草榴社区 (UAH), part of The University of Alabama System, has named Danny Tang as its chief information officer, effective February 17, 2025.
]]>by Staci Radden, OIT Cyber Analyst
This last cybersecurity awareness month article is all about incident response, and what to do when you see something suspicious. Reporting any questionable cyber activity is a way to protect UAH鈥檚 data and systems. Therefore, it is critical that we remain diligent in recognizing and reporting suspected cybersecurity threats.
As discussed in our previous articles this month, cybersecurity risks can present in a multitude of ways, including phishing emails, malware, ransomware, social engineering (e.g., job scams & tech support scams) and much more! Such threats can jeopardize personal data and put UAH processes into disarray. A few examples of suspicious activity are included below.
()
()
()
These are not the only examples of cybersecurity risks and these risks can take on a number of forms. Regardless of their appearance, any potential cybersecurity risk should be taken very seriously.
Have you ever tried to rationalize why you shouldn鈥檛 report a possible threat?
We may feel embarrassed about clicking a link in error or worried that we caused a problem. We may be afraid that we are making a big deal about nothing and creating unnecessary alarm. However, by communicating a potential security issue, you are helping the Office of Information Technology (OIT) do its job. Your prompt reporting allows UAH鈥檚 cybersecurity team to quickly react, often preventing the incident from becoming bigger and impacting more people. The valuable information you provide can assist OIT in improving security measures, such as user education, anti-phishing tools, stronger password policies, and software updates.
To report suspicious cyber activity, contact the OIT Help Desk at helpdesk@uah.edu or 256-824-3333. Provide them with as much information as possible, including date, time, description of the issue, and any screenshots available, as well as forwarding phishing emails.
Remember, we all play a crucial role in keeping UAH #ChargerSecure!
]]>This week is all about protecting ourselves while we are working remotely; whether you have a position that is approved for telecommuting or travel frequently for the university. The ability to work from anywhere has revolutionized how we support our students and has given us the flexibility that many of us enjoy. However, that flexibility also brings with it unique cybersecurity challenges.
Below are some tips to protect yourself, your family, and UAH while you work away from the main campus.
Whether you are using a tablet, laptop, or other mobile device, the university is only as secure as the devices that connect to it. It is crucial that you keep your device as secure as possible. It is best practice that you:
The combination of your password and your Duo Multifactor Authentication (MFA) solution is sufficient protection for a majority of UAH use cases. However, there are some caveats to this statement:
Even with a secure device and a secure login, you need to be aware of your surroundings while working on a UAH device.
By taking a little care and following a few simple steps you can help UAH stay #ChargerSecure
]]>Higher education is a prime target of cybercriminals. Vast amounts of valuable data, including personal information, intellectual property, and financial details, make universities vulnerable to cybercrime. According to 鈥淐yber Attack Trends: 2022 Mid-Year Report鈥�, attacks against higher education increased 114% between 2020 and 2022. Therefore, it is critical for all of us to integrate cybersecurity awareness into our daily routine. Below are some guidelines to follow in an effort to keep UAH and your information cyber secure.
Phishing is one of the most pervasive and detrimental cyber threats impacting universities. Phishing emails may appear to come from university IT departments, faculty members, or even classmates. Links to fake websites are often included which, when clicked, install malware or steal users鈥� information.
Ways to recognize phishing attempts:
What to do after receiving a suspicious email:
Malware (鈥渕alicious software鈥�) is any software created to disrupt, damage, or gain unauthorized access to a computer system. Recent studies have shown a 50% increase in malware attacks within universities in the last year. Such strikes often involve phishing emails, ransomware, and strategies to steal user credentials.
Tips to avoid malware:
Social engineering, within information security, is the manipulation and deception of individuals into divulging confidential or personal information that may be used for fraudulent purposes. Social engineers often exploit trust and urgency to achieve their mission.
Common examples targeting universities:
RED FLAGS to watch for:
In today鈥檚 interconnected world, cyber awareness is critical and a shared responsibility. Understanding the strategies used by cybercriminals and recognizing the signs of potential threats is essential in protecting our digital landscape and keeping UAH #ChargerSecure.
]]>October is Cybersecurity Awareness Month, highlighting the importance of cybersecurity and the steps you can take to help protect yourself, your family, and UAH. This year we will have a different theme for each week:
If you鈥檝e read previous cybersecurity newsletters or previous years鈥� Cybersecurity Awareness Month articles you will recognize the phishing topic as being one that I have mentioned before. So if I鈥檝e mentioned it before, why should I write about it again? It鈥檚 because phishing is the most common type of attack that is used to target UAH faculty, staff, and students. UAH receives thousands of potential phishing emails every day and more than 99% of them are caught and either prevented from reaching your inbox or are removed automatically when the Google anti-phishing and anti-spam analysis is completed.
However, no solution is perfect and chances are that you will eventually receive a phishing email in your inbox. It is critical that you keep a wary eye out for signs that an email is not legitimate. To assist you, here are some signs that can indicate that an email is actually a phishing threat.
Any email that does not originate from a uah.edu email address will have [External] at the beginning of the subject line. Many safe and legitimate email messages come from external email systems. The [External] tag does not automatically mean the message is a scam, but it does provide additional information about the message source. The [External] tag means you need to carefully examine this email before you respond or take action.
Phishing emails are getting more sophisticated and harder to detect but the [External] tag confirms that this email did not come from a UAH email address. Emails that offer jobs, internships, or requesting sensitive information, should never have an 鈥淸External]鈥� tag in the subject line.
For example, if your subject line says 鈥淩equest for Information鈥� then it originates from a UAH email address and has a high chance of being legitimate but if that same email鈥檚 subject line is 鈥淸External] Request for information鈥� then this email has a higher chance of being a phishing email.
The [External] tag is implemented to help protect your account from possibly being compromised as well as protect the University.
By policy, all official UAH communication will originate from a UAH email account. The information after the 鈥淍鈥� symbol in an email address indicates the domain and anything not 鈥渦ah.edu鈥� after the 鈥淍鈥� symbol should be a cause for additional scrutiny. Chances are these emails will have the [External] label at the beginning of the subject line but it鈥檚 better to be safe than sorry.
How do you know it is a UAH account? The from address will look like abc123@uah.edu or mailto:first.last@uah.edu. Official UAH email won鈥檛 come from DrJohnSmith@gmail.com or JaneCharger.uah@att.net. Not even Google employees use the Gmail domain for official correspondence.
If the domain does not match the apparent sender of the email, the email is almost certainly not legitimate. For example, if the sender is Floyd.Carter@.optonline.net but the email is signed, "Dr. Lori Charger," it is almost certainly a scam.
Although there are many different types of phishing emails, most of them rely on a common set of characteristics to trick users into replying or responding. Remember to stop, think, and verify information before you click.
If you receive an email you believe to be phishing, do not respond to the message. In Google Mail, it is possible to mark the email as phishing or you can add a message to your spam filter for unwanted messages by clicking the 鈥淩eport Spam鈥� button.
If you are at all unsure about the legitimacy of an email, you should err on the side of caution and do not provide any information. Instead, contact the purported individual who sent the email in person or over the phone to verify the email is legitimate. Also, you can forward the email to the OIT Help Desk at helpdesk@uah.edu for more assistance.
By remaining vigilant against phishing emails, you can help UAH stay #ChargerSecure
]]>During the month of March, OIT will:
If the computer you use is (or will soon be) in need of replacement, you are encouraged to begin the process of ordering a new computer as soon as possible to allow for the purchase, delivery, and configuration of the new device by October 1, 2024. Each department is responsible for purchasing the necessary equipment; OIT is available to offer assistance throughout the process.
If the computer is less than 5 years old, you are encouraged to set a reminder on your calendar to replace your computer before it exceeds the age of 5 years.
For more information, please see /images/administrative/oit/oit-device-support-standards.pdf
]]>
|
|
|
|
|
|
|
|
|
|
|