News & Announcements Archive

News & Announcements

  • Sep
    25

    September 25, 2014 East Campus Shred Event Results

    ECShred_9_25_14_fixed

    UCIT Office of Information Security (UCIT OIS) is pleased to announce the results from the campus Shred Event on Thursday, September 25, in Lot 13 outside of the Kettering Lab Complex on West campus.

    Courtesy of sponsorship from Document Destruction, UCIT OIS collected, securely shredded and recycled nearly 6,100 pounds (3.05 tons!) of documents received from 20 departments/colleges in only 4 hours at zero cost to the university.

    If you and/or your department or college were unable to participate in this first shred event, don’t worry. UCIT OIS will be hosting another one in the near future, so be looking out for a date!

    All personal and professional documents are accepted, but paper clips, hanging file folders and other metal/plastic must be removed from the documents in advance. (Staples are okay.)

    For additional information please visit the UCIT OIS website at http://www.uc.edu/infosec/services/shredding.html

  • Sep
    10

    East Campus Shred Event

    The UCIT Office of Information Security (UCIT OIS) is hosting a free document shredding event for all UC students, faculty, and staff on Thursday, September 25, 2014. The event will take place in Lot 13 outside of the Kettering Lab Complex on East Campus from 9 a.m. until 1 p.m.

    UCIT OIS staff will be onsite at all times to ensure all documents are securely destroyed and recycled.

  • May
    21

    UCIT Office of Information Security Alert Bulletin

    ** Password Expiration Notification**

    By now you may have heard about the internet bug Heartbleed, which has impacted up to 2/3 of companies on the web. Without getting too technical, Heartbleed affects the OpenSSL framework used by many entities to privately send data to and form internet servers.

    We want to assure you that the university took immediate and proactive steps to patch this security vulnerability - and has successfully eliminated any risk of unauthorized access to your account.

    For your added protection, we will be expiring your Central Login System (CLS) password within the next 2 to 4 weeks. Changing your password at this time is not required. Similar to a normal password expiration, you will receive an email stating that your password is about to expire and that you need to change your password at that time. You will receive five grace logins but should change your password as soon as possible.

    It's also a good idea to regularly change your passwords for all websites you frequent, especially if any use the same password as you were using for UC. 

    What Can I Do to Help?

    Please distribute this Security Alert to anyone who you feel needs to be made aware.

    Contact the UCIT Integrated Services Desk at 513-556-HELP (4357), 866-397-3382 or helpdesk@uc.edu or the UCIT Office of Information Security at 513-558-ISEC (4732) or infosec@uc.edu with any questions or concerns.

  • May
    06

    Cyber-Related Scams Targeting Universities, Employees, And Students

    The Internet Crime Complaint Center (IC3) is aware of multiple scams targeting universities, university employees, and students across the nation. The scams range from Internet fraud to intrusions. The following are common scenarios:

    • Spear phishing e-mails are being sent to university employees that appear to be from their employer. The e-mail contains a link and claims some type of issue has risen requiring them to enter their log-in credentials. Once employees provide their user name and password, the perpetrator accesses the university’s computer system to redirect the employees’ payroll allocation to another bank account. The university employees’ payroll allocations are being deposited into students’ accounts. These students were hired through online advertisements for work-at-home jobs, and provided their bank account information to the perpetrators to receive payment for the work they performed.
    • Scammers are posting online advertisements soliciting college students for administrative positions in which they would receive checks via the mail or e-mail. Students are directed to deposit the checks into their accounts, and then print checks and/or wire money to an individual. Students are never asked to provide their bank account information to the perpetrators.
    • Perpetrators are compromising students’ credential resulting in the rerouting of their reimbursement money to other bank accounts. The reimbursement money is from student loans and used to pay tuition, books, and living expenses.
    • Perpetrators are obtaining professors’ Personally Identifiable Information (PII) and using it to file fraudulent income tax returns.
    • Some universities have been victims of intrusions, resulting in the perpetrators being able to access university databases containing information on their employees and students.

    If you have been a victim of one of these scams or any other Internet related scam, we encourage you to file a complaint with the IC3 at http://www.ic3.gov and notify your university police.

  • May
    02

    UCIT Office of Information Security Alert Bulletin


    ** OpenID and OAuth Vulnerability Alert**

    OpenID and OAuth Vulnerability Summary

    This vulnerability may also be referred to as the “Covert Redirect” flaw.

    The vulnerability allows hackers to trick users into authorizing an app or website using malicious phishing links.

    Per Lifehacker:

    For example, if you visit a site and click a button to log in with Google or Facebook, you'll see the familiar authorization popup. If you authorize the login, your personal data can be sent to the hacker instead of to the site. This can include your email address, contact lists, birthday, and more. The vulnerability could also redirect you to a different look-alike website.

    Perhaps the scariest thing is the Covert Redirect flaw doesn't use a fake domain that might be spotted by more savvy surfers, but instead uses the real site address that you're trying to log into. So it's very hard to detect. 

    Additional information may be found at:  http://www.cnet.com/news/serious-security-flaw-in-oauth-and-openid-discovered/ and at http://lifehacker.com/security-flaw-found-in-oauth-and-openid-heres-what-it-1570872265.

    What applications does this affect?

    This vulnerability currently affects websites and applications that use credentials from websites such as Facebook, Twitter, Google, Yahoo, LinkedIn, Microsoft, PayPal, and others as a means to log into them.

    How will the vulnerability be remediated?

    CNET reports that this is not easy for sites to fix.

    Per CNET:

    This is to say, it's not easy to fix, and any effective remedies would negatively impact the user experience. Just another example that Web security is fundamentally broken and the powers that be have little incentive to address the inherent flaws.

    What should I do?

    The UCIT Office of Information Security suggests that users perform the following:

    • Whenever possible, do not use credentials from websites such as Facebook, Twitter, Google, Yahoo, LinkedIn, Microsoft, PayPal, and others as a means to log into them.
    • Watch out for links that immediately ask you to log into them and close the window to prevent the redirection attack.

    What Can I Do to Help?

    Please distribute this Security Alert to anyone who you feel needs to be made aware.

    Contact the UCIT Integrated Services Desk at 513-556-HELP (4357), 866-397-3382 or helpdesk@uc.edu or the UCIT Office of Information Security at 513-558-ISEC (4732) or infosec@uc.edu with any questions or concerns.

  • May
    02

    UCIT Office of Information Security Alert Bulletin

    **Security Update for Internet Explorer Alert**

    Microsoft Security Bulletin MS14-021 –Critical | CVE-2014-1776

    Internet Explorer Security Update Summary

    Microsoft has issued a security bulletin announcing the immediate availability of a fix that closes the “hole” in Internet Explorer discovered earlier this week. Since this is such a crucial vulnerability, the patch is available now meaning you don’t have to wait until Microsoft’s “Patch Tuesday.”

    All versions of Internet Explorer on ALL versions of Windows contain a security hole that could allow cybercriminals to implant malware on your computer with little or no warning. The attacks that have been discovered have been targeting IE 9, 10, and 11; they also relied on a Flash file to help the attack, as well as an IE extension from Microsoft called VGX.DLL used for vector graphics rendering.

    What Applications/Operating Systems does this affect?

    This vulnerability currently affects all versions of Internet Explorer including 6, 7, 8, 9, 10 and 11. 

    All versions of Windows are vulnerable.

    What should I do?

    The UCIT Office of Information Security suggests that users perform the following:

    • Update your machines immediately to ensure you receive this security update
      • Go to Control Panel | Windows Update

    Although Windows XP will still receive this update, this is likely one of the last to be released by Microsoft as that operating system has reached end-of-life support status. 

    For more information on the Security Update and the vulnerability, go here: https://technet.microsoft.com/library/security/ms14-021

    What Can I Do to Help?

    Please distribute this Security Alert to anyone who you feel needs to be made aware.

    Contact the UCIT Integrated Services Desk at 513-556-HELP (4357), 866-397-3382 or helpdesk@uc.edu or the UCIT Office of Information Security at 513-558-ISEC (4732) or infosec@uc.edu with any questions or concerns.

  • Apr
    29

    UCIT Office of Information Security Alert Bulletin

    **Adobe Flash Player Vulnerability Alert**

    Adobe Security Vulnerability | CVE-2014-0515

    Adobe Flash Player Vulnerability Summary

    A vulnerability has been identified that could potentially allow an attacker to take full control of a system by a user simply visiting a website that contains flash content.

    Adobe has announced that they are aware of reports that an exploit for CVE-2014-0515 exists in the wild, and is being used to target Flash Player users on the Windows platform.

    Adobe has recently released a security update for Adobe Flash Player to address this vulnerability.

    Additional information may be found at: https://helpx.adobe.com/security/products/flash-player/apsb14-13.html.

    What applications does this affect?

    The versions of Adobe Flash Player that are affected are:

    ·         Adobe Flash Player 13.0.0.182 and earlier versions for Windows

    ·         Adobe Flash Player 13.0.0.201 and earlier versions for Macintosh

    ·         Adobe Flash Player 11.2.202.350 and earlier versions for Linux. 

    How will the vulnerability be remediated?

    The vulnerability can be remediated by the following:

    ·         Users of Adobe Flash Player 13.0.0.182 and earlier versions for Windows should update to Adobe Flash Player 13.0.0.206.

    ·         Users of Adobe Flash Player 13.0.0.201 and earlier versions for Macintosh should update to Adobe Flash Player 13.0.0.206.

    ·         Users of Adobe Flash Player 11.2.202.350 and earlier versions for Linux should update to Adobe Flash Player 11.2.202.356.

    ·         Adobe Flash Player 13.0.0.182 installed with Google Chrome will automatically be updated to the latest Google Chrome version, which will include Adobe Flash Player 13.0.0.206 for Windows, Macintosh and Linux.

    ·         Adobe Flash Player 13.0.0.182 installed with Internet Explorer 10 will automatically be updated to the latest Internet Explorer 10 version, which will include Adobe Flash Player 13.0.0.206 for Windows 8.0.

    ·         Adobe Flash Player 13.0.0.182 installed with Internet Explorer 11 will automatically be updated to the latest Internet Explorer 11 version, which will include Adobe Flash Player 13.0.0.206 for Windows 8.1.

    What should I do?

    The UCIT Office of Information Security suggests that users perform the following:

    What Can I Do to Help?

    Please distribute this Security Alert to anyone who you feel needs to be made aware.

    Contact the UCIT Integrated Services Desk at 513-556-HELP (4357), 866-397-3382 or helpdesk@uc.edu or the UCIT Office of Information Security at 513-558-ISEC (4732) or infosec@uc.edu with any questions or concerns.

  • Apr
    28

    UCIT Office of Information Security Alert Bulletin

    **Internet Explorer Vulnerability Alert**

    Microsoft Security Advisory 2963983 | CVE-2014-1776

    Internet Explorer Vulnerability Summary

    Microsoft is aware of limited, targeted attacks that attempt to exploit a vulnerability in Internet Explorer versions 6 through 11.

    Per Microsoft:

    “The vulnerability is a remote code execution vulnerability. The vulnerability exists in the way that Internet Explorer accesses an object in memory that has been deleted or has not been properly allocated. The vulnerability may corrupt memory in a way that could allow an attacker to execute arbitrary code in the context of the current user within Internet Explorer. An attacker could host a specially crafted website that is designed to exploit this vulnerability through Internet Explorer and then convince a user to view the website.

    On completion of this investigation, Microsoft will take the appropriate action to protect our customers, which may include providing a solution through our monthly security update release process, or an out-of-cycle security update, depending on customer needs.”

    Additional information may be found at: https://technet.microsoft.com/en-us/library/security/2963983.aspx.

    What applications does this affect?

    This vulnerability currently affects all versions of Internet Explorer including 6, 7, 8, 9, 10 and 11.  Some Windows Server operating systems may not be affected as mitigating controls are already in place through “Enhanced Security Configurations” implemented by default.

    How will the vulnerability be remediated?

    Microsoft plans to release a patch to be released via their normal monthly update process.

    What should I do?

    The UCIT Office of Information Security suggests that users perform the following:

    • Users and administrators should enable Microsoft EMET (Enhanced Mitigation Experience Toolkit) where possible and consider deploying an alternate web browser until an official update is released. For users still using Windows XP and Windows Server 2003, upgrading to a newer operating system is recommended to receive further Windows Security Updates, or
    •  If utilizing Windows XP or Windows Server 2003, upgrade to a newer operating system if possible, or
    • Utilize a different internet browser such as Google Chrome or Mozilla Firefox
    • See the Mitigating Factors and/or Suggested Actions sections in the following link for additional information: https://technet.microsoft.com/en-us/library/security/2963983.aspx.

     

    What Can I Do to Help?

    Please distribute this Security Alert to anyone who you feel needs to be made aware.

    Contact the UCIT Integrated Services Desk at 513-556-HELP (4357), 866-397-3382 or helpdesk@uc.edu or the UCIT Office of Information Security at 513-558-ISEC (4732) or infosec@uc.edu with any questions or concerns.

    End UCIT Office of Information Security Alert Bulletin

  • Apr
    07

    OpenSSL HeartBleed Vulnerability Alert

    UCIT Office of Information Security Alert Bulletin

    **OpenSSL HeartBleed Vulnerability Alert**

    A vulnerability was discovered with OpenSSL which allows anyone on the Internet to read the memory of systems that run vulnerable versions of OpenSSL, revealing the secret authentication and encryption keys to protect the traffic. User names, passwords and the actual content of the communication can also be read. The bug appears to have been in OpenSSL for 2+ years since December 2011 and exploiting this bug leaves no trace in server logs so there is no easy way to determine if a server has been compromised.

    Affected Versions

    OpenSSL 1.0.1f, 1.0.1e, 1.0.1d, 1.0.1c, 1.0.1b, 1.0.1a, 1.0.1.

    Is There a Solution?

    OpenSSL and the UCIT Office of Information Security (UCIT OIS) recommend that users immediately upgrade to version 1.0.1g. Administrators are advised to apply the up-to-date version of OpenSSL, revoke potentially compromised private keys and reissue new keys. The newest version is available on OpenSSL’s website: https://www.openssl.org/source/.

    QualysGuard Vulnerability Scanning

    UCIT OIS uses QualysGuard, an enterprise vulnerability assessment, policy compliance, and remediation management tool that provides an extensive built-in database with the latest CVE vulnerability definitions. Monthly scans will be completed on the university’s network to ensure there are no vulnerable OpenSSL server’s on our network. If an outdated version of OpenSSL is found on the network, the IT Coordinator responsible will be contacted and told to upgrade their OpenSSL server. While upgrading however all certificates must be revoked and requested again once the upgrade is complete.

    End UCIT Office of Information Security Alert Bulletin

  • Apr
    03

    April 2, 2014 West Campus Shred Event Results

    Spring2014 Shred

    UCIT Office of Information Security (UCIT OIS) is pleased to announce the results from the campus Shred Event on Wednesday, April 2, at McMicken Commons on West campus.

    Courtesy of sponsorship from Document Destruction, UCIT OIS collected, securely shredded and recycled nearly 4,400 pounds (2.2 tons!) of documents received from 26 departments/colleges in only 4 hours at zero cost to the university.

    If you and/or your department or college were unable to participate in this first shred event, don’t worry. UCIT OIS will be hosting another one in the near future, so be looking out for a date!

    All personal and professional documents are accepted, but paper clips, hanging file folders and other metal/plastic must be removed from the documents in advance. (Staples are okay.)

    For additional information please visit the UCIT OIS website at http://www.uc.edu/infosec/services/shredding.html

  • Mar
    17

    April 2, 2014 West Campus Shred Event

    shredded-paper1

    UCIT Office of Information Security (UCIT OIS) is holding another Free Shred event on Wednesday, April 2 on West Campus in McMicken Commons. We will be accepting paper from 9 a.m. until 12:30 p.m.

    All faculty, staff, and students are invited to drop off professional or personal sensitive documents to ensure they are securely destroyed and recycled. All metal, including paper clips and hanging file folders must be removed in advance; staples are permissible. Plastic also needs to be removed - comb bindings, transparencies, Polaroid pictures, Tyvek envelopes. Anything that cannot be torn is not acceptable.

    UCIT OIS staff will remain present to ensure that all documents received are properly destroyed.

    For additional information please visit our Shredding page.

  • Mar
    03

    Microsoft End of Support Announcement

    microsoft

    Microsoft has recently announced that a number of their software products will be reaching their end of support date. The products that are ending their support this year include Windows XP, Office 2003, and Exchange Server 2003.

    When software reaches End of Support, customers are still able to utilize the product. However, Microsoft will no longer provide security updates or update online content. In short, companies are responsible for their own for support; more importantly, as no security updates are provided they accept the associated risk/s.

    Microsoft has released a helpful guide for their users showing how to upgrade from Windows XP to Windows 7. In order to receive security patches it's recommended that an upgrade to Windows 7 takes place.

    Products Reaching End of Support April 8, 2014

    • Windows XP
    • Office 2003
    • Exchange Server 2003

    Products Reaching End of Support July 14, 2015

    • Windows Server 2003

    Products Transitioning to Extended Support July 8, 2014

    • SQL Server 2008
    • SQL Server 2008 R2
  • Jan
    06

    "McAfee Security" to transition name to "Intel Security"

    McAfee Logo

    Intel CEO Brian Krzanich announced at the Consumer Electronics Show (CES) in Las Vegas on Monday, January 6 2014 that Intel will begin phasing out the "McAfee" name and will be transitioning to the "Intel Security" name.

    Per CNET's Seth Rosenblatt, "The software will remain unchanged except for changing the name from McAfee Security to Intel Security. The iconic red McAfee shield will remain, for now, and some components of the mobile versions of the software will be free to use on iOS and Android devices. The rebranding is expected to take up to a year to complete."

    Additional information is available in the article on the CNET website.


  • Oct
    28

    Information Security Awareness Week 2013 Re-Cap

    UCIT OIS ISAW 2013

    The fifth annual Information Security Awareness Week (ISAW) has unfortunately now come to a close. This year we had an impressive turnout and some great vendors to help out as well! If you walked through the Tangeman University Center this past week (October 21-23) you would have seen the UCIT Office of Information Security, Student Safety Board, Dell, Insight Global, TekSystems, and Apple.

    This year students were given awareness on mobile device security, QR codes, URL shorteners, social media safety, and phishing. Many of these topics are "hot" in the technology world when it comes to security, so educating our users will hopefully prepare us for potential attacks in the future.

    UCIT OIS will continue to publish documentation on multiple topics in security on our Awareness & Training page throughout the year. So, if you missed us in person, check us out on the web!

  • Oct
    28

    October 24, 2013 West Campus Shred Event Results

    UCITOIS_WestShred

    UCIT Office of Information Security (UCIT OIS) is pleased to announce the results from the campus Shred Event on Thursday, October 24, at McMicken Commons on West campus.

    Courtesy of sponsorship from Document Destruction, UCIT OIS collected, securely shredded and recycled nearly 7,500 pounds (3.7 tons!) of documents received from 32 departments/colleges in only 4 hours at zero cost to the university.

    If you and/or your department or college were unable to participate in this first shred event, don’t worry. UCIT OIS will be hosting another one in the near future, so be looking out for a date!

    All personal and professional documents are accepted, but paper clips, hanging file folders and other metal/plastic must be removed from the documents in advance. (Staples are okay.)

    For additional information please visit the UCIT OIS website at http://www.uc.edu/infosec/services/shredding.html

  • Oct
    18

    Information Security Awareness Week (ISAW)

    staysafeonlineorg

    This year marks the tenth anniversary of National Cyber Security Awareness Month sponsored by the Department of Homeland Security in cooperation with the National Cyber Security Alliance and the Multi-State Information Sharing and Analysis Center.

    UCIT Office of Information Security (UCIT OIS) is one of many entities that participate. UCIT OIS has held Information Security Awareness Week (ISAW) annually since 2009 to help promote the month and spread awareness to the university community so that UC may work towards a more secure future.

  • Oct
    18

    October 24, 2013 West Campus Shred Event

    shredded-paper1

    UCIT Office of Information Security (UCIT OIS) is holding another Free Shred event on Thursday, October 24th on West Campus in McMicken Commons from 9 a.m. until 11:30 a.m.

    All faculty, staff, and students are invited to drop off professional or personal sensitive documents to ensure they are securely destroyed and recycled. All metal, including paper clips and hanging file folders must be removed in advance; staples are permissible. Plastic also needs to be removed – comb bindings, transparencies, Polaroid pictures, Tyvek envelopes.  Anything that cannot be torn is not acceptable.

    UCIT OIS staff will remain present to ensure that all documents received are properly destroyed.

    For additional information please visit http://www.uc.edu/infosec/services/shredding.html


  • May
    17

    May 16, 2013 East Campus Shred Event Results

    Image of UCIT OIS at May 16 Campus Shred Event

    UCIT Office of Information Security (UCIT OIS) is pleased to announce the results from the second campus Shred Event of 2013, held Thursday, May 16, at the rear of Eden Garage in Lot 13 on East Campus.

    Courtesy of sponsorship from Shred-Safe, UCIT OIS collected, securely shredded and recycled 15,200 pounds (7.5 tons!) of documents received from 16 departments/colleges in only 2.5 hours at zero cost to the university.

    If you and/or your department or college were unable to participate in the recent shred events, don’t worry. UCIT OIS will offer additional shredding events in the Fall!

    All personal and professional documents will be accepted, but paper clips, hanging file folders and other metal or plastic must be removed from the documents in advance. (Staples are okay.)

    For additional information please visit the UCIT OIS website at http://www.uc.edu/infosec/services/shredding.html

  • May
    06

    May 16, 2013 East Campus Shred Event

    Image of shredded paper

    UCIT Office of Information Security (UCIT OIS) is holding another Free Shred event on Thursday, May 16th on East Campus at the rear of Eden Garage in Lot 13 from 9 a.m. until 11:30 a.m.

    All faculty, staff, and students are invited to drop off professional or personal sensitive documents to ensure they are securely destroyed and recycled. All metal, including paper clips and hanging file folders must be removed in advance; staples are permissible. Plastic also needs to be removed – comb bindings, transparencies, Polaroid pictures, Tyvek envelopes.  Anything that cannot be torn is not acceptable.

    UCIT OIS staff will remain present to ensure that all documents received are properly destroyed.

    For additional information please visit http://www.uc.edu/infosec/services/shredding.html


  • Apr
    26

    April 25, 2013 West Campus Shred Event Results

    Picture of UCIT OIS at April 25 Shred Event

    UCIT Office of Information Security (UCIT OIS) is pleased to announce the results from the first campus Shred Event of 2013, held Thursday, April 25, at McMicken Commons on West campus.

    Courtesy of sponsorship from Shred-Safe, UCIT OIS collected, securely shredded and recycled nearly 13,000 pounds (6.5 tons!) of documents received from 29 departments/colleges in only 4 hours at zero cost to the university.

    If you and/or your department or college were unable to participate in this first shred event, don’t worry. UCIT OIS is hosting another one on Thursday, May 16, from 9 a.m. until 1 p.m. on East Campus at the rear of Eden Garage in the Lot 13 parking lot.

    All personal and professional documents are accepted, but paper clips, hanging file folders and other metal/plastic must be removed from the documents in advance. (Staples are okay.)

    For additional information please visit the UCIT OIS website at http://www.uc.edu/infosec/services/shredding.html

  • Apr
    12

    MainStreet Stride 2013

    Picture of UCIT OIS at Mainstreet Pride 2013

    UCIT Office of Information Security (UCIT OIS) represented UCIT in the 2013 version of the annual parade.

  • Mar
    05

    Two shred events, coming right up!

    UCIT Office of Information Security (UCIT OIS) will be having two shred events this Spring. 

    • Main Campus, April 25th from 9 a.m. to 1 p.m.
    • East Campus, May 16th from 9 a.m. to 11:30 a.m.

    For more information, view the flyers here.

  • Jan
    25

    Follow us on Twitter!

    UC_OIS

    The UCIT Office of Information Security is now on Twitter!  Follow @UC_OIS for information security tips, fun facts, and alerts.


  • Jan
    24

    Welcome to the new UCIT Office of Information Security Site

    We have designed our website to be easier for you to find the information you need quickly. If you can't find something in the navigation, try the search box. And if you still can't find it, let us know so we can make improvements via email at infosec@uc.edu.

  • University of Cincinnati UCIT Office of Information Security
  • University Hall
  • 51 Goodman Drive
  • Cincinnati, OH 45221