The Protect IU Blog
Posted byon July 18, 2014 at 2:42 PM EDT
University employees and students have been targets of cyber-related crimes in the forms of phishing schemes and identity theft. Recently, phishing schemes ask the recipient to follow a link in order to facilitate a pay raise.
A public service announcement was previously released by the FBI’s Internet Crime Complaint Center (IC3) regarding this type of activity and is copied below.Learn more about protecting:
Posted byon July 15, 2014 at 10:12 AM EDT
The advancements in Information Technology over the past two decades have been nothing short of awe-inspiring. From the humble beginnings of limited-access mainframe systems and limited internet access via telephone-based modems to the instant and continual-access systems of today. In fact, at the heart of ongoing technological advancement is heavy reliance on internet-based systems and data connectivity from a range of devices previously inconceivable to the average consumer.Learn more about protecting:
Posted byon June 6, 2014 at 2:10 PM EDT
Last week, the developers of Truecrypt announced they had ceased development on the software. They removed all functional versions of the product and uploaded a version which can only be used to decrypt Truecrypt volumes. The website also claims that Truecrypt is no longer secure.Learn more about protecting:
Posted byon June 5, 2014 at 10:25 AM EDT
On June 5th, 2014, the developers of OpenSSL software released a critical update, patching 6 different vulnerabilities, one of which can lead to remote code execution.Learn more about protecting:
Posted byon May 7, 2014 at 3:18 PM EDT
May 7, 2015
Sergio Santiago believes in hard work.
The full-time student and part-time police officer has demonstrated his work ethic in the classroom and as a member of the Indiana University East Police Department. All of his hard work will pay off as Santiago receives his bachelor's degree in criminal justice at IU East’s commencement ceremony on May 16.Learn more about protecting:
Posted byon May 2, 2014 at 10:38 AM EDT
Having an open and unsecured home network is a risk as it may allow intruders to view your activity, gather information about you, or utilize your network for nefarious purposes. These can lead to potential legal issues, service outages, network performance issues, invasions of privacy, and identity theft.
To make your home network more secure, consider implementing the suggestions below. You may also refer to manufacturer's documentation that came with your router/wireless router for the recommended configuration and settings.
Secure Router Configuration Basics:Learn more about protecting:
Posted byon May 2, 2014 at 9:33 AM EDT
The IU Data Stewards have approved the online survey service provider, Qualtrics, for the use of HIPAA and FERPA protected data.
Qualtrics has not been approved for other Critical data elements.
As with any information technology system, data protection best practices should be known and followed. Among these are:Learn more about protecting:
Posted byon April 28, 2014 at 4:13 PM EDT
Microsoft has released an patch for the Internet Explorer vulnerability. If you haven't enabled daily automatic updates as described below, you should. You can also visit Windows Update directly.Learn more about protecting:
Posted byon April 18, 2014 at 1:23 PM EDT
We have received approximately 25 reports from faculty and staff who have had a fraudulent 2013 federal tax return submitted to the IRS in their name.
The University Information Security and Policy Offices have reported these cases to the FBI, U.S. Secret Service, and the IRS.Learn more about protecting:
Posted byon March 26, 2014 at 4:56 PM EDT
On March 24th 2014, Microsoft released an advisory describing a vulnerability in all supported versions of Microsoft Word related to opening a maliciously crafted Rich Text Format (RTF) file. Users of Microsoft Outlook may also be at risk as by default Outlook uses Word to view certain email types.Learn more about protecting: