<?xml version="1.0"?>
<News hasArchived="false" page="1" pageCount="1" pageSize="10" timestamp="Sun, 19 Apr 2026 17:03:28 -0400" url="https://beta.my.umbc.edu/groups/doit/posts.xml?tag=cybersecurity">
<NewsItem contentIssues="false" id="150425" important="false" status="posted" url="https://beta.my.umbc.edu/groups/doit/posts/150425">
<Title>UMBC Student experience at The Consortium of Cybersecurity Clinics</Title>
<Tagline>Event Recap: Spring 2025 &#8220;Clinic of Clinics&#8221;</Tagline>
<Body>
<![CDATA[
    <div class="html-content"> <div><span>By Tejas Ramlal Walke, Student, University of Maryland, Baltimore County</span> | <span>May 15, 2025</span></div> <div><p><br></p><p>On April 24, 2025, the Consortium of Cybersecurity Clinics held the Spring 2025 “Clinic of Clinics” event, bringing together over 140 students from more than 40 Cybersecurity Clinics across the world. This is a biannual event held each semester and gives students who are working in their school’s cybersecurity clinic a chance to connect with peers and learn from top experts in the field.</p><p>The Consortium of Cybersecurity Clinics is a collaborative network of higher education-based cybersecurity clinics focused on serving community organizations. The Consortium plays a key role in connecting these clinics, sharing resources, and assessing the impact of clinics on students and the communities they serve.</p><h4><span>General (Ret.) Paul M. Nakasone</span></h4><p>The highlight of the event was a keynote by <a href="https://engineering.vanderbilt.edu/bio/?pid=paul-nakasone" rel="nofollow external" class="bo">General (Ret.) Paul M. Nakasone</a>, who led as the former Director of the National Security Agency (NSA) and Commander at U.S. Cyber Command. He is now the founding director of <a href="https://www.vanderbilt.edu/national-security/" rel="nofollow external" class="bo">Vanderbilt University’s Institute for National Security</a>.</p><h4><span>Inside the NSA and U.S. Cyber Command</span></h4><div><img width="538" height="542" src="https://cybersecurityclinics.org/wp-content/uploads/2025/05/paul-nakasone-headshot.png" alt="General (Ret.) Paul M. Nakasone" style="max-width: 100%; height: auto;">Paul M. Nakasone</div><p>General Nakasone started the keynote with a powerful and inspiring statement for the students in attendance, “The future is about talent, and you represent that talent.” He then shared his experiences in the former roles at the National Security Agency (NSA) and U.S. Cyber Command, two organizations that play a very crucial role in securing the nation’s digital infrastructure. He explained the simple yet powerful mission of the NSA: “We make code, and we break code.” The NSA develops cryptographic keys, codes, and encryption technologies in order to protect the country’s most sensitive communications and defense platforms. NSA also plays a critical role in national intelligence by monitoring adversarial activity.</p><p>As for U.S. Cyber Command, General Nakasone outlined three core missions:</p><ol><li>Defending Department of Defense networks, data, and weapon systems: Supporting over 4.5 million users and maintaining constant mobility, this infrastructure serves as the foundation for global military operations.</li><li>Providing cyber support to U.S. forces deployed worldwide: From Korea to Iraq and Afghanistan, Cyber Command maintains cyber readiness and protection in active military environments.</li><li>Protecting the nation in cyberspace: Cyber Command works with the Department of Homeland Security (DHS), the FBI, and the private sector to protect US elections and other critical democratic functions from foreign interference.</li></ol><h4><span>Disruptive Technologies and the Importance of Adaptation</span></h4><p>The keynote was structured with three core themes: disruptive technologies, the current state of cybersecurity, and the skill sets needed for tomorrow’s leaders. To demonstrate the impact of disruptive technologies, General Nakasone talked about <a href="https://www.youtube.com/watch?v=MnrJzXM7a6o" rel="nofollow external" class="bo">Steve Jobs’ 2007 announcement of the iPhone</a>, which he described as “the most disruptive technology of the 21st century.” He compared the companies that embraced the adoption of and adaptation to mobile innovation, like Amazon and Google, with those that ignored the shift, such as Blockbuster, Blackberry, and Nokia. Through this comparison, he explained how early action can shape long-term relevance and success for companies in a world with rapidly evolving technologies, “You can adopt, adapt, or avoid. Choose wisely.”</p><img width="1024" height="572" src="https://cybersecurityclinics.org/wp-content/uploads/2025/05/nakasone-ppt-2-1024x572.png" alt="A hexagonal collage showing logos and phone screens for Meta AI, Anthropic, Google Gemini, Apple Intelligence, Microsoft Copilot, and OpenAI ChatGPT." style="max-width: 100%; height: auto;"><h4><span>Artificial Intelligence: Promise and Risk</span></h4><p>General Nakasone explained how today’s biggest disruptive technology, Artificial Intelligence, presents both huge opportunities and serious concerns. He then reflected on the launch of ChatGPT, noting its quick growth: over 1 million users in just five days, and 100 million within two months—a pace that significantly exceeded the internet’s initial expansion, which took seven years to reach 50 million users. He called the capabilities of current AI models as “truly outstanding,” citing their quick developments in areas like coding, reasoning, deep research, and even image generation. While he found the new technology to be exciting, he highlighted the need for responsible advancement and called for national investment in talent, energy, compute, chips, and data that would ensure the safe development and application of AI. With regard to cybersecurity, he mentioned several concerns, including the emergence of deepfakes. Fortunately, defense against malicious deepfakes outperformed offense in the 2024 U.S. presidential election.  Additionally, he expressed worries about the possibility of backdoors in open-source AI models, a recent example would be DeepSeek, and the danger of data poisoning during AI model training, vulnerabilities that may be used to infiltrate critical systems. Despite these risks, he maintained his optimism that AI would advance industries like national defense, education, and medicine, stating that the technology has him “riveted on the future.”</p><h4><span>The Geopolitical Landscape: Three Arcs of Global Security</span></h4><p>Shifting to a broader strategic view, General Nakasone defined today’s global security environment through what he described as three arcs of geopolitics. In the first arc, he explained the rise of China, showing how it went from a $114 billion economy in 1972 to a $17 trillion global power with expanding diplomatic, informational, and military influence today. The second arc focused on active conflicts, such as the Russia-Ukraine War, and ongoing instability in the Middle East. He explained how digital capabilities, like laptops connected through satellite internet, have made it possible for unprecedented disruption, pointing out that Ukraine has disabled more than half of Russia’s Black Sea Fleet despite having no navy. “This is the future of conflict,” he said, where non-kinetic cyber operations increasingly shape kinetic outcomes. The third arc addressed the threats that cross borders, such as pandemics, climate change, and cybersecurity itself, reminding us all that geographic boundaries no longer protect countries from cyberattacks. When combined, these three arcs show how intricately cyberspace has woven itself into both national security and international relations.</p><img src="https://cybersecurityclinics.org/wp-content/uploads/2025/05/nakasone-ppt-1.png" alt="A collage featuring images of a street in Asia, war destruction, city skyline, shipping, computer chip, military tank, cybersecurity, and a masked person." style="max-width: 100%; height: auto;"><h4><span>A Closer Look at Today’s Cybersecurity Threats</span></h4><p>General Nakasone also talked about the current cybersecurity threats. Last year, there were over 5,000 recorded ransomware attacks in the United States, which is a 15% increase from the prior year. He shared that when companies like Microsoft release updates, the attackers are able to exploit vulnerabilities within just five days, putting intense pressure on organizations to patch systems quickly. What’s even more concerning is that it takes an average of 194 days to detect an intrusion and 58 days to remove it. These three elements present a very challenging picture as we think about cybersecurity today and into the future.</p><h4><span>The Four Basics That Defeat 96% of Threats</span></h4><p>To tackle these challenges, General Nakasone stressed the importance of renewed commitment to “defense in depth,” urging cybersecurity experts to actively look for threats, conduct penetration tests, and prioritize patching. He also shared the four simple practices that can provide protection against 96% of known adversaries. Those four practices are:</p><ol><li>Keeping the systems updated.</li><li>Using strong passwords</li><li>Recognizing phishing attempts</li><li>Enabling multi-factor authentication (MFA)</li></ol><h4><span>What Makes a Great Cybersecurity Leader?</span></h4><p>General Nakasone concluded his presentation by outlining the three traits a cybersecurity professional must have: </p><ol><li>Critical thinking</li><li>Communication skills</li><li>Character</li></ol><p>He shared about this experience about how no one asked him what he majored in after college. Instead, they wanted to see if he could break down a complex problem, communicate clearly, and hold strong values. “Character,” he said, “is what you are in the dark. It’s what you stand for when no one’s watching.”</p><h4><span>Q&amp;A Session</span></h4><p>After the keynote, students from clinics across the world got the chance to ask questions directly to General Nakasone. The Q&amp;A session turned out to be one of the most captivating parts of the event, with questions ranging from privacy and national security to AI regulation, policy and career advice.</p><p>Key Takeaways from the Q&amp;A Session:</p><ol><li>Collaboration is key: Effective cybersecurity requires coordination between the government, the private sector, and academia. Each brings together strengths to solve complex challenges.</li><li>Technical leaders are in demand: “We need leaders who code, and coders who can lead.”</li><li>Strategic government investment in education, talent, and infrastructure can drive innovation, just as it did with the interstate highway system and GPS.</li></ol><h4><span>Breakout Sessions: Peer Connections and Takeaways</span></h4><p>After the conclusion of the keynote and Q&amp;A, the students were moved to breakout rooms, where they discussed engaging prompts. These sessions allowed everyone to make personal connections, share stories, and think about their clinic work from a new perspective.</p><h4><span>Final Reflections</span></h4><p>The Spring 2025 “Clinic of Clinics” was an insightful event where students connected with each other and learned how cybersecurity relies on people driven by shared values, teamwork, and a desire to learn. General Nakasone’s keynote shed light on today’s most critical challenges and sparked inspiration about the future we’re creating together. In his closing remarks, he quoted Steve Jobs, <em>“Everyone here has a sense that right now is one of the moments that we are influencing the future.” </em></p><p>Listening to his keynote certainly made us all feel we were in one.</p><p>The original post can be found at <a href="https://cybersecurityclinics.org/blog/event-recap-spring-2025-clinic-of-clinics/" rel="nofollow external" class="bo">The Consortium of Cybersecurity Clinics</a>.</p></div></div>
]]>
</Body>
<Summary>By Tejas Ramlal Walke, Student, University of Maryland, Baltimore County | May 15, 2025       On April 24, 2025, the Consortium of Cybersecurity Clinics held the Spring 2025 “Clinic of Clinics”...</Summary>
<Website>https://cybersecurityclinics.org/blog/event-recap-spring-2025-clinic-of-clinics/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/150425/guest@my.umbc.edu/b8b76075328f4671f1f7facc7eae2baa/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>miic</Tag>
<Group token="doit">Division of Information Technology (DoIT)</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/doit</GroupUrl>
<AvatarUrl>https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
<AvatarUrl size="original">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/original.JPG?1727453227</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxlarge.png?1727453227</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xlarge.png?1727453227</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/large.png?1727453227</AvatarUrl>
<AvatarUrl size="medium">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/medium.png?1727453227</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/small.png?1727453227</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxsmall.png?1727453227</AvatarUrl>
<Sponsor>Division of Information Technology (DoIT)</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/150/425/24a2cc0522ee3fd90db81ffe48593c75/xxlarge.jpg?1748375268</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/150/425/24a2cc0522ee3fd90db81ffe48593c75/xlarge.jpg?1748375268</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/150/425/24a2cc0522ee3fd90db81ffe48593c75/large.jpg?1748375268</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/150/425/24a2cc0522ee3fd90db81ffe48593c75/medium.jpg?1748375268</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/150/425/24a2cc0522ee3fd90db81ffe48593c75/small.jpg?1748375268</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/150/425/24a2cc0522ee3fd90db81ffe48593c75/xsmall.jpg?1748375268</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/150/425/24a2cc0522ee3fd90db81ffe48593c75/xxsmall.jpg?1748375268</ThumbnailUrl>
<ThumbnailAltText>The Consortium of Cybersecurity Clinics logo displayed on a purple gradient background with digital glitch-style lines on the left side.</ThumbnailAltText>
<PawCount>2</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Wed, 28 May 2025 08:34:42 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="149518" important="false" status="posted" url="https://beta.my.umbc.edu/groups/doit/posts/149518">
<Title>DoIT Student Digital Stories: Anna Plass</Title>
<Tagline>Journey in Information Systems and Cybersecurity</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><span><p><span>Follow Anna Plass's journey in information systems and cybersecurity in the Division of Information Technology (DoIT), discovering the importance of professional skills, teamwork, and continuous learning in the field.</span></p><br><p><span><span><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXdMl_FS3yDiw0IKJwuahwjQFjFkHEXh-iOQ1B1hH5HbpvZ4fYKBKjsFa5-iNOJsJUkYHJBBNXQDo4LuVCDraok1aKMUD2VRG3hijov6XFYyBRmUNmDCU0T5ccT53-X4BEIVEjO_4g?key=dDzsGfHIiXXZhzVANXcohFc3" width="624" height="359" alt="Anna is working at her desk with three computer screens." style="max-width: 100%; height: auto;"></span></span></p><p><br></p><h3><span>My Journey in Information Systems and Cybersecurity Assurance</span></h3><br><br><p><span>Hello everyone, I’m Anna Plass, a senior currently advancing my education in Information Systems with a minor in Computer Science. I am also working in Cybersecurity Assurance and Digital Trust, focusing on safeguarding systems and data within a corporate environment. Through my experiences, I've developed a unique perspective on what it takes to thrive in this dynamic and ever-evolving field.</span></p><br><h4><span>Starting Point: Joining DoIT</span></h4><br><p><span>I embarked on my journey with DoIT in June 2024, a decision that marked the start of an exciting chapter in my educational and professional development. At DoIT, I've been fortunate to engage with numerous projects, particularly those that make extensive use of our various security tools.</span></p><br><h4><span>The Puzzle of Cybersecurity</span></h4><br><p><span>One of the most exhilarating aspects of working in cybersecurity is the investigative nature of the job. Often, you only have fragments of a story, and your task is to find the missing pieces and fit them together like a puzzle. This detective work keeps the job fascinating, as every day presents a new challenge or mystery to solve, ensuring that no two days are ever the same.</span></p><br><h4><span>Professional Growth</span></h4><br><h5><span>Communication Skills</span></h5><br><p><span>Working at DoIT has significantly impacted my future, offering me innumerable opportunities to hone essential professional skills. One of the key areas of growth has been in communication across different departments. Effective communication is critical in cybersecurity, as it ensures that everyone is on the same page regarding security protocols and threat assessments.</span></p><br><h5><span><span><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXd8T0v0dJKK_gvGCocf7KrVbIu-bxLFPvHEWJpKaOC_vAfJgcmrnqSUql8PVwOwYVz659N5bz4fXTOys4rOzSyeCneD-oyUThVWislowL8Jo9fTzOKV8Wf13UUn7T0UxB0AQmsX?key=dDzsGfHIiXXZhzVANXcohFc3" width="624" height="356" alt="Anna Plass is walking up the stairs in the Engineering Building." style="max-width: 100%; height: auto;"></span></span></h5><h5><span>T</span><span>echnical Writing</span></h5><br><p><span>Likewise, technical writing is another skill I’ve sharpened during my time here. Being able to document processes, write reports, and create clear instructions is vital in cybersecurity assurance. DoIT has provided a robust platform for me to develop these skills.</span></p><br><h5><span>Time Management</span></h5><br><p><span>Time management, often overlooked, is crucial in this field. Balancing multiple responsibilities, ensuring the timely completion of tasks, and effectively prioritizing work are all skills I’ve developed through my projects at DoIT.</span></p><br><h5><span>Creating Memories</span></h5><br><p><span>Apart from the professional growth, my time at DoIT has also been about creating memories with my colleagues. One of the most enjoyable traditions we've maintained involves getting lunch together frequently during summer and winter breaks. These moments away from the office foster a sense of camaraderie and bond us as a team, making the work environment supportive and enjoyable.</span></p><br><h4><span>Advice for New Students</span></h4><br><p><span>For any new student joining DoIT, my advice is simple: never be afraid to ask questions. When you first join, it’s likely you won't have extensive experience in the field. Recognize that you are in a learning phase, and the full-time staff are there to help you gain these essential skills and experiences. Asking questions enables you to understand better and perform your duties more effectively.</span></p><br><h2><span>Looking Forward</span></h2><br><p><span>As I look to the future, I plan on staying with DoIT over the summer. This extended period will allow me to thoroughly explore various job opportunities in cybersecurity. The additional time at DoIT will not only bolster my experience but also provide more chances to refine my skills further before stepping out into the broader job market.</span></p><br><h2><span>Concluding Thoughts</span></h2><br><p><span>Working at DoIT has been an incredibly rewarding experience, providing me with a solid foundation in cybersecurity. The skills I've developed, the puzzles I've solved, and the bonds I've formed will undoubtedly serve me well as I continue to pursue my passion for cybersecurity. I look forward to applying these experiences to future opportunities and continuing to grow within this thrilling and essential field.</span></p><br><h1><span>Shout-out from DoIT!</span></h1><p><span>Next on her journey, Anna will be graduating in May 2025 from the University of Maryland, Baltimore County, with a BS in Information Systems and a minor in Computer Science. </span><span>Congratulations Anna!</span></p><br><p><a href="https://www.youtube.com/watch?v=M2gFpTYyqPY" rel="nofollow external" class="bo"><span>Watch her complete video here!</span></a></p><br><p><span>The first draft of the above announcement was generated using AI and edited by the Division of Information Technology Communications and IT teams.</span></p><div><span><br></span></div></span></div>
]]>
</Body>
<Summary>Follow Anna Plass's journey in information systems and cybersecurity in the Division of Information Technology (DoIT), discovering the importance of professional skills, teamwork, and continuous...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/149518/guest@my.umbc.edu/e10f5f4277dc11ee2d6e38f39517651d/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>doit-students</Tag>
<Tag>success</Tag>
<Group token="doit">Division of Information Technology (DoIT)</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/doit</GroupUrl>
<AvatarUrl>https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
<AvatarUrl size="original">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/original.JPG?1727453227</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxlarge.png?1727453227</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xlarge.png?1727453227</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/large.png?1727453227</AvatarUrl>
<AvatarUrl size="medium">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/medium.png?1727453227</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/small.png?1727453227</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxsmall.png?1727453227</AvatarUrl>
<Sponsor>Division of Information Technology (DoIT)</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/149/518/704b40d54c79d95e49cee72cd68c93ee/xxlarge.jpg?1745846098</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/149/518/704b40d54c79d95e49cee72cd68c93ee/xlarge.jpg?1745846098</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/149/518/704b40d54c79d95e49cee72cd68c93ee/large.jpg?1745846098</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/149/518/704b40d54c79d95e49cee72cd68c93ee/medium.jpg?1745846098</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/149/518/704b40d54c79d95e49cee72cd68c93ee/small.jpg?1745846098</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/149/518/704b40d54c79d95e49cee72cd68c93ee/xsmall.jpg?1745846098</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/149/518/704b40d54c79d95e49cee72cd68c93ee/xxsmall.jpg?1745846098</ThumbnailUrl>
<ThumbnailAltText>Graduation caps flying in the air with the words DoIT Student Digital Stories: Anna Plass</ThumbnailAltText>
<PawCount>9</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 28 Apr 2025 09:18:29 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="145112" important="false" status="posted" url="https://beta.my.umbc.edu/groups/doit/posts/145112">
<Title>Cybersecurity Awareness: Install Updates</Title>
<Tagline>Keep your system up-to-date by installing updates</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><span><h4><span>Update the Operating System (OS)</span></h4><p><span>Install operating system updates on all of your devices as soon as possible. Attackers won’t wait so neither should you!</span></p><br><h4><span>Update Anti-Virus (AV)</span></h4><p><span>Keep your anti-virus up-to-date so it can help keep you safe.</span></p><br><h4><span>Update Software</span></h4><p><span>Make sure all applications and software are updated and patched against known vulnerabilities. **</span><span>Patches are pushed automatically to DoIT-Managed devices.**</span></p><br><h2><span><span><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXcUcr5uykqmzdpLLZUS_0KRAo5fJq_dvUQDIKmbqosx9CCVKetOuBq6UX6Mm1cZFCkbChtCE_PjnJ_hfRAiDf7sKJzqykRmgUV-cmr7MezVOW_7oczu94NXkZ0smBtDd2pOrPn0dOskMApfeUAgdw-Zqeh7?key=ciB3wloKbf3CHOE_YTEWCg" width="323" height="424" style="max-width: 100%; height: auto;"></span></span><span> </span></h2><h3><span><u><br></u></span></h3><h3><span><u>Keep Software Up to Date with 3 Simple Steps</u></span></h3><div><span><br></span></div><h4><span>1. Watch for notifications</span></h4><p><span>Our devices will usually notify us that we need to run updates. This includes our devices’ operating systems, programs, and apps. It’s important to install ALL updates, especially for our web browsers and antivirus software. </span></p><h4><span>2. Install updates as soon as possible</span></h4><p><span>When notified about software updates, especially critical updates, we should be sure to install them as soon as possible. Malicious online criminals won’t wait, so we shouldn’t either!   </span></p><h4><span>3. Turn on automatic updates</span></h4><p><span>With automatic updates, our devices will install updates without any input from us as soon as the update is available—Easy! </span></p><p><span>To turn on the automatic updates feature, look in the device’s settings, possibly under Software or Security. Search settings for “automatic updates” if needed.</span></p><p><br></p><p><span>Source: <a href="https://www.cisa.gov/secure-our-world/update-software">https://www.cisa.gov/secure-our-world/update-software</a></span></p><div><span><br></span></div><div><span><span><p><span>For more information about UMBC’s cybersecurity initiatives, go to </span><a href="http://doit.umbc.edu/security" rel="nofollow external" class="bo"><span>doit.umbc.edu/security</span></a><span>. </span></p><div><span><br></span></div></span></span></div></span></div>
]]>
</Body>
<Summary>Update the Operating System (OS)  Install operating system updates on all of your devices as soon as possible. Attackers won’t wait so neither should you!   Update Anti-Virus (AV)  Keep your...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/145112/guest@my.umbc.edu/307eac6d4ff335c840d58031476c98d2/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>software</Tag>
<Tag>updates</Tag>
<Group token="doit">Division of Information Technology (DoIT)</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/doit</GroupUrl>
<AvatarUrl>https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
<AvatarUrl size="original">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/original.JPG?1727453227</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxlarge.png?1727453227</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xlarge.png?1727453227</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/large.png?1727453227</AvatarUrl>
<AvatarUrl size="medium">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/medium.png?1727453227</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/small.png?1727453227</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxsmall.png?1727453227</AvatarUrl>
<Sponsor>Division of Information Technology (DoIT)</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/145/112/9c9b99ca6d934d5f49a87743a2178453/xxlarge.jpg?1730123371</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/145/112/9c9b99ca6d934d5f49a87743a2178453/xlarge.jpg?1730123371</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/145/112/9c9b99ca6d934d5f49a87743a2178453/large.jpg?1730123371</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/145/112/9c9b99ca6d934d5f49a87743a2178453/medium.jpg?1730123371</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/145/112/9c9b99ca6d934d5f49a87743a2178453/small.jpg?1730123371</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/145/112/9c9b99ca6d934d5f49a87743a2178453/xsmall.jpg?1730123371</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/145/112/9c9b99ca6d934d5f49a87743a2178453/xxsmall.jpg?1730123371</ThumbnailUrl>
<PawCount>2</PawCount>
<CommentCount>1</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Thu, 31 Oct 2024 08:47:14 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="144937" important="false" status="posted" url="https://beta.my.umbc.edu/groups/doit/posts/144937">
<Title>Cybersecurity Awareness Month: DoIT Student Digital Stories with Ouwen Dai</Title>
<Tagline>Watch Ouwen Dai describe his cybersecurity journey</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><span><p><span>Ouwen Dai shares his experiences as a computer science student with a focus on cybersecurity and his work as a Security Analyst at DoIT. He highlights the importance of practical experience and the opportunity to connect coursework with work opportunities in college. Ouwen emphasizes the detective nature of cybersecurity work and encourages new students to seek help and engage fully in their learning process.</span></p><br><h3><a href="https://youtu.be/AIo4rp2s3uQ" rel="nofollow external" class="bo"><span><span><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXe0xACKasg5Baw26_odTXL1Ci_RFv275f1DautGuC1gaDwZdC0xurMgDFFK3VfVOITyjwwDpGlmmWSHXkUNb910tFpopaN_49ifPOGu3cLWo22aja848cLOfcJ3BRMVgm5_BZ_EdJ4wvLPH7UWuonbxMmZ9?key=ciB3wloKbf3CHOE_YTEWCg" width="452" height="325" style="max-width: 100%; height: auto;"></span></span></a></h3><br><h4><span>Passion for Cybersecurity</span></h4><p><span>He discusses his passion for cybersecurity, likening it to detective work. Ouwen enjoys solving puzzles and believes his interest in technology made cybersecurity an ideal field for him.</span></p><h3><br></h3><h4><span>Experience at DoIT</span></h4><p><span>Ouwen describes his time at DoIT as enriching, due to direct exposure to various tools that are relevant to the cybersecurity industry. He believes that this hands-on experience is crucial for his future career.</span></p><p><br></p><h4><span>Advice for New Students</span></h4><p><span>Ouwen advises new students not to hesitate to reach out for help. He emphasizes that college is a unique time for learning, and combining coursework with work experience can provide a competitive edge upon graduation.</span></p><h3><br></h3><h4><span>Future Career Aspirations</span></h4><p><span>Looking ahead, Ouwen aims to continue working in the cybersecurity field, with interests in defense contracting, startups, and penetration testing.</span></p><p><br></p><p><span><a href="https://youtu.be/AIo4rp2s3uQ" rel="nofollow external" class="bo">Click here to watch the full video!</a></span></p><p><br></p><br><p><a href="https://youtu.be/AIo4rp2s3uQ" rel="nofollow external" class="bo"><span><span><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXeBZb9TKU0_B0ey7sSIsewBrMpRh2b9qfgPIebaC3VUQ1cvsmQv39xHnKobrSC7iT0vgcHQLzDV8N5S2TIHrlKQqQcKdo1okuISSOM5JFGw352P93B-xMCXf8bNz-hxafql9MbCJ3Xxksi2KsxNHb8FZX0?key=ciB3wloKbf3CHOE_YTEWCg" width="454" height="326" style="max-width: 100%; height: auto;"></span></span></a></p><p><span><br></span></p><p><span>For more information about UMBC’s cybersecurity initiatives, go to </span><a href="http://doit.umbc.edu/security" rel="nofollow external" class="bo"><span>doit.umbc.edu/security</span></a>.</p><p><span><br></span></p><p><span></span></p><p><span>Thank you Dustin Roddy, Manager of UMBC’s </span><span></span><a href="http://newmediastudio.umbc.edu/" rel="nofollow external" class="bo"><span>New Media Studio</span></a>,<span> for this great video!</span></p><p><br></p></span></div>
]]>
</Body>
<Summary>Ouwen Dai shares his experiences as a computer science student with a focus on cybersecurity and his work as a Security Analyst at DoIT. He highlights the importance of practical experience and...</Summary>
<Website>https://youtu.be/AIo4rp2s3uQ</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/144937/guest@my.umbc.edu/e70a7937ad32d07a1a01957a8ab2af2d/api/pixel</TrackingUrl>
<Tag>career</Tag>
<Tag>cyber</Tag>
<Tag>cybersecurity</Tag>
<Tag>success</Tag>
<Group token="doit">Division of Information Technology (DoIT)</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/doit</GroupUrl>
<AvatarUrl>https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
<AvatarUrl size="original">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/original.JPG?1727453227</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxlarge.png?1727453227</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xlarge.png?1727453227</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/large.png?1727453227</AvatarUrl>
<AvatarUrl size="medium">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/medium.png?1727453227</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/small.png?1727453227</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxsmall.png?1727453227</AvatarUrl>
<Sponsor>Division of Information Technology (DoIT)</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/144/937/cc8a57d05fc41cde4581a4e648485105/xxlarge.jpg?1729518190</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/144/937/cc8a57d05fc41cde4581a4e648485105/xlarge.jpg?1729518190</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/144/937/cc8a57d05fc41cde4581a4e648485105/large.jpg?1729518190</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/144/937/cc8a57d05fc41cde4581a4e648485105/medium.jpg?1729518190</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/144/937/cc8a57d05fc41cde4581a4e648485105/small.jpg?1729518190</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/144/937/cc8a57d05fc41cde4581a4e648485105/xsmall.jpg?1729518190</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/144/937/cc8a57d05fc41cde4581a4e648485105/xxsmall.jpg?1729518190</ThumbnailUrl>
<PawCount>6</PawCount>
<CommentCount>1</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Fri, 25 Oct 2024 09:18:13 -0400</PostedAt>
<EditAt>Mon, 28 Oct 2024 14:35:08 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="144932" important="false" status="posted" url="https://beta.my.umbc.edu/groups/doit/posts/144932">
<Title>Cybersecurity Awareness Month: Multi-factor Authentication (MFA)</Title>
<Tagline>Use Duo MFA for myUMBC!</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><span><h3><span>What is multi-factor authentication?</span></h3><p><span>Multi-factor authentication adds a second layer of security to your online accounts. Verifying your identity using an additional factor (like your phone or other mobile device) prevents anyone but you from logging in, even if they know your password.</span></p><p><span>This additional factor of authentication is separate and independent from your username and password — Duo never sees your password.</span></p><p><br></p><h4><span>How It Works</span></h4><p><span><span><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXdIbopXJoeGiZ06rsHhOMcFZxWZJE71ULmqP77ZsZRsE8i43GO66Vg3TjC-HzDthw3SnbWYKdxMTKmQ_iSMSQ5Cj1_rda1nRhvqrHB4tgThoXUHKBh7Y7bHKbYms0x4kCtQ61Ufwex_V_RkIhRzMTN1xvg?key=ciB3wloKbf3CHOE_YTEWCg" width="624" height="163" style="max-width: 100%; height: auto;"></span></span></p><ol><li><p><span>Enter username and password as usual</span></p></li><li><p><span>Use your phone to verify your identity</span></p></li><li><p><span>Securely log in</span></p></li></ol><p><br></p><h4><span>Why do I need this?</span></h4><p><span>Passwords are surprisingly easy to compromise. They can often be stolen, guessed, or hacked — you might not even know someone is accessing your account. Multi-factor authentication helps keep your account secure even if your password is compromised. With Duo Push, you'll be alerted immediately (on your phone) if someone is trying to log in as you.</span></p><p><span><br></span></p><h4><span>What services are supported by Duo?</span></h4><p><span>Duo has apps for iOS and Android. Duo also allows you to authenticate using SMS passcodes sent to your cell phone, hardware tokens, or via a phone call (faculty/staff only). Duo is checked whenever you authenticate using WebAuth or myUMBC. This also applies to systems such as PeopleSoft and services such as </span><a href="https://umbc.atlassian.net/wiki/display/faq/Box" rel="nofollow external" class="bo"><span>Box</span></a><span>, </span><a href="https://umbc.atlassian.net/wiki/display/faq/Microsoft+Office+365" rel="nofollow external" class="bo"><span>Microsoft Office</span></a><span>, </span><a href="https://umbc.atlassian.net/wiki/pages/viewpage.action?pageId=30741112" rel="nofollow external" class="bo"><span>VPN</span></a><span>, and </span><a href="https://umbc.atlassian.net/wiki/display/faq/Google+Drive" rel="nofollow external" class="bo"><span>Google Apps (Drive)</span></a><span>.  Those who are identified as having access to sensitive data are administratively enrolled in Duo.</span></p><br><h4><span>What should you do if you receive a Duo push notification that you didn’t initiate?</span></h4><p><span>If you receive a Duo push notification that you didn’t initiate, DO NOT APPROVE IT! Instead, mark it as fraudulent and change your password on a trusted machine. </span></p><br><p><span><span><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXdgpKgM_AP0zEZutaCSrByTP_RxYVIcdPIWTNvmArbZ2_9bAQOOj59XASaoJGgf5-oK9qq20t-bxvjeRbZ9UbGKH7dTgM2BSyHkeL4DET1AhxFJGj8W_2zm2OJmbMRgpfVPZ9IQ5PC_Ot8oG_hi1PJobsEr?key=ciB3wloKbf3CHOE_YTEWCg" width="383" height="497" style="max-width: 100%; height: auto;"></span></span></p><div><span><span><span><p><span><br></span></p><p><span>For more information about UMBC’s cybersecurity initiatives, go to </span><a href="http://doit.umbc.edu/security" rel="nofollow external" class="bo"><span>doit.umbc.edu/security</span></a><span>. </span></p><div><span><br></span></div></span></span></span></div></span></div>
]]>
</Body>
<Summary>What is multi-factor authentication?  Multi-factor authentication adds a second layer of security to your online accounts. Verifying your identity using an additional factor (like your phone or...</Summary>
<Website>http://doit.umbc.edu/security</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/144932/guest@my.umbc.edu/6173ad16e8dbe0281ab5809322516904/api/pixel</TrackingUrl>
<Tag>cyber</Tag>
<Tag>cybersecurity</Tag>
<Tag>passwords</Tag>
<Group token="doit">Division of Information Technology (DoIT)</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/doit</GroupUrl>
<AvatarUrl>https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
<AvatarUrl size="original">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/original.JPG?1727453227</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxlarge.png?1727453227</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xlarge.png?1727453227</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/large.png?1727453227</AvatarUrl>
<AvatarUrl size="medium">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/medium.png?1727453227</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/small.png?1727453227</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxsmall.png?1727453227</AvatarUrl>
<Sponsor>Division of Information Technology (DoIT)</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/144/932/f76563954d408a6ba732106941fe0003/xxlarge.jpg?1729516268</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/144/932/f76563954d408a6ba732106941fe0003/xlarge.jpg?1729516268</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/144/932/f76563954d408a6ba732106941fe0003/large.jpg?1729516268</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/144/932/f76563954d408a6ba732106941fe0003/medium.jpg?1729516268</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/144/932/f76563954d408a6ba732106941fe0003/small.jpg?1729516268</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/144/932/f76563954d408a6ba732106941fe0003/xsmall.jpg?1729516268</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/144/932/f76563954d408a6ba732106941fe0003/xxsmall.jpg?1729516268</ThumbnailUrl>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 21 Oct 2024 09:15:53 -0400</PostedAt>
<EditAt>Mon, 21 Oct 2024 15:50:32 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="144740" important="false" status="posted" url="https://beta.my.umbc.edu/groups/doit/posts/144740">
<Title>Cybersecurity Awareness Month: Create Strong Passwords</Title>
<Tagline>Strengthen Passwords with Three Simple Tips</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><span><h3><span>1. Use Unique Passwords: </span></h3><ul><li><p><span>UMBC requires all students and staff to have a strong password for their account to help keep it secure. Find the UMBC </span><a href="https://umbc.atlassian.net/wiki/spaces/faq/pages/30736444/What+are+the+requirements+for+creating+a+myUMBC+password" rel="nofollow external" class="bo"><span>requirements for creating strong passwords here</span></a>.</p></li></ul><h3><span>2. Do Not Reuse Passwords:</span></h3><ul><li><p><span>Use different secure passwords for all of your personal, banking, and UMBC accounts. If one password were to appear in a data breach that you actively use in other accounts, attackers may try to use this password to access these accounts.</span></p></li><li><p><span>A password manager can be used to manage your different passwords easily. For an additional level of security for sensitive accounts, you can store part of the password in the password manager and add additional characters to the password when you are logging in. </span></p></li></ul><h3><span>3. Do Not Use Similar Passwords:</span></h3><ul><li><p><span>When changing your password, UMBC will not let you use a password that has been previously set.</span></p></li><li><p><span>Refrain from using your old passwords and slightly modifying them. For example, if your previous password was D0gL0vEr1, do not change the new password to D0gL0vEr2. This makes it easier for the hacker to guess the new password if they already know the previous password.</span></p></li></ul><p><span><span><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXd8ZUqPKW6n8WgSyj3et4Ug16tRpUX2O6c20mQf_WBlgSQibqofGBb0QRmldTDdi4oCrkBZTr0zz5Na_Z6_ngsP08jFWEW5BnKQvFrxIyXAmkMkq8ZDUOec-b-QiQfKTVvH84m-zQxQvjmoaJqoDFSOKEy9?key=ciB3wloKbf3CHOE_YTEWCg" width="463" height="600" style="max-width: 100%; height: auto;"></span></span><span></span></p><br><h5><span>For more information about UMBC’s cybersecurity initiatives, go to </span><a href="http://doit.umbc.edu/security" rel="nofollow external" class="bo"><span>doit.umbc.edu/security</span></a><span>. </span></h5><div><span><div><span><br></span></div></span></div></span></div>
]]>
</Body>
<Summary>1. Use Unique Passwords:     UMBC requires all students and staff to have a strong password for their account to help keep it secure. Find the UMBC requirements for creating strong passwords here....</Summary>
<Website>http://doit.umbc.edu/security</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/144740/guest@my.umbc.edu/ee92262a03ce5fc594d682b40d375d56/api/pixel</TrackingUrl>
<Tag>cyber</Tag>
<Tag>cybersecurity</Tag>
<Tag>passwords</Tag>
<Group token="doit">Division of Information Technology (DoIT)</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/doit</GroupUrl>
<AvatarUrl>https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
<AvatarUrl size="original">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/original.JPG?1727453227</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxlarge.png?1727453227</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xlarge.png?1727453227</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/large.png?1727453227</AvatarUrl>
<AvatarUrl size="medium">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/medium.png?1727453227</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/small.png?1727453227</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxsmall.png?1727453227</AvatarUrl>
<Sponsor>Division of Information Technology (DoIT)</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/144/740/0ec52b1e1eac533c53d3d855486809d2/xxlarge.jpg?1728913586</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/144/740/0ec52b1e1eac533c53d3d855486809d2/xlarge.jpg?1728913586</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/144/740/0ec52b1e1eac533c53d3d855486809d2/large.jpg?1728913586</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/144/740/0ec52b1e1eac533c53d3d855486809d2/medium.jpg?1728913586</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/144/740/0ec52b1e1eac533c53d3d855486809d2/small.jpg?1728913586</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/144/740/0ec52b1e1eac533c53d3d855486809d2/xsmall.jpg?1728913586</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/144/740/0ec52b1e1eac533c53d3d855486809d2/xxsmall.jpg?1728913586</ThumbnailUrl>
<PawCount>2</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 14 Oct 2024 09:53:52 -0400</PostedAt>
</NewsItem>

</News>
