docs, using a browser detection would depend on one of the following:</span></p><ul><li><p><span>If you are trying to work around a specific bug in some version of a browser.</span></p></li><li><p><span>If you are trying to check for the existence of a particular feature.</span></p></li><li><p><span>If you want to provide different HTML depending on which browser.</span></p></li></ul><div>When you receive messages like this<span>, plese mark them as spam or phishing and continue to report them to us at: </span><span><a href="mailto:security@umbc.edu">security@umbc.edu</a>.</span></div><div><span><br></span></div><p><span>Source:</span></p><br><p><a href="https://www.phishing.org/what-is-phishing" rel="nofollow external" class="bo"><span>https://www.phishing.org/what-is-phishing</span></a></p><br><p><a href="https://www.cisco.com/c/en/us/products/security/email-security/what-is-spam.html#:~:text=Spam%20email%20is%20unsolicited%20and,botnets%2C%20networks%20of%20infected%20computers" rel="nofollow external" class="bo"><span>https://www.cisco.com/c/en/us/products/security/email-security/what-is-spam.html#:~:text=Spam%20email%20is%20unsolicited%20and,botnets%2C%20networks%20of%20infected%20computers</span></a><span>.</span></p><br><p><span>To read more about user agents, visit </span><a href="https://towardsdatascience.com/the-user-agent-that-crazy-string-underpinning-a-bunch-of-analytics-86507ef632f0" rel="nofollow external" class="bo"><span>https://towardsdatascience.com/the-user-agent-that-crazy-string-underpinning-a-bunch-of-analytics-86507ef632f0</span></a><span>.</span></p><br><p><span><a href="https://developer.mozilla.org/en-US/docs/Web/HTTP/Browser_detection_using_the_user_agent">https://developer.mozilla.org/en-US/docs/Web/HTTP/Browser_detection_using_the_user_agent</a></span></p><br><p><span>______________________________________________________________________________________________________________________________________</span></p><p><span>Receive any suspicious emails?</span></p><p><span>Forward it to </span><span><a href="mailto:security@umbc.edu">security@umbc.edu</a></span><span> along with the email headers. Instructions for doing so can be found at the UMBC support wiki: </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><br><p><span>Follow us on myUMBC:</span><a href="https://my3.my.umbc.edu/groups/itsecurity" rel="nofollow external" class="bo"><span>https://my3.my.umbc.edu/groups/itsecurity</span></a><span>.</span></p></div>
]]>
</Body>
<Summary>Recently, DOIT received multiple reports of suspicious messages about student loans from email addresses with the format &lt;emails@alert###.info&gt;. The recipients of these messages marked them...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/112255/guest@my.umbc.edu/96ad3039ef3fff9a72053358bbb5565d/api/pixel</TrackingUrl>
<Tag>notice</Tag>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1776949508</AvatarUrl>
<AvatarUrl size="original">https://assets2-beta.my.umbc.edu/images/avatars/group/7/original.png?1776949508</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1776949508</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1776949508</AvatarUrl>
<AvatarUrl size="large">https://assets4-beta.my.umbc.edu/images/avatars/group/7/large.png?1776949508</AvatarUrl>
<AvatarUrl size="medium">https://assets2-beta.my.umbc.edu/images/avatars/group/7/medium.png?1776949508</AvatarUrl>
<AvatarUrl size="small">https://assets1-beta.my.umbc.edu/images/avatars/group/7/small.png?1776949508</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1776949508</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1776949508</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 13 Sep 2021 14:45:05 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="111913" important="false" status="posted" url="https://beta.my.umbc.edu/groups/doit/posts/111913">
<Title>Synchronize Bb groups in Collab breakout groups coming soon!</Title>
<Tagline>Maintain student learning between course &amp; live sessions</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><div><div>Breakout groups are a powerful engagement tool for active learning in a synchronous session, providing private audio, video, whiteboard, application sharing, and chat for small group collaboration. Instructors can <a href="https://wiki.umbc.edu/x/OIoMBQ" rel="nofollow external" class="bo">distribute files</a> with breakout groups, and <a href="https://wiki.umbc.edu/x/PooMBQ" rel="nofollow external" class="bo">pull those files</a> back into the main room for sharing with the entire class. </div><div><br></div><div>In Collaborate, breakout groups were <a href="https://wiki.umbc.edu/x/VwUPAg" rel="nofollow external" class="bo">typically created</a> with random student placements to the groups or manual placements by the instructor with an optional setting to allow students to switch groups. <span>With this new integration, however, in</span><span>structors will be able to use their existing groups in their Blackboard courses to quickly create and launch breakout groups in Collaborate. As needed, instructors can </span><span>adjust groups while maintaining the original placements.</span></div></div><div><span><br></span></div><div><span><img src="https://blackboard.umbc.edu/bbcswebdav/institution/doitnews/ultra-updates/collab-learn-groups-02.png" alt="Synchronize your Bb groups with Collaborate breakout groups" width="500" style="max-width: 100%; height: auto;"></span></div><div><span><br></span></div><div><div><span>The Collaborate and Blackboard Learn groups integration applies to <em>both</em> Original and Ultra courses, but will require the use of group sets rather than individually created groups in the course.</span></div><div><ul><li><span><a href="https://wiki.umbc.edu/x/roFcAg" rel="nofollow external" class="bo">Original course experience group sets</a> </span></li><li><span><a href="https://wiki.umbc.edu/display/faq/Managing+Groups+in+Ultra" rel="nofollow external" class="bo">Ultra course experience course level groups</a></span></li></ul></div><div><span>The Collaborate and Blackboard Learn groups integration<a href="https://help.blackboard.com/Collaborate/Ultra/Administrator/Release_Notes" rel="nofollow external" class="bo"> is scheduled</a> for gradual release in mid-September. As soon we have additional information, we will update the FAQs with how-to documentation and related resources. UPDATE: <a href="https://wiki.umbc.edu/x/T4SxBw" rel="nofollow external" class="bo">New FAQ is available</a>.</span></div></div><div><span><br></span></div><div><span>Additionally, with this release, Collaborate will proactively inform users about outdated browser use and encourage them to upgrade to a supported browser. Users will still be allowed to join a session, but the experience may not be the same. </span></div><div><span><br></span></div><div><span>As always, if you have any questions about teaching, learning, and technology at UMBC, please consider the following options:</span></div><div><ul><li><span><a href="http://pivot.umbc.edu" rel="nofollow external" class="bo">PIVOT</a> | <a href="https://doit.umbc.edu/itnm/academic-continuity/" rel="nofollow external" class="bo">Academic Continuity</a></span><span> </span><span>|</span><span> </span><span><a href="https://fdc.umbc.edu/teaching/keep-on-teaching/" rel="nofollow external" class="bo">Keep On Teaching</a></span><span> </span><span>|</span><span> </span><span><a href="https://doit.umbc.edu/students" rel="nofollow external" class="bo">Student Technology Resources</a></span></li><li><a href="http://www.umbc.edu/faq" rel="nofollow external" class="bo">Check our extensive FAQ collection</a><span> </span></li><ul><li><span><a href="https://wiki.umbc.edu/x/LohnB" rel="nofollow external" class="bo"><span>What’s new in Ultra?</span></a><span> </span><span>|</span><span> </span><a href="https://wiki.umbc.edu/x/bwrSAQ" rel="nofollow external" class="bo"><span>Known Issues</span></a><span> </span></span></li></ul><li><span><a href="http://my.umbc.edu/go/request-help" rel="nofollow external" class="bo">Open a ticket via RT</a></span></li><li><span>Follow the </span><a href="http://my.umbc.edu/groups/instructional-technology" rel="nofollow external" class="bo">Instructional Technology</a><span> &amp; </span><a href="http://my.umbc.edu/groups/doit" rel="nofollow external" class="bo">DoIT</a><span> myUMBC groups</span></li><li><a href="http://doit.umbc.edu/itnm/staff/" rel="nofollow external" class="bo">Request a consult</a><span> with instructional technology staff</span></li></ul></div></div>
]]>
</Body>
<Summary>Breakout groups are a powerful engagement tool for active learning in a synchronous session, providing private audio, video, whiteboard, application sharing, and chat for small group...</Summary>
<Website>https://my3.my.umbc.edu/groups/instructional-technology/posts/111913</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/111913/guest@my.umbc.edu/b2f1689c1c04219624acc0f3a3bb8064/api/pixel</TrackingUrl>
<Tag>active-learning</Tag>
<Tag>breakout-groups</Tag>
<Tag>collaborate</Tag>
<Tag>fa2021</Tag>
<Tag>online-learning</Tag>
<Tag>ultra-update</Tag>
<Group token="instructional-technology">Instructional Technology</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/instructional-technology</GroupUrl>
<AvatarUrl>https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/xsmall.png?1446126703</AvatarUrl>
<AvatarUrl size="original">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/original.png?1446126703</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/xxlarge.png?1446126703</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/xlarge.png?1446126703</AvatarUrl>
<AvatarUrl size="large">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/large.png?1446126703</AvatarUrl>
<AvatarUrl size="medium">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/medium.png?1446126703</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/small.png?1446126703</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/xsmall.png?1446126703</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/xxsmall.png?1446126703</AvatarUrl>
<Sponsor>Instructional Technology</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/111/913/13771dc0bfbc18b7486895087f95d15f/xxlarge.jpg?1630501227</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/111/913/13771dc0bfbc18b7486895087f95d15f/xlarge.jpg?1630501227</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/111/913/13771dc0bfbc18b7486895087f95d15f/large.jpg?1630501227</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/111/913/13771dc0bfbc18b7486895087f95d15f/medium.jpg?1630501227</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/111/913/13771dc0bfbc18b7486895087f95d15f/small.jpg?1630501227</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/111/913/13771dc0bfbc18b7486895087f95d15f/xsmall.jpg?1630501227</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/111/913/13771dc0bfbc18b7486895087f95d15f/xxsmall.jpg?1630501227</ThumbnailUrl>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 07 Sep 2021 11:59:08 -0400</PostedAt>
<EditAt>Mon, 13 Sep 2021 10:54:43 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="111939" important="false" status="posted" url="https://beta.my.umbc.edu/groups/doit/posts/111939">
<Title>Free Training for Respondus Lockdown Browser &amp; Monitor</Title>
<Tagline>Join an upcoming webinar to see the latest features</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><div><span>Join an upcoming training webinar from Respondus to see the latest features and integrations for LockDown Browser and Monitor. Learn how these applications are used with a range of online testing environments, virtual proctoring and Blackboard. </span></div><div><br></div><div><div><strong>Instructor Training: LockDown Browser &amp; Respondus Monitor</strong></div><div>This comprehensive 45-minute training is intended for instructors who plan to use LockDown Browser and/or Respondus Monitor to protect academic integrity and ensure student identity during online testing. <span>The training will cover:</span></div><div><div><ul><li><span>How to use LockDown Browser to prevent digital cheating in proctored testing environments</span></li><li><span>How to use Respondus Monitor in non-proctored environments, to protect exam integrity and confirm student identity</span></li><li><span>The student perspective using each application</span></li><li><span>Efficient review of the assessment data collected, including the Review Priority system, timeline, and milestone features</span></li><li><span>Best practices and tips for success with both applications</span></li></ul></div><div><span>Pick your date/time and register directly with Respondus:</span></div></div><div><ul><li><a href="https://attendee.gotowebinar.com/register/5857805844266046988" rel="nofollow external" class="bo">Tuesday, September 7 at 12 pm ET / 9 am PT</a></li><li><a href="https://attendee.gotowebinar.com/register/3468666033173772557" rel="nofollow external" class="bo">Wednesday, September 8 at 2 pm ET / 11 am PT</a></li><li><a href="https://attendee.gotowebinar.com/register/3816231554236914956" rel="nofollow external" class="bo">Thursday, September 9 at 1 pm ET / 10 am PT</a></li><li><a href="https://attendee.gotowebinar.com/register/7974814328563486475" rel="nofollow external" class="bo">Tuesday, September 14 at 2 pm ET / 11 am PT</a></li><li><a href="https://attendee.gotowebinar.com/register/3294920106307040267" rel="nofollow external" class="bo">Wednesday, September 15 at 10 pm ET / 7 pm PT</a></li><li><a href="https://attendee.gotowebinar.com/register/5643306518934560011" rel="nofollow external" class="bo">Wednesday, September 22 at 3 pm ET / 12 pm PT</a></li><li><a href="https://attendee.gotowebinar.com/register/6973113056171564299" rel="nofollow external" class="bo">Thursday, September 23 at 1 pm ET / 10 am PT</a></li><li><a href="https://attendee.gotowebinar.com/register/3253879735289106187" rel="nofollow external" class="bo">Tuesday, September 28 at 12 pm ET / 9 am PT</a></li><li><a href="https://attendee.gotowebinar.com/register/4476070472473782028" rel="nofollow external" class="bo">Wednesday, September 29 at 3 pm ET / 12 pm PT</a></li></ul></div><div>All attendees will receive a link to a recording after the session.</div></div><div><span><br></span></div><div><span><strong>About Respondus Lockdown Browser</strong></span></div><div><span><br></span></div><div><span>RLDB is a custom browser that locks down the testing environment within Blackboard. Students are unable to copy, print, access other applications, or visit other websites during an online exam. </span>For additional information, please review <a href="https://wiki.umbc.edu/x/0AI9BQ" rel="nofollow external" class="bo">our FAQ collection</a>.</div><div><br></div><div>NOTE: Students should not register for any instructor training session but instead, contact use the Respondus support tools embedded in RLDB, or <a href="https://wiki.umbc.edu/x/BQb9Aw" rel="nofollow external" class="bo">review this FAQ</a> for further help.</div><div><br></div></div>
]]>
</Body>
<Summary>Join an upcoming training webinar from Respondus to see the latest features and integrations for LockDown Browser and Monitor. Learn how these applications are used with a range of online testing...</Summary>
<Website>https://my3.my.umbc.edu/groups/instructional-technology/posts/111939</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/111939/guest@my.umbc.edu/c1e119d883cebce043b350ec39ac600e/api/pixel</TrackingUrl>
<Tag>respondus-lockdown-browser</Tag>
<Tag>respondus-monitor</Tag>
<Tag>rldb</Tag>
<Tag>training</Tag>
<Tag>webinar</Tag>
<Group token="instructional-technology">Instructional Technology</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/instructional-technology</GroupUrl>
<AvatarUrl>https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/xsmall.png?1446126703</AvatarUrl>
<AvatarUrl size="original">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/original.png?1446126703</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/xxlarge.png?1446126703</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/xlarge.png?1446126703</AvatarUrl>
<AvatarUrl size="large">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/large.png?1446126703</AvatarUrl>
<AvatarUrl size="medium">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/medium.png?1446126703</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/small.png?1446126703</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/xsmall.png?1446126703</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/164/dec3b026b81ee6d890a8f82f75c94a2e/xxsmall.png?1446126703</AvatarUrl>
<Sponsor>Instructional Technology</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/111/939/3eaec6d8dd6be57d0d27fa0ef7b2a483/xxlarge.jpg?1630519917</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/111/939/3eaec6d8dd6be57d0d27fa0ef7b2a483/xlarge.jpg?1630519917</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/111/939/3eaec6d8dd6be57d0d27fa0ef7b2a483/large.jpg?1630519917</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/111/939/3eaec6d8dd6be57d0d27fa0ef7b2a483/medium.jpg?1630519917</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/111/939/3eaec6d8dd6be57d0d27fa0ef7b2a483/small.jpg?1630519917</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/111/939/3eaec6d8dd6be57d0d27fa0ef7b2a483/xsmall.jpg?1630519917</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/111/939/3eaec6d8dd6be57d0d27fa0ef7b2a483/xxsmall.jpg?1630519917</ThumbnailUrl>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Wed, 01 Sep 2021 14:19:47 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="111785" important="false" status="posted" url="https://beta.my.umbc.edu/groups/doit/posts/111785">
<Title>SCAM: University of Maryland Personnel Retirement Support</Title>
<Tagline>Retirement Phishing Scam</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p><span>During the past week, the Division of Technology(DOIT) has received phishing reports of scammers impersonating state-licensed retirement support representatives. Below is an example of such a message. The reporter’s name and email have been removed to protect their privacy.</span></p><br><div><table><colgroup></colgroup><tbody><tr><td><br><p><span>From: </span><span>Jennifer Flynn</span><span> &lt;<a href="mailto:support@publicemployeeretirement.com">support@publicemployeeretirement.com</a>&gt;</span></p><p><span>Date: Tue, Jun 22, 2021 at 2:07 PM</span></p><p><span>Subject: University of Maryland Personnel Retirement Support</span></p><p><span>To: &lt;YOUR UMBC EMAIL&gt;</span></p><br><br><p><span>Employee &lt;YOUR FIRSTNAME&gt;,</span></p><p> </p><p><span>All University of Maryland employees are eligible to schedule an annual phone call or video conference with a licensed representative to answer your retirement benefit questions.</span></p><p><span> </span></p><p><span>During your initial consultation, you will be providing your basic financial and retirement data to the representative so they can begin to calculate your potential retirement income.  They are then able to provide examples regarding how much longer you may need to work to reach your retirement income goals, your best ways to utilize your 401(a)/403(b), and how your social security benefits may be affected.</span></p><p><span> </span></p><p><span>Please don't forget to indicate in the notes section which type of appointment you prefer (phone call or video conference).  Also, be sure to leave the best phone number you can be reached at during that time.</span></p><p><span> </span></p><p><span>These representatives work with all MD State/University employees so appointments fill up quickly.  Be sure to click the link below to schedule your consultation.</span></p><p> </p><p> </p><p><a href="https://campus.publicemployeeretirement.com/pera" rel="nofollow external" class="bo"><span>https://campus.publicemployeeretirement.com/pera</span></a></p><p> </p><p> </p><p><span>Disclosure - Licensed representatives are not employees of the college, state, or direct representatives of your specific plan, however, they are independently licensed fiduciaries with the state.</span></p><p> </p><p> </p><p> </p><p><span>To opt-out of future mailings, click on the following link:</span></p><p><a href="http://email.replies.publicemployeeretirement.com/u/eJwNzDsSgyAQANDTSMnsbvgWFBqTewRYJ0wkOkQKbx-r170cCLz2olwSgiFCBxZAolTOTjPgPN71c5pvj0FB430t_JN7j2tJXPd1O5kbH6Vx5e8h01bFO7AxyXGkBZ19YURrF1bakTcKjU9ZtFA_pXI7r7PXmCTnLo4w0PgHmdsrEw" rel="nofollow external" class="bo"><span>unsubscribe</span></a></p><p> </p><br></td></tr></tbody></table></div><p> </p><p> </p><p><span>This message is not legitimate. If you have received this email, </span><span>DO NOT CLICK THE LINK IN THE EMAIL. </span><span>The link takes you to the website below. </span><span>DO NOT FILL OUT THIS FORM.</span></p><p><span><span><img src="https://lh3.googleusercontent.com/U__oUVQWO5sjOOHWWf6qFOUw4ZUD4CCvQTg8ivNySwxagStzwixcPIfJhE-45DHk4oF9Igv7PFMG999Urf9_7YOF9A835SvW67a4QH6-lbNm4ZLaJ3sZRqkMrHw6YhR5ixXg49Gr=s0" width="624" height="385" style="max-width: 100%; height: auto;"></span></span></p><p><span>If you have filled out this form, </span><span>DO NOT JOIN THE APPOINTMENT</span><span>.</span><span>If you have joined the video conference or phone call and provided your financial information to the actors, immediately notify your bank. View our article on Identity Theft to help protect your identity: </span><span><a href="https://itsecurity.umbc.edu/critical/?id=102139">https://itsecurity.umbc.edu/critical/?id=102139</a></span></p><br><p><span>Forward this email with its headers immediately to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>. </span><span>Instructions on how to find the email headers can be found below.</span></p><br><p><span>The HR Department advises that all valid retirement-related emails are sent from their approved </span><a href="https://hr.umbc.edu/benefits/retirement-information/" rel="nofollow external" class="bo"><span>retirement vendors</span></a></p><p><span>______________________________________________________________________________________________________________________________________</span></p><p><span>Receive any suspicious emails?</span></p><p><span>Forward it to </span><span><a href="mailto:security@umbc.edu">security@umbc.edu</a></span><span> along with the email headers. Instructions for doing so can be found at the UMBC support wiki: </span><a href="https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970" rel="nofollow external" class="bo"><span>https://wiki.umbc.edu/pages/viewpage.action?pageId=1867970</span></a><span>.</span></p><br><p><span>Follow us on myUMBC:</span><a href="https://my3.my.umbc.edu/groups/itsecurity" rel="nofollow external" class="bo"><span>https://my3.my.umbc.edu/groups/itsecurity</span></a></p><br><br></div>
]]>
</Body>
<Summary>During the past week, the Division of Technology(DOIT) has received phishing reports of scammers impersonating state-licensed retirement support representatives. Below is an example of such a...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/111785/guest@my.umbc.edu/3ad213f6b8e2a6163ced429e7afab217/api/pixel</TrackingUrl>
<Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/itsecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1776949508</AvatarUrl>
<AvatarUrl size="original">https://assets2-beta.my.umbc.edu/images/avatars/group/7/original.png?1776949508</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/images/avatars/group/7/xxlarge.png?1776949508</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/images/avatars/group/7/xlarge.png?1776949508</AvatarUrl>
<AvatarUrl size="large">https://assets4-beta.my.umbc.edu/images/avatars/group/7/large.png?1776949508</AvatarUrl>
<AvatarUrl size="medium">https://assets2-beta.my.umbc.edu/images/avatars/group/7/medium.png?1776949508</AvatarUrl>
<AvatarUrl size="small">https://assets1-beta.my.umbc.edu/images/avatars/group/7/small.png?1776949508</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/images/avatars/group/7/xsmall.png?1776949508</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets2-beta.my.umbc.edu/images/avatars/group/7/xxsmall.png?1776949508</AvatarUrl>
<Sponsor>IT Security - DoIT</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Wed, 25 Aug 2021 18:15:13 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="111763" important="true" status="posted" url="https://beta.my.umbc.edu/groups/doit/posts/111763">
<Title>taki downtime completed</Title>
<Body>
<![CDATA[
    <div class="html-content"><div>To all taki users,</div><div><br></div><div>Our work bringing the taki cluster environment up-to-date has concluded. Please begin normal use of the cluster environment.</div><div><br></div><div>Please let us know if you have any questions or concerns by submitting a descriptive help request form found at the following link.</div><div><br></div><div><a href="https://doit.umbc.edu/request-tracker-rt/doit-research-computing/">https://doit.umbc.edu/request-tracker-rt/doit-research-computing/</a></div><div><br></div><div>Roy Prouty</div><div>HPC System Administrator</div></div>
]]>
</Body>
<Summary>To all taki users,     Our work bringing the taki cluster environment up-to-date has concluded. Please begin normal use of the cluster environment.     Please let us know if you have any questions...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/111763/guest@my.umbc.edu/0a5cb6583a1a2898f7828aa106495c87/api/pixel</TrackingUrl>
<Group token="hpcf">HPCF</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/hpcf</GroupUrl>
<AvatarUrl>https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/659/63ae3e64663572042ecdd0ef493c16e1/xsmall.png?1596736674</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/659/63ae3e64663572042ecdd0ef493c16e1/original.png?1596736674</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/001/659/63ae3e64663572042ecdd0ef493c16e1/xxlarge.png?1596736674</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/659/63ae3e64663572042ecdd0ef493c16e1/xlarge.png?1596736674</AvatarUrl>
<AvatarUrl size="large">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/001/659/63ae3e64663572042ecdd0ef493c16e1/large.png?1596736674</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/659/63ae3e64663572042ecdd0ef493c16e1/medium.png?1596736674</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/659/63ae3e64663572042ecdd0ef493c16e1/small.png?1596736674</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/659/63ae3e64663572042ecdd0ef493c16e1/xsmall.png?1596736674</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/001/659/63ae3e64663572042ecdd0ef493c16e1/xxsmall.png?1596736674</AvatarUrl>
<Sponsor>HPCF</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Tue, 24 Aug 2021 20:43:00 -0400</PostedAt>
</NewsItem>

</News>
