The Protect IU Blog
Posted byon August 17, 2014 at 2:37 PM EDT
This past weekend I received THREE calls from the "IRS." I am, "Melvin" said, subject of some sort of tax evasion petition, and they will be issuing a warrant for my arrest. However, Melvin also said that if I call him back right away (888-369-8791) I can make arrangements to keep that from happening. I got two calls from Melvin, and one from Scott. Other people are receiving the same call from "Julie Smith."Learn more about protecting:
Posted byon August 5, 2014 at 2:24 PM EDT
Disaster recovery planning involves the process, policies, and procedures that enable delivery of critical technical services to Indiana University in the event of natural or man-made disaster.
Disaster recovery (DR) is an integral part of the overall business continuity program. While business continuity is concerned with continuation of the business of the university, disaster recovery or information technology business continuity is focused on the continued operation and function of technology to support those business functions.Learn more about protecting:
Posted byon August 1, 2014 at 3:06 PM EDT
Whether you provide Information Technology (IT) service, acquire services from others, write software, or simply use IT technology, you work in a culture which either is finely tuned for Information security or is not.
Where security is lacking, the problem is often a matter of focus. Sitting before us each day is a set of tasks which demand our attention. We focus our attention on those aspects of problem solving which we are most familiar with, setting out to complete tasks using the methodology we perceive as most efficient.Learn more about protecting:
Posted byon July 23, 2014 at 5:16 PM EDT
Indiana University fully supports the goals of the Indiana Lifeline Law.
There is no sense in someone being seriously injured or dying because someone doesn't seek medical assistance for a person suffering from an alcohol-related health emergency, for fear of legal consequences. This law seeks to provide protections for those Good Samaritans who stay and help.
See the video describing the law by Indiana State Senator Jim Merritt and Indiana Attorney General Greg Zoeller at
Posted byon July 18, 2014 at 2:42 PM EDT
University employees and students have been targets of cyber-related crimes in the forms of phishing schemes and identity theft. Recently, phishing schemes ask the recipient to follow a link in order to facilitate a pay raise.
A public service announcement was previously released by the FBI’s Internet Crime Complaint Center (IC3) regarding this type of activity and is copied below.Learn more about protecting:
Posted byon July 15, 2014 at 10:12 AM EDT
The advancements in Information Technology over the past two decades have been nothing short of awe-inspiring. From the humble beginnings of limited-access mainframe systems and limited internet access via telephone-based modems to the instant and continual-access systems of today. In fact, at the heart of ongoing technological advancement is heavy reliance on internet-based systems and data connectivity from a range of devices previously inconceivable to the average consumer.Learn more about protecting:
Posted byon June 6, 2014 at 2:10 PM EDT
Last week, the developers of Truecrypt announced they had ceased development on the software. They removed all functional versions of the product and uploaded a version which can only be used to decrypt Truecrypt volumes. The website also claims that Truecrypt is no longer secure.Learn more about protecting:
Posted byon June 5, 2014 at 10:25 AM EDT
On June 5th, 2014, the developers of OpenSSL software released a critical update, patching 6 different vulnerabilities, one of which can lead to remote code execution.Learn more about protecting:
Posted byon May 7, 2014 at 3:18 PM EDT
May 7, 2015
Sergio Santiago believes in hard work.
The full-time student and part-time police officer has demonstrated his work ethic in the classroom and as a member of the Indiana University East Police Department. All of his hard work will pay off as Santiago receives his bachelor's degree in criminal justice at IU East’s commencement ceremony on May 16.Learn more about protecting:
Posted byon May 2, 2014 at 10:38 AM EDT
Having an open and unsecured home network is a risk as it may allow intruders to view your activity, gather information about you, or utilize your network for nefarious purposes. These can lead to potential legal issues, service outages, network performance issues, invasions of privacy, and identity theft.
To make your home network more secure, consider implementing the suggestions below. You may also refer to manufacturer's documentation that came with your router/wireless router for the recommended configuration and settings.
Secure Router Configuration Basics:Learn more about protecting: