Category: Information Security
BUMC IT and Information Security is sponsoring several events on the BU Medical Campus Oct. 9 and 11, so mark your calendar. This coincides with Information Security Awareness Week!
Take this opportunity to get sensitive papers out of your office and get them properly destroyed. A shredding truck will be on the BU Medical Campus located between BUSM and BUSPH, adjacent to Talbot Green, Oct. 9, 11 a.m.-1 p.m. BUMC IT and Information Security personnel will be available to accept custody of your sensitive paper documents and ensure they are immediately shredded. CDs or old floppy disks will also be accepted and destroyed.
Hard Drive and Computer Disposal
Personnel will also be available to answer questions about computer and IT security, and will accept old computers and hard drives at a table near the Shredding truck on Wednesday, Oct. 9 and in the BUSM lobby Friday, Oct. 11, 11 a.m.-1 p.m.
If you have questions or need more information about this event contact the BUMC IT Service Desk at 617 638-5914 or email email@example.com.
BUMC IT and BU IS&T Information Security will be sponsoring a paper shredding day, Thursday, June 13 from 10am to 1pm along the Talbot Green. Bring any work related or personal documents that you would like to have securely shredded on site at the shredder truck. We will also have an area nearby where you can drop off computer equipment you would like recycled as well as hard drives you would like destroyed.
When will this change happen?
Monday 10/29 through Friday 11/2
*Due to Hurricane Sandy this update will only take place Tuesday 10/30 through Friday 11/2
What is changing?
McAfee is being upgraded from an unmanaged installation to a managed installation using McAfee ePolicy Orchestrator (ePO)
If you do not have McAfee installed it will not be installed on your system this is only an upgrade to existing McAfee installations.
Why is this change happening?
- McAfee ePO allows BUMC IT to set the same antivirus policies on all Windows computers
- McAfee virus definition updates can be pushed out and updated to ensure your computer has the most recent version instead of relying on a set schedule that requires your computer to be on when it is scheduled
- Virus infections will be reported back to a central server so threats can be analyzed by BUMC IT staff
- New versions and patches to McAfee can be quickly deployed to all computers to reduce errors and improve the functionality of McAfee
- Computers which have McAfee disabled and/or who have outdated virus definitions can be identified then updated by BUMC IT staff before they are infected
What change will I see?
In the lower right corner of your computer (near the clock) you will see the following icon meaning your computer has McAfee antivirus installed.
After the upgrade, the icon will change to this.
*If you don’t see either McAfee shield above on your computer please contact the BUMC IT service desk at 617-638-5914
What computers are affected by the change?
All Windows computers that have been setup and are managed by BUMC IT will have McAfee Antivirus installed. Computers that have been setup and are managed by BUMC IT will have one of the following tags on them. If you are on a BMC computer you are not affected by this change.
If you have any questions about the change please feel free to contact the BUMC IT Service Desk at 617-638-5914
Win cash, gain experience, and earn international recognition with one short video or a poster!
The EDUCAUSE & Internet2 Higher Education Information Security Council (HEISC) is conducting a contest in search of short information security awareness videos and posters developed by college students for college students. The contest seeks creative, topical, and effective videos (two minutes or less) and posters that focus attention on information security problems and how best to handle them.
Winners will receive cash prizes, and their videos and posters will be featured on the HEISC website (www.educause.edu/security). The winning videos and posters may be used in campus security awareness campaigns.
A gold, silver, and bronze prize will be awarded in three categories—training films of two minutes or less, 30-second public service announcements (PSAs), and posters—for a total of nine cash prizes. Honorable mention prizes will also be awarded.
Cash prizes for videos
- Gold: $2,000
- Silver: $1,500
- Bronze: $1,000
Cash prizes for posters
- Gold: $1,500
- Silver: $1,000
- Bronze: $500
Deadline: March 8, 2013.
For more information, visit http://www.educause.edu/SecurityVideoContest.
BUMC IT will be in the BUSM Lobby on Monday (10/1), Wednesday (10/3) & Friday (10/5) from 11am-2pm to provide information and answer questions about information security as well as help you properly get rid of old computer hard drives. Bring your old computer hard drives or magnetic tapes, etc. and BUMC IT will ensure your data is securely destroyed.
Even more, you can bring your whole computers or laptops and BUMC IT staff will remove the hard drive for you and make sure hard drive and computer are properly disposed of.
All BUMC faculty staff and students are invited to stop by.
Avoid being a victim of phishing! If you are ever unsure whether an e-mail you receive is legitimate or if you receive an e-mail messages that is abusive or harassing in nature, you can forward it to firstname.lastname@example.org for verification. Read the following tips to protect yourself from phishing…
A new zero-day vulnerability in Java—a Poison Ivy variant—has been discovered and exploits have been found. The flaw affects all versions of Oracle’s Java 7 (version 1.7) on all supported operating systems. No patch is available at this time. Java 6 and earlier are currently unaffected (although that will possibly change soon).
If your computer is managed by IS&T using KACE or is running Blackboard, it should be running Java version 6 and is currently not affected by this issue.
Find out if your computer can be exploited: www.isjavaexploitable.com
In order for this vulnerability to be exploited, you have to visit a web page or follow a link to an infected site. If your computer has been exploited, the software can do anything with your computer that you can.
- If you are not using any programs that require Java, remove it from your system altogether. Java is one of the most heavily-exploited platforms in the world today due to its almost ubiquitous presence.
- If you have to have Java for a specific program, but don’t need it for the web pages you visit, disable Java for universal use on your browsers. (Links to instructions listed below.) It is safest to allow use of Java browser plug-ins on a case-by-case basis when prompted for permission by trusted programs.
- If you cannot disable Java in your browsers, confine your browsing to regular commercial sites which, while not immune from being infected, are typically more carefully maintained and monitored and represent a lower risk. This is not a reliable security approach, but it is better than nothing.
- Internet Explorer
(For Firefox on Mac OS X, it is like Windows XP (Tools > Add-ons))
While in Chrome, enter this URL: chrome://plugins/ then click Disable under Java.
Prevent laptop theft by registering your laptop with the BUPD. Find out more: http://bit.ly/xxmqzP
- If an e-mail asks for your password, it is a scam. Delete it!
A popular phishing technique asks you to reply to a message and send your password. As an example, you could receive a message claiming to be from some seemingly official (but non-existent) entity, e.g., “The BU.EDU Upgrade Team,” saying that the mail system is being upgraded and your account will be deleted unless you respond immediately and provide your password. Please keep in mind that Boston University will never ask for your login and password information.
- Don’t follow links, and never provide personal information.
You should never follow links offered to you in unsolicited mail or provide any personal or financial information, just as you wouldn’t when you receive an unsolicited phone call. This should be your guideline no matter how tempting, frightening, or persuasive the mail seems. Remember that, given an awareness of the problem of phishing, legitimate companies won’t use this method of approaching you. If you do feel compelled to respond or that you must check out something sent to you in an e-mail, don’t use a link in the e-mail message to do that. Use your browser to go to the known and trusted website (PayPal, for example) by typing in the URL/web address yourself and log in there.You can tell where a link is going by hovering over it with your mouse. Don’t click. Hover. As a general rule, if the e-mail message is lying to you about where the link wants to send you, it is a scam.
- Don’t open attachments that you weren’t expecting.
Many viruses are designed to send out spoofed e-mail messages. This message could be originating from any infected PC in the world which happens to have your address in a file (e.g., the address book) or which happens to have auto-generated your address in some fashion. Some, although not all, of these messages will come with an attachment designed to spread the virus to you. Viewing such an attachment puts your computer at risk.
- Filter out spam.
Spam is always annoying, and it can be dangerous too: spam e-mail often contains virus, spyware, or phishing exploits. You can protect yourself from many of these hazards by filtering spam.
- When in doubt…
If you are unsure whether an e-mail is real or if you receive an e-mail messages that is abusive or harassing in nature, report it to email@example.com. If possible, it is helpful to include full headers when forwarding a message. If you have questions, contact the Service Desk at (617) 638-5914.
If it’s too late…
If you responded to a suspicious e-mail message and provided your password, you should immediately change your password and scan your computer for spyware and viruses. Depending on what information you provided, you may also need to take steps to protect your credit card and bank information.
Contact the BUMC IT Service Desk if you believe you have been a victim of phishing at (617) 638-5914 or firstname.lastname@example.org.
LEARN MORE ABOUT PHISHING:
- Phishing IQ Test: http://www.sonicwall.com/furl/phishing/index.php
- Phishing Awareness: http://www.youtube.com/watch?v=H0yWWqX0L4g
- “Phishing” Internet Security PSA: http://www.youtube.com/watch?v=pPCPU5UpPG4&NR=1
Remember, Boston University will never ask for your login and password information via e-mail.
Be on the lookout for a new phishing email that is circulating through the BU community. The email appears to come from email@example.com and has the subject “Boston University IT Help Center – Please Upgrade Today!” A full transcript of this phishing message can be found below.
THIS IS A PHISHING EMAIL AND NOT FROM BOSTON UNIVERSITY.
As long as you disregard these e-mails and do not click on any of the links you should be fine. You can learn more about phishing e-mails on our website: http://www.bumc.bu.edu/it/comm-collab/e-mail/unwanted-email/phishing/.
As a reminder, BU will never ask you for personal information or your password.
Here are a few simple tips to avoid being hooked by a phisher:
- If the email asks for your password, it is a scam. Delete it.
- If the email is about a financial account you don’t have or an order that you don’t know anything about, it is almost certainly a scam.
- If you feel you must check out something sent to you in email DON’T CLICK THE LINK. It is completely possible to make a link lie to you. Instead, use your browser to go to the known and trusted website by typing in the URL/Web Address yourself.
- You can tell where a link is going to take you by hovering over it with your mouse. Don’t click. Hover. If you do this for the link above you will see yahoo pop up in a box by your pointer or in a space at the bottom of your email client or browser. General rule: if the email message is lying to you about where it wants to send you, it is a scam.
As always, forward any e-mails you are unsure about to firstname.lastname@example.org and then delete them. When forwarding an e-mail to email@example.com, it is helpful to include the full headers if possible. If in doubt, call the BUMC IT Service Desk at (617) 638-5914 or the IT Help Desk (Charles River Campus) at (617) 353-4357.
Transcript of Phishing Scam:
From: Boston University IT Help Center [firstname.lastname@example.org]
Due to congestion in our webmail database, we will be shutting down some unused accounts.
You will need to confirm your account as soon as possible so we can upgrade your account before the deadline.
To Upgrade your account, kindly CLICK THE UNIVERSITY LINK BELOW and fill out the form.
After following the instructions on the sheet, your account will not be interrupted and will continue as normal.
Thank you for attending to this request.
We apologize for any inconvenience.