<?xml version="1.0"?>
<News hasArchived="true" page="3" pageCount="4" pageSize="10" timestamp="Sun, 19 Apr 2026 23:07:16 -0400" url="https://dev.my.umbc.edu/groups/doit/posts.xml?page=3&amp;tag=security">
  <NewsItem contentIssues="false" id="59380" important="false" status="posted" url="https://dev.my.umbc.edu/groups/doit/posts/59380">
    <Title>Critical Vulnerability in Adobe Flash Affects Most Machines</Title>
    <Body>
      <![CDATA[
          <div class="html-content">A few days ago a critical vulnerability was announced within Adobe Flash Player that allows a machine to become infected with ransomware through a web browser. Ransomware is a type of malicious software that will encrypt files on your system and then require payment in return for giving you access back to these files. If you ever infected with this type of software you should submit a ticket through <a href="http://my.umbc.edu/help" rel="nofollow external" class="bo">myUMBC Help</a> or contact the <a href="http://doit.umbc.edu/tsc" rel="nofollow external" class="bo">Technology Support Center</a> (TSC) at x5-3838 immediately. <div><br></div><div>In response to this DoIT has pushed an update out to all Windows PCs that are in active directory patching the vulnerability. </div><div><br></div><div>We strongly encourage all Apple, Linux and non active directory Windows users to apply the patch Adobe released to protect your machine against this bug. </div><div><br></div><div>For instructions on how to patch your browser, please visit adobe's help page:</div><div><br></div><div><a href="https://helpx.adobe.com/flash-player.html" rel="nofollow external" class="bo">https://helpx.adobe.com/flash-player.html</a></div><div><br></div><div>For more information about the vulnerability please visit the link below:</div><div><br></div><div><a href="http://www.groovypost.com/news/adobe-flash-emergency-flash-player-patch/" rel="nofollow external" class="bo">http://www.groovypost.com/news/adobe-flash-emergency-flash-player-patch/</a></div><div><br></div><div>If you have any questions please feel free to email me directly or contact the TSC at x5-3838 or submit a ticket through <a href="http://my.umbc.edu/help/request" rel="nofollow external" class="bo">http://my.umbc.edu/help/request</a></div><div><br></div><div>Thank You, </div><div><br></div><div>Damian Doyle</div><div>--</div><div>Director of Enterprise Infrastructure</div><div>DoIT - UMBC</div><div><a href="mailto:damian@umbc.edu">damian@umbc.edu</a></div></div>
      ]]>
    </Body>
    <Summary>A few days ago a critical vulnerability was announced within Adobe Flash Player that allows a machine to become infected with ransomware through a web browser. Ransomware is a type of malicious...</Summary>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/59380/guest@my.umbc.edu/b7197d8269285d9f9383d5e31374b98f/api/pixel</TrackingUrl>
    <Tag>adobe</Tag>
    <Tag>patching</Tag>
    <Tag>security</Tag>
    <Tag>software</Tag>
    <Group token="doit">Division of Information Technology (DoIT)</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/doit</GroupUrl>
    <AvatarUrl>https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
    <AvatarUrl size="original">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/original.JPG?1727453227</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxlarge.png?1727453227</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xlarge.png?1727453227</AvatarUrl>
    <AvatarUrl size="large">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/large.png?1727453227</AvatarUrl>
    <AvatarUrl size="medium">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/medium.png?1727453227</AvatarUrl>
    <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/small.png?1727453227</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxsmall.png?1727453227</AvatarUrl>
    <Sponsor>Division of Information Technology (DoIT)</Sponsor>
    <PawCount>3</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Thu, 14 Apr 2016 09:29:58 -0400</PostedAt>
    <EditAt>Fri, 15 Apr 2016 05:36:56 -0400</EditAt>
  </NewsItem>
  <NewsItem contentIssues="false" id="58761" important="false" status="posted" url="https://dev.my.umbc.edu/groups/doit/posts/58761">
  <Title>Phishing:  Don&#8217;t Be Our Weak Link</Title>
  <Tagline>Attacks are Becoming More Targeted.  What should people do?</Tagline>
  <Body>
    <![CDATA[
    <div class="html-content"><span><p><span>Phishing attacks have been a problem for many years.  Typically, hackers have sent messages asking members of our community to click on a link or reply to an email message with a password.  Their goal has always been to trick our community members into giving them access to our accounts and information.  Sometimes, they have pretended to be DoIT and sent messages to ask for your password or to tell you that there is a problem with your UMBC account.  </span></p><p><span>Recently, the hackers have expanded their efforts and sent messages as people around our campus.  They have been looking up the names and titles of UMBC community members on the Internet and then using that person’s name and title to request information.  They try to choose a name or title that the community would trust.  As examples, during recent attempts, they have requested information about how to wire money out of the campus and get people to send checks to outside addresses.  They have also requested that people send them files containing the social security numbers of community members.  In some cases, they have also impersonated UMBC vendors.  In each of these examples, they have tried to make their phishing messages appear to come from a person that the campus would trust.</span></p><p><span>The hackers are motivated by money and resources and will continue to try to get to our accounts, information, and resources.  The only thing that can stop them is the UMBC community working together to block their attempts.  Here are some questions that DoIT frequently receives and the answers.  </span></p><p><span>1. What information can’t I send in email?</span></p><p><span>No one should ever send passwords or confidential information in an email message.</span><span>  </span></p><p><span>C</span><span>onfidential information includes social security numbers, driver’s license numbers, passport numbers, and financial account numbers.  This information is classified as confidential information under the policies of UMBC, the University System of Maryland, and the State of Maryland.  Passwords and confidential information can </span><span>never</span><span> be sent through email.  This includes the body of an email message and as an attachment to a message.  For in depth information about our data classifications and use, please see the following two links:</span></p><p><a href="http://www.umbc.edu/policies/pdfs/X-1.00.07%20Sensitive%20Information.pdf" rel="nofollow external" class="bo"><span>UMBC Policy on the Definition and Classification of Sensitive Information</span></a></p><p><span><a href="https://docs.google.com/document/d/1Yj49OMeHHQEj_gazOumzVPbsjE5hGa6m82RFBSG5H_8/edit" rel="nofollow external" class="bo">UMBC Data Use Guidelines</a></span></p><p><span>2. Will DoIT ever ask for my password?</span></p><p><span>No.  In fact, DoIT doesn’t know (and has no reason to know) your password.  The only person who should ever know your password is you.  If DoIT needs to assist you with your password, we can help you to reset your password, but DoIT still won’t need to know your password.  To help us maintain the privacy of your password, please make sure you have your </span><a href="https://wiki.umbc.edu/x/hIAc" rel="nofollow external" class="bo"><span>account security questions enabled</span></a><span> -- and make sure you know the answers.  Please also ensure that you have an </span><a href="https://wiki.umbc.edu/x/tIAc" rel="nofollow external" class="bo"><span>alternate email address</span></a><span> registered with UMBC.  If DoIT needs to send you a link to reset your password, we will send it to the secondary email address that we have associated with your account.</span></p><p><span>3. What should I do if I receive a suspicious message?  </span></p><p><span>If you think that the message is asking you to do something that seems unusual, look up the phone number of the person the message is from in the UMBC directory, call the person, and ask them if they really sent the message.  Do not call a person back at a phone number that is listed in the suspicious email message.  The phishing message may include the phone number of the hacker.  For example, if you get a message saying that there is a problem with your computer account and you aren’t sure if it’s a real message, please call the DoIT Technology Support Center (410-455-3838) and ask if it’s a real message.  This also applies to any messages that might appear to come from Human Resources, Finance, Financial Aid, or any other department.  If the message seems strange, trust your instincts, look up the correct phone number for the person, and call to verify the message.</span></p><p><span>4.  What should I do with a message that I have determined is a phishing message?</span></p><p><span>F</span><span>orward it to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span> with “</span><a href="https://wiki.umbc.edu/x/woAc" rel="nofollow external" class="bo"><span>full headers</span></a><span>” and as much information as you can.  DoIT will review the messages that you forward, verify that they are phishing messages, and take steps to try and protect the rest of the community.</span></p><p><span>Once you forward any phishing messages to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>, please delete the messages, and very importantly, never click on the links in a phishing message.  Just by clicking on the link in a phishing message, you may download a malicious program onto your computer.  </span></p><p><span>5. Who do I contact if I have additional questions?</span></p><p><span>As a starting point, the following links may provide assistance. </span></p><ul><li><p><span>UMBC “</span><a href="https://wiki.umbc.edu/x/HwMxAg" rel="nofollow external" class="bo"><span>Phishing &amp; Spam</span></a><span>” FAQ Collection</span></p></li><li><p><a href="http://www.apwg.org/resources/overview/" rel="nofollow external" class="bo"><span>Anti-Phishing Work Group</span></a><span> (non-UMBC consortium of institutions fighting phishing)</span></p></li></ul><span>You can also contact the DoIT Technology Support Center at 410-455-3838 or send any security questions and problems to </span><a href="mailto:security@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span>.</span></span><div><span><span><br></span></span></div><div><span><span>Mark Cather</span></span></div><div><span><span>UMBC Chief Information Security Officer</span></span></div></div>
]]>
  </Body>
  <Summary>Phishing attacks have been a problem for many years.  Typically, hackers have sent messages asking members of our community to click on a link or reply to an email message with a password.  Their...</Summary>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/58761/guest@my.umbc.edu/8784b21688c7f7cf99ee3161bba99a98/api/pixel</TrackingUrl>
  <Tag>security</Tag>
  <Group token="doit">Division of Information Technology (DoIT)</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/doit</GroupUrl>
  <AvatarUrl>https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
  <AvatarUrl size="original">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/original.JPG?1727453227</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxlarge.png?1727453227</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xlarge.png?1727453227</AvatarUrl>
  <AvatarUrl size="large">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/large.png?1727453227</AvatarUrl>
  <AvatarUrl size="medium">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/medium.png?1727453227</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/small.png?1727453227</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxsmall.png?1727453227</AvatarUrl>
  <Sponsor>Division of Information Technology (DoIT)</Sponsor>
  <PawCount>8</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Wed, 23 Mar 2016 14:56:02 -0400</PostedAt>
  <EditAt>Fri, 25 Mar 2016 11:44:22 -0400</EditAt>
</NewsItem>
  <NewsItem contentIssues="false" id="54016" important="true" status="posted" url="https://dev.my.umbc.edu/groups/doit/posts/54016">
    <Title>Review of DoIT Communications</Title>
    <Tagline>Notification by DoIT Student Worker Was a Mistake</Tagline>
    <Body>
      <![CDATA[
          <div class="html-content"><span><p><span>To The UMBC Campus Community,</span></p><p><span>Recently a DoIT student employee contacted members of the campus that they may have a number of files on their computers containing personally identifiable information (PII).  This information may include social security numbers (SSNs), credit card numbers, passport numbers or bank account numbers.  </span></p><p><span>While this was a legitimate email, it was sent out mistakenly by a grad student working in our cyber security group.</span></p><p><span>We apologize for the alarm this has caused and we have used this incident to review how we keep the campus informed of the important work we are doing. We will be sharing our plans with the campus community once we have had this process reviewed by our shared governance committees and the VPs and Deans.</span></p><p><span>If you have continued questions or concerns, or would like to discuss this further, please feel free to reach out to our Chief Information Security Officer, Mark Cather at <a href="mailto:mark.cather@umbc.edu">mark.cather@umbc.edu</a>.</span></p><p><span>Sincerely,</span></p><p><span>Jack Suess</span></p><p><span>VP of IT and Chief Information Officer</span></p><span>UMBC Division of Information Technology</span></span></div>
      ]]>
    </Body>
    <Summary>To The UMBC Campus Community,  Recently a DoIT student employee contacted members of the campus that they may have a number of files on their computers containing personally identifiable...</Summary>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/54016/guest@my.umbc.edu/0ca8e15bda37e3724d6959f386c9e317/api/pixel</TrackingUrl>
    <Tag>security</Tag>
    <Group token="doit">Division of Information Technology (DoIT)</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/doit</GroupUrl>
    <AvatarUrl>https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
    <AvatarUrl size="original">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/original.JPG?1727453227</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxlarge.png?1727453227</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xlarge.png?1727453227</AvatarUrl>
    <AvatarUrl size="large">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/large.png?1727453227</AvatarUrl>
    <AvatarUrl size="medium">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/medium.png?1727453227</AvatarUrl>
    <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/small.png?1727453227</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxsmall.png?1727453227</AvatarUrl>
    <Sponsor>Division of Information Technology (DoIT)</Sponsor>
    <PawCount>4</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Thu, 10 Sep 2015 19:18:55 -0400</PostedAt>
    <EditAt>Fri, 25 Mar 2016 12:17:01 -0400</EditAt>
  </NewsItem>
  <NewsItem contentIssues="false" id="52209" important="false" status="posted" url="https://dev.my.umbc.edu/groups/doit/posts/52209">
    <Title>Locating Our Confidential Data</Title>
    <Tagline>Identity Finder is being installed to help reduce our risk.</Tagline>
    <Body>
      <![CDATA[
          <div class="html-content"><div><span>In an effort to try and detect confidential data on university-owned systems and reduce the risk that UMBC will be the source of a data breach, UMBC has worked with the university system to purchase a program called Identity Finder.  Identity Finder is a program that runs in the background on computers and looks for information like SSNs and credit card numbers.  The program will make a list of the files that contain this information, but will </span><strong><u>not</u></strong><span> modify or delete the files.  Once we receive the lists of files that possibly contain confidential data, we </span>will<span> work with each machine's owner to </span>determine<span> how to best manage data.</span></div><div><br></div><div>We have been running the program, for almost a year, in the departments that process and store SSNs and credit cards as a standard part of their business.  Starting this week, we are pushing the program out to all centrally managed UMBC machines.  The software will be installed automatically on each system, through Active Directory,  and members of the UMBC community should not need to do anything.  If anyone sees an impact from the installation of Identity Finder or has any questions, they should contact the DoIT Technology Support Center at x53838.  </div><div><br></div><div>Mark Cather</div><div>DoIT / UMBC</div><div><br></div></div>
      ]]>
    </Body>
    <Summary>In an effort to try and detect confidential data on university-owned systems and reduce the risk that UMBC will be the source of a data breach, UMBC has worked with the university system to...</Summary>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/52209/guest@my.umbc.edu/fb0acceac21cd8b2fc84c338f2d9b69d/api/pixel</TrackingUrl>
    <Tag>security</Tag>
    <Group token="doit">Division of Information Technology (DoIT)</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/doit</GroupUrl>
    <AvatarUrl>https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
    <AvatarUrl size="original">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/original.JPG?1727453227</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxlarge.png?1727453227</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xlarge.png?1727453227</AvatarUrl>
    <AvatarUrl size="large">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/large.png?1727453227</AvatarUrl>
    <AvatarUrl size="medium">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/medium.png?1727453227</AvatarUrl>
    <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/small.png?1727453227</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxsmall.png?1727453227</AvatarUrl>
    <Sponsor>Division of Information Technology (DoIT)</Sponsor>
    <PawCount>4</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>false</CommentsAllowed>
    <PostedAt>Tue, 09 Jun 2015 10:01:48 -0400</PostedAt>
    <EditAt>Sat, 26 Mar 2016 00:11:39 -0400</EditAt>
  </NewsItem>
  <NewsItem contentIssues="true" id="51604" important="false" status="posted" url="https://dev.my.umbc.edu/groups/doit/posts/51604">
    <Title>Recent Phishing Email Messages</Title>
    <Tagline>How to Identify and Report Phishing Messages.</Tagline>
    <Body>
      <![CDATA[
          <div class="html-content">UMBC has recently been the target of an increasing number of <a href="http://en.wikipedia.org/wiki/Phishing" rel="nofollow external" class="bo">phishing</a> messages.  These phishing messages <a href="http://my.umbc.edu/groups/doit/documents/7910" rel="nofollow external" class="bo">appear</a> to come from the UMBC Division of Information Technology or another university official, but they are actually coming from hackers.  Over the last few weeks, we have received many reports of phishing messages asking for people to verify their UMBC account by providing their UMBC username and password.  Messages have also been received asking for instructions related to wiring money to a bank account.  <div><br></div><div>In almost all phishing messages, there are some typical clues that should cause us all to be suspicious:</div><div><ul><li>The messages look official but are <strong><u>not</u></strong> sent from a "umbc.edu" email address. </li><li>Some of the messages list a copyright at the bottom.</li><li>Some of the messages include the phrase "All Rights Reserved".  </li><li>The messages include a link to a web page that is not on a "umbc.edu" server.  </li><li>The message comes from a department that we do not have at UMBC or a person who does not work at UMBC.  One of the recent messages claimed to be from the "Security Alert Office".  UMBC does not have a department by that name.</li></ul><div>All of these are signs of a message that is likely a phishing message.  </div><div><br></div><div>One last big clue that a message is a suspicious phishing message is in content of the message.  DoIT will <strong><u>NEVER</u></strong> ask for a person's username and password as a part of a legitimate support request.  We do not need a person's username and password in order to provide assistance or verify an account.</div></div><div><br></div><div>If you do receive a message that you believe is a phishing message, there are a few things that you can do:</div><div><ul><li>Forward a copy of the message to <a href="mailto:security@umbc.edu">security@umbc.edu</a>.  This will send the message directly to the DoIT IT Security Department.  We will review the message and determine if any action is needed.</li><li>Call the group that the message appears to come from on the phone and ask if the message is legitimate.  In the case of messages that appear to come from DoIT, please contact the DoIT Technology Support Center at x53838.</li></ul><div>If anyone has additional questions about phishing messages or any other computer security topic, please feel free to contact the UMBC IT Security Department at <a href="mailto:security@umbc.edu">security@umbc.edu</a>.</div><div><br></div><div>Mark Cather</div></div><div>Chief Information Security Officer</div><div>Division of Information Technology / UMBC</div></div>
      ]]>
    </Body>
    <Summary>UMBC has recently been the target of an increasing number of phishing messages.  These phishing messages appear to come from the UMBC Division of Information Technology or another university...</Summary>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/51604/guest@my.umbc.edu/281686a4ac072160edfe24fc20f270e5/api/pixel</TrackingUrl>
    <Tag>itsecurity</Tag>
    <Tag>security</Tag>
    <Group token="doit">Division of Information Technology (DoIT)</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/doit</GroupUrl>
    <AvatarUrl>https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
    <AvatarUrl size="original">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/original.JPG?1727453227</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxlarge.png?1727453227</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xlarge.png?1727453227</AvatarUrl>
    <AvatarUrl size="large">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/large.png?1727453227</AvatarUrl>
    <AvatarUrl size="medium">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/medium.png?1727453227</AvatarUrl>
    <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/small.png?1727453227</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxsmall.png?1727453227</AvatarUrl>
    <Sponsor>Division of Information Technology</Sponsor>
    <ThumbnailUrl size="xxlarge">https://assets4-dev.my.umbc.edu/system/shared/thumbnails/news/000/051/604/9653d77d9d5a084b880262a75a3d0210/xxlarge.jpg?1430335389</ThumbnailUrl>
    <ThumbnailUrl size="xlarge">https://assets1-dev.my.umbc.edu/system/shared/thumbnails/news/000/051/604/9653d77d9d5a084b880262a75a3d0210/xlarge.jpg?1430335389</ThumbnailUrl>
    <ThumbnailUrl size="large">https://assets1-dev.my.umbc.edu/system/shared/thumbnails/news/000/051/604/9653d77d9d5a084b880262a75a3d0210/large.jpg?1430335389</ThumbnailUrl>
    <ThumbnailUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/thumbnails/news/000/051/604/9653d77d9d5a084b880262a75a3d0210/medium.jpg?1430335389</ThumbnailUrl>
    <ThumbnailUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/thumbnails/news/000/051/604/9653d77d9d5a084b880262a75a3d0210/small.jpg?1430335389</ThumbnailUrl>
    <ThumbnailUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/thumbnails/news/000/051/604/9653d77d9d5a084b880262a75a3d0210/xsmall.jpg?1430335389</ThumbnailUrl>
    <ThumbnailUrl size="xxsmall">https://assets1-dev.my.umbc.edu/system/shared/thumbnails/news/000/051/604/9653d77d9d5a084b880262a75a3d0210/xxsmall.jpg?1430335389</ThumbnailUrl>
    <PawCount>6</PawCount>
    <CommentCount>1</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Tue, 28 Apr 2015 22:08:16 -0400</PostedAt>
    <EditAt>Sat, 26 Mar 2016 00:12:34 -0400</EditAt>
  </NewsItem>
  <NewsItem contentIssues="true" id="49518" important="false" status="posted" url="https://dev.my.umbc.edu/groups/doit/posts/49518">
  <Title>Critical Security Flaw in Core Linux Library</Title>
  <Tagline>Allows for complete control of a system with no credentials</Tagline>
  <Body>
    <![CDATA[
    <div class="html-content">Earlier this week a critical security flaw in the gethostbyname() function of glibc in Linux was exposed. This effects many major linux distributions including Redhat 5 and Redhat 6 Enterprise. This vulnerability has the potential to allow a fairly simple attack to gain complete control of a server. Any vulnerable servers should be patched and rebooted as soon as possible. <div><br></div><div>DoIT has been patching and rebooting our systems and we are now protected from this on all centrally managed accessible servers. We would encourage any linux admins to check out the posting below to see if your system is vulnerable and patch accordingly. I've also included a link to a PCworld article with a new exploit that just came out showing how this flaw can be used. </div><div><br></div><div>Its being referred to as the GHOST vulnerability because it uses the GetHost function. Besides the obvious security issue, this one has some marketing behind it as well, its even got a cute logo (see below), so I think you may see it around the news at some point. </div><div><br></div><div>List of vulnerable glibc versions:</div><div><a href="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-0235" rel="nofollow external" class="bo">http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-0235</a></div><div><br></div><div>For information:</div><div><a href="http://www.pcworld.com/article/2878252/ghost-linux-vulnerability-can-be-exploited-through-wordpress-other-php-apps.html" rel="nofollow external" class="bo">http://www.pcworld.com/article/2878252/ghost-linux-vulnerability-can-be-exploited-through-wordpress-other-php-apps.html</a></div><div><br></div><div><img src="https://dum21w3618van.cloudfront.net/images/blogs/laws/ghost-vulnerability.svg" style="max-width: 100%; height: auto;"></div></div>
]]>
  </Body>
  <Summary>Earlier this week a critical security flaw in the gethostbyname() function of glibc in Linux was exposed. This effects many major linux distributions including Redhat 5 and Redhat 6 Enterprise....</Summary>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/49518/guest@my.umbc.edu/6d632f23938175dcab67b98178404d40/api/pixel</TrackingUrl>
  <Tag>security</Tag>
  <Group token="doit">Division of Information Technology (DoIT)</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/doit</GroupUrl>
  <AvatarUrl>https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
  <AvatarUrl size="original">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/original.JPG?1727453227</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxlarge.png?1727453227</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xlarge.png?1727453227</AvatarUrl>
  <AvatarUrl size="large">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/large.png?1727453227</AvatarUrl>
  <AvatarUrl size="medium">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/medium.png?1727453227</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/small.png?1727453227</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxsmall.png?1727453227</AvatarUrl>
  <Sponsor>Division of Information Technology</Sponsor>
  <PawCount>1</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Sat, 31 Jan 2015 10:59:20 -0500</PostedAt>
  <EditAt>Sat, 26 Mar 2016 00:13:47 -0400</EditAt>
</NewsItem>
  <NewsItem contentIssues="false" id="44704" important="false" status="posted" url="https://dev.my.umbc.edu/groups/doit/posts/44704">
  <Title>DoIT Taking Steps to Protect Sensitive Data on our AD server</Title>
  <Body>
    <![CDATA[
    <div class="html-content"><div>Over the weekend of May17-18, DoIT will be copying  files found on our Active Directory (AD) servers that have sensitive information in them and encrypting those files and storing them in a special location.  DoIT will be glad to work with anyone that requires access to these files for their work or scholarship, we ask you submit a help request ticket or email <a href="mailto:security@umbc.edu">security@umbc.edu</a>.  Before giving you these files back we will have one of our staff contact you and go over procedures for how to safely store and work with files that contain sensitive information in a way that protects the university and individuals. </div><div><br></div><div>We want to thank everyone for your cooperation to date, as DoIT has been working with departments to remediate other places that have this information we have seen great cooperation. We very much appreciate the way the UMBC community has supported the efforts to better protect the information of our students, alumni, staff, and faculty. We know this is abrupt but felt that getting the data in a secure state was of the greatest importance. </div><div><br></div><div>Below is some information to explain this further.</div><div><br></div><div><strong>Why is DoIT removing these files from AD at this time?</strong></div><div><br></div><div>Due to the data breach at UM-College Park, the Regents have instructed all institutions to take additional steps to identify and protect personal information, such as SSN, from being released. The Regents have asked that campuses undertake an inventory to find where this information is stored and take all appropriate measures to protect this information. Under Maryland law, file encryption is one of the recognized measures for protecting information. </div><div><br></div><div><strong>Why the sense of urgency?</strong></div><div><br></div><div>Over the years, DoIT has consistently increased space for users and departments in our Active Directory environment.  The totality of the number of files makes the Active Directory (AD) server critical to protect. Because we feel most of these files were used in the past and most will not be needed immediately, we feel acting quickly is the best course of action to ensure we are protecting the university and each others information.</div><div><br></div><div><strong>What kind of files are being scanned?</strong></div><div><strong><br></strong></div><div>The software that we have scans word, excel, pdf, and images looking for SSN's. Most of the files it will find are old reports dating back many years ago when SSN was regularly used. In many cases, the files may contain on a few SSN's in them.</div><div><strong><br></strong></div><div><strong>How can I find out what files were taken from my account?</strong></div><div><strong><br></strong></div><div>Please submit a ticket, <a href="http://my.umbc.edu/help">http://my.umbc.edu/help</a>, and we will send you back the list of files associated with your names. If you don't notice any files missing it is likely the files we protected were no longer needed.</div><div><strong><br></strong></div><div><strong>How do I get access to my files with SSNs in them?</strong></div><div><br></div><div>You should submit a ticket through <a href="http://my.umbc.edu/help">http://my.umbc.edu/help</a>, we will have someone work with you go over the best way to do this. If you have a time critical issue, please note that in the ticket and we will expedite this.</div><div><br></div><div><strong>What will I do if I need to do if I regularly deal with files that have SSNs in them as part of my job?</strong></div><div><br></div><div>There are options available (encrypted hard drives, UMBCs Box.com service) for securely working with these kinds of files. DoIT will sit down with your staff and understand what your needs are and come up with a solution that meets your units needs but at the same time ensures you are protecting the information and the university.</div><div><br></div><div><strong>Will you continue to scan for sensitive files in my account?</strong></div><div><br></div><div>Yes. We intend to run the process on a regularly basis and scan, at least monthly, all files on Active Directory and remove and encrypt files with sensitive information in them..</div><div><br></div><div><strong>Will DoIT delete these files at some point in the future?</strong></div><div><br></div><div>There are no immediate plans to do this right now. Our plan is to work with units over the next fiscal year to review the files and discuss the best ways to safely handle sensitive data. As part of that process we will ask departments if there are any files that can be safely deleted.</div><div><br></div><div><br></div></div>
]]>
  </Body>
  <Summary>Over the weekend of May17-18, DoIT will be copying  files found on our Active Directory (AD) servers that have sensitive information in them and encrypting those files and storing them in a...</Summary>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/44704/guest@my.umbc.edu/1f725cafc713ff1be5f36da3d7bbb860/api/pixel</TrackingUrl>
  <Tag>security</Tag>
  <Group token="doit">Division of Information Technology (DoIT)</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/doit</GroupUrl>
  <AvatarUrl>https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
  <AvatarUrl size="original">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/original.JPG?1727453227</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxlarge.png?1727453227</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xlarge.png?1727453227</AvatarUrl>
  <AvatarUrl size="large">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/large.png?1727453227</AvatarUrl>
  <AvatarUrl size="medium">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/medium.png?1727453227</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/small.png?1727453227</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxsmall.png?1727453227</AvatarUrl>
  <Sponsor>Division of Information Technology</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>false</CommentsAllowed>
  <PostedAt>Fri, 16 May 2014 09:50:33 -0400</PostedAt>
  <EditAt>Sat, 26 Mar 2016 00:16:26 -0400</EditAt>
</NewsItem>
  <NewsItem contentIssues="false" id="43444" important="false" status="posted" url="https://dev.my.umbc.edu/groups/doit/posts/43444">
    <Title>Warning: Email Phishing Attacks Targeting Faculty &amp; Staff</Title>
    <Tagline>Never give out your username or password</Tagline>
    <Body>
      <![CDATA[
          <div class="html-content">DoIT continues to receive reports of faculty and staff receiving that is part of a targeted "phishing" attack to steal your username and password information or infect your computer. <div><br></div><div>One recent email that a number of faculty received appeared to come from Blackboard, and is listed below. DoIT will not give out our email lists to 3rd parties and it would always come from someone in DoIT.</div><div><br></div><div>The message below does not have the Link active, however, in the original message if you took your mouse and hovered it over the link for "Click here to sign in and revier this article now." you would see the web site is not Bloackboard.com</div><div><br></div><div><br></div><div><br></div><div><table border="0"><tbody><tr><th>Subject:</th><td>New School Article - Important</td></tr><tr><th>Date:</th><td>Sat, 5 Apr 2014 12:35:05 -0700 (PDT)</td></tr><tr><th>From:</th><td>Blackboard Articles <a href="mailto:articles@www.blackboard.com" rel="nofollow external" class="bo">&lt;articles@www.blackboard.com&gt;</a></td></tr><tr><th>To:</th><td><span>SOMEONE@UMBC</span></td></tr></tbody></table><br><p>Hello,<br><br>Your school has uploaded an article with your information tagged in the content.<br><br>Please sign in immediately to review your information.<br><br><strong><a href="http://radiocentrodolores.com.ar/media/web/login.blackboard.com.htm" rel="nofollow external" class="bo">Click here to sign in and review the article now</a></strong><br><br>Comment/Notifications of articles that are published will be delivered to you.<br><br><br><strong>Black board Articles.</strong></p></div></div>
      ]]>
    </Body>
    <Summary>DoIT continues to receive reports of faculty and staff receiving that is part of a targeted "phishing" attack to steal your username and password information or infect your computer.     One...</Summary>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/43444/guest@my.umbc.edu/0a7813c2bedef30ca0fa131baf6be237/api/pixel</TrackingUrl>
    <Tag>security</Tag>
    <Group token="doit">Division of Information Technology (DoIT)</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/doit</GroupUrl>
    <AvatarUrl>https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
    <AvatarUrl size="original">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/original.JPG?1727453227</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxlarge.png?1727453227</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xlarge.png?1727453227</AvatarUrl>
    <AvatarUrl size="large">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/large.png?1727453227</AvatarUrl>
    <AvatarUrl size="medium">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/medium.png?1727453227</AvatarUrl>
    <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/small.png?1727453227</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxsmall.png?1727453227</AvatarUrl>
    <Sponsor>Division of Information Technology</Sponsor>
    <PawCount>0</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Thu, 10 Apr 2014 00:48:42 -0400</PostedAt>
    <EditAt>Sat, 26 Mar 2016 00:17:18 -0400</EditAt>
  </NewsItem>
  <NewsItem contentIssues="true" id="43403" important="false" status="posted" url="https://dev.my.umbc.edu/groups/doit/posts/43403">
  <Title>UMBC Response to Heartbleed Security Incident</Title>
  <Tagline>Issue potentially affects "https" web sites using Open SSL</Tagline>
  <Body>
    <![CDATA[
    <div class="html-content"><span>A major security vulnerability named </span><span>Heartbleed</span><span> was disclosed Monday night.  The vulnerability affects a large portion of websites on the Internet, and here at UMBC, that use the "<strong>https:" </strong>protocol for secure web traffic. Many servers that support "<strong>https:"</strong>  utilize a package named OpenSSL to encrypt webpages.  The <strong>"https:" </strong>protocol, which is referred to as SSL or secure socket layer, is a cryptographic protocol which is designed to provide secure communication over the Internet. The vulnerability could allow usernames and passwords being exchanged over the web to be stolen.</span><br><div><span><br></span><span>Starting with the announcement on Monday evening, DoIT staff have been working to understand the risks, determine which systems are vulnerable, and take the necessary steps to remediate or lessen the risk. DoIT classifies system risk from 0 - very low to 3 (very high).  Over the last two days we have patched or remediated all of our level 2 and 3 servers. We expect to have all systems patched this week.  In addition, we are working with departmental IT staff to identify and address issues in the departments. We also continue to work closely with commercial partners to patch devices and equipment that may be impacted</span><br>
    <br>
    <span>Prior to this event occurring, DoIT was planning to move forward with a <a href="http://my.umbc.edu/groups/doit/news/43156" rel="nofollow external" class="bo">mandatory password change</a> for all users starting the end of April. As a precaution, we are looking at expediting this process and will be sending out another message on this early next week to expedite that process. </span><br>
    <br>
    <span>If you are wondering if a site is vulnerable, there is a web site created that you can use to test: </span><span><a href="http://filippo.io/Heartbleed/">http://filippo.io/Heartbleed/</a></span><span> and type in a web site.. </span><span>Any questions or concerns may be directed to </span><span><a href="mailto:security@umbc.edu">security@umbc.edu</a></span><br>
    <br></div></div>
]]>
  </Body>
  <Summary>A major security vulnerability named Heartbleed was disclosed Monday night.  The vulnerability affects a large portion of websites on the Internet, and here at UMBC, that use the "https:" protocol...</Summary>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/43403/guest@my.umbc.edu/71f0bbcd8992e838302107c10be9bfcf/api/pixel</TrackingUrl>
  <Tag>security</Tag>
  <Group token="doit">Division of Information Technology (DoIT)</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/doit</GroupUrl>
  <AvatarUrl>https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
  <AvatarUrl size="original">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/original.JPG?1727453227</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxlarge.png?1727453227</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xlarge.png?1727453227</AvatarUrl>
  <AvatarUrl size="large">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/large.png?1727453227</AvatarUrl>
  <AvatarUrl size="medium">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/medium.png?1727453227</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/small.png?1727453227</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxsmall.png?1727453227</AvatarUrl>
  <Sponsor>Division of Information Technology</Sponsor>
  <ThumbnailUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/thumbnails/news/000/043/403/21dfc13281c485bd21bf5f5539ae01d0/xxlarge.jpg?1397069998</ThumbnailUrl>
  <ThumbnailUrl size="xlarge">https://assets2-dev.my.umbc.edu/system/shared/thumbnails/news/000/043/403/21dfc13281c485bd21bf5f5539ae01d0/xlarge.jpg?1397069998</ThumbnailUrl>
  <ThumbnailUrl size="large">https://assets1-dev.my.umbc.edu/system/shared/thumbnails/news/000/043/403/21dfc13281c485bd21bf5f5539ae01d0/large.jpg?1397069998</ThumbnailUrl>
  <ThumbnailUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/thumbnails/news/000/043/403/21dfc13281c485bd21bf5f5539ae01d0/medium.jpg?1397069998</ThumbnailUrl>
  <ThumbnailUrl size="small">https://assets4-dev.my.umbc.edu/system/shared/thumbnails/news/000/043/403/21dfc13281c485bd21bf5f5539ae01d0/small.jpg?1397069998</ThumbnailUrl>
  <ThumbnailUrl size="xsmall">https://assets2-dev.my.umbc.edu/system/shared/thumbnails/news/000/043/403/21dfc13281c485bd21bf5f5539ae01d0/xsmall.jpg?1397069998</ThumbnailUrl>
  <ThumbnailUrl size="xxsmall">https://assets1-dev.my.umbc.edu/system/shared/thumbnails/news/000/043/403/21dfc13281c485bd21bf5f5539ae01d0/xxsmall.jpg?1397069998</ThumbnailUrl>
  <PawCount>7</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Wed, 09 Apr 2014 19:40:51 -0400</PostedAt>
  <EditAt>Sat, 26 Mar 2016 00:17:42 -0400</EditAt>
</NewsItem>
  <NewsItem contentIssues="true" id="43156" important="false" status="posted" url="https://dev.my.umbc.edu/groups/doit/posts/43156">
    <Title>Everyone Must Reset Password and Create Security Questions</Title>
    <Tagline>Deadline: May 23, 2014</Tagline>
    <Body>
      <![CDATA[
          <div class="html-content"><p><strong>Update:</strong></p><p>Given recent <a href="http://my.umbc.edu/groups/doit/news/43403" rel="nofollow external" class="bo">IT security threats</a> generally, DoIT has decided to force the password change to <strong>May 23, 2014</strong>, the day after Undergraduate Commencement. Thank you in advance for your patience and understanding. </p><p>--------------------------------------------</p><p>In an effort to improve campus security and better protect user information, DoIT is requiring that everyone with a UMBC account must change his or her password by <strong>June 9, 2014</strong>, unless this has already been done this calendar year. This will apply to all myUMBC account holders -- students, faculty, staff and alumni. We know people hate changing their account passwords, but with the rise of emails targeting people to share their account and password, called phishing, we feel it is necessary for security.</p><p>As part of this effort, everyone will also be required to provide an alternate email address and create account security questions. Once in place, all users will then be able to reset their password through a self-service page. We have had these account security questions in place for the <a href="http://my.umbc.edu/groups/doit/news/13849" rel="nofollow external" class="bo"><span>last two years</span></a> for students and the program has been very successful in reducing the number of time-consuming, manual password resets performed by our <a href="http://doit.umbc.edu/tsc" rel="nofollow external" class="bo"><span>Technolgy Support Center</span></a> (TSC). We expect that by expanding self-service password resets to all account holders, everyone will benefit.</p><p>A notice will appear to all faculty and staff when they login on <strong>Wednesday, April 23</strong>, informing them they need to change their password and establish their security questions, if they have not done so already in 2014. While the final date for password changes is June 9th, DoIT especially recommends that faculty make this change before they leave for the summer. We will also be sending out regular reminders.</p><p>To create your own security questions, visit the following Frequently Asked Question (FAQ):</p><p><span><a href="https://wiki.umbc.edu/x/hIAc" rel="nofollow external" class="bo">How do I create my security questions to reset a forgotten password?</a></span></p><p>If you have any questions or need help, please <a href="http://my.umbc.edu/help" rel="nofollow external" class="bo"><span>submit an RT Ticket</span></a> or contact the <a href="http://doit.umbc.edu/tsc" rel="nofollow external" class="bo"><span>TSC</span></a> at 410.455.3838.</p></div>
      ]]>
    </Body>
    <Summary>Update:  Given recent IT security threats generally, DoIT has decided to force the password change to May 23, 2014, the day after Undergraduate Commencement. Thank you in advance for your patience...</Summary>
    <Website>http://doit.umbc.edu/tsc</Website>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/43156/guest@my.umbc.edu/2ed428be40a2cd3dfd502f2933a09b23/api/pixel</TrackingUrl>
    <Tag>security</Tag>
    <Group token="doit">Division of Information Technology (DoIT)</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/doit</GroupUrl>
    <AvatarUrl>https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
    <AvatarUrl size="original">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/original.JPG?1727453227</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxlarge.png?1727453227</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xlarge.png?1727453227</AvatarUrl>
    <AvatarUrl size="large">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/large.png?1727453227</AvatarUrl>
    <AvatarUrl size="medium">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/medium.png?1727453227</AvatarUrl>
    <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/small.png?1727453227</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xsmall.png?1727453227</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/021/d27760c5de12c74b73faec8d0e631acf/xxsmall.png?1727453227</AvatarUrl>
    <Sponsor>Division of Information Technology</Sponsor>
    <ThumbnailUrl size="xxlarge">https://assets4-dev.my.umbc.edu/system/shared/thumbnails/news/000/043/156/1715a3a663307916bd96b966cdf2ee16/xxlarge.jpg?1396493740</ThumbnailUrl>
    <ThumbnailUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/thumbnails/news/000/043/156/1715a3a663307916bd96b966cdf2ee16/xlarge.jpg?1396493740</ThumbnailUrl>
    <ThumbnailUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/thumbnails/news/000/043/156/1715a3a663307916bd96b966cdf2ee16/large.jpg?1396493740</ThumbnailUrl>
    <ThumbnailUrl size="medium">https://assets4-dev.my.umbc.edu/system/shared/thumbnails/news/000/043/156/1715a3a663307916bd96b966cdf2ee16/medium.jpg?1396493740</ThumbnailUrl>
    <ThumbnailUrl size="small">https://assets3-dev.my.umbc.edu/system/shared/thumbnails/news/000/043/156/1715a3a663307916bd96b966cdf2ee16/small.jpg?1396493740</ThumbnailUrl>
    <ThumbnailUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/thumbnails/news/000/043/156/1715a3a663307916bd96b966cdf2ee16/xsmall.jpg?1396493740</ThumbnailUrl>
    <ThumbnailUrl size="xxsmall">https://assets2-dev.my.umbc.edu/system/shared/thumbnails/news/000/043/156/1715a3a663307916bd96b966cdf2ee16/xxsmall.jpg?1396493740</ThumbnailUrl>
    <PawCount>57</PawCount>
    <CommentCount>4</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Wed, 02 Apr 2014 22:57:22 -0400</PostedAt>
    <EditAt>Sat, 26 Mar 2016 00:18:19 -0400</EditAt>
  </NewsItem>
</News>
