<?xml version="1.0"?>
<News hasArchived="false" page="2" pageCount="3" pageSize="10" timestamp="Wed, 22 Apr 2026 19:14:19 -0400" url="https://dev.my.umbc.edu/groups/doit/posts.xml?page=2&amp;tag=cybersecurity">
  <NewsItem contentIssues="false" id="153511" important="false" status="posted" url="https://dev.my.umbc.edu/groups/doit/posts/153511">
    <Title>Stop! A DUO Push You Didn't Initiate</Title>
    <Tagline>Cybersecurity Awareness Month</Tagline>
    <Body>
      <![CDATA[
          <div class="html-content"><p>Hello UMBC Community,</p><br><p>We rely on Duo two-factor authentication to protect our accounts, and it's an excellent defense. However, cybercriminals are always looking for new ways to get past our security. This week's topic is all about what to do if you receive a Duo push notification you didn't initiate.</p><p>You're working on your computer, not logging into anything new, and suddenly your phone buzzes with Duo push notifications, including SMS texts or phone calls from Duo. What's happening? This is likely an attacker who has obtained your password and is attempting to bypass Duo to access your account.</p><p><strong>Your immediate action is critical.</strong></p><ul><li><p><strong>Do NOT Approve It: </strong>The most important thing is to never approve a Duo push notification you did not initiate. Approving it will give the attacker access to your account.</p></li><li><p><strong>Deny the Request:</strong> Decline the request on your phone.</p></li><li><p><strong>Report as Fraudulent: </strong>If you can, mark the notification as fraudulent.</p></li><li><p><strong>Change Your Password:</strong> Immediately change your password on a trusted device or computer. This will invalidate the password the attacker is using.</p></li></ul><p>Remember, a Duo push notification is like a digital handshake. You must be the one to initiate it. If someone else is trying to shake your hand, don't approve the connection!</p><p>If you received a Duo push notification you did not initiate, deny the request, change your password, and immediately report the event to the security team at <a href="https://my3.my.umbc.edu/groups/doit/posts/152867/2f8a9/9ea5a53f309c71f879c300bf0bb681ec/web/link?link=mailto%3Asecurity%40umbc.edu" rel="nofollow external" class="bo">security@umbc.edu</a>. Your report helps protect everyone!</p><p>Stay safe out there.</p><p><img src="https://my3.my.umbc.edu/groups/itsecurity/posts/153511/attachments/59521" alt="Fraudulent DUO Push Notification descriptions and MFA for All!" style="max-width: 100%; height: auto;"></p></div>
      ]]>
    </Body>
    <Summary>Hello UMBC Community,   We rely on Duo two-factor authentication to protect our accounts, and it's an excellent defense. However, cybercriminals are always looking for new ways to get past our...</Summary>
    <AttachmentKind>Image</AttachmentKind>
    <AttachmentUrl>https://assets1-dev.my.umbc.edu/system/shared/attachments/03a6802a7d1112575197428daf1af47a/69e9564b/news/000/153/511/85fc0797fcbf06cda270bc538f2692f6/2025 Cybersecurity Awareness Month General Thumbnail.JPG?1760375649</AttachmentUrl>
    <Attachments>
      <Attachment kind="Image" url="https://dev.my.umbc.edu/groups/doit/posts/153511/attachments/59519"></Attachment>
      <Attachment kind="Flyer" url="https://dev.my.umbc.edu/groups/doit/posts/153511/attachments/59520"></Attachment>
      <Attachment kind="Image" url="https://dev.my.umbc.edu/groups/doit/posts/153511/attachments/59521"></Attachment>
    </Attachments>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/153511/guest@my.umbc.edu/e6b38f0e8ed88e40c1fca608330a1eff/api/pixel</TrackingUrl>
    <Tag>cybersecurity</Tag>
    <Tag>mfa</Tag>
    <Tag>security</Tag>
    <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
    <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
    <Sponsor>IT Security - DoIT Cybersecurity Assurance and Digital Trust</Sponsor>
    <ThumbnailUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/thumbnails/news/000/153/511/55d9057dcb2bed6c5984ce33d52dc925/xxlarge.jpg?1760375660</ThumbnailUrl>
    <ThumbnailUrl size="xlarge">https://assets1-dev.my.umbc.edu/system/shared/thumbnails/news/000/153/511/55d9057dcb2bed6c5984ce33d52dc925/xlarge.jpg?1760375660</ThumbnailUrl>
    <ThumbnailUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/thumbnails/news/000/153/511/55d9057dcb2bed6c5984ce33d52dc925/large.jpg?1760375660</ThumbnailUrl>
    <ThumbnailUrl size="medium">https://assets4-dev.my.umbc.edu/system/shared/thumbnails/news/000/153/511/55d9057dcb2bed6c5984ce33d52dc925/medium.jpg?1760375660</ThumbnailUrl>
    <ThumbnailUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/thumbnails/news/000/153/511/55d9057dcb2bed6c5984ce33d52dc925/small.jpg?1760375660</ThumbnailUrl>
    <ThumbnailUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/thumbnails/news/000/153/511/55d9057dcb2bed6c5984ce33d52dc925/xsmall.jpg?1760375660</ThumbnailUrl>
    <ThumbnailUrl size="xxsmall">https://assets4-dev.my.umbc.edu/system/shared/thumbnails/news/000/153/511/55d9057dcb2bed6c5984ce33d52dc925/xxsmall.jpg?1760375660</ThumbnailUrl>
    <ThumbnailAltText>Cybersecurity Awareness Month text on black and gold background</ThumbnailAltText>
    <PawCount>2</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Mon, 13 Oct 2025 13:17:29 -0400</PostedAt>
  </NewsItem>
  <NewsItem contentIssues="false" id="152867" important="false" status="posted" url="https://dev.my.umbc.edu/groups/doit/posts/152867">
    <Title>Stop! A DUO Push You Didn't Initiate</Title>
    <Tagline>Cybersecurity Awareness Month</Tagline>
    <Body>
      <![CDATA[
          <div class="html-content"><p>Hello UMBC Community,</p><br><p>We rely on <strong>Duo two-factor authentication</strong> to protect our accounts, and it's an excellent defense. However, cybercriminals are always looking for new ways to get past our security. This week's topic is all about what to do if you receive a Duo push notification you didn't initiate.</p><p>You're working on your computer, not logging into anything new, and suddenly your phone buzzes with Duo push notifications, including SMS texts or phone calls from Duo. What's happening? This is likely an attacker who has obtained your password and is attempting to bypass Duo to access your account.</p><p><strong>Your immediate action is critical.</strong></p><ul><li><p><strong>Do NOT Approve It:</strong> The most important thing is to <strong>never</strong> approve a Duo push notification you did not initiate. Approving it will give the attacker access to your account.</p></li><li><p><strong>Deny the Request:</strong> Decline the request on your phone.</p></li><li><p><strong>Report as Fraudulent:</strong> If you can, mark the notification as fraudulent.</p></li><li><p><strong>Change Your Password:</strong> Immediately change your password on a trusted device or computer. This will invalidate the password the attacker is using.</p></li></ul><p>Remember, a Duo push notification is like a digital handshake. You must be the one to initiate it. If someone else is trying to shake your hand, don't approve the connection!</p><p>If you received a Duo push notification you did not initiate, deny the request, change your password, and immediately report the event to the security team at <strong><a href="mailto:security@umbc.edu">security@umbc.edu</a></strong>. Your report helps protect everyone!</p><p><strong>Stay safe out there.</strong></p><img src="https://my3.my.umbc.edu/groups/doit/posts/152867/attachments/58958" alt="Fraudulent DUO Push Notification with an example." style="max-width: 100%; height: auto;"></div>
      ]]>
    </Body>
    <Summary>Hello UMBC Community,   We rely on Duo two-factor authentication to protect our accounts, and it's an excellent defense. However, cybercriminals are always looking for new ways to get past our...</Summary>
    <AttachmentKind>Image</AttachmentKind>
    <AttachmentUrl>https://assets4-dev.my.umbc.edu/system/shared/attachments/f27291dc7779e5a187ca19d938743f17/69e9564b/news/000/152/867/74cf190d5c38c1a052d96e4ad0ec10fd/Week 4.png?1758732647</AttachmentUrl>
    <Attachments>
      <Attachment kind="Image" url="https://dev.my.umbc.edu/groups/doit/posts/152867/attachments/58958"></Attachment>
      <Attachment kind="Flyer" url="https://dev.my.umbc.edu/groups/doit/posts/152867/attachments/58996"></Attachment>
    </Attachments>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/152867/guest@my.umbc.edu/2cc7078ed3918c2bb439a52bc0d0239e/api/pixel</TrackingUrl>
    <Tag>cybersecurity</Tag>
    <Tag>mfa</Tag>
    <Tag>security</Tag>
    <Group token="doit">Division of Information Technology (DoIT)</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/doit</GroupUrl>
    <AvatarUrl>https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
    <AvatarUrl size="original">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/original.JPG?1727453227</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxlarge.png?1727453227</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xlarge.png?1727453227</AvatarUrl>
    <AvatarUrl size="large">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/large.png?1727453227</AvatarUrl>
    <AvatarUrl size="medium">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/medium.png?1727453227</AvatarUrl>
    <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/small.png?1727453227</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxsmall.png?1727453227</AvatarUrl>
    <Sponsor>Division of Information Technology (DoIT)</Sponsor>
    <ThumbnailUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/thumbnails/news/000/152/867/b70cbf9796f10cb59eabad854ce1ca91/xxlarge.jpg?1758732569</ThumbnailUrl>
    <ThumbnailUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/thumbnails/news/000/152/867/b70cbf9796f10cb59eabad854ce1ca91/xlarge.jpg?1758732569</ThumbnailUrl>
    <ThumbnailUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/thumbnails/news/000/152/867/b70cbf9796f10cb59eabad854ce1ca91/large.jpg?1758732569</ThumbnailUrl>
    <ThumbnailUrl size="medium">https://assets2-dev.my.umbc.edu/system/shared/thumbnails/news/000/152/867/b70cbf9796f10cb59eabad854ce1ca91/medium.jpg?1758732569</ThumbnailUrl>
    <ThumbnailUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/thumbnails/news/000/152/867/b70cbf9796f10cb59eabad854ce1ca91/small.jpg?1758732569</ThumbnailUrl>
    <ThumbnailUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/thumbnails/news/000/152/867/b70cbf9796f10cb59eabad854ce1ca91/xsmall.jpg?1758732569</ThumbnailUrl>
    <ThumbnailUrl size="xxsmall">https://assets4-dev.my.umbc.edu/system/shared/thumbnails/news/000/152/867/b70cbf9796f10cb59eabad854ce1ca91/xxsmall.jpg?1758732569</ThumbnailUrl>
    <ThumbnailAltText>Cybersecurity Awareness Month: Fraudulent DUO Push Notifications</ThumbnailAltText>
    <PawCount>16</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Mon, 13 Oct 2025 09:01:44 -0400</PostedAt>
  </NewsItem>
  <NewsItem contentIssues="false" id="153400" important="false" status="posted" url="https://dev.my.umbc.edu/groups/doit/posts/153400">
  <Title>Don't Take the Bait! How to Spot a Phishing Scam</Title>
  <Tagline>Cybersecurity Awareness Month</Tagline>
  <Body>
    <![CDATA[
    <div class="html-content"><p>Hello UMBC Community,</p><p>In the digital world, Phishing is one of the most used forms of cyber trickery where attackers impersonate trusted sources to deceive you into handing over credentials or personal information. These attacks come in various forms. Learning about them will help you not fall victim to those emails.</p><p>Phishing attacks are emails that may look like important messages but are actually crafted by cyber criminals. The good news? With the right knowledge, you can foil their tricks and keep yourself and UMBC safe. These are some tips on how you can recognize phishing emails:</p><ol><li><p><strong>Requests for Your Password:</strong> UMBC will never ask for your password. Never submit your password on Google forms or Monday.com forms. Your password is for your eyes only!</p></li><li><p><strong>Unexpected Calendar Invitations:</strong> Watch out for calendar invites from unknown senders. Delete them and never click suspicious links inside.</p></li><li><p><strong>Fraudulent Offers:</strong> Be wary of unsolicited offers for gift cards or jobs that are too promising. Do not send your personal or financial information to anyone who requests it over email or text. Real job postings are on Handshake only!</p></li><li><p><strong>Unexpected Attachments or Links: </strong>Did someone send you a weird file or link you weren't expecting? Is a link in an email suspiciously short or strange-looking? If it feels off, don't click or download it.</p></li><li><p><strong>A Sense of Urgency: </strong>Phishing emails often try to rush you into action, like claiming your account will be "deactivated" if you don't click a link immediately. Always be suspicious of urgent, high-pressure requests.</p></li><li><p><strong>Poor Grammar and Spelling:</strong> While not always a giveaway, many phishing emails contain noticeable spelling errors or awkward phrasing.</p></li></ol><p><strong>What to do if you get a suspicious email:</strong></p><p>If you suspect an email is a phishing attempt, do not reply, click any links, or open any attachments. Instead, forward the email immediately to the security team at <a href="https://my3.my.umbc.edu/groups/doit/posts/152866/2f8a9/7deb560f9e35dc2ee159e78538b7393a/web/link?link=mailto%3Asecurity%40umbc.edu" rel="nofollow external" class="bo">security@umbc.edu</a>. Your report helps protect everyone!</p><p>Stay vigilant, and together we can keep our digital environment safe.</p><p><img src="https://my3.my.umbc.edu/groups/itsecurity/posts/153400/attachments/59389" alt="Avoid Phishing Emails" style="max-width: 100%; height: auto;"></p></div>
]]>
  </Body>
  <Summary>Hello UMBC Community,  In the digital world, Phishing is one of the most used forms of cyber trickery where attackers impersonate trusted sources to deceive you into handing over credentials or...</Summary>
  <AttachmentKind>Newsletter</AttachmentKind>
  <AttachmentUrl>https://assets4-dev.my.umbc.edu/system/shared/attachments/4d6c95a4e3b02da19fcf5181d2a9f65b/69e9564b/news/000/153/400/ea057c6ee9f50f9a65bfa85c550f3fad/2025 Cybersecurity Awareness Month Flyers.pdf?1759945995</AttachmentUrl>
  <Attachments>
    <Attachment kind="Newsletter" url="https://dev.my.umbc.edu/groups/doit/posts/153400/attachments/59388"></Attachment>
    <Attachment kind="Image" url="https://dev.my.umbc.edu/groups/doit/posts/153400/attachments/59389"></Attachment>
  </Attachments>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/153400/guest@my.umbc.edu/1905f817666a334e3785b5ea9b64232d/api/pixel</TrackingUrl>
  <Tag>cybersecurity</Tag>
  <Tag>itsecurity</Tag>
  <Tag>phishing</Tag>
  <Tag>scam</Tag>
  <Tag>security</Tag>
  <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
  <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
  <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
  <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
  <Sponsor>IT Security - DoIT Cybersecurity Assurance and Digital Trust</Sponsor>
  <ThumbnailUrl size="xxlarge">https://assets4-dev.my.umbc.edu/system/shared/thumbnails/news/000/153/400/eda3d05996f7407d552a9d7fc12787c6/xxlarge.jpg?1759945914</ThumbnailUrl>
  <ThumbnailUrl size="xlarge">https://assets1-dev.my.umbc.edu/system/shared/thumbnails/news/000/153/400/eda3d05996f7407d552a9d7fc12787c6/xlarge.jpg?1759945914</ThumbnailUrl>
  <ThumbnailUrl size="large">https://assets2-dev.my.umbc.edu/system/shared/thumbnails/news/000/153/400/eda3d05996f7407d552a9d7fc12787c6/large.jpg?1759945914</ThumbnailUrl>
  <ThumbnailUrl size="medium">https://assets3-dev.my.umbc.edu/system/shared/thumbnails/news/000/153/400/eda3d05996f7407d552a9d7fc12787c6/medium.jpg?1759945914</ThumbnailUrl>
  <ThumbnailUrl size="small">https://assets3-dev.my.umbc.edu/system/shared/thumbnails/news/000/153/400/eda3d05996f7407d552a9d7fc12787c6/small.jpg?1759945914</ThumbnailUrl>
  <ThumbnailUrl size="xsmall">https://assets2-dev.my.umbc.edu/system/shared/thumbnails/news/000/153/400/eda3d05996f7407d552a9d7fc12787c6/xsmall.jpg?1759945914</ThumbnailUrl>
  <ThumbnailUrl size="xxsmall">https://assets1-dev.my.umbc.edu/system/shared/thumbnails/news/000/153/400/eda3d05996f7407d552a9d7fc12787c6/xxsmall.jpg?1759945914</ThumbnailUrl>
  <ThumbnailAltText>Cybersecurity Awareness Month</ThumbnailAltText>
  <PawCount>1</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Wed, 08 Oct 2025 13:55:57 -0400</PostedAt>
</NewsItem>
  <NewsItem contentIssues="false" id="153399" important="false" status="posted" url="https://dev.my.umbc.edu/groups/doit/posts/153399">
    <Title>Welcome to Cybersecurity Awareness Month!</Title>
    <Tagline>Stay connected, stay safe, stay smart!</Tagline>
    <Body>
      <![CDATA[
          <div class="html-content">Hello UMBC Community,<div><br>Cyber threats are always lurking in the digital realm, but don't worry! The security team at <a href="https://my3.my.umbc.edu/groups/doit/posts/152857/2f8a9/cafca9e8f195d27911509c02c2b08099/web/link?link=https%3A%2F%2Fdoit.umbc.edu%2Fabout-cadt%2F" rel="nofollow external" class="bo">Cybersecurity Assurance and Digital Trust (CADT)</a> is here to guide you so you can protect yourself against phishing, malware, and other cyber threats.<br></div><div><br></div><div><h4>What can you expect this month?</h4><br></div><div><h5>Tips to stay safe</h5>October is Cybersecurity Awareness Month and this year, we will be posting cybersecurity tips for the UMBC community each week. </div><div><br></div><h5>Catch a "Fish"!</h5><div>You can also connect with us in person! Come check out our table on your way to lunch on October 6th and 20th from 12:00 to 1:00 PM at Breezeway near the Commons! Catch a fish or spot a phish and get a Swedish fish!<br></div><div><h5>Reminder</h5>Cybersecurity is everyone's responsibility. Together, we will build a strong and resilient security culture. Only by increasing your understanding of cybersecurity can you defend against cyber attacks!<br></div><div>Stay tuned for an amazing month filled with cybersecurity tips, treats, merch, and posters to make learning about cybersecurity fun and memorable!</div><div><br></div><div>Follow <a href="https://my3.my.umbc.edu/groups/doit/posts/152857/2f8a9/6323d224263c7de67108c79d49c28c77/web/link?link=https%3A%2F%2Fmy3.my.umbc.edu%2Fgroups%2Fitsecurity" rel="nofollow external" class="bo">DoIT Security on myUMBC</a> and check out our <a href="https://my3.my.umbc.edu/groups/doit/posts/152857/2f8a9/fbdda07693e2f4ba1d0c20f3895c390c/web/link?link=https%3A%2F%2Fmy3.my.umbc.edu%2Fgroups%2Fitsecurity%2Fposts%2F151776" rel="nofollow external" class="bo">Tips to Stay Safe</a>.</div><div><br></div><div><h5>Do you have questions?</h5>Reach out to us at <a href="https://my3.my.umbc.edu/groups/doit/posts/152857/2f8a9/6acb3527a65ea1b69918d27583e55587/web/link?link=mailto%3Asecurity%40umbc.edu" rel="nofollow external" class="bo">security@umbc.edu</a>!<br></div><div>Thank you, and may your digital defenses be strong this October!</div><div><br></div><div><img src="https://my3.my.umbc.edu/groups/itsecurity/posts/153399/attachments/59386" alt="Cybersecurity Awareness Month, three scams to avoid: 1) Phishing Emails, 2) Fraudulent DUO Push and 3) ClickFix Popup Window." style="max-width: 100%; height: auto;"></div></div>
      ]]>
    </Body>
    <Summary>Hello UMBC Community,  Cyber threats are always lurking in the digital realm, but don't worry! The security team at Cybersecurity Assurance and Digital Trust (CADT) is here to guide you so you can...</Summary>
    <AttachmentKind>Flyer</AttachmentKind>
    <AttachmentUrl>https://assets2-dev.my.umbc.edu/system/shared/attachments/cfe7d30780a12bceffdffdb2497f1571/69e9564b/news/000/153/399/9437e3994929bc613a9f2b7fe5fb4f9f/2025 Cybersecurity Awareness Month Flyers.pdf?1759945719</AttachmentUrl>
    <Attachments>
      <Attachment kind="Flyer" url="https://dev.my.umbc.edu/groups/doit/posts/153399/attachments/59385"></Attachment>
      <Attachment kind="Image" url="https://dev.my.umbc.edu/groups/doit/posts/153399/attachments/59386"></Attachment>
    </Attachments>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/153399/guest@my.umbc.edu/ab2ac6ab53c36e40c6ffcc8d571d1e23/api/pixel</TrackingUrl>
    <Tag>cybersecurity</Tag>
    <Tag>itsecurity</Tag>
    <Tag>security</Tag>
    <Group token="itsecurity">IT Security - DoIT Cybersecurity Assurance and Digital Trust</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/itsecurity</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/original.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xlarge.png?1761588639</AvatarUrl>
    <AvatarUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/large.png?1761588639</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/medium.png?1761588639</AvatarUrl>
    <AvatarUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/small.png?1761588639</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xsmall.png?1761588639</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/001/660/859c6838736bc30c98279ed45d7fd70a/xxsmall.png?1761588639</AvatarUrl>
    <Sponsor>IT Security - DoIT Cybersecurity Assurance and Digital Trust</Sponsor>
    <ThumbnailUrl size="xxlarge">https://assets2-dev.my.umbc.edu/system/shared/thumbnails/news/000/153/399/db4c3bf00068ad845398df26d8dcc4a4/xxlarge.jpg?1759945680</ThumbnailUrl>
    <ThumbnailUrl size="xlarge">https://assets2-dev.my.umbc.edu/system/shared/thumbnails/news/000/153/399/db4c3bf00068ad845398df26d8dcc4a4/xlarge.jpg?1759945680</ThumbnailUrl>
    <ThumbnailUrl size="large">https://assets2-dev.my.umbc.edu/system/shared/thumbnails/news/000/153/399/db4c3bf00068ad845398df26d8dcc4a4/large.jpg?1759945680</ThumbnailUrl>
    <ThumbnailUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/thumbnails/news/000/153/399/db4c3bf00068ad845398df26d8dcc4a4/medium.jpg?1759945680</ThumbnailUrl>
    <ThumbnailUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/thumbnails/news/000/153/399/db4c3bf00068ad845398df26d8dcc4a4/small.jpg?1759945680</ThumbnailUrl>
    <ThumbnailUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/thumbnails/news/000/153/399/db4c3bf00068ad845398df26d8dcc4a4/xsmall.jpg?1759945680</ThumbnailUrl>
    <ThumbnailUrl size="xxsmall">https://assets1-dev.my.umbc.edu/system/shared/thumbnails/news/000/153/399/db4c3bf00068ad845398df26d8dcc4a4/xxsmall.jpg?1759945680</ThumbnailUrl>
    <ThumbnailAltText>Cybersecurity Awareness Month. Stay Connected, stay safe, and stay smart</ThumbnailAltText>
    <PawCount>1</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Wed, 08 Oct 2025 13:51:02 -0400</PostedAt>
  </NewsItem>
  <NewsItem contentIssues="false" id="152866" important="false" status="posted" url="https://dev.my.umbc.edu/groups/doit/posts/152866">
  <Title>Don't Take the Bait! How to Spot a Phishing Scam</Title>
  <Tagline>Cybersecurity Awareness Month</Tagline>
  <Body>
    <![CDATA[
    <div class="html-content"><p>Hello UMBC Community,</p><p>In the digital world, Phishing is one of the most used forms of cyber trickery where attackers impersonate trusted sources to deceive you into handing over credentials or personal information. These attacks come in various forms. Learning about them will help you not fall victim to those emails.</p><p>Phishing attacks are emails that may look like important messages but are actually crafted by cyber criminals. The good news? With the right knowledge, you can foil their tricks and keep yourself and UMBC safe. These are some tips on how you can recognize phishing emails:</p><ol><li><p><strong>Requests for Your Password</strong>: UMBC will <strong>never</strong> ask for your password. Never submit your password on Google forms or Monday.com forms. Your password is for your eyes only!</p></li><li><p><strong>Unexpected Calendar Invitations</strong>: Watch out for calendar invites from unknown senders. Delete them and never click suspicious links inside.</p></li><li><p><strong>Fraudulent Offers</strong>: Be wary of unsolicited offers for gift cards or jobs that are too promising. Do not send your personal or financial information to anyone who requests it over email or text. Real job postings are on Handshake only!</p></li><li><p><strong>Unexpected Attachments or Links</strong>: Did someone send you a weird file or link you weren't expecting? Is a link in an email suspiciously short or strange-looking? If it feels off, don't click or download it.</p></li><li><p><strong>A Sense of Urgency:</strong> Phishing emails often try to rush you into action, like claiming your account will be "deactivated" if you don't click a link immediately. Always be suspicious of urgent, high-pressure requests.</p></li><li><p><strong>Poor Grammar and Spelling:</strong> While not always a giveaway, many phishing emails contain noticeable spelling errors or awkward phrasing.</p></li></ol><p><strong>What to do if you get a suspicious email</strong>:</p><p>If you suspect an email is a phishing attempt, do not reply, click any links, or open any attachments. Instead, forward the email immediately to the security team at <strong><a href="mailto:security@umbc.edu">security@umbc.edu</a></strong>. Your report helps protect everyone!</p><p>Stay vigilant, and together we can keep our digital environment safe.</p><p><img src="https://my3.my.umbc.edu/groups/doit/posts/152866/attachments/58957" alt="How to avoid phishing emails with some example phishing scams." style="max-width: 100%; height: auto;"></p><br></div>
]]>
  </Body>
  <Summary>Hello UMBC Community,  In the digital world, Phishing is one of the most used forms of cyber trickery where attackers impersonate trusted sources to deceive you into handing over credentials or...</Summary>
  <AttachmentKind>Image</AttachmentKind>
  <AttachmentUrl>https://assets1-dev.my.umbc.edu/system/shared/attachments/f8a056d52c77ee072ca960b960d75682/69e9564b/news/000/152/866/8745069c965eed43669165c79cb2f626/Week 2.png?1758732333</AttachmentUrl>
  <Attachments>
    <Attachment kind="Image" url="https://dev.my.umbc.edu/groups/doit/posts/152866/attachments/58957"></Attachment>
    <Attachment kind="Flyer" url="https://dev.my.umbc.edu/groups/doit/posts/152866/attachments/58995"></Attachment>
  </Attachments>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/152866/guest@my.umbc.edu/b1d8a0c967fbaac946337eeb084fe46e/api/pixel</TrackingUrl>
  <Tag>cybersecurity</Tag>
  <Tag>itsecurity</Tag>
  <Tag>security</Tag>
  <Group token="doit">Division of Information Technology (DoIT)</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/doit</GroupUrl>
  <AvatarUrl>https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
  <AvatarUrl size="original">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/original.JPG?1727453227</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxlarge.png?1727453227</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xlarge.png?1727453227</AvatarUrl>
  <AvatarUrl size="large">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/large.png?1727453227</AvatarUrl>
  <AvatarUrl size="medium">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/medium.png?1727453227</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/small.png?1727453227</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxsmall.png?1727453227</AvatarUrl>
  <Sponsor>Division of Information Technology (DoIT)</Sponsor>
  <ThumbnailUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/thumbnails/news/000/152/866/e526a9da2dcc0471152c355392d4c670/xxlarge.jpg?1758732372</ThumbnailUrl>
  <ThumbnailUrl size="xlarge">https://assets2-dev.my.umbc.edu/system/shared/thumbnails/news/000/152/866/e526a9da2dcc0471152c355392d4c670/xlarge.jpg?1758732372</ThumbnailUrl>
  <ThumbnailUrl size="large">https://assets1-dev.my.umbc.edu/system/shared/thumbnails/news/000/152/866/e526a9da2dcc0471152c355392d4c670/large.jpg?1758732372</ThumbnailUrl>
  <ThumbnailUrl size="medium">https://assets4-dev.my.umbc.edu/system/shared/thumbnails/news/000/152/866/e526a9da2dcc0471152c355392d4c670/medium.jpg?1758732372</ThumbnailUrl>
  <ThumbnailUrl size="small">https://assets3-dev.my.umbc.edu/system/shared/thumbnails/news/000/152/866/e526a9da2dcc0471152c355392d4c670/small.jpg?1758732372</ThumbnailUrl>
  <ThumbnailUrl size="xsmall">https://assets1-dev.my.umbc.edu/system/shared/thumbnails/news/000/152/866/e526a9da2dcc0471152c355392d4c670/xsmall.jpg?1758732372</ThumbnailUrl>
  <ThumbnailUrl size="xxsmall">https://assets1-dev.my.umbc.edu/system/shared/thumbnails/news/000/152/866/e526a9da2dcc0471152c355392d4c670/xxsmall.jpg?1758732372</ThumbnailUrl>
  <ThumbnailAltText>Cybersecurity Awareness Month: Avoid Phishing Emails</ThumbnailAltText>
  <PawCount>20</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Mon, 06 Oct 2025 09:18:32 -0400</PostedAt>
</NewsItem>
  <NewsItem contentIssues="false" id="152857" important="false" status="posted" url="https://dev.my.umbc.edu/groups/doit/posts/152857">
    <Title>Welcome to Cybersecurity Awareness Month!</Title>
    <Tagline>Stay connected, stay safe, stay smart!</Tagline>
    <Body>
      <![CDATA[
          <div class="html-content">Hello UMBC Community,<div><br>Cyber threats are always lurking in the digital realm, but don't worry! The security team at <a href="https://doit.umbc.edu/about-cadt/" rel="nofollow external" class="bo">Cybersecurity Assurance and Digital Trust (CADT)</a> is here to guide you so you can protect yourself against phishing, malware, and other cyber threats.<br><br></div><div><h3>What can you expect this month?</h3><br></div><div><h4>Tips to stay safe</h4>October is Cybersecurity Awareness Month and this year, we will be posting cybersecurity tips for the UMBC community each week. </div><div><br></div><h4><span>Catch a "Fish"!</span></h4><div>You can also connect with us in person! Come check out our table on your way to lunch on October 6th and 20th from 12:00 to 1:00 PM at Breezeway near the Commons! Catch a fish or spot a phish and get a Swedish fish!<br><br></div><div><h4>Reminder</h4>Cybersecurity is everyone's responsibility. Together, we will build a strong and resilient security culture. Only by increasing your understanding of cybersecurity can you defend against cyber attacks!<br><br></div><div>Stay tuned for an amazing month filled with cybersecurity tips, treats, merch, and posters to make learning about cybersecurity fun and memorable!</div><div><br></div><div>Follow <a href="https://my3.my.umbc.edu/groups/itsecurity" rel="nofollow external" class="bo">DoIT Security on myUMBC</a> and check out our <a href="https://my3.my.umbc.edu/groups/itsecurity/posts/151776" rel="nofollow external" class="bo">Tips to Stay Safe</a>.</div><div><br></div><div><h4>Do you have questions?</h4>Reach out to us at <a href="mailto:security@umbc.edu">security@umbc.edu</a>!<br><br></div><div>Thank you, and may your digital defenses be strong this October!</div><div><br></div><div><img src="https://my3.my.umbc.edu/groups/doit/posts/152857/attachments/58993" alt="During Cybersecurity Awareness Month, avoid these three scams: 1) Phishing emails, 2) Fraudulent DUO Pushes, and 3) ClickFix." style="max-width: 100%; height: auto;"></div></div>
      ]]>
    </Body>
    <Summary>Hello UMBC Community,  Cyber threats are always lurking in the digital realm, but don't worry! The security team at Cybersecurity Assurance and Digital Trust (CADT) is here to guide you so you can...</Summary>
    <AttachmentKind>Image</AttachmentKind>
    <AttachmentUrl>https://assets4-dev.my.umbc.edu/system/shared/attachments/cda6281045628ac7e459016817a0c5c9/69e9564b/news/000/152/857/2cd18791c6c4f3cfaa670f96535ee20f/3 Scams.png?1758809942</AttachmentUrl>
    <Attachments>
      <Attachment kind="Image" url="https://dev.my.umbc.edu/groups/doit/posts/152857/attachments/58993"></Attachment>
      <Attachment kind="Flyer" url="https://dev.my.umbc.edu/groups/doit/posts/152857/attachments/58994"></Attachment>
    </Attachments>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/152857/guest@my.umbc.edu/23b95aa01bac1c7f1bed4fd0fa1ece59/api/pixel</TrackingUrl>
    <Tag>cybersecurity</Tag>
    <Tag>itsecurity</Tag>
    <Tag>security</Tag>
    <Group token="doit">Division of Information Technology (DoIT)</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/doit</GroupUrl>
    <AvatarUrl>https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
    <AvatarUrl size="original">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/original.JPG?1727453227</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxlarge.png?1727453227</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xlarge.png?1727453227</AvatarUrl>
    <AvatarUrl size="large">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/large.png?1727453227</AvatarUrl>
    <AvatarUrl size="medium">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/medium.png?1727453227</AvatarUrl>
    <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/small.png?1727453227</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxsmall.png?1727453227</AvatarUrl>
    <Sponsor>Division of Information Technology (DoIT)</Sponsor>
    <ThumbnailUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/thumbnails/news/000/152/857/81c00a4703d8a7a190b1d8e4a6fff6ae/xxlarge.jpg?1758727153</ThumbnailUrl>
    <ThumbnailUrl size="xlarge">https://assets2-dev.my.umbc.edu/system/shared/thumbnails/news/000/152/857/81c00a4703d8a7a190b1d8e4a6fff6ae/xlarge.jpg?1758727153</ThumbnailUrl>
    <ThumbnailUrl size="large">https://assets2-dev.my.umbc.edu/system/shared/thumbnails/news/000/152/857/81c00a4703d8a7a190b1d8e4a6fff6ae/large.jpg?1758727153</ThumbnailUrl>
    <ThumbnailUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/thumbnails/news/000/152/857/81c00a4703d8a7a190b1d8e4a6fff6ae/medium.jpg?1758727153</ThumbnailUrl>
    <ThumbnailUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/thumbnails/news/000/152/857/81c00a4703d8a7a190b1d8e4a6fff6ae/small.jpg?1758727153</ThumbnailUrl>
    <ThumbnailUrl size="xsmall">https://assets1-dev.my.umbc.edu/system/shared/thumbnails/news/000/152/857/81c00a4703d8a7a190b1d8e4a6fff6ae/xsmall.jpg?1758727153</ThumbnailUrl>
    <ThumbnailUrl size="xxsmall">https://assets2-dev.my.umbc.edu/system/shared/thumbnails/news/000/152/857/81c00a4703d8a7a190b1d8e4a6fff6ae/xxsmall.jpg?1758727153</ThumbnailUrl>
    <ThumbnailAltText>Cybersecurity Awareness Month</ThumbnailAltText>
    <PawCount>11</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Wed, 01 Oct 2025 09:07:49 -0400</PostedAt>
    <EditAt>Wed, 01 Oct 2025 09:57:21 -0400</EditAt>
  </NewsItem>
  <NewsItem contentIssues="false" id="152837" important="false" status="posted" url="https://dev.my.umbc.edu/groups/doit/posts/152837">
  <Title>Maryland Institute for Innovative Computing: U.S. Cyber Range</Title>
  <Tagline>Explore our First Newsletter - September 2025 Edition</Tagline>
  <Body>
    <![CDATA[
    <div class="html-content"><p><strong>Welcome </strong>to the Maryland Institute for Innovative Computing (MIIC) newsletter.</p><p>MIIC's purpose is to bring together researchers, educators, industry, and government to address challenges in areas such as cybersecurity, artificial intelligence, and cloud computing. Our goal is to keep Maryland at the forefront of discovery while providing opportunities for students, educators, and professionals to develop the skills needed in today's technology-driven world.</p><p><em>"The Range is a perfect fit for student-driven projects—whether they're preparing for competitions or building their own capture-the-flag challenges." </em></p><div>- Paul Thompson</div><div><br></div><p>In this first issue, we highlight one of our flagship initiatives: Maryland's access to the U.S. Cyber Range. This cloud-based training environment provides hands-on cybersecurity learning without the need for local infrastructure.</p><p>Thanks to state support, K–12 school systems and public higher education institutions can use the platform at no cost.</p><p>This newsletter will feature updates, events, and opportunities to engage with MIIC. We look forward to building this community together! </p><p><em><strong>For the complete newsletter, please check out the flyer attached!</strong></em></p><p><img src="https://my3.my.umbc.edu/groups/doit/posts/152837/attachments/58948" alt="MIIC September Newsletter Sample page 1" style="max-width: 100%; height: auto;"></p><p><img src="https://my3.my.umbc.edu/groups/doit/posts/152837/attachments/58949" alt="MIIC September Newsletter Sample page 2" style="max-width: 100%; height: auto;"></p><p><img src="https://my3.my.umbc.edu/groups/doit/posts/152837/attachments/58950" alt="MIIC September Newsletter Sample page 3" style="max-width: 100%; height: auto;"></p><p><strong></strong></p><p></p><p></p><p></p><p><strong></strong></p><div><p></p></div></div>
]]>
  </Body>
  <Summary>Welcome to the Maryland Institute for Innovative Computing (MIIC) newsletter.  MIIC's purpose is to bring together researchers, educators, industry, and government to address challenges in areas...</Summary>
  <AttachmentKind>Newsletter</AttachmentKind>
  <AttachmentUrl>https://assets4-dev.my.umbc.edu/system/shared/attachments/66a28fa55b739802b28a9d93e5d14bc3/69e9564c/news/000/152/837/d2477fc4bf0dc177f12260233f22eff2/September 2025 MIIC Newsletter.pdf?1758660844</AttachmentUrl>
  <Attachments>
    <Attachment kind="Newsletter" url="https://dev.my.umbc.edu/groups/doit/posts/152837/attachments/58939"></Attachment>
    <Attachment kind="Image" url="https://dev.my.umbc.edu/groups/doit/posts/152837/attachments/58948"></Attachment>
    <Attachment kind="Image" url="https://dev.my.umbc.edu/groups/doit/posts/152837/attachments/58949"></Attachment>
    <Attachment kind="Image" url="https://dev.my.umbc.edu/groups/doit/posts/152837/attachments/58950"></Attachment>
  </Attachments>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/152837/guest@my.umbc.edu/d5531e02fa6f8df054abcfc5aeef739a/api/pixel</TrackingUrl>
  <Tag>cybersecurity</Tag>
  <Tag>maryland</Tag>
  <Tag>miic</Tag>
  <Group token="doit">Division of Information Technology (DoIT)</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/doit</GroupUrl>
  <AvatarUrl>https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
  <AvatarUrl size="original">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/original.JPG?1727453227</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxlarge.png?1727453227</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xlarge.png?1727453227</AvatarUrl>
  <AvatarUrl size="large">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/large.png?1727453227</AvatarUrl>
  <AvatarUrl size="medium">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/medium.png?1727453227</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/small.png?1727453227</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxsmall.png?1727453227</AvatarUrl>
  <Sponsor>Division of Information Technology (DoIT)</Sponsor>
  <ThumbnailUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/thumbnails/news/000/152/837/6c7acd763f22d8f11202266eebf1aed9/xxlarge.jpg?1758720037</ThumbnailUrl>
  <ThumbnailUrl size="xlarge">https://assets1-dev.my.umbc.edu/system/shared/thumbnails/news/000/152/837/6c7acd763f22d8f11202266eebf1aed9/xlarge.jpg?1758720037</ThumbnailUrl>
  <ThumbnailUrl size="large">https://assets1-dev.my.umbc.edu/system/shared/thumbnails/news/000/152/837/6c7acd763f22d8f11202266eebf1aed9/large.jpg?1758720037</ThumbnailUrl>
  <ThumbnailUrl size="medium">https://assets2-dev.my.umbc.edu/system/shared/thumbnails/news/000/152/837/6c7acd763f22d8f11202266eebf1aed9/medium.jpg?1758720037</ThumbnailUrl>
  <ThumbnailUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/thumbnails/news/000/152/837/6c7acd763f22d8f11202266eebf1aed9/small.jpg?1758720037</ThumbnailUrl>
  <ThumbnailUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/thumbnails/news/000/152/837/6c7acd763f22d8f11202266eebf1aed9/xsmall.jpg?1758720037</ThumbnailUrl>
  <ThumbnailUrl size="xxsmall">https://assets1-dev.my.umbc.edu/system/shared/thumbnails/news/000/152/837/6c7acd763f22d8f11202266eebf1aed9/xxsmall.jpg?1758720037</ThumbnailUrl>
  <ThumbnailAltText>MIIC US Cyber Range Newsletter with a laptop running code displayed</ThumbnailAltText>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Wed, 24 Sep 2025 09:51:00 -0400</PostedAt>
</NewsItem>
  <NewsItem contentIssues="false" id="150425" important="false" status="posted" url="https://dev.my.umbc.edu/groups/doit/posts/150425">
  <Title>UMBC Student experience at The Consortium of Cybersecurity Clinics</Title>
  <Tagline>Event Recap: Spring 2025 &#8220;Clinic of Clinics&#8221;</Tagline>
  <Body>
    <![CDATA[
    <div class="html-content"> <div><span>By Tejas Ramlal Walke, Student, University of Maryland, Baltimore County</span> | <span>May 15, 2025</span></div> <div><p><br></p><p>On April 24, 2025, the Consortium of Cybersecurity Clinics held the Spring 2025 “Clinic of Clinics” event, bringing together over 140 students from more than 40 Cybersecurity Clinics across the world. This is a biannual event held each semester and gives students who are working in their school’s cybersecurity clinic a chance to connect with peers and learn from top experts in the field.</p><p>The Consortium of Cybersecurity Clinics is a collaborative network of higher education-based cybersecurity clinics focused on serving community organizations. The Consortium plays a key role in connecting these clinics, sharing resources, and assessing the impact of clinics on students and the communities they serve.</p><h4><span>General (Ret.) Paul M. Nakasone</span></h4><p>The highlight of the event was a keynote by <a href="https://engineering.vanderbilt.edu/bio/?pid=paul-nakasone" rel="nofollow external" class="bo">General (Ret.) Paul M. Nakasone</a>, who led as the former Director of the National Security Agency (NSA) and Commander at U.S. Cyber Command. He is now the founding director of <a href="https://www.vanderbilt.edu/national-security/" rel="nofollow external" class="bo">Vanderbilt University’s Institute for National Security</a>.</p><h4><span>Inside the NSA and U.S. Cyber Command</span></h4><div><img width="538" height="542" src="https://cybersecurityclinics.org/wp-content/uploads/2025/05/paul-nakasone-headshot.png" alt="General (Ret.) Paul M. Nakasone" style="max-width: 100%; height: auto;">Paul M. Nakasone</div><p>General Nakasone started the keynote with a powerful and inspiring statement for the students in attendance, “The future is about talent, and you represent that talent.” He then shared his experiences in the former roles at the National Security Agency (NSA) and U.S. Cyber Command, two organizations that play a very crucial role in securing the nation’s digital infrastructure. He explained the simple yet powerful mission of the NSA: “We make code, and we break code.” The NSA develops cryptographic keys, codes, and encryption technologies in order to protect the country’s most sensitive communications and defense platforms. NSA also plays a critical role in national intelligence by monitoring adversarial activity.</p><p>As for U.S. Cyber Command, General Nakasone outlined three core missions:</p><ol><li>Defending Department of Defense networks, data, and weapon systems: Supporting over 4.5 million users and maintaining constant mobility, this infrastructure serves as the foundation for global military operations.</li><li>Providing cyber support to U.S. forces deployed worldwide: From Korea to Iraq and Afghanistan, Cyber Command maintains cyber readiness and protection in active military environments.</li><li>Protecting the nation in cyberspace: Cyber Command works with the Department of Homeland Security (DHS), the FBI, and the private sector to protect US elections and other critical democratic functions from foreign interference.</li></ol><h4><span>Disruptive Technologies and the Importance of Adaptation</span></h4><p>The keynote was structured with three core themes: disruptive technologies, the current state of cybersecurity, and the skill sets needed for tomorrow’s leaders. To demonstrate the impact of disruptive technologies, General Nakasone talked about <a href="https://www.youtube.com/watch?v=MnrJzXM7a6o" rel="nofollow external" class="bo">Steve Jobs’ 2007 announcement of the iPhone</a>, which he described as “the most disruptive technology of the 21st century.” He compared the companies that embraced the adoption of and adaptation to mobile innovation, like Amazon and Google, with those that ignored the shift, such as Blockbuster, Blackberry, and Nokia. Through this comparison, he explained how early action can shape long-term relevance and success for companies in a world with rapidly evolving technologies, “You can adopt, adapt, or avoid. Choose wisely.”</p><img width="1024" height="572" src="https://cybersecurityclinics.org/wp-content/uploads/2025/05/nakasone-ppt-2-1024x572.png" alt="A hexagonal collage showing logos and phone screens for Meta AI, Anthropic, Google Gemini, Apple Intelligence, Microsoft Copilot, and OpenAI ChatGPT." style="max-width: 100%; height: auto;"><h4><span>Artificial Intelligence: Promise and Risk</span></h4><p>General Nakasone explained how today’s biggest disruptive technology, Artificial Intelligence, presents both huge opportunities and serious concerns. He then reflected on the launch of ChatGPT, noting its quick growth: over 1 million users in just five days, and 100 million within two months—a pace that significantly exceeded the internet’s initial expansion, which took seven years to reach 50 million users. He called the capabilities of current AI models as “truly outstanding,” citing their quick developments in areas like coding, reasoning, deep research, and even image generation. While he found the new technology to be exciting, he highlighted the need for responsible advancement and called for national investment in talent, energy, compute, chips, and data that would ensure the safe development and application of AI. With regard to cybersecurity, he mentioned several concerns, including the emergence of deepfakes. Fortunately, defense against malicious deepfakes outperformed offense in the 2024 U.S. presidential election.  Additionally, he expressed worries about the possibility of backdoors in open-source AI models, a recent example would be DeepSeek, and the danger of data poisoning during AI model training, vulnerabilities that may be used to infiltrate critical systems. Despite these risks, he maintained his optimism that AI would advance industries like national defense, education, and medicine, stating that the technology has him “riveted on the future.”</p><h4><span>The Geopolitical Landscape: Three Arcs of Global Security</span></h4><p>Shifting to a broader strategic view, General Nakasone defined today’s global security environment through what he described as three arcs of geopolitics. In the first arc, he explained the rise of China, showing how it went from a $114 billion economy in 1972 to a $17 trillion global power with expanding diplomatic, informational, and military influence today. The second arc focused on active conflicts, such as the Russia-Ukraine War, and ongoing instability in the Middle East. He explained how digital capabilities, like laptops connected through satellite internet, have made it possible for unprecedented disruption, pointing out that Ukraine has disabled more than half of Russia’s Black Sea Fleet despite having no navy. “This is the future of conflict,” he said, where non-kinetic cyber operations increasingly shape kinetic outcomes. The third arc addressed the threats that cross borders, such as pandemics, climate change, and cybersecurity itself, reminding us all that geographic boundaries no longer protect countries from cyberattacks. When combined, these three arcs show how intricately cyberspace has woven itself into both national security and international relations.</p><img src="https://cybersecurityclinics.org/wp-content/uploads/2025/05/nakasone-ppt-1.png" alt="A collage featuring images of a street in Asia, war destruction, city skyline, shipping, computer chip, military tank, cybersecurity, and a masked person." style="max-width: 100%; height: auto;"><h4><span>A Closer Look at Today’s Cybersecurity Threats</span></h4><p>General Nakasone also talked about the current cybersecurity threats. Last year, there were over 5,000 recorded ransomware attacks in the United States, which is a 15% increase from the prior year. He shared that when companies like Microsoft release updates, the attackers are able to exploit vulnerabilities within just five days, putting intense pressure on organizations to patch systems quickly. What’s even more concerning is that it takes an average of 194 days to detect an intrusion and 58 days to remove it. These three elements present a very challenging picture as we think about cybersecurity today and into the future.</p><h4><span>The Four Basics That Defeat 96% of Threats</span></h4><p>To tackle these challenges, General Nakasone stressed the importance of renewed commitment to “defense in depth,” urging cybersecurity experts to actively look for threats, conduct penetration tests, and prioritize patching. He also shared the four simple practices that can provide protection against 96% of known adversaries. Those four practices are:</p><ol><li>Keeping the systems updated.</li><li>Using strong passwords</li><li>Recognizing phishing attempts</li><li>Enabling multi-factor authentication (MFA)</li></ol><h4><span>What Makes a Great Cybersecurity Leader?</span></h4><p>General Nakasone concluded his presentation by outlining the three traits a cybersecurity professional must have: </p><ol><li>Critical thinking</li><li>Communication skills</li><li>Character</li></ol><p>He shared about this experience about how no one asked him what he majored in after college. Instead, they wanted to see if he could break down a complex problem, communicate clearly, and hold strong values. “Character,” he said, “is what you are in the dark. It’s what you stand for when no one’s watching.”</p><h4><span>Q&amp;A Session</span></h4><p>After the keynote, students from clinics across the world got the chance to ask questions directly to General Nakasone. The Q&amp;A session turned out to be one of the most captivating parts of the event, with questions ranging from privacy and national security to AI regulation, policy and career advice.</p><p>Key Takeaways from the Q&amp;A Session:</p><ol><li>Collaboration is key: Effective cybersecurity requires coordination between the government, the private sector, and academia. Each brings together strengths to solve complex challenges.</li><li>Technical leaders are in demand: “We need leaders who code, and coders who can lead.”</li><li>Strategic government investment in education, talent, and infrastructure can drive innovation, just as it did with the interstate highway system and GPS.</li></ol><h4><span>Breakout Sessions: Peer Connections and Takeaways</span></h4><p>After the conclusion of the keynote and Q&amp;A, the students were moved to breakout rooms, where they discussed engaging prompts. These sessions allowed everyone to make personal connections, share stories, and think about their clinic work from a new perspective.</p><h4><span>Final Reflections</span></h4><p>The Spring 2025 “Clinic of Clinics” was an insightful event where students connected with each other and learned how cybersecurity relies on people driven by shared values, teamwork, and a desire to learn. General Nakasone’s keynote shed light on today’s most critical challenges and sparked inspiration about the future we’re creating together. In his closing remarks, he quoted Steve Jobs, <em>“Everyone here has a sense that right now is one of the moments that we are influencing the future.” </em></p><p>Listening to his keynote certainly made us all feel we were in one.</p><p>The original post can be found at <a href="https://cybersecurityclinics.org/blog/event-recap-spring-2025-clinic-of-clinics/" rel="nofollow external" class="bo">The Consortium of Cybersecurity Clinics</a>.</p></div></div>
]]>
  </Body>
  <Summary>By Tejas Ramlal Walke, Student, University of Maryland, Baltimore County | May 15, 2025       On April 24, 2025, the Consortium of Cybersecurity Clinics held the Spring 2025 “Clinic of Clinics”...</Summary>
  <Website>https://cybersecurityclinics.org/blog/event-recap-spring-2025-clinic-of-clinics/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/150425/guest@my.umbc.edu/b8b76075328f4671f1f7facc7eae2baa/api/pixel</TrackingUrl>
  <Tag>cybersecurity</Tag>
  <Tag>miic</Tag>
  <Group token="doit">Division of Information Technology (DoIT)</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/doit</GroupUrl>
  <AvatarUrl>https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
  <AvatarUrl size="original">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/original.JPG?1727453227</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxlarge.png?1727453227</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xlarge.png?1727453227</AvatarUrl>
  <AvatarUrl size="large">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/large.png?1727453227</AvatarUrl>
  <AvatarUrl size="medium">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/medium.png?1727453227</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/small.png?1727453227</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxsmall.png?1727453227</AvatarUrl>
  <Sponsor>Division of Information Technology (DoIT)</Sponsor>
  <ThumbnailUrl size="xxlarge">https://assets4-dev.my.umbc.edu/system/shared/thumbnails/news/000/150/425/24a2cc0522ee3fd90db81ffe48593c75/xxlarge.jpg?1748375268</ThumbnailUrl>
  <ThumbnailUrl size="xlarge">https://assets1-dev.my.umbc.edu/system/shared/thumbnails/news/000/150/425/24a2cc0522ee3fd90db81ffe48593c75/xlarge.jpg?1748375268</ThumbnailUrl>
  <ThumbnailUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/thumbnails/news/000/150/425/24a2cc0522ee3fd90db81ffe48593c75/large.jpg?1748375268</ThumbnailUrl>
  <ThumbnailUrl size="medium">https://assets3-dev.my.umbc.edu/system/shared/thumbnails/news/000/150/425/24a2cc0522ee3fd90db81ffe48593c75/medium.jpg?1748375268</ThumbnailUrl>
  <ThumbnailUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/thumbnails/news/000/150/425/24a2cc0522ee3fd90db81ffe48593c75/small.jpg?1748375268</ThumbnailUrl>
  <ThumbnailUrl size="xsmall">https://assets4-dev.my.umbc.edu/system/shared/thumbnails/news/000/150/425/24a2cc0522ee3fd90db81ffe48593c75/xsmall.jpg?1748375268</ThumbnailUrl>
  <ThumbnailUrl size="xxsmall">https://assets2-dev.my.umbc.edu/system/shared/thumbnails/news/000/150/425/24a2cc0522ee3fd90db81ffe48593c75/xxsmall.jpg?1748375268</ThumbnailUrl>
  <ThumbnailAltText>The Consortium of Cybersecurity Clinics logo displayed on a purple gradient background with digital glitch-style lines on the left side.</ThumbnailAltText>
  <PawCount>2</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Wed, 28 May 2025 08:34:42 -0400</PostedAt>
</NewsItem>
  <NewsItem contentIssues="false" id="149518" important="false" status="posted" url="https://dev.my.umbc.edu/groups/doit/posts/149518">
  <Title>DoIT Student Digital Stories: Anna Plass</Title>
  <Tagline>Journey in Information Systems and Cybersecurity</Tagline>
  <Body>
    <![CDATA[
    <div class="html-content"><span><p><span>Follow Anna Plass's journey in information systems and cybersecurity in the Division of Information Technology (DoIT), discovering the importance of professional skills, teamwork, and continuous learning in the field.</span></p><br><p><span><span><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXdMl_FS3yDiw0IKJwuahwjQFjFkHEXh-iOQ1B1hH5HbpvZ4fYKBKjsFa5-iNOJsJUkYHJBBNXQDo4LuVCDraok1aKMUD2VRG3hijov6XFYyBRmUNmDCU0T5ccT53-X4BEIVEjO_4g?key=dDzsGfHIiXXZhzVANXcohFc3" width="624" height="359" alt="Anna is working at her desk with three computer screens." style="max-width: 100%; height: auto;"></span></span></p><p><br></p><h3><span>My Journey in Information Systems and Cybersecurity Assurance</span></h3><br><br><p><span>Hello everyone, I’m Anna Plass, a senior currently advancing my education in Information Systems with a minor in Computer Science. I am also working in Cybersecurity Assurance and Digital Trust, focusing on safeguarding systems and data within a corporate environment. Through my experiences, I've developed a unique perspective on what it takes to thrive in this dynamic and ever-evolving field.</span></p><br><h4><span>Starting Point: Joining DoIT</span></h4><br><p><span>I embarked on my journey with DoIT in June 2024, a decision that marked the start of an exciting chapter in my educational and professional development. At DoIT, I've been fortunate to engage with numerous projects, particularly those that make extensive use of our various security tools.</span></p><br><h4><span>The Puzzle of Cybersecurity</span></h4><br><p><span>One of the most exhilarating aspects of working in cybersecurity is the investigative nature of the job. Often, you only have fragments of a story, and your task is to find the missing pieces and fit them together like a puzzle. This detective work keeps the job fascinating, as every day presents a new challenge or mystery to solve, ensuring that no two days are ever the same.</span></p><br><h4><span>Professional Growth</span></h4><br><h5><span>Communication Skills</span></h5><br><p><span>Working at DoIT has significantly impacted my future, offering me innumerable opportunities to hone essential professional skills. One of the key areas of growth has been in communication across different departments. Effective communication is critical in cybersecurity, as it ensures that everyone is on the same page regarding security protocols and threat assessments.</span></p><br><h5><span><span><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXd8T0v0dJKK_gvGCocf7KrVbIu-bxLFPvHEWJpKaOC_vAfJgcmrnqSUql8PVwOwYVz659N5bz4fXTOys4rOzSyeCneD-oyUThVWislowL8Jo9fTzOKV8Wf13UUn7T0UxB0AQmsX?key=dDzsGfHIiXXZhzVANXcohFc3" width="624" height="356" alt="Anna Plass is walking up the stairs in the Engineering Building." style="max-width: 100%; height: auto;"></span></span></h5><h5><span>T</span><span>echnical Writing</span></h5><br><p><span>Likewise, technical writing is another skill I’ve sharpened during my time here. Being able to document processes, write reports, and create clear instructions is vital in cybersecurity assurance. DoIT has provided a robust platform for me to develop these skills.</span></p><br><h5><span>Time Management</span></h5><br><p><span>Time management, often overlooked, is crucial in this field. Balancing multiple responsibilities, ensuring the timely completion of tasks, and effectively prioritizing work are all skills I’ve developed through my projects at DoIT.</span></p><br><h5><span>Creating Memories</span></h5><br><p><span>Apart from the professional growth, my time at DoIT has also been about creating memories with my colleagues. One of the most enjoyable traditions we've maintained involves getting lunch together frequently during summer and winter breaks. These moments away from the office foster a sense of camaraderie and bond us as a team, making the work environment supportive and enjoyable.</span></p><br><h4><span>Advice for New Students</span></h4><br><p><span>For any new student joining DoIT, my advice is simple: never be afraid to ask questions. When you first join, it’s likely you won't have extensive experience in the field. Recognize that you are in a learning phase, and the full-time staff are there to help you gain these essential skills and experiences. Asking questions enables you to understand better and perform your duties more effectively.</span></p><br><h2><span>Looking Forward</span></h2><br><p><span>As I look to the future, I plan on staying with DoIT over the summer. This extended period will allow me to thoroughly explore various job opportunities in cybersecurity. The additional time at DoIT will not only bolster my experience but also provide more chances to refine my skills further before stepping out into the broader job market.</span></p><br><h2><span>Concluding Thoughts</span></h2><br><p><span>Working at DoIT has been an incredibly rewarding experience, providing me with a solid foundation in cybersecurity. The skills I've developed, the puzzles I've solved, and the bonds I've formed will undoubtedly serve me well as I continue to pursue my passion for cybersecurity. I look forward to applying these experiences to future opportunities and continuing to grow within this thrilling and essential field.</span></p><br><h1><span>Shout-out from DoIT!</span></h1><p><span>Next on her journey, Anna will be graduating in May 2025 from the University of Maryland, Baltimore County, with a BS in Information Systems and a minor in Computer Science. </span><span>Congratulations Anna!</span></p><br><p><a href="https://www.youtube.com/watch?v=M2gFpTYyqPY" rel="nofollow external" class="bo"><span>Watch her complete video here!</span></a></p><br><p><span>The first draft of the above announcement was generated using AI and edited by the Division of Information Technology Communications and IT teams.</span></p><div><span><br></span></div></span></div>
]]>
  </Body>
  <Summary>Follow Anna Plass's journey in information systems and cybersecurity in the Division of Information Technology (DoIT), discovering the importance of professional skills, teamwork, and continuous...</Summary>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/149518/guest@my.umbc.edu/e10f5f4277dc11ee2d6e38f39517651d/api/pixel</TrackingUrl>
  <Tag>cybersecurity</Tag>
  <Tag>doit-students</Tag>
  <Tag>success</Tag>
  <Group token="doit">Division of Information Technology (DoIT)</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/doit</GroupUrl>
  <AvatarUrl>https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
  <AvatarUrl size="original">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/original.JPG?1727453227</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxlarge.png?1727453227</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xlarge.png?1727453227</AvatarUrl>
  <AvatarUrl size="large">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/large.png?1727453227</AvatarUrl>
  <AvatarUrl size="medium">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/medium.png?1727453227</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/small.png?1727453227</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxsmall.png?1727453227</AvatarUrl>
  <Sponsor>Division of Information Technology (DoIT)</Sponsor>
  <ThumbnailUrl size="xxlarge">https://assets4-dev.my.umbc.edu/system/shared/thumbnails/news/000/149/518/704b40d54c79d95e49cee72cd68c93ee/xxlarge.jpg?1745846098</ThumbnailUrl>
  <ThumbnailUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/thumbnails/news/000/149/518/704b40d54c79d95e49cee72cd68c93ee/xlarge.jpg?1745846098</ThumbnailUrl>
  <ThumbnailUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/thumbnails/news/000/149/518/704b40d54c79d95e49cee72cd68c93ee/large.jpg?1745846098</ThumbnailUrl>
  <ThumbnailUrl size="medium">https://assets3-dev.my.umbc.edu/system/shared/thumbnails/news/000/149/518/704b40d54c79d95e49cee72cd68c93ee/medium.jpg?1745846098</ThumbnailUrl>
  <ThumbnailUrl size="small">https://assets3-dev.my.umbc.edu/system/shared/thumbnails/news/000/149/518/704b40d54c79d95e49cee72cd68c93ee/small.jpg?1745846098</ThumbnailUrl>
  <ThumbnailUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/thumbnails/news/000/149/518/704b40d54c79d95e49cee72cd68c93ee/xsmall.jpg?1745846098</ThumbnailUrl>
  <ThumbnailUrl size="xxsmall">https://assets2-dev.my.umbc.edu/system/shared/thumbnails/news/000/149/518/704b40d54c79d95e49cee72cd68c93ee/xxsmall.jpg?1745846098</ThumbnailUrl>
  <ThumbnailAltText>Graduation caps flying in the air with the words DoIT Student Digital Stories: Anna Plass</ThumbnailAltText>
  <PawCount>9</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Mon, 28 Apr 2025 09:18:29 -0400</PostedAt>
</NewsItem>
  <NewsItem contentIssues="true" id="145112" important="false" status="posted" url="https://dev.my.umbc.edu/groups/doit/posts/145112">
    <Title>Cybersecurity Awareness: Install Updates</Title>
    <Tagline>Keep your system up-to-date by installing updates</Tagline>
    <Body>
      <![CDATA[
          <div class="html-content"><span><h4><span>Update the Operating System (OS)</span></h4><p><span>Install operating system updates on all of your devices as soon as possible. Attackers won’t wait so neither should you!</span></p><br><h4><span>Update Anti-Virus (AV)</span></h4><p><span>Keep your anti-virus up-to-date so it can help keep you safe.</span></p><br><h4><span>Update Software</span></h4><p><span>Make sure all applications and software are updated and patched against known vulnerabilities. **</span><span>Patches are pushed automatically to DoIT-Managed devices.**</span></p><br><h2><span><span><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXcUcr5uykqmzdpLLZUS_0KRAo5fJq_dvUQDIKmbqosx9CCVKetOuBq6UX6Mm1cZFCkbChtCE_PjnJ_hfRAiDf7sKJzqykRmgUV-cmr7MezVOW_7oczu94NXkZ0smBtDd2pOrPn0dOskMApfeUAgdw-Zqeh7?key=ciB3wloKbf3CHOE_YTEWCg" width="323" height="424" style="max-width: 100%; height: auto;"></span></span><span> </span></h2><h3><span><u><br></u></span></h3><h3><span><u>Keep Software Up to Date with 3 Simple Steps</u></span></h3><div><span><br></span></div><h4><span>1. Watch for notifications</span></h4><p><span>Our devices will usually notify us that we need to run updates. This includes our devices’ operating systems, programs, and apps. It’s important to install ALL updates, especially for our web browsers and antivirus software. </span></p><h4><span>2. Install updates as soon as possible</span></h4><p><span>When notified about software updates, especially critical updates, we should be sure to install them as soon as possible. Malicious online criminals won’t wait, so we shouldn’t either!   </span></p><h4><span>3. Turn on automatic updates</span></h4><p><span>With automatic updates, our devices will install updates without any input from us as soon as the update is available—Easy! </span></p><p><span>To turn on the automatic updates feature, look in the device’s settings, possibly under Software or Security. Search settings for “automatic updates” if needed.</span></p><p><br></p><p><span>Source: <a href="https://www.cisa.gov/secure-our-world/update-software">https://www.cisa.gov/secure-our-world/update-software</a></span></p><div><span><br></span></div><div><span><span><p><span>For more information about UMBC’s cybersecurity initiatives, go to </span><a href="http://doit.umbc.edu/security" rel="nofollow external" class="bo"><span>doit.umbc.edu/security</span></a><span>. </span></p><div><span><br></span></div></span></span></div></span></div>
      ]]>
    </Body>
    <Summary>Update the Operating System (OS)  Install operating system updates on all of your devices as soon as possible. Attackers won’t wait so neither should you!   Update Anti-Virus (AV)  Keep your...</Summary>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/145112/guest@my.umbc.edu/307eac6d4ff335c840d58031476c98d2/api/pixel</TrackingUrl>
    <Tag>cybersecurity</Tag>
    <Tag>software</Tag>
    <Tag>updates</Tag>
    <Group token="doit">Division of Information Technology (DoIT)</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/doit</GroupUrl>
    <AvatarUrl>https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
    <AvatarUrl size="original">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/original.JPG?1727453227</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxlarge.png?1727453227</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xlarge.png?1727453227</AvatarUrl>
    <AvatarUrl size="large">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/large.png?1727453227</AvatarUrl>
    <AvatarUrl size="medium">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/medium.png?1727453227</AvatarUrl>
    <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/small.png?1727453227</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxsmall.png?1727453227</AvatarUrl>
    <Sponsor>Division of Information Technology (DoIT)</Sponsor>
    <ThumbnailUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/thumbnails/news/000/145/112/9c9b99ca6d934d5f49a87743a2178453/xxlarge.jpg?1730123371</ThumbnailUrl>
    <ThumbnailUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/thumbnails/news/000/145/112/9c9b99ca6d934d5f49a87743a2178453/xlarge.jpg?1730123371</ThumbnailUrl>
    <ThumbnailUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/thumbnails/news/000/145/112/9c9b99ca6d934d5f49a87743a2178453/large.jpg?1730123371</ThumbnailUrl>
    <ThumbnailUrl size="medium">https://assets3-dev.my.umbc.edu/system/shared/thumbnails/news/000/145/112/9c9b99ca6d934d5f49a87743a2178453/medium.jpg?1730123371</ThumbnailUrl>
    <ThumbnailUrl size="small">https://assets4-dev.my.umbc.edu/system/shared/thumbnails/news/000/145/112/9c9b99ca6d934d5f49a87743a2178453/small.jpg?1730123371</ThumbnailUrl>
    <ThumbnailUrl size="xsmall">https://assets4-dev.my.umbc.edu/system/shared/thumbnails/news/000/145/112/9c9b99ca6d934d5f49a87743a2178453/xsmall.jpg?1730123371</ThumbnailUrl>
    <ThumbnailUrl size="xxsmall">https://assets1-dev.my.umbc.edu/system/shared/thumbnails/news/000/145/112/9c9b99ca6d934d5f49a87743a2178453/xxsmall.jpg?1730123371</ThumbnailUrl>
    <PawCount>2</PawCount>
    <CommentCount>1</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Thu, 31 Oct 2024 08:47:14 -0400</PostedAt>
  </NewsItem>
</News>
