The Protect IU Blog
Posted byon October 16, 2014 at 3:44 PM EDT
On Wednesday the 15th, Drupal announced the availability of a patch to fix a critical SQL injection vulnerability in Drupal 7. Attackers may use this vulnerability to execute arbitrary SQL statements remotely with no authentication needed. Drupal 7 site owners should immediately upgrade to Drupal 7.32 or manually deploy the patch to Drupal's database.inc file if a full upgrade isn’t possible.Learn more about protecting:
Posted byon October 15, 2014 at 11:35 AM EDT
IU President Michael McRobbie gave his annual State of the University address yesterday, in which he laid out the framework of a University Bicentennial Strategic Plan. He specifically called out IU's efforts in personal safety, and in information and physical security, and identified these as ongoing priorities:
Posted byon August 17, 2014 at 2:37 PM EDT
This past weekend I received THREE calls from the "IRS." I am, "Melvin" said, subject of some sort of tax evasion petition, and they will be issuing a warrant for my arrest. However, Melvin also said that if I call him back right away (888-369-8791) I can make arrangements to keep that from happening. I got two calls from Melvin, and one from Scott. Other people are receiving the same call from "Julie Smith."Learn more about protecting:
Posted byon August 5, 2014 at 2:24 PM EDT
Disaster recovery planning involves the process, policies, and procedures that enable delivery of critical technical services to Indiana University in the event of natural or man-made disaster.
Disaster recovery (DR) is an integral part of the overall business continuity program. While business continuity is concerned with continuation of the business of the university, disaster recovery or information technology business continuity is focused on the continued operation and function of technology to support those business functions.Learn more about protecting:
Posted byon August 1, 2014 at 3:06 PM EDT
Whether you provide Information Technology (IT) service, acquire services from others, write software, or simply use IT technology, you work in a culture which either is finely tuned for Information security or is not.
Where security is lacking, the problem is often a matter of focus. Sitting before us each day is a set of tasks which demand our attention. We focus our attention on those aspects of problem solving which we are most familiar with, setting out to complete tasks using the methodology we perceive as most efficient.Learn more about protecting:
Posted byon July 25, 2014 at 10:25 AM EDT
In today’s techno-saturated society, where devices are equipped with high quality cameras and microphones that can instantly share to the entire population of the Internet, we need to consider what is appropriate when using wearable technology. Wearable technology (also called wearable gadgets) is a category of technology devices that can be worn by a consumer and often include tracking information related to health and fitness.Learn more about protecting:
Posted byon July 23, 2014 at 5:16 PM EDT
Indiana University fully supports the goals of the Indiana Lifeline Law.
There is no sense in someone being seriously injured or dying because someone doesn't seek medical assistance for a person suffering from an alcohol-related health emergency, for fear of legal consequences. This law seeks to provide protections for those Good Samaritans who stay and help.
See the video describing the law by Indiana State Senator Jim Merritt and Indiana Attorney General Greg Zoeller at
Posted byon July 18, 2014 at 2:42 PM EDT
University employees and students have been targets of cyber-related crimes in the forms of phishing schemes and identity theft. Recently, phishing schemes ask the recipient to follow a link in order to facilitate a pay raise.
A public service announcement was previously released by the FBI’s Internet Crime Complaint Center (IC3) regarding this type of activity and is copied below.Learn more about protecting:
Posted byon July 15, 2014 at 10:12 AM EDT
The advancements in Information Technology over the past two decades have been nothing short of awe-inspiring. From the humble beginnings of limited-access mainframe systems and limited internet access via telephone-based modems to the instant and continual-access systems of today. In fact, at the heart of ongoing technological advancement is heavy reliance on internet-based systems and data connectivity from a range of devices previously inconceivable to the average consumer.Learn more about protecting:
Posted byon June 6, 2014 at 2:10 PM EDT
Last week, the developers of Truecrypt announced they had ceased development on the software. They removed all functional versions of the product and uploaded a version which can only be used to decrypt Truecrypt volumes. The website also claims that Truecrypt is no longer secure.Learn more about protecting: